{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:51:26Z","timestamp":1763704286556,"version":"3.45.0"},"reference-count":66,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,26]]},"DOI":"10.1109\/iccad66269.2025.11240678","type":"proceedings-article","created":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:39:34Z","timestamp":1763663974000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Invited Paper: Hardware-Software Co-Design for Highly Optimized, Customized, and Reliable AI Systems"],"prefix":"10.1109","author":[{"given":"J\u00f6rg","family":"Henkel","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT),Germany"}]},{"given":"Mehdi","family":"Tahoori","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT),Germany"}]},{"given":"Heba","family":"Khdr","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT),Germany"}]},{"given":"Hassan","family":"Nassar","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT),Germany"}]},{"given":"Vincent","family":"Meyers","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT),Germany"}]},{"given":"Deming","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign,USA"}]},{"given":"Selin","family":"Yildirim","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign,USA"}]},{"given":"Yingbing","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign,USA"}]},{"given":"Nirmal R.","family":"Saxena","sequence":"additional","affiliation":[{"name":"Nvidia,USA"}]},{"given":"Saurabh","family":"Hukerikar","sequence":"additional","affiliation":[{"name":"Nvidia,USA"}]},{"given":"Srivi","family":"Dhruvanarayan","sequence":"additional","affiliation":[{"name":"SiMa,USA"}]}],"member":"263","reference":[{"article-title":"Efficientnetv2: Smaller models and faster training","volume-title":"Proc. ICML","author":"Tan","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01167"},{"article-title":"An image is worth 16x16 words: Transformers for image recognition at scale","volume-title":"Proc. ICLR","author":"Dosovitskiy","key":"ref3"},{"volume-title":"Data on notable AI models","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2910073"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"article-title":"Proxylessnas: Direct neural architecture search on target task and hardware","year":"2018","author":"Cai","key":"ref7"},{"article-title":"Distilling the knowledge in a neural network","year":"2015","author":"Hinton","key":"ref8"},{"article-title":"The lottery ticket hypothesis: Finding sparse, trainable neural networks","year":"2018","author":"Frankle","key":"ref9"},{"key":"ref10","article-title":"Post training 4-bit quantization of convolutional networks for rapid-deployment","volume":"32","author":"Banner","year":"2019","journal-title":"Advances in neural information processing systems"},{"volume-title":"Cpu, gpu, fpga or tpu: Which one to choose for my machine learning training","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3285094"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/iolts59296.2023.10224872"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3458336.3465297"},{"journal-title":"European Data Protection Supervisor","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation)","year":"2016","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2039370.2039401"},{"article-title":"Smart thermal management for heterogeneous multi-cores","volume-title":"Proc. DATE","author":"Henkel","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/DATE58400.2024.10546574"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/DATE64628.2025.10992947"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744916"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586287"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2024.3386067"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218676"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2024.3438998"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3609388"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.23919\/DATE64628.2025.10992747"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3676536.3697114"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3228897"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2900036"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2499369.2465564"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00049"},{"article-title":"CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel","volume-title":"Proc. USENIX Security","author":"Batina","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300276"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.23919\/DATE58400.2024.10546836"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TDMR.2020.2989813"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2761740"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001177"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00062"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2018.00072"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3214113"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICM63406.2024.10815826"},{"journal-title":"European Data Protection Supervisor","article-title":"AI Act Regulation (EU) 2024\/1689 \u2013 Regulation (EU) 2024\/1689 of the European Parliament and of the Council of 13 June 2024 laying down harmonised rules on artificial intelligence and amending Regulations (EC) No 300\/2008, (EU) No 167\/2013, (EU) No 168\/2013, (EU) 2018\/858, (EU) 2018\/1139 and (EU) 2019\/2144 and Directives 2014\/90\/EU, (EU) 2016\/797 and (EU) 2020\/1828 (Artificial Intelligence Act","year":"2025","key":"ref43"},{"article-title":"Deep neural network fingerprinting by conferrable adversarial examples","year":"2019","author":"Lukas","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02117-4"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICSICT.2018.8564956"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317829"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942055"},{"article-title":"Skynet: a hardware-efficient method for object detection and tracking on embedded systems","volume-title":"Proc. MLSys","author":"Zhang","key":"ref49"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218749"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3386263.3406956"},{"article-title":"Autodistill: an end-to-end framework to explore and distill hardware-efficient language models","year":"2022","author":"Zhang","key":"ref52"},{"article-title":"Eh-dnas: End-to-end hardware-aware differentiable neural architecture search","volume-title":"ICML Workshop on Differentiable Almost Everything","author":"Jiang","key":"ref53"},{"article-title":"Medusa: Simple llm inference acceleration framework with multiple decoding heads","volume-title":"Proc. ICML","author":"Cai","key":"ref54"},{"article-title":"Snapkv: Llm knows what you are looking for before generation","volume-title":"Proc. NeurIPS","author":"Li","key":"ref55"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2024.3443628"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2022.3178730"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2023.3298742"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM53951.2022.9786107"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM57271.2023.00025"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55342.2024.10545350"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ETS61313.2024.10567471"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/FPL60245.2023.00044"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i2.543-567"},{"volume-title":"SiMa.ai","key":"ref65"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2878168"}],"event":{"name":"2025 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)","start":{"date-parts":[[2025,10,26]]},"location":"Munich, Germany","end":{"date-parts":[[2025,10,30]]}},"container-title":["2025 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx8\/11240608\/11240621\/11240678.pdf?arnumber=11240678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:42:52Z","timestamp":1763703772000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/11240678\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,26]]},"references-count":66,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/iccad66269.2025.11240678","relation":{},"subject":[],"published":{"date-parts":[[2025,10,26]]}}}