Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective

G Kornaros - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart
devices act in concert, rarely requiring human intervention, posing significant challenges in …

Multimodal Emotion Recognition with deep learning: advancements, challenges, and future directions

AV Geetha, T Mala, D Priyanka, E Uma - Information Fusion, 2024 - Elsevier
In recent years, affective computing has become a topic of considerable interest, driven by
its ability to enhance several domains, such as mental health monitoring, human–computer …

Strongbox: A gpu tee on arm endpoints

Y Deng, C Wang, S Yu, S Liu, Z Ning, K Leach… - Proceedings of the …, 2022 - dl.acm.org
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate
computation such as image processing and numerical processing applications. However, in …

Trusted Deep Neural Execution—A Survey

MF Babar, M Hasan - IEEE Access, 2023 - ieeexplore.ieee.org
The growing use of deep neural networks (DNNs) in various applications has raised
concerns about the security and privacy of model parameters and runtime execution. To …

Secure and timely gpu execution in cyber-physical systems

J Wang, Y Wang, N Zhang - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Graphics Processing Units (GPU) are increasingly deployed on Cyber-physical Systems
(CPSs), frequently used to perform real-time safety-critical functions, such as object …

Context-aware hybrid encoding for privacy-preserving computation in IoT devices

H Khalili, HJ Chien, A Hass… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Recent years have witnessed a surge in hybrid IoT-cloud applications where an end user
distributes the desired computation between the IoT and cloud nodes. While achieving …

Secure and Efficient Mobile DNN Using Trusted Execution Environments

B Hu, Y Wang, J Cheng, T Zhao, Y Xie, X Guo… - Proceedings of the …, 2023 - dl.acm.org
Many mobile applications have resorted to deep neural networks (DNNs) because of their
strong inference capabilities. Since both input data and DNN architectures could be …

A survey of secure computation using trusted execution environments

X Li, B Zhao, G Yang, T Xiang, J Weng… - arXiv preprint arXiv …, 2023 - arxiv.org
As an essential technology underpinning trusted computing, the trusted execution
environment (TEE) allows one to launch computation tasks on both on-and off-premises …

Safe and Practical GPU Computation in TrustZone

H Park, FX Lin - Proceedings of the Eighteenth European Conference …, 2023 - dl.acm.org
For mobile devices, it is compelling to run sensitive GPU computation within a TrustZone
trusted execution environment (TEE). To minimize GPU software deployed in TEE, the …

Building a lightweight trusted execution environment for arm gpus

C Wang, Y Deng, Z Ning, K Leach, J Li… - … on Dependable and …, 2023 - ieeexplore.ieee.org
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate
computation. However, Arm GPU security has not been explored by the community. Existing …