{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:01:59Z","timestamp":1730224919587,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2212010,CNS-1916762,SaTC-1929300"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545351","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"332-342","source":"Crossref","is-referenced-by-count":0,"title":["One Flip Away from Chaos: Unraveling Single Points of Failure in Quantized DNN s"],"prefix":"10.1109","author":[{"given":"Cheng","family":"Gongye","sequence":"first","affiliation":[{"name":"Northeastern University,Department of Electrical & Computer Engineering,Boston,MA"}]},{"given":"Yunsi","family":"Fei","sequence":"additional","affiliation":[{"name":"Northeastern University,Department of Electrical & Computer Engineering,Boston,MA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2011.12"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2011.9"},{"key":"ref4","first-page":"71","article-title":"Exploiting the DRAM rowhammer bug to gain kernel privileges","volume":"15","author":"Seaborn","year":"2015","journal-title":"Black Hat"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.44-68"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218690"},{"key":"ref7","first-page":"497","article-title":"Terminal brain damage: Exposing the graceless degradation in deep neural networks under hardware fault attacks","volume-title":"USENIX Security Symposium","author":"Hong","year":"2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00130"},{"key":"ref9","article-title":"Ra-bnn: Constructing robust & accurate binary neural network to simultaneously defend adversarial bit-flip attack and improve accuracy","author":"Rakin","year":"2021","journal-title":"arXiv preprint"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3211411"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001165"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HOST49136.2021.9702287"},{"key":"ref13","article-title":"Information bottle- neck: Exact analysis of (quantized) neural networks","author":"Lorenzen","year":"2021","journal-title":"arXiv preprint"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833772"},{"key":"ref15","article-title":"Deephammer: Depleting the intelligence of deep neural networks through targeted chain of bit flips","volume-title":"USENIX Security Symposium","author":"Yao","year":"2020"},{"volume-title":"Automotive Solutions","year":"2023","key":"ref16"},{"volume-title":"Subaru Taps Xilinx For Its New EyeSight Vision-Based Advanced Driver-Assistance System","year":"2020","author":"Chiappetta","key":"ref17"},{"volume-title":"Xilinx SoC FPGA Powers Baidus Apollo Driverless Platform","year":"2020","author":"Wong","key":"ref18"},{"volume-title":"Vitis AI","year":"2023","key":"ref19"},{"volume-title":"TensorFlow","year":"2023","key":"ref20"},{"volume-title":"Achieving FP32 Accuracy for INT8 Inference Using Quantization Aware Training with NVIDIA TensorRT | NVIDIA Technical Blog","year":"2022","key":"ref21"},{"volume-title":"PyTorch vs News, Research","year":"2023","author":"OConnor","key":"ref22"},{"volume-title":"TorchScript for Deployment - PyTorch Tutorials 2.0.1+cu117 documentation","year":"2023","key":"ref23"},{"key":"ref24","article-title":"A white paper on neural network quantization","author":"Nagel","year":"2021","journal-title":"arXiv preprint"},{"volume-title":"Introduction Zynq DPU Product Guide (PG338) \u2022 Reader \u2022 AMD Adaptive Computing Documentation Portal","year":"2023","key":"ref25"},{"volume-title":"TensorFlow Lite | ML for Mobile and Edge Devices","year":"2023","key":"ref26"},{"article-title":"tvm-vta","volume-title":"apache","year":"2023","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774686"},{"volume-title":"The mnist database of handwritten digits","key":"ref29"},{"volume-title":"Zynq UltraScale+ MPSoC","year":"2023","key":"ref30"},{"volume-title":"Digilent. Ultra96-v2 board","key":"ref31"},{"volume-title":"Xilinx. Pynq","key":"ref32"},{"article-title":"ARM ELF File Format","volume-title":"Arm","year":"2021","key":"ref33"},{"key":"ref34","article-title":"F8net: Fixed-point 8-bit only multiplication for network quantization","author":"Jin","year":"2022","journal-title":"arXiv preprint"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS56730.2022.9897813"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00018"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643556"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD53106.2021.00090"},{"key":"ref41","first-page":"6347","article-title":"NeuroPots: Realtime proactive defense against Bit-Flip attacks in neural networks","volume-title":"32nd USENIX Security Symposium","author":"Liu","year":"2023"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2024,5,6]]},"location":"Tysons Corner, VA, USA","end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545351.pdf?arnumber=10545351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T04:11:58Z","timestamp":1717906318000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545351\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545351","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}