{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:35:26Z","timestamp":1770842126366,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670449","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Transfer Adversarial Attacks through Approximate Computing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0964-7014","authenticated-orcid":false,"given":"Valentina","family":"Casola","sequence":"first","affiliation":[{"name":"University of Naples Federico II, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5489-5370","authenticated-orcid":false,"given":"Salvatore","family":"Della Torca","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Napoli Federico II, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTS56346.2023.10140043"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2940943"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110760"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Mohammad\u00a0Javad Askarizadeh Ebrahim Farahmand Jorge Castro-Godinez Ali Mahani Laura Cabrera-Quiros and Carlos Salazar-Garcia. 2024. Exploring DNN Robustness Against Adversarial Attacks Using Approximate Multipliers. http:\/\/arxiv.org\/abs\/2404.11665 arXiv:2404.11665 [cs].","DOI":"10.1109\/CONCAPAN63470.2024.10933879"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2024.3403757"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3501772"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-021-01565-5"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2022.3170502"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2024.103112"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3087858"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2022.06.386"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Ruihao Gong Xianglong Liu Shenghu Jiang Tianxiang Li Peng Hu Jiazhen Lin Fengwei Yu and Junjie Yan. 2019. Differentiable Soft Quantization: Bridging Full-Precision and Low-Bit Neural Networks. 4852\u20134861. https:\/\/openaccess.thecvf.com\/content_ICCV_2019\/html\/Gong_Differentiable_Soft_Quantization_Bridging_Full-Precision_and_Low-Bit_Neural_Networks_ICCV_2019_paper.html","DOI":"10.1109\/ICCV.2019.00495"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Ian\u00a0J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. https:\/\/doi.org\/10.48550\/arXiv.1412.6572 arXiv:1412.6572 [cs stat].","DOI":"10.48550\/arXiv.1412.6572"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446747"},{"key":"e_1_3_2_1_16_1","volume-title":"Advances in Neural Information Processing Systems, Vol.\u00a033. Curran Associates","author":"Guo Yiwen","year":"2020","unstructured":"Yiwen Guo, Qizhang Li, and Hao Chen. 2020. Backpropagating Linearly Improves Transferability of Adversarial Examples. In Advances in Neural Information Processing Systems, Vol.\u00a033. Curran Associates, Inc., 85\u201395. https:\/\/proceedings.neurips.cc\/paper\/2020\/hash\/00e26af6ac3b1c1c49d7c3d79c60d000-Abstract.html"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_18_1","unstructured":"Alex Krizhevsky Vinod Nair and Geoffrey Hinton. 2010. CIFAR-10 (canadian institute for advanced research). https:\/\/www.cs.toronto.edu\/\u00a0kriz\/cifar.html"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103431"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2021.08.001"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7926993"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942068"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3164354"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3623402"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097264"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774563"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"e_1_3_2_1_29_1","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian Goodfellow and Rob Fergus. 2014. Intriguing properties of neural networks. http:\/\/arxiv.org\/abs\/1312.6199 arXiv:1312.6199 [cs]."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.3019460"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627369.2627613"},{"key":"e_1_3_2_1_32_1","unstructured":"Cihang Xie Zhishuai Zhang Yuyin Zhou Song Bai Jianyu Wang Zhou Ren and Alan\u00a0L. Yuille. 2019. Improving Transferability of Adversarial Examples With Input Diversity. 2730\u20132739. https:\/\/openaccess.thecvf.com\/content_CVPR_2019\/html\/Xie_Improving_Transferability_of_Adversarial_Examples_With_Input_Diversity_CVPR_2019_paper.html"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119491"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3360891"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2024"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670449","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:52:16Z","timestamp":1755881536000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670449"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":34,"alternative-id":["10.1145\/3664476.3670449","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670449","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}