{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:49:04Z","timestamp":1725515344347},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.23919\/date.2019.8714807","type":"proceedings-article","created":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T21:29:07Z","timestamp":1558042147000},"page":"908-913","source":"Crossref","is-referenced-by-count":1,"title":["Real-Time Anomalous Branch Behavior Inference with a GPU-inspired Engine for Machine Learning Models"],"prefix":"10.23919","author":[{"given":"Hyunyoung","family":"Oh","sequence":"first","affiliation":[]},{"given":"Hayoon","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Hyeokjun","family":"Choe","sequence":"additional","affiliation":[]},{"given":"Yeongpil","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Sungroh","family":"Yoon","sequence":"additional","affiliation":[]},{"given":"Yunheung","family":"Paek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11933-5_44"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2764908"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056070"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485970"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2012.2218630"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3123953"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2010.10.002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3035965"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HOTCHIPS.2015.7477329"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813654"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.37"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.49"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2491300"},{"key":"ref8","article-title":"Extended abstract: Mimicry resilient program behavior modeling with lstm based branch models","author":"yi","year":"2018","journal-title":"1st Deep Learning and Security Workshop (DLS 2018) arXiv preprint arXiv 1803 09171"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00025"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.13"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.54"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745295"}],"event":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2019,3,25]]},"location":"Florence, Italy","end":{"date-parts":[[2019,3,29]]}},"container-title":["2019 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8704855\/8714721\/08714807.pdf?arnumber=8714807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T23:49:02Z","timestamp":1559605742000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8714807\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/date.2019.8714807","relation":{},"subject":[],"published":{"date-parts":[[2019,3]]}}}