ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1911.00783
  4. Cited By
A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of
  Deep Learning Architectures: Input Interception Attack (IIA)
v1v2 (latest)

A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)

2 November 2019
Tolulope A. Odetola
Hawzhin Mohammed
S. R. Hasan
    AAML
ArXiv (abs)PDFHTML

Papers citing "A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)"

3 / 3 papers shown
Title
Evil from Within: Machine Learning Backdoors through Hardware Trojans
Evil from Within: Machine Learning Backdoors through Hardware Trojans
Alexander Warnecke
Julian Speith
Janka Möller
Konrad Rieck
C. Paar
AAML
211
3
0
17 Apr 2023
2L-3W: 2-Level 3-Way Hardware-Software Co-Verification for the Mapping
  of Deep Learning Architecture (DLA) onto FPGA Boards
2L-3W: 2-Level 3-Way Hardware-Software Co-Verification for the Mapping of Deep Learning Architecture (DLA) onto FPGA Boards
Tolulope A. Odetola
Katie M. Groves
S. R. Hasan
68
5
0
14 Nov 2019
A Scalable Multilabel Classification to Deploy Deep Learning
  Architectures For Edge Devices
A Scalable Multilabel Classification to Deploy Deep Learning Architectures For Edge Devices
Tolulope A. Odetola
Ogheneuriri Oderhohwo
S. R. Hasan
144
6
0
05 Nov 2019
1