Feshi: Feature map-based stealthy hardware intrinsic attack
Convolutional Neural Networks (CNN) have shown impressive performance in computer
vision, natural language processing, and many other applications, but they exhibit high …
vision, natural language processing, and many other applications, but they exhibit high …
Security analysis of capsule network inference using horizontal collaboration
The traditional convolution neural networks (CNN) have several drawbacks like the" Picasso
effect" and the loss of information by the pooling layer. The Capsule network (CapsNet) was …
effect" and the loss of information by the pooling layer. The Capsule network (CapsNet) was …
Implementation of analog perceptron as an essential element of configurable neural networks
C Geng, Q Sun, S Nakatake - Sensors, 2020 - mdpi.com
Perceptron is an essential element in neural network (NN)-based machine learning,
however, the effectiveness of various implementations by circuits is rarely demonstrated …
however, the effectiveness of various implementations by circuits is rarely demonstrated …
How secure is distributed convolutional neural network on iot edge devices?
Convolutional Neural Networks (CNN) has found successful adoption in many applications.
The deployment of CNN on resource-constrained edge devices have proved challenging …
The deployment of CNN on resource-constrained edge devices have proved challenging …
Labani: Layer-based noise injection attack on convolutional neural networks
Hardware accelerator-based CNN inference improves the performance and latency but
increases the time-to-market. As a result, CNN deployment on hardware is often outsourced …
increases the time-to-market. As a result, CNN deployment on hardware is often outsourced …
Partial neural network weight adaptation for unstable input distortions
Abstract Systems and methods are provided for an improved machine learning (ML) model
system. The improved ML system can be configured to (1) initially classify the types of …
system. The improved ML system can be configured to (1) initially classify the types of …
Towards Securing Edge Intelligence for Inference in Horizontal Collaborative Environments
AA Adeyemo - 2023 - search.proquest.com
With the growing demand for real-time intelligence driven by device-to-device (D2D)
communication, deploying Deep Learning (DL) applications at the network edge becomes …
communication, deploying Deep Learning (DL) applications at the network edge becomes …
WORDA: A Winograd Offline-Runtime Decomposition Algorithm for Faster CNN Inference
Convolutional Neural Networks (CNNs) have demonstrated impressive performance in
recent times and have shown a wide range of applicability. The deployment of CNNs on …
recent times and have shown a wide range of applicability. The deployment of CNNs on …
[图书][B] Securing in-memory processors against Row Hammering Attacks
SK Gogna - 2021 - search.proquest.com
Modern applications on general purpose processors require both rapid and power-efficient
computing and memory components. As applications continue to improve, the demand for …
computing and memory components. As applications continue to improve, the demand for …
Hardware Intrinsic Attacks on IoT Based Network: A Secure Edge Intelligence Perspective
HR Mohammed - 2021 - search.proquest.com
Abstract Internet of Things (IoT) devices has connected millions of houses around the globe
via the internet. Running Artificial Intelligence (AI) on IoT devices is popular nowadays …
via the internet. Running Artificial Intelligence (AI) on IoT devices is popular nowadays …