Proceedings of the 39th International Conference on Computer-Aided Design 2020
DOI: 10.1145/3400302.3416260
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning and hardware security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Due to the limited storage of TEE, Gangal et al [22] partitioned an edge device model and encapsulated only some layers in SGX powered TEE. However, the model parameters stored in unprotected memory are still easy to be stolen, and adversaries can build a complete model through model reverse engineering [23], [24]. Another idea is to explore building custom secure neural network accelerators [19], [25], [26].…”
Section: Hardware Protection Of Edge Device Modelsmentioning
confidence: 99%
“…Due to the limited storage of TEE, Gangal et al [22] partitioned an edge device model and encapsulated only some layers in SGX powered TEE. However, the model parameters stored in unprotected memory are still easy to be stolen, and adversaries can build a complete model through model reverse engineering [23], [24]. Another idea is to explore building custom secure neural network accelerators [19], [25], [26].…”
Section: Hardware Protection Of Edge Device Modelsmentioning
confidence: 99%
“…The authors of the study [105] analyze the viability of repurposing an existing neural network to construct a robust Physically Unclonable Function in order to ensure safety and reliability in Internet of Things and smart sensor applications. The Multilayer Perceptron is the primary subject of this work.…”
Section: Machine Learning and Artificial Intelligencementioning
confidence: 99%
“…In the contemporary digital era, information sharing has brought great convenience but also poses a tremendous risk of information leakage. Consequently, information security has become a significant focus in order to safeguard data security, leading to numerous advances in cryptographic technology. Within this realm, metasurface-based optical encryption presents an excellent framework for the secure storage of encrypted information. Optical encryption offers several unique merits, , including high speed, parallel processing, low power consumption, and numerous encoding channels. In tandem, the metasurface provides a compact subwavelength photonic platform with powerful light manipulation ability that can concurrently encode multiple optical parameters, such as amplitude, , phase, , polarization, , and wavelength. , As a result, various metasurface-based optical encryption approaches are demonstrated to achieve high-security information storage based on distinct optical manipulation principles and encryption coding methods .…”
Section: Introductionmentioning
confidence: 99%