Feshi: Feature map-based stealthy hardware intrinsic attack

TA Odetola, F Khalid, H Mohammed… - IEEE …, 2021 - ieeexplore.ieee.org
Convolutional Neural Networks (CNN) have shown impressive performance in computer
vision, natural language processing, and many other applications, but they exhibit high …

Security analysis of capsule network inference using horizontal collaboration

A Adeyemo, F Khalid, T Odetola… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
The traditional convolution neural networks (CNN) have several drawbacks like the" Picasso
effect" and the loss of information by the pooling layer. The Capsule network (CapsNet) was …

Implementation of analog perceptron as an essential element of configurable neural networks

C Geng, Q Sun, S Nakatake - Sensors, 2020 - mdpi.com
Perceptron is an essential element in neural network (NN)-based machine learning,
however, the effectiveness of various implementations by circuits is rarely demonstrated …

How secure is distributed convolutional neural network on iot edge devices?

H Mohammed, TA Odetola, SR Hasan - arXiv preprint arXiv:2006.09276, 2020 - arxiv.org
Convolutional Neural Networks (CNN) has found successful adoption in many applications.
The deployment of CNN on resource-constrained edge devices have proved challenging …

Labani: Layer-based noise injection attack on convolutional neural networks

TA Odetola, F Khalid, SR Hasan - … of the Great Lakes Symposium on …, 2022 - dl.acm.org
Hardware accelerator-based CNN inference improves the performance and latency but
increases the time-to-market. As a result, CNN deployment on hardware is often outsourced …

Partial neural network weight adaptation for unstable input distortions

X Xie, KH Kim - US Patent App. 16/817,251, 2021 - Google Patents
Abstract Systems and methods are provided for an improved machine learning (ML) model
system. The improved ML system can be configured to (1) initially classify the types of …

Towards Securing Edge Intelligence for Inference in Horizontal Collaborative Environments

AA Adeyemo - 2023 - search.proquest.com
With the growing demand for real-time intelligence driven by device-to-device (D2D)
communication, deploying Deep Learning (DL) applications at the network edge becomes …

WORDA: A Winograd Offline-Runtime Decomposition Algorithm for Faster CNN Inference

J Nelson, T Odetola, SR Hasan - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Convolutional Neural Networks (CNNs) have demonstrated impressive performance in
recent times and have shown a wide range of applicability. The deployment of CNNs on …

[图书][B] Securing in-memory processors against Row Hammering Attacks

SK Gogna - 2021 - search.proquest.com
Modern applications on general purpose processors require both rapid and power-efficient
computing and memory components. As applications continue to improve, the demand for …

Hardware Intrinsic Attacks on IoT Based Network: A Secure Edge Intelligence Perspective

HR Mohammed - 2021 - search.proquest.com
Abstract Internet of Things (IoT) devices has connected millions of houses around the globe
via the internet. Running Artificial Intelligence (AI) on IoT devices is popular nowadays …