A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of
  Deep Learning Architectures: Input Interception Attack (IIA)
v1v2 (latest)

A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)

    AAML

Papers citing "A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)"