{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:27:34Z","timestamp":1730266054239,"version":"3.28.0"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000266","name":"UK EPSRC","doi-asserted-by":"publisher","award":["EP\/S035362\/1"],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,18]]},"DOI":"10.1109\/ijcnn54540.2023.10191429","type":"proceedings-article","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T13:30:03Z","timestamp":1690983003000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Improving Robustness Against Adversarial Attacks with Deeply Quantized Neural Networks"],"prefix":"10.1109","author":[{"given":"Ferheen","family":"Ayaz","sequence":"first","affiliation":[{"name":"University of Sussex,UK"}]},{"given":"Idris","family":"Zakariyya","sequence":"additional","affiliation":[{"name":"University of Glasgow,UK"}]},{"given":"Jos\u00e9","family":"Cano","sequence":"additional","affiliation":[{"name":"University of Glasgow,UK"}]},{"given":"Sye Loong","family":"Keoh","sequence":"additional","affiliation":[{"name":"University of Glasgow,UK"}]},{"given":"Jeremy","family":"Singer","sequence":"additional","affiliation":[{"name":"University of Glasgow,UK"}]},{"given":"Danilo","family":"Pau","sequence":"additional","affiliation":[{"name":"STMicroelectronics"}]},{"given":"Mounia","family":"Kharbouche-Harrari","sequence":"additional","affiliation":[{"name":"STMicroelectronics"}]}],"member":"263","reference":[{"journal-title":"Defensive quantization When efficiency meets robustness","year":"2019","author":"lin","key":"ref13"},{"journal-title":"Opportunities and challenges in deep learning adversarial robustness A survey","year":"2020","author":"silva","key":"ref12"},{"journal-title":"MLPerf Tiny Benchmark","year":"2021","author":"banbury","key":"ref56"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3064507"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3370748.3406585"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-809633-8.20349-X"},{"key":"ref52","first-page":"7650","article-title":"Random Noise Defense Against Query-based Black-box Attacks","volume":"34","author":"qin","year":"2021","journal-title":"Advances in neural information processing systems"},{"journal-title":"Learning accurate low-bit deep neural networks with stochastic quantization","year":"2017","author":"dong","key":"ref11"},{"journal-title":"Scikit-learn Machine Learning Python API","year":"2019","key":"ref55"},{"key":"ref10","article-title":"Automatic Heterogeneous Quantization of Deep Neural Networks for Low-latency Inference on the Edge for Particle Detectors","author":"c","year":"2021","journal-title":"Internet of Things"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2912815"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6663028"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref18","article-title":"Bridging the Performance Gap between FGSM and PGD Adversarial Training","author":"huang","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref51","article-title":"Adversarial Robustness Toolbox v1. 0.0","author":"nicolae","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref46","article-title":"Reading Digits in Natural Images with Unsupervised Feature Learning","author":"netzer","year":"2011","journal-title":"NIPS Workshop on Deep Learning and Unsupervised Feature Learning"},{"journal-title":"Learning multiple layers of features from tiny images","year":"2009","author":"krizhevsky","key":"ref45"},{"key":"ref48","article-title":"SGDR: Stochastic Gradient Descent with Warm Restarts","author":"loshchilov","year":"2017","journal-title":"ICLRE"},{"journal-title":"Google's Speech Commands Dataset","year":"2016","author":"commands","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2018.11.005"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3469116.3470015"},{"journal-title":"Netronome","year":"2022","author":"roeder","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17123"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"journal-title":"Xilinx\/brevitas","year":"2022","author":"pappalardo","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.21105\/joss.01746"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/RTSI50628.2021.9597341"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3032744"},{"key":"ref3","first-page":"108:1","article-title":"Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain","volume":"54","author":"rosenberg","year":"2021","journal-title":"ACM Comput Surv"},{"key":"ref6","article-title":"TensorFlow Lite Micro: Embedded Machine Learning for TinyML Systems","volume":"3","author":"david","year":"2021","journal-title":"Proc of the Machine Learning and Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2021.3133552"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33018368"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3453688.3461755"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3377555.3377900"},{"journal-title":"QKeras Quantization Extension to Keras","year":"2017","key":"ref37"},{"journal-title":"Keras Framework Python Deep Learning API","year":"2017","key":"ref36"},{"key":"ref31","article-title":"Improving Adversarial Robustness in Weight-quantized Neural Networks","author":"song","year":"2020","journal-title":"ArXiv e-prints"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Berlin53567.2021.9720009"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2019.00057"},{"key":"ref32","article-title":"Attacking Binarized Neural Networks","author":"galloway","year":"2018","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2018.8573503"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.038"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1134\/S1995080222090232"},{"key":"ref38","article-title":"DoReFa-Net: Training Low Bitwidth Convolutional Neural Networks with Low Bitwidth Gradients","author":"zhou","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534397"},{"key":"ref23","article-title":"WaveGuard: Understanding and Mitigating Audio Adversarial Examples","author":"hussain","year":"2021","journal-title":"Proc of the 30th USENIX Security Symposium"},{"key":"ref26","article-title":"Adversarial Robustness via Fisher-rao Regularization","author":"picot","year":"2022","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC49221.2020.9297344"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00130"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01446"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-019-1211-x"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2708039"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01258-8_32"},{"journal-title":"A survey of quantization methods for efficient neural network inference","year":"2021","author":"gholami","key":"ref29"}],"event":{"name":"2023 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2023,6,18]]},"location":"Gold Coast, Australia","end":{"date-parts":[[2023,6,23]]}},"container-title":["2023 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10190990\/10190992\/10191429.pdf?arnumber=10191429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T13:47:16Z","timestamp":1692625636000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10191429\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,18]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/ijcnn54540.2023.10191429","relation":{},"subject":[],"published":{"date-parts":[[2023,6,18]]}}}