ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2002.11021
  4. Cited By
SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
v1v2 (latest)

SNIFF: Reverse Engineering of Neural Networks with Fault Attacks

IEEE Transactions on Reliability (IEEE Trans. Reliab.), 2020
23 February 2020
J. Breier
Dirmanto Jap
Xiaolu Hou
S. Bhasin
Yang Liu
ArXiv (abs)PDFHTML

Papers citing "SNIFF: Reverse Engineering of Neural Networks with Fault Attacks"

49 / 49 papers shown
SoK: A Beginner-Friendly Introduction to Fault Injection Attacks
SoK: A Beginner-Friendly Introduction to Fault Injection Attacks
Christopher Simon Liu
Fan Wang
Patrick Gould
Carter Yagemann
62
0
0
22 Sep 2025
GATEBLEED: Exploiting On-Core Accelerator Power Gating for High Performance & Stealthy Attacks on AI
GATEBLEED: Exploiting On-Core Accelerator Power Gating for High Performance & Stealthy Attacks on AI
Joshua Kalyanapu
Farshad Dizani
Darsh Asher
Azam Ghanbari
Rosario Cammarota
Aydin Aysu
Samira Mirbagher Ajorpaz
360
0
0
22 Jul 2025
A Survey of Model Extraction Attacks and Defenses in Distributed Computing Environments
A Survey of Model Extraction Attacks and Defenses in Distributed Computing Environments
Kaixiang Zhao
Lincan Li
Kaize Ding
Neil Zhenqiang Gong
Yue Zhao
Yushun Dong
AAML
288
7
0
22 Feb 2025
A Review of the Duality of Adversarial Learning in Network Intrusion:
  Attacks and Countermeasures
A Review of the Duality of Adversarial Learning in Network Intrusion: Attacks and Countermeasures
Shalini Saini
Anitha Chennamaneni
Babatunde Sawyerr
AAML
303
4
0
18 Dec 2024
A Survey on Failure Analysis and Fault Injection in AI Systems
A Survey on Failure Analysis and Fault Injection in AI Systems
Guangba Yu
Gou Tan
Haojia Huang
Zhenyu Zhang
Pengfei Chen
Roberto Natella
Zibin Zheng
328
18
0
28 Jun 2024
Attacking Graph Neural Networks with Bit Flips: Weisfeiler and Lehman Go
  Indifferent
Attacking Graph Neural Networks with Bit Flips: Weisfeiler and Lehman Go Indifferent
Lorenz Kummer
Samir Moustafa
Nils N. Kriege
Wilfried N. Gansterer
GNNAAML
233
0
0
02 Nov 2023
Privacy Side Channels in Machine Learning Systems
Privacy Side Channels in Machine Learning SystemsUSENIX Security Symposium (USENIX Security), 2023
Edoardo Debenedetti
Giorgio Severi
Nicholas Carlini
Christopher A. Choquette-Choo
Matthew Jagielski
Milad Nasr
Eric Wallace
Florian Tramèr
MIALM
589
52
0
11 Sep 2023
A Desynchronization-Based Countermeasure Against Side-Channel Analysis
  of Neural Networks
A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural NetworksInternational Conference on Cyber Security Cryptography and Machine Learning (ICCSCML), 2023
J. Breier
Dirmanto Jap
Xiaolu Hou
S. Bhasin
AAML
158
9
0
25 Mar 2023
A Practical Introduction to Side-Channel Extraction of Deep Neural
  Network Parameters
A Practical Introduction to Side-Channel Extraction of Deep Neural Network ParametersSmart Card Research and Advanced Application Conference (CARDIS), 2022
Raphael Joud
Pierre-Alain Moëllic
S. Pontié
J. Rigaud
AAMLMIACVMLAU
224
15
0
10 Nov 2022
HWGN2: Side-channel Protected Neural Networks through Secure and Private
  Function Evaluation
HWGN2: Side-channel Protected Neural Networks through Secure and Private Function Evaluation
Mohammad J. Hashemi
Steffi Roy
Domenic Forte
F. Ganji
AAML
208
3
0
07 Aug 2022
I Know What You Trained Last Summer: A Survey on Stealing Machine
  Learning Models and Defences
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and DefencesACM Computing Surveys (ACM CSUR), 2022
Daryna Oliynyk
Rudolf Mayer
Andreas Rauber
353
162
0
