DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage
暂无分享,去创建一个
Haocheng Ma | Yiqiang Zhao | Kaichen Yang | Yier Jin | Honggang Yu | Honggang Yu | Yiqiang Zhao | Yier Jin | Kaichen Yang | Haocheng Ma
[1] Valentina Emilia Balas,et al. Stealing Neural Networks via Timing Side Channels , 2018, ArXiv.
[2] Ali Farhadi,et al. XNOR-Net: ImageNet Classification Using Binary Convolutional Neural Networks , 2016, ECCV.
[3] Saibal Mukhopadhyay,et al. Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers , 2019, 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[4] Daphne Koller,et al. Support Vector Machine Active Learning with Applications to Text Classification , 2000, J. Mach. Learn. Res..
[5] Yoshua Bengio,et al. BinaryNet: Training Deep Neural Networks with Weights and Activations Constrained to +1 or -1 , 2016, ArXiv.
[6] Xiaogang Wang,et al. Deep Learning Face Representation from Predicting 10,000 Classes , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[7] David J. Fleet,et al. Adversarial Manipulation of Deep Representations , 2015, ICLR.
[8] Zhiru Zhang,et al. Reverse Engineering Convolutional Neural Networks Through Side-channel Information Leaks , 2018, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[9] Steven L. Waslander,et al. Monocular 3D Object Detection Leveraging Accurate Proposals and Shape Reconstruction , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[10] Jason Helge Anderson,et al. Power estimation techniques for FPGAs , 2004, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[11] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[12] Forrest N. Iandola,et al. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <1MB model size , 2016, ArXiv.
[13] David A. Cohn,et al. Active Learning with Statistical Models , 1996, NIPS.
[14] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[15] Tudor Dumitras,et al. Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks , 2018, ArXiv.
[16] Udo Payer,et al. From NLP (Natural Language Processing) to MLP (Machine Language Processing) , 2010, MMM-ACNS.
[17] Bo Chen,et al. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications , 2017, ArXiv.
[18] Ran El-Yaniv,et al. Binarized Neural Networks , 2016, ArXiv.
[19] Lejla Batina,et al. CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel , 2019, USENIX Security Symposium.
[20] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[21] Atsuto Maki,et al. From generic to specific deep representations for visual recognition , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[22] Michael Hübner,et al. A dynamic partial reconfigurable overlay concept for PYNQ , 2017, 2017 27th International Conference on Field Programmable Logic and Applications (FPL).
[23] Mark Craven,et al. Multiple-Instance Active Learning , 2007, NIPS.
[24] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[25] Samuel Marchal,et al. PRADA: Protecting Against DNN Model Stealing Attacks , 2018, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).
[26] David Berthelot,et al. High-Fidelity Extraction of Neural Network Models , 2019, ArXiv.
[27] Yizhou Yu,et al. Borrowing Treasures from the Wealthy: Deep Transfer Learning through Selective Joint Fine-Tuning , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[28] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[29] Sylvain Guilley,et al. Differential Power Analysis Model and Some Results , 2004, CARDIS.
[30] Hiroki Nakahara,et al. On-Chip Memory Based Binarized Convolutional Deep Neural Network Applying Batch Normalization Free Technique on an FPGA , 2017, 2017 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW).
[31] Kibok Lee,et al. Hierarchical Novelty Detection for Visual Object Recognition , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[32] Tribhuvanesh Orekondy,et al. Knockoff Nets: Stealing Functionality of Black-Box Models , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[33] Cláudio Rosito Jung,et al. License Plate Detection and Recognition in Unconstrained Scenarios , 2018, ECCV.
[34] Tsung-Yi Ho,et al. CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples , 2020, NDSS.
[35] Wei Pan,et al. Towards Accurate Binary Convolutional Neural Network , 2017, NIPS.
[36] Rajesh Gupta,et al. Accelerating Binarized Convolutional Neural Networks with Software-Programmable FPGAs , 2017, FPGA.
[37] Philip Heng Wai Leong,et al. FINN: A Framework for Fast, Scalable Binarized Neural Network Inference , 2016, FPGA.
[38] Ankur Srivastava,et al. Mitigating Reverse Engineering Attacks on Deep Neural Networks , 2019, 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
[39] Yann LeCun,et al. Very Deep Convolutional Networks for Natural Language Processing , 2016, ArXiv.
[40] Alberto Ferreira de Souza,et al. Copycat CNN: Stealing Knowledge by Persuading Confession with Random Non-Labeled Data , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).
[41] Huchuan Lu,et al. Attentive Feedback Network for Boundary-Aware Salient Object Detection , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[42] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[43] Vinod Ganapathy,et al. A framework for the extraction of Deep Neural Networks by leveraging public data , 2019, ArXiv.
[44] Mark Craven,et al. An Analysis of Active Learning Strategies for Sequence Labeling Tasks , 2008, EMNLP.
[45] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).