Model stealing attacks on AI/ML devices undermine intellectual property rights, compromise the competitive advantage of the original model developers, and potentially expose …
There has been significant progress over the past seven years in model reverse engineering (RE) for neural network (NN) hardware. Although there has been systematization of …
Artificial Intelligence (AI) hardware accelerators have been widely adopted to enhance the efficiency of deep learning applications. However, they also raise security concerns …
X Yan, H Qiu, T Zhang - 2024 34th International Conference on …, 2024 - ieeexplore.ieee.org
The proliferation of AI technology gives rise to a variety of security threats, significantly compromising the confidentiality and integrity of AI applications. Existing software-based …
X Yan, H Qiu, T Zhang - arXiv preprint arXiv:2311.16684, 2023 - arxiv.org
The proliferation of AI technology gives rise to a variety of security threats, which significantly compromise the confidentiality and integrity of AI models and applications. Existing software …
Computertechnologien sind heute so sehr verwoben mit unserer Existenz, dass moderne Türen sowohl physisch als auch metaphorisch durch einen Strom digitaler Daten geöffnet …