Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1911.00783
Cited By
v1
v2 (latest)
A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)
2 November 2019
Tolulope A. Odetola
Hawzhin Mohammed
S. R. Hasan
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)"
3 / 3 papers shown
Title
Evil from Within: Machine Learning Backdoors through Hardware Trojans
Alexander Warnecke
Julian Speith
Janka Möller
Konrad Rieck
C. Paar
AAML
211
3
0
17 Apr 2023
2L-3W: 2-Level 3-Way Hardware-Software Co-Verification for the Mapping of Deep Learning Architecture (DLA) onto FPGA Boards
Tolulope A. Odetola
Katie M. Groves
S. R. Hasan
68
5
0
14 Nov 2019
A Scalable Multilabel Classification to Deploy Deep Learning Architectures For Edge Devices
Tolulope A. Odetola
Ogheneuriri Oderhohwo
S. R. Hasan
144
6
0
05 Nov 2019
1