{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T09:01:01Z","timestamp":1770541261887,"version":"3.49.0"},"reference-count":64,"publisher":"Association for Computing Machinery (ACM)","issue":"3","funder":[{"name":"National Key Research and Development Program of China","award":["2024YFE0204300"],"award-info":[{"award-number":["2024YFE0204300"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62402311"],"award-info":[{"award-number":["62402311"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Foundation of Shanghai","award":["24ZR1433700"],"award-info":[{"award-number":["24ZR1433700"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Archit. Code Optim."],"published-print":{"date-parts":[[2025,9,30]]},"abstract":"<jats:p>Hyper-Dimensional Computing (HDC) has emerged as a lightweight computational model, renowned for its robust and efficient learning capabilities, particularly suitable for resource-constrained hardware. As HDC often finds its application in edge devices, the associated security challenges pose a critical concern that cannot be ignored. In this work, we aim to quantitatively delve into the robustness of binary HDC, which is widely recognized for its robustness. Employing the bit-flip attack as our initial focal point, we meticulously devise both an attack mechanism and a corresponding defense mechanism. Our objective is to comprehensively explore the robustness of the binary hyper-dimensional computation model, aiming to gain a deeper understanding of its security vulnerabilities and potential defenses.<\/jats:p>\n          <jats:p>Specifically, we introduce a novel attack framework for HDC, named HyperAttack, which is capable of compromising a robust binary HDC model by maliciously flipping a minimal number of bits within its memory system (specifically, the DRAM) that houses the associative memory. The bit-flip operation is executed through the well-known Row Hammer attack, and HyperAttack optimizes the accuracy degradation by pinpointing the most vulnerable bits in the hyper-dimensional vectors (represented as binary vectors within the associative memory) of the HDC model. The proposed HyperAttack framework is grounded in the principles of fuzziness, seamlessly integrating dimensional ranking and feature similarity analysis within hypervectors to precisely identify the bits to be flipped. Furthermore, we have developed a defense mechanism named HyperDefense, designed to bolster the robustness of binary hyper-dimensional computational models against bit-flip attacks. This defense scheme is tailored specifically for HDC models, providing a robust safeguard against potential threats. HyperDefense operates directly on the associative memory of HDC models, strengthening their defenses. By meticulously modifying selected bits, HyperDefense maintains a high level of accuracy close to the original model, even in the face of increased bit flip rates. This defense mechanism leverages redundant dimensions as backups for critical information. Through a thorough analysis of dimension importance, HyperDefense achieves superior robustness by gracefully sacrificing non-critical dimensions, thus ensuring the model\u2019s robustness against potential attacks.<\/jats:p>","DOI":"10.1145\/3736172","type":"journal-article","created":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T07:20:27Z","timestamp":1747725627000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Attack and Defense: Enhancing Robustness of Binary Hyper-Dimensional Computing"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2939-6534","authenticated-orcid":false,"given":"Haomin","family":"Li","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University","place":["Shanghai, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8769-293X","authenticated-orcid":false,"given":"Fangxin","family":"Liu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University","place":["Shanghai, China"]},{"name":"Shanghai Qi Zhi Institute","place":["Shanghai, China"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2157-4927","authenticated-orcid":false,"given":"Zongwu","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University","place":["Shanghai, China"]},{"name":"Shanghai Qi Zhi