Picture for Hawzhin Mohammed

Hawzhin Mohammed

Dynamic Distribution of Edge Intelligence at the Node Level for Internet of Things

Add code
Jul 13, 2021
Figure 1 for Dynamic Distribution of Edge Intelligence at the Node Level for Internet of Things
Figure 2 for Dynamic Distribution of Edge Intelligence at the Node Level for Internet of Things
Figure 3 for Dynamic Distribution of Edge Intelligence at the Node Level for Internet of Things
Figure 4 for Dynamic Distribution of Edge Intelligence at the Node Level for Internet of Things
Viaarxiv icon

FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack

Add code
Jun 13, 2021
Figure 1 for FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack
Figure 2 for FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack
Figure 3 for FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack
Figure 4 for FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack
Viaarxiv icon

How Secure is Distributed Convolutional Neural Network on IoT Edge Devices?

Add code
Jun 16, 2020
Figure 1 for How Secure is Distributed Convolutional Neural Network on IoT Edge Devices?
Figure 2 for How Secure is Distributed Convolutional Neural Network on IoT Edge Devices?
Figure 3 for How Secure is Distributed Convolutional Neural Network on IoT Edge Devices?
Figure 4 for How Secure is Distributed Convolutional Neural Network on IoT Edge Devices?
Viaarxiv icon