2019 IEEE High Performance Extreme Computing Conference (HPEC) 2019
DOI: 10.1109/hpec.2019.8916519
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Attacks and Defenses on Edge-Deployed Neural Networks

Abstract: Deep Neural Network (DNN) workloads are quickly moving from datacenters onto edge devices, for latency, privacy, or energy reasons. While datacenter networks can be protected using conventional cybersecurity measures, edge neural networks bring a host of new security challenges. Unlike classic IoT applications, edge neural networks are typically very compute and memory intensive, their execution is data-independent, and they are robust to noise and faults. Neural network models may be very expensive to develop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(26 citation statements)
references
References 47 publications
0
26
0
Order By: Relevance
“…The security of DNNs on embedded devices has been discussed recently [IGGK19,SW19]. Several of the attacks against DNNs of embedded devices (e.g., against cryptographic devices [Koc96,KJJ99]) have been severe because the attackers easily reverseengineered them or measured the side-channel leaks, such as processing time and power consumption.…”
Section: Introductionmentioning
confidence: 99%
“…The security of DNNs on embedded devices has been discussed recently [IGGK19,SW19]. Several of the attacks against DNNs of embedded devices (e.g., against cryptographic devices [Koc96,KJJ99]) have been severe because the attackers easily reverseengineered them or measured the side-channel leaks, such as processing time and power consumption.…”
Section: Introductionmentioning
confidence: 99%
“…Another approach is Edge Intelligence (EdgeAI) where the AI model is distributed across network edges. Several works have discussed the convergence of edge and AI [ 30 , 31 , 32 , 33 , 34 , 35 ]. AI model can be pre-trained then modified and optimized to be appropriate to run in the resource-constrained edges.…”
Section: Background and Related Workmentioning
confidence: 99%
“…They provide a model for classifying attacks against online machine learning algorithms. Most of the studies in these fields have been focused on specific adversarial attacks and generally, presented the theoretical discussion of adversarial machine learning area [23,25].…”
Section: Related Workmentioning
confidence: 99%