Picture for Anantha P. Chandrakasan

Anantha P. Chandrakasan

Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images

Add code
Apr 29, 2022
Figure 1 for Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images
Figure 2 for Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images
Figure 3 for Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images
Figure 4 for Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images
Viaarxiv icon

Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels -- Attacks and Defenses

Add code
Mar 26, 2021
Figure 1 for Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels -- Attacks and Defenses
Figure 2 for Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels -- Attacks and Defenses
Figure 3 for Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels -- Attacks and Defenses
Figure 4 for Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels -- Attacks and Defenses
Viaarxiv icon

Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods

Add code
Jun 01, 2020
Figure 1 for Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods
Figure 2 for Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods
Figure 3 for Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods
Figure 4 for Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods
Viaarxiv icon