16 Jun 2022
Model Inversion Attack against Transfer Learning: Inverting a Model
  without Accessing It
Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Dayong Ye
Huiqiang Chen
Shuai Zhou
Tianqing Zhu
Wanlei Zhou
S. Ji
MIACV
203
8
0
13 Mar 2022
BDFA: A Blind Data Adversarial Bit-flip Attack on Deep Neural Networks
BDFA: A Blind Data Adversarial Bit-flip Attack on Deep Neural Networks
B. Ghavami
Mani Sadati
M. Shahidzadeh
Zhenman Fang
Lesley Shannon
AAML
272
3
0
07 Dec 2021
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
FooBaR: Fault Fooling Backdoor Attack on Neural Network TrainingIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2021
J. Breier
Xiaolu Hou
Martín Ochoa
Jesus Solano
SILMAAML
322
13
0
23 Sep 2021
Guarding Machine Learning Hardware Against Physical Side-Channel Attacks
Guarding Machine Learning Hardware Against Physical Side-Channel AttacksACM Journal on Emerging Technologies in Computing Systems (JETC), 2021
Anuj Dubey
Rosario Cammarota
Vikram B. Suresh
Aydin Aysu
AAML
275
39
0
01 Sep 2021
DeepFreeze: Cold Boot Attacks and High Fidelity Model Recovery on
  Commercial EdgeML Device
DeepFreeze: Cold Boot Attacks and High Fidelity Model Recovery on Commercial EdgeML Device
Yoo-Seung Won
Soham Chatterjee
Dirmanto Jap
A. Basu
S. Bhasin
AAMLFedML
167
14
0
03 Aug 2021
The Threat of Offensive AI to Organizations
The Threat of Offensive AI to OrganizationsComputers & security (CS), 2021
Yisroel Mirsky
Ambra Demontis
J. Kotak
Ram Shankar
Deng Gelei
Liu Yang
Xinming Zhang
Wenke Lee
Yuval Elovici
Battista Biggio
243
103
0
30 Jun 2021
A Review of Confidentiality Threats Against Embedded Neural Network
  Models
A Review of Confidentiality Threats Against Embedded Neural Network ModelsWorld Forum on Internet of Things (WF-IoT), 2021
Raphael Joud
Pierre-Alain Moëllic
Rémi Bernhard
J. Rigaud
196
6
0
04 May 2021
Targeted Attack against Deep Neural Networks via Flipping Limited Weight
  Bits
Targeted Attack against Deep Neural Networks via Flipping Limited Weight BitsInternational Conference on Learning Representations (ICLR), 2021
Jiawang Bai
Baoyuan Wu
Yong Zhang
Yiming Li
Zhifeng Li
Shutao Xia
AAML
231
86
0
21 Feb 2021
Artificial Neural Networks and Fault Injection Attacks
Artificial Neural Networks and Fault Injection Attacks
Shahin Tajik
F. Ganji
SILM
267
14
0
17 Aug 2020
BoMaNet: Boolean Masking of an Entire Neural Network
BoMaNet: Boolean Masking of an Entire Neural Network
Anuj Dubey
Rosario Cammarota
Aydin Aysu
AAML
214
57
0
16 Jun 2020
A Protection against the Extraction of Neural Network Models
A Protection against the Extraction of Neural Network ModelsInternational Conference on Information Systems Security and Privacy (ICISSP), 2020
H. Chabanne
Vincent Despiegel
Linda Guiga
FedML
176
5
0
26 May 2020
DeepHammer: Depleting the Intelligence of Deep Neural Networks through
  Targeted Chain of Bit Flips
DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit FlipsUSENIX Security Symposium (USENIX Security), 2020
Fan Yao
Adnan Siraj Rakin
Deliang Fan
AAML
191
203
0
30 Mar 2020
V0LTpwn: Attacking x86 Processor Integrity from Software
V0LTpwn: Attacking x86 Processor Integrity from SoftwareUSENIX Security Symposium (USENIX Security), 2019
Zijo Kenjar
Tommaso Frassetto
David Gens
Michael Franz
A. Sadeghi
186
97
0
10 Dec 2019
PyTorch: An Imperative Style, High-Performance Deep Learning Library
PyTorch: An Imperative Style, High-Performance Deep Learning LibraryNeural Information Processing Systems (NeurIPS), 2019
Adam Paszke
Sam Gross
Francisco Massa
Adam Lerer
James Bradbury
...
