2020
DOI: 10.48550/arxiv.2002.09786
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

HarDNN: Feature Map Vulnerability Evaluation in CNNs

Abstract: As Convolutional Neural Networks (CNNs) are increasingly being employed in safety-critical applications, it is important that they behave reliably in the face of hardware errors. Transient hardware errors may percolate undesirable state during execution, resulting in software-manifested errors which can adversely affect high-level decision making. This paper presents HarDNN, a software-directed approach to identify vulnerable computations during a CNN inference and selectively protect them based on their prope… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(14 citation statements)
references
References 17 publications
0
14
0
Order By: Relevance
“…Therefore, performing FIs to obtain a comprehensive training set is prohibitively expensive for large DNNs (such large DNNs are not studied in [15]). Mahmoud et.al [16] use statistical fault injection to identify vulnerable regions in DNNs, and selectively duplicate the vulnerable computations for protection. However, their approach incurs high computational overheads (due to the use of duplication), and also provides only limited protection coverage.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, performing FIs to obtain a comprehensive training set is prohibitively expensive for large DNNs (such large DNNs are not studied in [15]). Mahmoud et.al [16] use statistical fault injection to identify vulnerable regions in DNNs, and selectively duplicate the vulnerable computations for protection. However, their approach incurs high computational overheads (due to the use of duplication), and also provides only limited protection coverage.…”
Section: Related Workmentioning
confidence: 99%
“…Duplicating hardware components adds to the total cost of the system, and requires synchronization and voting. DNN-specific techniques have been proposed to enhance the error resilience of DNNs [12], [15], [16]. However, they either suffer from significant false positives (e.g., raise an alarm when there is no fault present), or require significant implementation effort (Section VI).…”
Section: Introductionmentioning
confidence: 99%
“…To mitigate their negative impact, several techniques have been proposed [51], [53]- [57]. Some of these techniques only cover limited faults [55] and/or incur significant overheads [53] [56]. For instance, techniques in [53] employ a separate network to detect the anomaly in the output.…”
Section: A Reliability Threats and Mitigation Techniquesmentioning
confidence: 99%
“…Recent works have illustrated the potentially-catastrophic effects of soft errors on NNs through fault injection tools [27,28,52,58] and neutron beam experiments [35]. This has spurred many approaches for fault tolerance in NNs, such as leveraging the "inherent robustness" of NNs [66,77,85], training NNs to tolerate faults [49], anomalous activation suppression [26,67], selective feature hardening [59], and learning to detect faults [56,70,72]. Our focus in this work is on leveraging ABFT to detect errors in NN inference.…”
Section: Related Workmentioning
confidence: 99%