Robust machine learning systems: Challenges, current trends, perspectives, and the road ahead
Currently, machine learning (ML) techniques are at the heart of smart cyber-physical
systems (CPSs) and Internet-of-Things (loT). This article discusses various challenges and …
systems (CPSs) and Internet-of-Things (loT). This article discusses various challenges and …
Neuroattack: Undermining spiking neural networks security through externally triggered bit-flips
V Venceslai, A Marchisio, I Alouani… - … Joint Conference on …, 2020 - ieeexplore.ieee.org
Due to their proven efficiency, machine-learning systems are deployed in a wide range of
complex real-life problems. More specifically, Spiking Neural Networks (SNNs) emerged as …
complex real-life problems. More specifically, Spiking Neural Networks (SNNs) emerged as …
MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices
Traditional learning-based approaches for runtime hardware Trojan (HT) detection require
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …
Architecting a secure wireless interconnect for multichip communication: An ML approach
Compute-intensive platforms such as micro-servers and embedded systems have already
undergone a shift from a single-chip to multichip architecture to achieve better yield and …
undergone a shift from a single-chip to multichip architecture to achieve better yield and …
Hardware Trojan designs based on high-low probability and partitioned combinational logic with a malicious reset signal
J Shi, X Zhang, P Ma, W Pan, P Li… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
To counteract logic-testing methods and trust verification methods for hardware Trojan (HT)
detection, two HT design strategies based on high-low probability and partitioned …
detection, two HT design strategies based on high-low probability and partitioned …
HIT: a hidden instruction trojan model for processors
J Zhang, Y Zhang, H Li, J Jiang - 2020 Design, Automation & …, 2020 - ieeexplore.ieee.org
This paper explores an intrusion mechanism to microprocessors using illegal instructions,
namely hidden instruction Trojan (HIT). It uses a low-probability sequence consisting of …
namely hidden instruction Trojan (HIT). It uses a low-probability sequence consisting of …