Neural Network Model Extraction Attacks in Edge Devices by Hearing Architectural Hints
arXiv: Cryptography and Security, 2019.
As neural networks continue their reach into nearly every aspect of software operations, the details of those networks become an increasingly sensitive subject. Even those that deploy neural networks embedded in physical devices may wish to keep the inner working of their designs hidden -- either to protect their intellectual property or ...More
PPT (Upload PPT)