Institute","place":["Shanghai, China"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6964-8910","authenticated-orcid":false,"given":"Ning","family":"Yang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University","place":["Shanghai, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8086-6802","authenticated-orcid":false,"given":"Shiyuan","family":"Huang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University","place":["Shanghai, China"]},{"name":"Shanghai Qi Zhi Institute","place":["Shanghai, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2790-5884","authenticated-orcid":false,"given":"Xiaoyao","family":"Liang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University","place":["Shanghai, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4714-7400","authenticated-orcid":false,"given":"Haibing","family":"Guan","sequence":"additional","affiliation":[{"name":"School of Software, Shanghai Jiao Tong University","place":["Shanghai, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7353-8798","authenticated-orcid":false,"given":"Li","family":"Jiang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University","place":["Shanghai, China"]},{"name":"Shanghai Qi Zhi Institute","place":["Shanghai, China"]}]}],"member":"320","published-online":{"date-parts":[[2025,9,17]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"e_1_3_2_3_2","first-page":"515","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security\u201919)","author":"Batina Lejla","year":"2019","unstructured":"Lejla Batina, Shivam Bhasin, Dirmanto Jap, and Stjepan Picek. 2019. CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel. In Proceedings of the 28th USENIX Security Symposium (USENIX Security\u201919). USENIX Association, Santa Clara, CA, 515\u2013532. Retrieved from https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/batina"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.24432\/C51S4N"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12026"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.24432\/C51G69"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300276"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576914.3587484"},{"key":"e_1_3_2_9_2","first-page":"1","volume-title":"Proceedings of the 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201923)","author":"Gungor Onat","year":"2023","unstructured":"Onat Gungor, Tajana Rosing, and Baris Aksanli. 2023. HD-I-IoT: Hyperdimensional computing for resilient industrial internet of things analytics. In Proceedings of the 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201923). IEEE, 1\u20136."},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586217"},{"key":"e_1_3_2_11_2","doi-asserted-by":"crossref","first-page":"56","DOI":"10.23919\/DATE51398.2021.9474107","volume-title":"Proceedings of the 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201921)","author":"Hern\u00e1ndez-Cano Alejandro","year":"2021","unstructured":"Alejandro Hern\u00e1ndez-Cano, Namiko Matsumoto, Eric Ping, and Mohsen Imani. 2021. OnlineHD: Robust, efficient, and single-pass online learning using hyperdimensional system. In Proceedings of the 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201921). IEEE, 56\u201361."},{"key":"e_1_3_2_12_2","first-page":"884","volume-title":"Proceedings of the 2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC\u201924)","author":"Huang Shiyuan","year":"2024","unstructured":"Shiyuan Huang, Fangxin Liu, Tian Li, Zongwu Wang, Haomin Li, and Li Jiang. 2024. TSTC: Enabling efficient training via structured sparse tensor compilation. In Proceedings of the 2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC\u201924). IEEE, 884\u2013889."},{"issue":"10","key":"e_1_3_2_13_2","doi-asserted-by":"crossref","first-page":"2268","DOI":"10.1109\/TCAD.2019.2954472","article-title":"QuantHD: A quantization framework for hyperdimensional computing","volume":"39","author":"Imani Mohsen","year":"2019","unstructured":"Mohsen Imani, Samuel Bosch, Sohum Datta, Sharadhi Ramakrishna, Sahand Salamat, Jan M. Rabaey, and Tajana Rosing. 2019. QuantHD: A quantization framework for hyperdimensional computing. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 39, 10 (2019), 2268\u20132278.","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRC.2017.8123650"},{"key":"e_1_3_2_15_2","doi-asserted-by":"crossref","first-page":"126","DOI":"10.23919\/DATE.2019.8714821","volume-title":"Proceedings of the 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201919)","author":"Imani Mohsen","year":"2019","unstructured":"Mohsen Imani, John Messerly, Fan Wu, Wang Pi, and Tajana Rosing. 