Preventing DNN Model IP Theft via Hardware Obfuscation
暂无分享,去创建一个
Sandip Kundu | Felipe M. G. França | Alexandre S. Nery | Vinay C. Patil | Brunno F. Goldstein | Victor C. Ferreira | A. S. Nery | F. França | S. Kundu | V. C. Ferreira
[1] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[2] Fan Zhang,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[3] Tsung-Te Liu,et al. An Energy-Efficient Dual-Field Elliptic Curve Cryptography Processor for Internet of Things Applications , 2020, IEEE Transactions on Circuits and Systems II: Express Briefs.
[4] Ankur Srivastava,et al. Hardware-Assisted Intellectual Property Protection of Deep Learning Models , 2020, 2020 57th ACM/IEEE Design Automation Conference (DAC).
[5] Binghui Wang,et al. Stealing Hyperparameters in Machine Learning , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[6] Mark Chen,et al. Language Models are Few-Shot Learners , 2020, NeurIPS.
[7] Li Fei-Fei,et al. ImageNet: A large-scale hierarchical image database , 2009, CVPR.
[8] Debjit Das Sarma,et al. Compute Solution for Tesla's Full Self-Driving Computer , 2020, IEEE Micro.
[9] Zhiru Zhang,et al. Reverse Engineering Convolutional Neural Networks Through Side-channel Information Leaks , 2018, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[10] Santosh Ghosh,et al. A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device , 2020, IACR Cryptol. ePrint Arch..
[11] Jae-Gon Lee,et al. 7.1 An 11.5TOPS/W 1024-MAC Butterfly Structure Dual-Core Sparsity-Aware Neural Processing Unit in 8nm Flagship Mobile SoC , 2019, 2019 IEEE International Solid- State Circuits Conference - (ISSCC).
[12] Song Han,et al. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding , 2015, ICLR.
[13] David A. Patterson,et al. In-datacenter performance analysis of a tensor processing unit , 2017, 2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA).
[14] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[15] Xavier Alameda-Pineda,et al. How to Train Your Deep Multi-Object Tracker , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[16] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[17] Lake Bu,et al. Preventing Neural Network Model Exfiltration in Machine Learning Hardware Accelerators , 2018, 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).
[18] Jeremy Kepner,et al. Survey of Machine Learning Accelerators , 2020, 2020 IEEE High Performance Extreme Computing Conference (HPEC).
[19] Song Han,et al. Learning both Weights and Connections for Efficient Neural Network , 2015, NIPS.
[20] Yann LeCun,et al. Optimal Brain Damage , 1989, NIPS.
[21] Anne Canteaut,et al. PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version) , 2012, IACR Cryptol. ePrint Arch..
[22] Michael R. Lyu,et al. DeepObfuscation: Securing the Structure of Convolutional Neural Networks via Knowledge Distillation , 2018, ArXiv.
[23] Allan Skillman,et al. A Technical Overview of Cortex-M55 and Ethos-U55: Arm’s Most Capable Processors for Endpoint AI , 2020, 2020 IEEE Hot Chips 32 Symposium (HCS).