Backdoor Attacks to Deep Neural Networks: A Survey of the Literature, Challenges, and Future Research Directions

O Mengara, A Avila, TH Falk - IEEE Access, 2024 - ieeexplore.ieee.org
Deep neural network (DNN) classifiers are potent instruments that can be used in various
security-sensitive applications. Nonetheless, they are vulnerable to certain attacks that …

{SOTER}: Guarding Black-box Inference for General Neural Networks at the Edge

T Shen, J Qi, J Jiang, X Wang, S Wen, X Chen… - 2022 USENIX Annual …, 2022 - usenix.org
The prosperity of AI and edge computing has pushed more and more well-trained DNN
models to be deployed on third-party edge devices to compose mission-critical applications …

A threshold implementation-based neural network accelerator with power and electromagnetic side-channel countermeasures

S Maji, U Banerjee, SH Fuller… - IEEE Journal of Solid …, 2022 - ieeexplore.ieee.org
With the recent advancements in machine learning (ML) theory, a lot of energy-efficient
neural network (NN) accelerators have been developed. However, their associated side …

Secure Quantum‐based Adder Design for Protecting Machine Learning Systems Against Side‐Channel Attacks

NU Ain, SS Ahmadpour, NJ Navimipour, E Diakina… - Applied Soft …, 2025 - Elsevier
Abstract Machine learning (ML) has recently been adopted in various application domains.
Usually, a well-performing ML model relies on a large volume of training data and powerful …

Hardware-software co-design for side-channel protected neural network inference

A Dubey, R Cammarota, A Varna… - … Oriented Security and …, 2023 - ieeexplore.ieee.org
Physical side-channel attacks are a major threat to stealing confidential data from devices.
There has been a recent surge in such attacks on edge machine learning (ML) hardware to …

Special session: Towards an agile design methodology for efficient, reliable, and secure ML systems

S Dave, A Marchisio, MA Hanif… - 2022 IEEE 40th VLSI …, 2022 - ieeexplore.ieee.org
The real-world use cases of Machine Learning (ML) have exploded over the past few years.
However, the current computing infrastructure is insufficient to support all real-world …

Cryptography and Embedded Systems Security

X Hou, J Breier - Springer, 2024 - Springer
Cryptography is an indispensable tool used to protect information in computing systems.
Billions of people all over the world use it in their daily lives without even noticing there is …

Generation and deployment of honeytokens in relational databases for cyber deception

N Prabhaker, GS Bopche, M Arock - Computers & Security, 2024 - Elsevier
Despite considerable investments in database security, global statistics indicate an
exponential increase in data breaches. Organizations are often unaware of data breaches …

[PDF][PDF] SoK: neural network extraction through physical side channels

P Horváth, D Lauret, Z Liu, L Batina - … of the 33rd USENIX Conference on …, 2024 - usenix.org
SoK Neural Network Extraction-USENIX Presentation Page 1 SoK: Neural Network Extraction
Through Physical Side Channels 15.08.2024 Péter Horváth, Dirk Lauret, Zhuoran Liu, and …

Transformers: A Security Perspective

BS Latibari, N Nazari, MA Chowdhury, KI Gubbi… - IEEE …, 2024 - ieeexplore.ieee.org
The Transformers architecture has recently emerged as a revolutionary paradigm in the field
of deep learning, particularly excelling in Natural Language Processing (NLP) and …