2019. A binary learning framework for hyperdimensional computing. In Proceedings of the 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201919). IEEE, 126\u2013131."},{"key":"e_1_3_2_16_2","volume-title":"Proceedings of the 2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)","author":"Imani Mohsen","year":"2017","unstructured":"Mohsen Imani, Abbas Rahimi, Deqian Kong, Tajana Rosing, and Jan M. Rabaey. 2017. Exploring hyperdimensional associative memory. In Proceedings of the 2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)."},{"key":"e_1_3_2_17_2","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/HPCA51647.2021.00028","volume-title":"Proceedings of the 2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA\u201921)","author":"Imani Mohsen","year":"2021","unstructured":"Mohsen Imani, Zhuowen Zou, Samuel Bosch, Sanjay Anantha Rao, Sahand Salamat, Venkatesh Kumar, Yeseong Kim, and Tajana Rosing. 2021. Revisiting hyperdimensional learning for FPGA and low-power architectures. In Proceedings of the 2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA\u201921). IEEE, 221\u2013234."},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-020-0410-3"},{"key":"e_1_3_2_19_2","volume-title":"Proceedings of the 2020 57th ACM\/IEEE Design Automation Conference (DAC)","author":"Khaleghi Behnam","year":"2020","unstructured":"Behnam Khaleghi, Mohsen Imani, and Tajana Rosing. 2020. Prive-HD: Privacy-preserved hyperdimensional computing. In Proceedings of the 2020 57th ACM\/IEEE Design Automation Conference (DAC)."},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"e_1_3_2_21_2","first-page":"361","volume-title":"Proceeding of the 41st Annual International Symposium on Computer Architecuture (ISCA\u201914)","author":"Kim Yoongu","year":"2014","unstructured":"Yoongu Kim, Ross Daly, Jeremie Kim, Chris Fallin, Ji Hye Lee, Donghyuk Lee, Chris Wilkerson, Konrad Lai, and Onur Mutlu. 2014. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors. In Proceeding of the 41st Annual International Symposium on Computer Architecuture (ISCA\u201914). IEEE Press, 361\u2013372."},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586235"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD57390.2023.10323813"},{"key":"e_1_3_2_24_2","first-page":"716","volume-title":"Proceedings of the 2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC\u201924)","author":"Li Haomin","year":"2024","unstructured":"Haomin Li, Fangxin Liu, Yichi Chen, and Li Jiang. 2024. HyperFeel: An efficient federated learning framework using hyperdimensional computing. In Proceedings of the 2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC\u201924). IEEE, 716\u2013721."},{"key":"e_1_3_2_25_2","volume-title":"Proceedings of the 52th Annual International Symposium on Computer Architecture","author":"Li Haomin","year":"2025","unstructured":"Haomin Li, Fangxin Liu, Yichi Chen, Zongwu Wang, Shiyuan Huang, Ning Yang, Dongxu Lyu, and Li Jiang. 2025. FATE: Boosting the performance of hyper-dimensional computing intelligence with flexible numerical data type. In Proceedings of the 52th Annual International Symposium on Computer Architecture."},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658617.3697716"},{"key":"e_1_3_2_27_2","first-page":"1","volume-title":"Proceedings of the 2025 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201925)","author":"Li Haomin","year":"2025","unstructured":"Haomin Li, Fangxin Liu, Zongwu Wang, Dongxu Lyu, Shiyuan Huang, Ning Yang, Qi Sun, Zhuoran Song, and Li Jiang. 2025. TAIL: Exploiting temporal asynchronous execution for efficient spiking neural networks with inter-layer parallelism. In Proceedings of the 2025 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201925). IEEE, 1\u20136."},{"key":"e_1_3_2_28_2","first-page":"1","volume-title":"Proceedings of the 2020 57th ACM\/IEEE Design Automation Conference (DAC\u201920)","author":"Li Jingtao","year":"2020","unstructured":"Jingtao Li, Adnan Siraj Rakin, Yan Xiong, Liangliang Chang, Zhezhi He, Deliang Fan, and Chaitali Chakrabarti. 2020. Defending bit-flip attack through DNN weight reconstruction. In Proceedings of the 2020 57th ACM\/IEEE Design Automation Conference (DAC\u201920). IEEE, 1\u20136."