Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective

G Kornaros - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart
devices act in concert, rarely requiring human intervention, posing significant challenges in …

Multimodal Emotion Recognition with deep learning: advancements, challenges, and future directions

AV Geetha, T Mala, D Priyanka, E Uma - Information Fusion, 2024 - Elsevier
In recent years, affective computing has become a topic of considerable interest, driven by
its ability to enhance several domains, such as mental health monitoring, human–computer …

Strongbox: A gpu tee on arm endpoints

Y Deng, C Wang, S Yu, S Liu, Z Ning, K Leach… - Proceedings of the …, 2022 - dl.acm.org
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate
computation such as image processing and numerical processing applications. However, in …

Machine learning with confidential computing: A systematization of knowledge

F Mo, Z Tarkhani, H Haddadi - ACM computing surveys, 2024 - dl.acm.org
Privacy and security challenges in Machine Learning (ML) have become increasingly
severe, along with ML's pervasive development and the recent demonstration of large attack …

Secure and timely gpu execution in cyber-physical systems

J Wang, Y Wang, N Zhang - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Graphics Processing Units (GPU) are increasingly deployed on Cyber-physical Systems
(CPSs), frequently used to perform real-time safety-critical functions, such as object …

Context-aware hybrid encoding for privacy-preserving computation in IoT devices

H Khalili, HJ Chien, A Hass… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Recent years have witnessed a surge in hybrid IoT-cloud applications where an end user
distributes the desired computation between the IoT and cloud nodes. While achieving …

Secure and Efficient Mobile DNN Using Trusted Execution Environments

B Hu, Y Wang, J Cheng, T Zhao, Y **e, X Guo… - Proceedings of the …, 2023 - dl.acm.org
Many mobile applications have resorted to deep neural networks (DNNs) because of their
strong inference capabilities. Since both input data and DNN architectures could be …

A survey of secure computation using trusted execution environments

X Li, B Zhao, G Yang, T **ang, J Weng… - arxiv preprint arxiv …, 2023 - arxiv.org
As an essential technology underpinning trusted computing, the trusted execution
environment (TEE) allows one to launch computation tasks on both on-and off-premises …

DeepTrust^ RT: Confidential Deep Neural Inference Meets Real-Time!

MF Babar, M Hasan - 36th Euromicro Conference on Real-Time …, 2024 - drops.dagstuhl.de
Abstract Deep Neural Networks (DNNs) are becoming common in" learning-enabled" time-
critical applications such as autonomous driving and robotics. One approach to protect DNN …

Safe and Practical GPU Computation in TrustZone

H Park, FX Lin - Proceedings of the Eighteenth European Conference …, 2023 - dl.acm.org
For mobile devices, it is compelling to run sensitive GPU computation within a TrustZone
trusted execution environment (TEE). To minimize GPU software deployed in TEE, the …