A Roy, J Kokila, N Ramasubramanian… - The Journal of …, 2023 - Springer
Rapid growth in IoT technology demands the need for the emergence of new IoT devices. IoT devices vary in terms of shape, size, storage, battery life, and computational power …
F Guan, T Zhu, H Tong, W Zhou - Knowledge-Based Systems, 2024 - Elsevier
Abstract Model extraction attacks are considered to be a significant avenue of vulnerability in machine learning. In model extraction attacks, the attacker repeatedly queries a victim model …
There has been significant progress over the past seven years in model reverse engineering (RE) for neural network (NN) hardware. Although there has been systematization of …
Hardware security has witnessed a promising solution with the emergence of SRAM-PUFs. This research paper presents a comprehensive analysis of SRAM-PUFs, focusing on their …
MO Kalinin, MD Soshnev, AS Konoplev - Automatic Control and Computer …, 2023 - Springer
The extraction threat to machine learning models is considered. Most contemporary methods of defense against the extraction of computational machine learning models are …