SoK: A Systems Perspective on Compound AI Threats and Countermeasures
Large language models (LLMs) used across enterprises often use proprietary models and
operate on sensitive inputs and data. The wide range of attack vectors identified in prior …
operate on sensitive inputs and data. The wide range of attack vectors identified in prior …
Power Side-Channel Analysis and Mitigation for Neural Network Accelerators based on Memristive Crossbars
B Sapui, MB Tahoori - 2024 29th Asia and South Pacific …, 2024 - ieeexplore.ieee.org
The modern trend of exploring Artificial Intelligence (AI) in various industries, such as big
data, edge computing, automobile, and medical applications, has increased tremendously …
data, edge computing, automobile, and medical applications, has increased tremendously …
Side-Channel Attack with Fault Analysis on Memristor-based Computation-in-Memory
B Sapui, S Meschkov… - 2024 IEEE 30th …, 2024 - ieeexplore.ieee.org
The inherent limitations of traditional processor-centric architectures have led to the
emergence of Computationin-Memory (CiM), offering an energy-efficient hardware solution …
emergence of Computationin-Memory (CiM), offering an energy-efficient hardware solution …