},{"key":"e_1_3_2_29_2","first-page":"1","volume-title":"Proceedings of the 2023 60th ACM\/IEEE Design Automation Conference (DAC\u201923)","author":"Liu Fangxin","year":"2023","unstructured":"Fangxin Liu, Haoming Li, Yongbiao Chen, Tao Yang, and Li Jiang. 2023. Hyperattack: An efficient attack framework for hyperdimensional computing. In Proceedings of the 2023 60th ACM\/IEEE Design Automation Conference (DAC\u201923). IEEE, 1\u20136."},{"key":"e_1_3_2_30_2","first-page":"1","volume-title":"Proceedings of the 2025 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201925)","author":"Liu Fangxin","year":"2025","unstructured":"Fangxin Liu, Haomin Li, Zongwu Wang, Dongxu Lyu, and Li Jiang. 2025. HyperDyn: Dynamic dimensional masking for efficient hyper-dimensional computing. In Proceedings of the 2025 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201925). IEEE, 1\u20136."},{"key":"e_1_3_2_31_2","first-page":"46","volume-title":"Proceedings of the 2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC\u201924)","author":"Liu Fangxin","year":"2024","unstructured":"Fangxin Liu, Haomin Li, Ning Yang, Yichi Chen, Zongwu Wang, Tao Yang, and Li Jiang. 2024. PAAP-HD: PIM-Assisted approximation for efficient hyper-dimensional computing. In Proceedings of the 2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC\u201924). IEEE, 46\u201351."},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC58780.2024.10473984"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531761"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA57654.2024.00082"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20061"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00523"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530660"},{"key":"e_1_3_2_38_2","first-page":"1","volume-title":"Proceedings of the 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201923)","author":"Liu Fangxin","year":"2023","unstructured":"Fangxin Liu, Wenbo Zhao, Zongwu Wang, Xiaokang Yang, and Li Jiang. 2023. SIMSnn: A weight-agnostic ReRAM-based search-in-memory engine for SNN acceleration. In Proceedings of the 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201923). IEEE, 1\u20132."},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3156017"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3263120"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3566097.3568355"},{"key":"e_1_3_2_42_2","unstructured":"Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2018. Towards deep learning models resistant to adversarial attacks. In 6th International Conference on Learning Representations ICLR 2018 Vancouver BC Canada April 30 - May 3 2018 Conference Track Proceedings."},{"issue":"15","key":"e_1_3_2_43_2","doi-asserted-by":"crossref","first-page":"6790","DOI":"10.3390\/app11156790","article-title":"Physical side-channel attacks on embedded neural networks: A survey","volume":"11","author":"Real Maria M\u00e9ndez","year":"2021","unstructured":"Maria M\u00e9ndez Real and Ruben Salvador. 2021. Physical side-channel attacks on embedded neural networks: A survey. Applied Sciences 11, 15 (2021), 6790.","journal-title":"Applied Sciences"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/HSI55341.2022.9869459"},{"key":"e_1_3_2_45_2","first-page":"710","volume-title":"Proceedings of the 2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC\u201924)","author":"Moreno Ivannia Gomez","year":"2024","unstructured":"Ivannia Gomez Moreno, Xiaofan Yu, and Tajana Rosing. 2024. KalmanHD: Robust on-device time series forecasting with hyperdimensional computing. In Proceedings of the 2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC\u201924). IEEE, 710\u2013715."},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3524067"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2022.757125"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586166"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12040853"},{"key":"e_1_3_2_51_2","first-page":"1211","volume-title":"Proceedings of the 2019 IEEE\/CVF International Conference on Computer Vision (ICCV)","author":"Rakin Adnan Siraj","year":"2019","unstructured":"Adnan Siraj Rakin, Zhezhi He, and Deliang Fan. 2019. Bit-flip attack: Crushing neural network with progressive bit search. In Proceedings of the 2019 IEEE\/CVF International Conference on Computer Vision (ICCV). 1211\u20131220."