Login / Signup
A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA).
Tolulope A. Odetola
Hawzhin Raoof Mohammed
Syed Rafay Hasan
Published in:
CoRR (2019)
Keyphrases
</>
deep learning
unsupervised learning
unsupervised feature learning
machine learning
weakly supervised
deep architectures
mental models
restricted boltzmann machine
buffer overflow
attack graphs
image processing
data sets
pairwise
object detection
graph cuts
decision trees
attack graph