Search for tag: "attacks"
Application Specific Integrated Circuit (ASIC) Hardware SecurityKevin Immanuel Gubbi Abstract: Due to the globalization of the semiconductor IC supply chain, there has been a plethora of opportunities for malicious entities to compromise the seciruty of the…
From Philip Young
0 likes
59 plays
0
|
|
DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices - Kartik PatwariAbstract: Deep Learning has gained tremendous momentum in the last decade and is now widely used for many tasks. Deep Neural Networks (DNNs) are constantly being developed and improved, finding…
From Philip Young
0 likes
37 plays
0
|
|
ECS 289M Winter Quarter 2022 Lecture for Jan 31Lecture January 31, 2022 of ECS 289M, Research in Computer Security
From Matthew Bishop
0 likes
4 plays
0
|
|
HybriDG: Hybrid Dynamic Time Warping and Gaussian Distribution Model for Detecting Emerging Zero-Day Microarchitectural Side-Channel AttacksIntegrated Circuits and Systems 15 Team Lead: Han Wang Advisor: Prof. Homayoun
From Femi-Jide Akinmoladun
0 likes
14 plays
0
|
|