Empirical study on security verification and assessment of neural network accelerator.
Yean-Ru ChenTzu-Fan WangSi-Han ChenYi-Chun KaoPublished in: Microprocess. Microsystems (2023)
Keyphrases
- empirical studies
- neural network
- high security
- java card
- empirical analysis
- integrity verification
- real world data sets
- security issues
- artificial neural networks
- neural network model
- security requirements
- cryptographic protocols
- information security
- genetic algorithm
- model checking
- security mechanisms
- back propagation
- risk assessment
- access control
- experimental design
- pattern recognition
- data mining
- neural network is trained
- statistical databases
- security policies
- network security
- key management
- security analysis
- security protocols
- security model
- protocol specification
- security level
- recurrent neural networks
- feed forward
- smart card
- systematic review
- learning algorithm
- self organizing maps
- image encryption
- security systems
- parallel implementation