{"id":"https://openalex.org/W2910935126","doi":"https://doi.org/10.1145/3287624.3288752","title":"HAMPER","display_name":"HAMPER","publication_year":2019,"publication_date":"2019-01-18","ids":{"openalex":"https://openalex.org/W2910935126","doi":"https://doi.org/10.1145/3287624.3288752","mag":"2910935126"},"language":"en","primary_location":{"id":"doi:10.1145/3287624.3288752","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3287624.3288752","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030027584","display_name":"Zirui Xu","orcid":"https://orcid.org/0000-0002-3556-9358"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zirui Xu","raw_affiliation_strings":["George Mason University"],"affiliations":[{"raw_affiliation_string":"George Mason University","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103085687","display_name":"Fuxun Yu","orcid":"https://orcid.org/0000-0002-4880-6658"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fuxun Yu","raw_affiliation_strings":["George Mason University"],"affiliations":[{"raw_affiliation_string":"George Mason University","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100767202","display_name":"Chenchen Liu","orcid":"https://orcid.org/0000-0001-7749-0640"},"institutions":[{"id":"https://openalex.org/I16944753","display_name":"Clarkson University","ror":"https://ror.org/03rwgpn18","country_code":"US","type":"education","lineage":["https://openalex.org/I16944753"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chenchen Liu","raw_affiliation_strings":["Clarkson University"],"affiliations":[{"raw_affiliation_string":"Clarkson University","institution_ids":["https://openalex.org/I16944753"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100441957","display_name":"Xiang Chen","orcid":"https://orcid.org/0000-0003-2790-976X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiang Chen","raw_affiliation_strings":["George Mason University"],"affiliations":[{"raw_affiliation_string":"George Mason University","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5030027584"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":0.5601,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.73613612,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"512","last_page":"517"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8656041622161865},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5920134782791138},{"id":"https://openalex.org/keywords/speedup","display_name":"Speedup","score":0.5736396908760071},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4823605418205261},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.458112895488739},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.45214635133743286},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4470776319503784},{"id":"https://openalex.org/keywords/word-error-rate","display_name":"Word error rate","score":0.44410914182662964},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.4433434009552002},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4318321943283081},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.3834618330001831},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.366775780916214},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.15083640813827515},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.12715432047843933},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1240050196647644},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11034166812896729}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8656041622161865},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5920134782791138},{"id":"https://openalex.org/C68339613","wikidata":"https://www.wikidata.org/wiki/Q1549489","display_name":"Speedup","level":2,"score":0.5736396908760071},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4823605418205261},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.458112895488739},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.45214635133743286},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4470776319503784},{"id":"https://openalex.org/C40969351","wikidata":"https://www.wikidata.org/wiki/Q3516228","display_name":"Word error rate","level":2,"score":0.44410914182662964},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.4433434009552002},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4318321943283081},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.3834618330001831},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.366775780916214},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.15083640813827515},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.12715432047843933},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1240050196647644},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11034166812896729}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3287624.3288752","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3287624.3288752","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6600000262260437,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1507892613","https://openalex.org/W1686810756","https://openalex.org/W1920908428","https://openalex.org/W1922655562","https://openalex.org/W1945616565","https://openalex.org/W2112796928","https://openalex.org/W2163605009","https://openalex.org/W2255539412","https://openalex.org/W2460937040","https://openalex.org/W2543927648","https://openalex.org/W2618098489","https://openalex.org/W2618530766","https://openalex.org/W2782403400","https://openalex.org/W2964301649","https://openalex.org/W3118608800","https://openalex.org/W3139612913"],"related_works":["https://openalex.org/W4224883155","https://openalex.org/W4225586443","https://openalex.org/W3172173631","https://openalex.org/W2953920146","https://openalex.org/W3013617128","https://openalex.org/W4285263558","https://openalex.org/W4287815799","https://openalex.org/W4247200422","https://openalex.org/W3216063557","https://openalex.org/W4379255972"],"abstract_inverted_index":{"Recently,":[0],"the":[1,56,73,81,89,119,129,135,145,148,157,169,201],"machine":[2,64,121],"learning":[3,65,122],"technologies":[4],"have":[5,25],"been":[6,26],"widely":[7],"used":[8,28],"in":[9,29,45,92,197],"cognitive":[10],"applications":[11],"such":[12],"as":[13,108,110],"Automatic":[14],"Speech":[15],"Recognition":[16,20],"(ASR)":[17],"and":[18,141,154,177,194,209],"Image":[19],"(IR).":[21],"Unfortunately,":[22],"these":[23],"techniques":[24],"massively":[27],"unauthorized":[30,60,170],"audio/image":[31,57,74],"data":[32,51,58,75,111],"analysis,":[33],"causing":[34],"serious":[35],"privacy":[36],"leakage.":[37],"To":[38,87],"address":[39],"this":[40,46],"issue,":[41],"we":[42],"propose":[43],"HAMPER":[44,71,98,124,165,183,205],"work,":[47],"which":[48],"is":[49],"a":[50],"encryption":[52,193],"framework":[53,91],"that":[54],"protects":[55],"from":[59,128],"ASR/IR":[61,85,159,171],"analysis.":[62],"Leveraging":[63],"models'":[66],"vulnerability":[67],"to":[68,79,200],"adversarial":[69,77,126,150,211],"examples,":[70],"encrypt":[72],"with":[76,173,188,213],"noises":[78],"perturb":[80,168],"recognition":[82],"results":[83,162],"of":[84,103,134,144],"systems.":[86,160],"deploy":[88],"proposed":[90],"extensive":[93],"platforms":[94],"(e.g.":[95],"mobile":[96],"devices),":[97],"also":[99],"take":[100],"into":[101],"consideration":[102],"computation":[104,137],"efficiency,":[105],"perturbation":[106],"transferability,":[107],"well":[109],"attribute":[112],"configuration.":[113],"Therefore,":[114],"rather":[115],"than":[116],"focusing":[117],"on":[118],"high-level":[120],"models,":[123],"generates":[125],"examples":[127,151,212],"low-level":[130,146],"features.":[131],"Taking":[132],"advantage":[133],"light":[136],"load,":[138],"fundamental":[139],"impact,":[140],"direct":[142],"configurability":[143],"features,":[147],"generated":[149],"can":[152,166],"efficiently":[153],"effectively":[155,167],"affect":[156],"whole":[158],"Experiment":[161],"show":[163],"that,":[164],"analysis":[172],"85%":[174],"Word-Error-Rate":[175],"(WER)":[176],"83%":[178],"Image-Error-Rate":[179],"(IER)":[180],"respectively.":[181],"Also,":[182],"achieves":[184,206],"faster":[185],"processing":[186],"speed":[187],"1.5X":[189],"speedup":[190],"for":[191,216],"image":[192],"even":[195],"26X":[196],"audio,":[198],"comparing":[199],"state-of-the-art":[202],"methods.":[203],"Moreover,":[204],"strong":[207],"transferability":[208],"configures":[210],"desired":[214],"attributes":[215],"better":[217],"scenario":[218],"adaptation.":[219]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-01-25T00:00:00"}
