Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on hardware security of DNN models and accelerators
As “deep neural networks”(DNNs) achieve increasing accuracy, they are getting employed
in increasingly diverse applications, including security-critical applications such as medical …
in increasingly diverse applications, including security-critical applications such as medical …
Microarchitectural attacks in heterogeneous systems: A survey
With the increasing proliferation of hardware accelerators and the predicted continued
increase in the heterogeneity of future computing systems, it is necessary to understand the …
increase in the heterogeneity of future computing systems, it is necessary to understand the …
Spy in the gpu-box: Covert and side channel attacks on multi-gpu systems
The deep learning revolution has been enabled in large part by GPUs, and more recently
accelerators, which make it possible to carry out computationally demanding training and …
accelerators, which make it possible to carry out computationally demanding training and …
Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models
Recent studies show that on-device deployed deep learning (DL) models, such as those of
Tensor Flow Lite (TFLite), can be easily extracted from real-world applications and devices …
Tensor Flow Lite (TFLite), can be easily extracted from real-world applications and devices …
Neurobfuscator: A full-stack obfuscation tool to mitigate neural architecture stealing
Neural network stealing attacks have posed grave threats to neural network model
deployment. Such attacks can be launched by extracting neural architecture information …
deployment. Such attacks can be launched by extracting neural architecture information …
Dynamo: Protecting mobile dl models through coupling obfuscated dl operators
Deploying deep learning (DL) models on mobile applications (Apps) has become ever-more
popular. However, existing studies show attackers can easily reverse-engineer mobile DL …
popular. However, existing studies show attackers can easily reverse-engineer mobile DL …
Layer sequence extraction of optimized dnns using side-channel information leaks
Deep neural network (DNN) intellectual property (IP) models must be kept undisclosed to
avoid revealing trade secrets. Recent works have devised machine learning techniques that …
avoid revealing trade secrets. Recent works have devised machine learning techniques that …
[PDF][PDF] A Security Framework for Improving QoS by Detecting and Mitigating Cache Side-Channel Attacks in Virtualized Environments
Virtualization technology makes cloud resources affordable. Virtual Machines (VMs) are
widely used on top of host machines in cloud computing environments. Adversaries target …
widely used on top of host machines in cloud computing environments. Adversaries target …
Ezclone: Improving dnn model extraction attack via shape distillation from gpu execution profiles
Deep Neural Networks (DNNs) have become ubiquitous due to their performance on
prediction and classification problems. However, they face a variety of threats as their usage …
prediction and classification problems. However, they face a variety of threats as their usage …
Extracting DNN Architectures via Runtime Profiling on Mobile GPUs
Deep Neural Networks (DNNs) have become invaluable intellectual property for AI providers
due to advancements fueled by a decade of research and development. However, recent …
due to advancements fueled by a decade of research and development. However, recent …