Zobrazeno 1 - 10
of 158
pro vyhledávání: '"Yunsi Fei"'
Publikováno v:
Frontiers in High Performance Computing, Vol 2 (2024)
The convincing performances of deep neural networks (DNNs) can be degraded tremendously under malicious samples, known as adversarial examples. Besides, with the widespread edge platforms, it is essential to reduce the DNN model size for efficient de
Externí odkaz:
https://doaj.org/article/9cad631153314868ab79bb136115ea76
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 2 (2020)
Guessing entropy (GE) is a widely adopted metric that measures the average computational cost needed for a successful side-channel analysis (SCA). However, with current estimation methods where the evaluator has to average the correct key rank over m
Externí odkaz:
https://doaj.org/article/c594039cdf0f4675ae655bfe4047cdcf
Publikováno v:
IEEE Transactions on Information Forensics and Security. 18:3018-3030
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2022, Iss 1, Pp 501-521 (2022)
Recent advances in machine learning have enabled Neural Network (NN) inference directly on constrained embedded devices. This local approach enhances the privacy of user data, as the inputs to the NN inference are not shared with third-party cloud pr
Publikováno v:
Electronic Proceedings in Theoretical Computer Science. 342:35-48
Neural Networks are used today in numerous security- and safety-relevant domains and are, as such, a popular target of attacks that subvert their classification capabilities, by manipulating the network parameters. Prior work has introduced sensitive
Publikováno v:
ACM Journal on Emerging Technologies in Computing Systems. 17:1-4
Publikováno v:
Proceedings of the Great Lakes Symposium on VLSI 2022.
Publikováno v:
Proceedings of the Great Lakes Symposium on VLSI 2022.
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 29:124-135
This article presents large delay-based analog Trojan circuits, a new class of analog Trojans that can be interfaced with digital and analog macros to launch fabrication-time hardware attacks. Two different circuit topologies of analog Trojan are pre
Publikováno v:
2022 IEEE International Symposium on Circuits and Systems (ISCAS).