Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective
G Kornaros - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart
devices act in concert, rarely requiring human intervention, posing significant challenges in …
devices act in concert, rarely requiring human intervention, posing significant challenges in …
Multimodal Emotion Recognition with deep learning: advancements, challenges, and future directions
In recent years, affective computing has become a topic of considerable interest, driven by
its ability to enhance several domains, such as mental health monitoring, human–computer …
its ability to enhance several domains, such as mental health monitoring, human–computer …
Strongbox: A gpu tee on arm endpoints
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate
computation such as image processing and numerical processing applications. However, in …
computation such as image processing and numerical processing applications. However, in …
Machine learning with confidential computing: A systematization of knowledge
Privacy and security challenges in Machine Learning (ML) have become increasingly
severe, along with ML's pervasive development and the recent demonstration of large attack …
severe, along with ML's pervasive development and the recent demonstration of large attack …
Secure and timely gpu execution in cyber-physical systems
Graphics Processing Units (GPU) are increasingly deployed on Cyber-physical Systems
(CPSs), frequently used to perform real-time safety-critical functions, such as object …
(CPSs), frequently used to perform real-time safety-critical functions, such as object …
Context-aware hybrid encoding for privacy-preserving computation in IoT devices
Recent years have witnessed a surge in hybrid IoT-cloud applications where an end user
distributes the desired computation between the IoT and cloud nodes. While achieving …
distributes the desired computation between the IoT and cloud nodes. While achieving …
Secure and Efficient Mobile DNN Using Trusted Execution Environments
Many mobile applications have resorted to deep neural networks (DNNs) because of their
strong inference capabilities. Since both input data and DNN architectures could be …
strong inference capabilities. Since both input data and DNN architectures could be …
A survey of secure computation using trusted execution environments
As an essential technology underpinning trusted computing, the trusted execution
environment (TEE) allows one to launch computation tasks on both on-and off-premises …
environment (TEE) allows one to launch computation tasks on both on-and off-premises …
DeepTrust^ RT: Confidential Deep Neural Inference Meets Real-Time!
Abstract Deep Neural Networks (DNNs) are becoming common in" learning-enabled" time-
critical applications such as autonomous driving and robotics. One approach to protect DNN …
critical applications such as autonomous driving and robotics. One approach to protect DNN …
Safe and Practical GPU Computation in TrustZone
For mobile devices, it is compelling to run sensitive GPU computation within a TrustZone
trusted execution environment (TEE). To minimize GPU software deployed in TEE, the …
trusted execution environment (TEE). To minimize GPU software deployed in TEE, the …