A comprehensive review on deep learning algorithms: Security and privacy issues

M Tayyab, M Marjani, NZ Jhanjhi, IAT Hashem… - Computers & …, 2023 - Elsevier
Abstract Machine Learning (ML) algorithms are used to train the machines to perform
various complicated tasks that begin to modify and improve with experiences. It has become …

Device-specific security challenges and solution in IoT edge computing: a review

A Roy, J Kokila, N Ramasubramanian… - The Journal of …, 2023 - Springer
Rapid growth in IoT technology demands the need for the emergence of new IoT devices.
IoT devices vary in terms of shape, size, storage, battery life, and computational power …

A realistic model extraction attack against graph neural networks

F Guan, T Zhu, H Tong, W Zhou - Knowledge-Based Systems, 2024 - Elsevier
Abstract Model extraction attacks are considered to be a significant avenue of vulnerability in
machine learning. In model extraction attacks, the attacker repeatedly queries a victim model …

SoK: Model Reverse Engineering Threats for Neural Network Hardware

S Potluri, F Koushanfar - Cryptology ePrint Archive, 2024 - eprint.iacr.org
There has been significant progress over the past seven years in model reverse engineering
(RE) for neural network (NN) hardware. Although there has been systematization of …

Enhancing Hardware Security: An Analysis of SRAM-PUFs

NP Bhatta, F Amsaad, H Singh, A Sherif… - NAECON 2023-IEEE …, 2023 - ieeexplore.ieee.org
Hardware security has witnessed a promising solution with the emergence of SRAM-PUFs.
This research paper presents a comprehensive analysis of SRAM-PUFs, focusing on their …

Protection of Computational Machine Learning Models against Extraction Threat

MO Kalinin, MD Soshnev, AS Konoplev - Automatic Control and Computer …, 2023 - Springer
The extraction threat to machine learning models is considered. Most contemporary
methods of defense against the extraction of computational machine learning models are …