{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:22:05Z","timestamp":1767183725899,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1909854"],"award-info":[{"award-number":["1909854"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3676536.3676842","type":"proceedings-article","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:21:20Z","timestamp":1744204880000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing DNN Accelerator Integrity via Selective and Permuted Recomputation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3061-3428","authenticated-orcid":false,"given":"Jhon","family":"Ordo\u00f1ez","sequence":"first","affiliation":[{"name":"University of Delaware, Newark, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0978-1504","authenticated-orcid":false,"given":"Chengmo","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Delaware, Newark, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"FT-DeepNets: Fault-Tolerant Convolutional Neural Networks with Kernel-based Duplication. In 2022 IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV).","author":"Baek Iljoo","year":"2022","unstructured":"Iljoo Baek, Wei Chen, Zhihao Zhu, Soheil Samii, and Ragunathan Raj Rajkumar. 2022. FT-DeepNets: Fault-Tolerant Convolutional Neural Networks with Kernel-based Duplication. In 2022 IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"volume-title":"On the Resilience of Deep Learning for Reduced-voltage FPGAs. In 2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP).","author":"Givaki Kamyar","key":"e_1_3_2_1_3_1","unstructured":"Kamyar Givaki, Behzad Salami, Reza Hojabr, S. M. Reza Tayaranian, Ahmad Khonsari, Dara Rahmati, Saeid Gorgin, Adrian Cristal, and Osman S. Unsal. 2020. On the Resilience of Deep Learning for Reduced-voltage FPGAs. In 2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)."},{"key":"e_1_3_2_1_4_1","volume-title":"Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","author":"He Kaiming","year":"2016","unstructured":"Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_5_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE).","author":"Hoang Le-Ha","year":"2020","unstructured":"Le-Ha Hoang, Muhammad Abdullah Hanif, and Muhammad Shafique. 2020. FT-ClipAct: Resilience Analysis of Deep Neural Networks and Improving their Fault Tolerance using Clipped Activation. In 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST49136.2021.9702292"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Fateme S. Hosseini Fanruo Meng Chengmo Yang Wujie Wen and Rosario Cammarota. 2021. Tolerating Defects in Low-Power Neural Network Accelerators Via Retraining-Free Weight Approximation. ACM Trans. Embed. Comput. Syst. (2021).","DOI":"10.1145\/3477016"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00140"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530498"},{"key":"e_1_3_2_1_10_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE).","author":"Lee Seo-Seok","year":"2022","unstructured":"Seo-Seok Lee and Joon-Sung Yang. 2022. Value-aware Parity Insertion ECC for Fault-tolerant Deep Neural Network. In 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359831"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218577"},{"key":"e_1_3_2_1_13_1","volume-title":"Zhenkai Liang, Yueqiang Cheng, and Yajin Zhou.","author":"Lou Xiaoxuan","year":"2019","unstructured":"Xiaoxuan Lou, Fan Zhang, Zheng Leong Chua, Zhenkai Liang, Yueqiang Cheng, and Yajin Zhou. 2019. Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework. ArXiv (2019)."},{"key":"e_1_3_2_1_14_1","volume-title":"DeepStrike: Remotely-Guided Fault Injection Attacks on DNN Accelerator in Cloud-FPGA. In 2021 58th ACM\/IEEE Design Automation Conference (DAC).","author":"Luo Yukui","year":"2021","unstructured":"Yukui Luo, Cheng Gongye, Yunsi Fei, and Xiaolin Xu. 2021. DeepStrike: Remotely-Guided Fault Injection Attacks on DNN Accelerator in Cloud-FPGA. In 2021 58th ACM\/IEEE Design Automation Conference (DAC)."},{"key":"e_1_3_2_1_15_1","volume-title":"Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era. Comput. Surveys","author":"Mahmoud Dina G.","year":"2023","unstructured":"Dina G. Mahmoud, Vincent Lenders, and Mirjana Stojilovi\u0107. 2023. Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era. Comput. Surveys (2023)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394885.3431519"},{"key":"e_1_3_2_1_17_1","volume-title":"Exploring Image Selection for Self-Testing in Neural Network Accelerators. In 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).","author":"Meng Fanruo","year":"2022","unstructured":"Fanruo Meng and Chengmo Yang. 2022. Exploring Image Selection for Self-Testing in Neural Network Accelerators. In 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)."},{"key":"e_1_3_2_1_18_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE).","author":"Ordo\u00f1ez Jhon","year":"2024","unstructured":"Jhon Ordo\u00f1ez and Chengmo Yang. 2024. Derailed: Arbitrarily Controlling DNN Outputs with Targeted Fault Injection Attacks. In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE)."},{"key":"e_1_3_2_1_19_1","volume-title":"T-BFA: Targeted Bit-Flip Adversarial Weight Attack","author":"Rakin Adnan Siraj","year":"2022","unstructured":"Adnan Siraj Rakin, Zhezhi He, Jingtao Li, Fan Yao, Chaitali Chakrabarti, and Deliang Fan. 2022. T-BFA: Targeted Bit-Flip Adversarial Weight Attack. IEEE Transactions on Pattern Analysis and Machine Intelligence (2022)."},{"key":"e_1_3_2_1_20_1","volume-title":"RA-BNN: Constructing Robust & Accurate Binary Neural Network to Simultaneously Defend Adversarial Bit-Flip Attack and Improve Accuracy. ArXiv","author":"Rakin Adnan Siraj","year":"2021","unstructured":"Adnan Siraj Rakin, Li Yang, Jingtao Li, Fan Yao, Chaitali Chakrabarti, Yu Cao, Jae-sun Seo, and Deliang Fan. 2021. RA-BNN: Constructing Robust & Accurate Binary Neural Network to Simultaneously Defend Adversarial Bit-Flip Attack and Improve Accuracy. ArXiv (2021)."},{"key":"e_1_3_2_1_21_1","volume-title":"Lightning: Striking the Secure Isolation on GPU Clouds with Transient Hardware Faults. ACM Trans. Des. Autom. Electron. Syst.","author":"Sun Rihui","year":"2023","unstructured":"Rihui Sun, Pefei Qiu, Yongqiang Lyu, Donsheng Wang, Jiang Dong, and Gang Qu. 2023. Lightning: Striking the Secure Isolation on GPU Clouds with Transient Hardware Faults. ACM Trans. Des. Autom. Electron. Syst. (2023)."},{"volume-title":"Rethinking the Inception Architecture for Computer Vision. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Szegedy C.","key":"e_1_3_2_1_22_1","unstructured":"C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna. 2016. Rethinking the Inception Architecture for Computer Vision. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530516"},{"key":"e_1_3_2_1_24_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Yao Fan","year":"2020","unstructured":"Fan Yao, Adnan Siraj Rakin, and Deliang Fan. 2020. DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips. In 29th USENIX Security Symposium (USENIX Security 20)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3129114"}],"event":{"name":"ICCAD '24: 43rd IEEE\/ACM International Conference on Computer-Aided Design","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","IEEE CEDA","IEEE EDS"],"location":"Newark Liberty International Airport Marriott New York NY USA","acronym":"ICCAD '24"},"container-title":["Proceedings of the 43rd IEEE\/ACM International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676536.3676842","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676536.3676842","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676536.3676842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:45Z","timestamp":1750295925000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676536.3676842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":25,"alternative-id":["10.1145\/3676536.3676842","10.1145\/3676536"],"URL":"https:\/\/doi.org\/10.1145\/3676536.3676842","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2025-04-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}