An overview of hardware security and trust: Threats, countermeasures, and design tools
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
Blind backdoors in deep learning models
We investigate a new method for injecting backdoors into machine learning models, based
on compromising the loss-value computation in the model-training code. We use it to …
on compromising the loss-value computation in the model-training code. We use it to …
Hardware trojans in chips: A survey for detection and prevention
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Robust machine learning systems: Challenges, current trends, perspectives, and the road ahead
Currently, machine learning (ML) techniques are at the heart of smart cyber-physical
systems (CPSs) and Internet-of-Things (loT). This article discusses various challenges and …
systems (CPSs) and Internet-of-Things (loT). This article discusses various challenges and …
Chaotic weights: A novel approach to protect intellectual property of deep neural networks
Despite the high accuracy achieved by the deep neural network (DNN) technique, there is
still a lack of satisfying methodologies to protect the intellectual property (IP) of DNNs, which …
still a lack of satisfying methodologies to protect the intellectual property (IP) of DNNs, which …
Security of neural networks from hardware perspective: A survey and beyond
Recent advances in neural networks (NNs) and their applications in deep learning
techniques have made the security aspects of NNs an important and timely topic for …
techniques have made the security aspects of NNs an important and timely topic for …
A survey of bit-flip attacks on deep neural network and corresponding defense methods
C Qian, M Zhang, Y Nie, S Lu, H Cao - Electronics, 2023 - mdpi.com
As the machine learning-related technology has made great progress in recent years, deep
neural networks are widely used in many scenarios, including security-critical ones, which …
neural networks are widely used in many scenarios, including security-critical ones, which …
Imperceptible misclassification attack on deep learning accelerator by glitch injection
The convergence of edge computing and deep learning empowers endpoint hardwares or
edge devices to perform inferences locally with the help of deep neural network (DNN) …
edge devices to perform inferences locally with the help of deep neural network (DNN) …
A survey on hardware security of DNN models and accelerators
As “deep neural networks”(DNNs) achieve increasing accuracy, they are getting employed
in increasingly diverse applications, including security-critical applications such as medical …
in increasingly diverse applications, including security-critical applications such as medical …
FTT-NAS: Discovering fault-tolerant neural architecture
With the fast evolvement of deep-learning specific embedded computing systems,
applications powered by deep learning are moving from the cloud to the edge. When …
applications powered by deep learning are moving from the cloud to the edge. When …