Picture for Jakub Breier

Jakub Breier

Side-Channel Analysis of OpenVINO-based Neural Network Models

Add code
Jul 23, 2024
Figure 1 for Side-Channel Analysis of OpenVINO-based Neural Network Models
Figure 2 for Side-Channel Analysis of OpenVINO-based Neural Network Models
Figure 3 for Side-Channel Analysis of OpenVINO-based Neural Network Models
Viaarxiv icon

RMF: A Risk Measurement Framework for Machine Learning Models

Add code
Jun 15, 2024
Viaarxiv icon

DeepNcode: Encoding-Based Protection against Bit-Flip Attacks on Neural Networks

Add code
May 22, 2024
Viaarxiv icon

A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks

Add code
Mar 25, 2023
Figure 1 for A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks
Figure 2 for A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks
Figure 3 for A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks
Figure 4 for A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks
Viaarxiv icon

FooBaR: Fault Fooling Backdoor Attack on Neural Network Training

Add code
Sep 23, 2021
Figure 1 for FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
Figure 2 for FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
Figure 3 for FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
Figure 4 for FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
Viaarxiv icon

Risk Management Framework for Machine Learning Security

Add code
Dec 09, 2020
Figure 1 for Risk Management Framework for Machine Learning Security
Figure 2 for Risk Management Framework for Machine Learning Security
Figure 3 for Risk Management Framework for Machine Learning Security
Figure 4 for Risk Management Framework for Machine Learning Security
Viaarxiv icon

SNIFF: Reverse Engineering of Neural Networks with Fault Attacks

Add code
Feb 23, 2020
Figure 1 for SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
Figure 2 for SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
Figure 3 for SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
Figure 4 for SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
Viaarxiv icon

Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications

Add code
Feb 05, 2019
Figure 1 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Figure 2 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Figure 3 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Figure 4 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Viaarxiv icon

DeepLaser: Practical Fault Attack on Deep Neural Networks

Add code
Sep 29, 2018
Figure 1 for DeepLaser: Practical Fault Attack on Deep Neural Networks
Figure 2 for DeepLaser: Practical Fault Attack on Deep Neural Networks
Figure 3 for DeepLaser: Practical Fault Attack on Deep Neural Networks
Figure 4 for DeepLaser: Practical Fault Attack on Deep Neural Networks
Viaarxiv icon