},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00130"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3112932"},{"key":"e_1_3_2_54_2","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/978-3-319-11179-7_23","volume-title":"Artificial Neural Networks and Machine Learning\u2013ICANN 2014: Proceedings of the 24th International Conference on Artificial Neural Networks","author":"Reyes-Ortiz Jorge-Luis","year":"2014","unstructured":"Jorge-Luis Reyes-Ortiz, Luca Oneto, Alessandro Ghio, Albert Sam\u00e1, Davide Anguita, and Xavier Parra. 2014. Human activity recognition on smartphones with awareness of basic activities and postural transitions. In Artificial Neural Networks and Machine Learning\u2013ICANN 2014: Proceedings of the 24th International Conference on Artificial Neural Networks. Springer, 177\u2013184."},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658617.3697768"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","unstructured":"Fran\u00e7ois-Xavier Standaert. 2010. Introduction to side-channel attacks. Secure Integrated Circuits and Systems (2010) 27\u201342. 10.1007\/978-0-387-71829-3_2","DOI":"10.1007\/978-0-387-71829-3_2"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774641"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO61859.2024.00083"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","unstructured":"Weihong Xu Saransh Gupta Justin Morris Xincheng Shen Mohsen Imani Baris Aksanli and Tajana Rosing. 2025. Tri-HD: Energy-efficient on-chip learning with in-memory hyperdimensional computing. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 44 2 (2025) 525\u2013539. 10.1109\/TCAD.2024.3435679","DOI":"10.1109\/TCAD.2024.3435679"},{"key":"e_1_3_2_60_2","first-page":"1","volume-title":"Proceedings of the 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201923)","author":"Xu Weihong","year":"2023","unstructured":"Weihong Xu, Jaeyoung Kang, and Tajana Rosing. 2023. FSL-HD: Accelerating few-shot learning on ReRAM using hyperdimensional computing. In Proceedings of the 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201923). IEEE, 1\u20136."},{"key":"e_1_3_2_61_2","doi-asserted-by":"crossref","unstructured":"Fangfang Yang and Shaolei Ren. 2020. On the vulnerability of hyperdimensional computing-based classifiers to adversarial attacks. In Network and System Security Miros\u0142aw Kuty\u0142owski Jun Zhang and Chao Chen (Eds.). Springer International Publishing Cham 371\u2013387.","DOI":"10.1007\/978-3-030-65745-1_22"},{"key":"e_1_3_2_62_2","first-page":"211","volume-title":"Proceedings of the 2021 IEEE 32nd International Conference on Application-Specific Systems, Architectures and Processors (ASAP\u201921)","author":"Zhang Sizhe","year":"2021","unstructured":"Sizhe Zhang, Ruixuan Wang, Jeff Jun Zhang, Abbas Rahimi, and Xun Jiao. 2021. Assessing robustness of hyperdimensional computing against errors in associative memory. In Proceedings of the 2021 IEEE 32nd International Conference on Application-Specific Systems, Architectures and Processors (ASAP\u201921). IEEE, 211\u2013217."},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.23919\/DATE56975.2023.10137289"},{"key":"e_1_3_2_64_2","first-page":"1","volume-title":"Proceedings of the 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201924)","author":"Zhao Quanling","year":"2024","unstructured":"Quanling Zhao, Xiaofan Yu, Shengfan Hu, and Tajana Rosing. 2024. MultimodalHD: Federated learning over heterogeneous sensor modalities using hyperdimensional computing. In Proceedings of the 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE\u201924). IEEE, 1\u20136."},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527422"}],"container-title":["ACM Transactions on Architecture and Code Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3736172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T13:43:46Z","timestamp":1758116626000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3736172"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":64,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9,30]]}},"alternative-id":["10.1145\/3736172"],"URL":"https:\/\/doi.org\/10.1145\/3736172","relation":{},"ISSN":["1544-3566","1544-3973"],"issn-type":[{"value":"1544-3566","type":"print"},{"value":"1544-3973","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,17]]},"assertion":[{"value":"2024-08-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-15","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}