Picture for Faiq Khalid

Faiq Khalid

Security Analysis of Capsule Network Inference using Horizontal Collaboration

Add code
Sep 22, 2021
Figure 1 for Security Analysis of Capsule Network Inference using Horizontal Collaboration
Figure 2 for Security Analysis of Capsule Network Inference using Horizontal Collaboration
Figure 3 for Security Analysis of Capsule Network Inference using Horizontal Collaboration
Figure 4 for Security Analysis of Capsule Network Inference using Horizontal Collaboration
Viaarxiv icon

FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack

Add code
Jun 13, 2021
Figure 1 for FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack
Figure 2 for FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack
Figure 3 for FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack
Figure 4 for FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack
Viaarxiv icon

Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks

Add code
May 05, 2021
Figure 1 for Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks
Figure 2 for Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks
Figure 3 for Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks
Figure 4 for Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks
Viaarxiv icon

MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices

Add code
Nov 21, 2020
Figure 1 for MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices
Figure 2 for MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices
Figure 3 for MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices
Figure 4 for MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices
Viaarxiv icon

FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks

Add code
Dec 03, 2019
Figure 1 for FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks
Figure 2 for FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks
Figure 3 for FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks
Figure 4 for FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks
Viaarxiv icon

SNN under Attack: are Spiking Deep Belief Networks vulnerable to Adversarial Examples?

Add code
Feb 04, 2019
Figure 1 for SNN under Attack: are Spiking Deep Belief Networks vulnerable to Adversarial Examples?
Figure 2 for SNN under Attack: are Spiking Deep Belief Networks vulnerable to Adversarial Examples?
Figure 3 for SNN under Attack: are Spiking Deep Belief Networks vulnerable to Adversarial Examples?
Figure 4 for SNN under Attack: are Spiking Deep Belief Networks vulnerable to Adversarial Examples?
Viaarxiv icon

RED-Attack: Resource Efficient Decision based Attack for Machine Learning

Add code
Jan 30, 2019
Figure 1 for RED-Attack: Resource Efficient Decision based Attack for Machine Learning
Figure 2 for RED-Attack: Resource Efficient Decision based Attack for Machine Learning
Figure 3 for RED-Attack: Resource Efficient Decision based Attack for Machine Learning
Figure 4 for RED-Attack: Resource Efficient Decision based Attack for Machine Learning
Viaarxiv icon

CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks

Add code
Jan 28, 2019
Figure 1 for CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks
Figure 2 for CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks
Figure 3 for CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks
Figure 4 for CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks
Viaarxiv icon

A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems

Add code
Nov 06, 2018
Figure 1 for A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems
Figure 2 for A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems
Figure 3 for A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems
Figure 4 for A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems
Viaarxiv icon

Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference

Add code
Nov 05, 2018
Figure 1 for Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference
Figure 2 for Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference
Figure 3 for Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference
Figure 4 for Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference
Viaarxiv icon