Neural Network Model Extraction Attacks in Edge Devices by Hearing Architectural Hints

arXiv: Cryptography and Security, 2019.

Cited by: 16|Views17
EI

Abstract:

As neural networks continue their reach into nearly every aspect of software operations, the details of those networks become an increasingly sensitive subject. Even those that deploy neural networks embedded in physical devices may wish to keep the inner working of their designs hidden -- either to protect their intellectual property or ...More

Code:

Data:

Your rating :
0

 

Tags
Comments