Ten years of hardware Trojans: a survey from the attacker's perspective
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …
reliable and effective defenses, it is important to figure out how hardware Trojans are …
A survey on hardware security of DNN models and accelerators
As “deep neural networks”(DNNs) achieve increasing accuracy, they are getting employed
in increasingly diverse applications, including security-critical applications such as medical …
in increasingly diverse applications, including security-critical applications such as medical …
Security of neural networks from hardware perspective: A survey and beyond
Recent advances in neural networks (NNs) and their applications in deep learning
techniques have made the security aspects of NNs an important and timely topic for …
techniques have made the security aspects of NNs an important and timely topic for …
Imperceptible misclassification attack on deep learning accelerator by glitch injection
The convergence of edge computing and deep learning empowers endpoint hardwares or
edge devices to perform inferences locally with the help of deep neural network (DNN) …
edge devices to perform inferences locally with the help of deep neural network (DNN) …
Fusion-on-field security and privacy preservation for IoT edge devices: Concurrent defense against multiple types of hardware trojan attacks
Internet of Things (IoT) devices have connected millions of houses around the globe via the
internet. In the recent past, threats due to hardware Trojan (HT) in the integrated circuits (IC) …
internet. In the recent past, threats due to hardware Trojan (HT) in the integrated circuits (IC) …
Security and privacy preservation for smart grid AMI using machine learning and cryptography
MM Badr - 2022 - search.proquest.com
In the smart grid's advanced metering infrastructure (AMI), smart meters (SMs) are deployed
at the customers' premises to report their electricity consumption readings to the electric …
at the customers' premises to report their electricity consumption readings to the electric …
Incentivized and secure blockchain-based firmware update and dissemination for autonomous vehicles
This chapter explores an incentivized blockchain-based firmware update scheme tailored for
Autonomous Vehicles (AVs). As the number of autonomous vehicles increases, the security …
Autonomous Vehicles (AVs). As the number of autonomous vehicles increases, the security …
Secure Machine Learning Hardware: Challenges and Progress [Feature]
With the rising adoption of deep neural networks (DNNs) for commercial and high-stakes
applications that process sensitive user data and make critical decisions, security concerns …
applications that process sensitive user data and make critical decisions, security concerns …
GuardianMPC: Backdoor-resilient Neural Network Computation
The rapid growth of deep learning (DL) has raised serious concerns about users' data and
neural network (NN) models' security and privacy, particularly the risk of backdoor insertion …
neural network (NN) models' security and privacy, particularly the risk of backdoor insertion …
Towards hardware trojan resilient design of convolutional neural networks
The use of hardware accelerators for convolutional neural networks (CNN) is on the rise due
to the popularity of artificial intelligence in autonomous vehicles, industrial control systems …
to the popularity of artificial intelligence in autonomous vehicles, industrial control systems …