Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators.
Hongye XuDongfang LiuCory E. MerkelMichael ZuzackPublished in: CoRR (2023)
Keyphrases
- machine learning
- neural network
- network architecture
- machine learning methods
- information extraction
- feature selection
- decision trees
- pattern recognition
- learning systems
- learning tasks
- inductive logic programming
- countermeasures
- modal logic
- inductive learning
- support vector machine
- concurrency control
- natural language processing
- learning algorithm
- neural model
- single chip
- knowledge acquisition
- computer vision
- machine learning algorithms
- logic programs
- supervised learning
- active learning
- data analysis
- computer science
- reinforcement learning
- secret key
- artificial intelligence
- data mining