Stealing Machine Learning Parameters via Side Channel Power Attacks.
Shaya WolfHui HuRafer CooleyMike BorowczakPublished in: ISVLSI (2021)
Keyphrases
- machine learning
- countermeasures
- knowledge acquisition
- power analysis
- parameter values
- maximum likelihood
- knowledge representation
- computational intelligence
- pattern recognition
- data mining
- computer vision
- active learning
- decision trees
- model selection
- sensitivity analysis
- neural network
- data analysis
- traffic analysis
- inductive learning
- inductive logic programming
- learning tasks
- machine learning methods
- machine learning algorithms