Sasank Chilamkurthy
Benoit Steiner
Lu Fang
Junjie Bai
Soumith Chintala
ODL
1.0K
50,197
0
03 Dec 2019
TBT: Targeted Neural Network Attack with Bit Trojan
TBT: Targeted Neural Network Attack with Bit TrojanComputer Vision and Pattern Recognition (CVPR), 2019
Adnan Siraj Rakin
Zhezhi He
Deliang Fan
AAML
411
251
0
10 Sep 2019
High Accuracy and High Fidelity Extraction of Neural Networks
High Accuracy and High Fidelity Extraction of Neural NetworksUSENIX Security Symposium (USENIX Security), 2019
Matthew Jagielski
Nicholas Carlini
David Berthelot
Alexey Kurakin
Nicolas Papernot
MLAUMIACV
422
446
0
03 Sep 2019
SCNIFFER: Low-Cost, Automated, Efficient Electromagnetic Side-Channel
  Sniffing
SCNIFFER: Low-Cost, Automated, Efficient Electromagnetic Side-Channel SniffingIEEE Access (IEEE Access), 2019
Josef Danial
Debayan Das
Santosh K. Ghosh
A. Raychowdhury
Shreyas Sen
198
37
0
25 Aug 2019
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural
  Networks Under Hardware Fault Attacks
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault AttacksUSENIX Security Symposium (USENIX Security), 2019
Sanghyun Hong
Pietro Frigo
Yigitcan Kaya
Cristiano Giuffrida
Tudor Dumitras
AAML
180
245
0
03 Jun 2019
Bit-Flip Attack: Crushing Neural Network with Progressive Bit Search
Bit-Flip Attack: Crushing Neural Network with Progressive Bit Search
Adnan Siraj Rakin
Zhezhi He
Deliang Fan
AAML
243
286
0
28 Mar 2019
A Simple Explanation for the Existence of Adversarial Examples with
  Small Hamming Distance
A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance
A. Shamir
Itay Safran
Eyal Ronen
O. Dunkelman
GANAAML
170
96
0
30 Jan 2019
Model Reconstruction from Model Explanations
Model Reconstruction from Model Explanations
S. Milli
Ludwig Schmidt
Anca Dragan
Moritz Hardt
FAtt
190
196
0
13 Jul 2018
Stealing Hyperparameters in Machine Learning
Stealing Hyperparameters in Machine Learning
Binghui Wang
Neil Zhenqiang Gong
AAML
436
498
0
14 Feb 2018
Learning Transferable Architectures for Scalable Image Recognition
Learning Transferable Architectures for Scalable Image Recognition
Barret Zoph
Vijay Vasudevan
Jonathon Shlens
Quoc V. Le
879
6,089
0
21 Jul 2017
Multiple Fault Attack on PRESENT with a Hardware Trojan Implementation
  in FPGA
Multiple Fault Attack on PRESENT with a Hardware Trojan Implementation in FPGAInternational Workshop on Secure Internet of Things (SIoT), 2015
J. Breier
W. He
123
22
0
27 Feb 2017
Aggregated Residual Transformations for Deep Neural Networks
Aggregated Residual Transformations for Deep Neural Networks
Saining Xie
Ross B. Girshick
Piotr Dollár
Zhuowen Tu
Kaiming He
1.2K
11,453
0
16 Nov 2016
Membership Inference Attacks against Machine Learning Models
Membership Inference Attacks against Machine Learning Models
Reza Shokri
M. Stronati
Congzheng Song
Vitaly Shmatikov
SLRMIALMMIACV
928
4,966
0
18 Oct 2016
Xception: Deep Learning with Depthwise Separable Convolutions
Xception: Deep Learning with Depthwise Separable ConvolutionsComputer Vision and Pattern Recognition (CVPR), 2016
François Chollet
MDEBDLPINN
3.5K
17,171
0
07 Oct 2016
Stealing Machine Learning Models via Prediction APIs
Stealing Machine Learning Models via Prediction APIs
Florian Tramèr
Fan Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
SILMMLAU
462
2,044
0
09 Sep 2016
Densely Connected Convolutional Networks
Densely Connected Convolutional NetworksComputer Vision and Pattern Recognition (CVPR), 2016
Gao Huang
Zhuang Liu
Laurens van der Maaten
Kilian Q. Weinberger
PINN3DV
2.0K
42,006
0
25 Aug 2016
Wide Residual Networks
Wide Residual Networks
Sergey Zagoruyko
N. Komodakis
1.1K
8,721
0
23 May 2016
Inception-v4, Inception-ResNet and the Impact of Residual Connections on
  Learning
Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning
Christian Szegedy
Sergey Ioffe
Vincent Vanhoucke
Alexander A. Alemi
770
15,286
0
23 Feb 2016
Deep Residual Learning for Image Recognition
Deep Residual Learning for Image Recognition
Kaiming He
Xinming Zhang
Shaoqing Ren
Jian Sun
MedIm
4.1K
222,278
0
10 Dec 2015
Rethinking the Inception Architecture for Computer Vision
Rethinking the Inception Architecture for Computer Vision
Christian Szegedy
Vincent Vanhoucke
Sergey Ioffe
Jonathon Shlens
Z. Wojna
3DVBDL
1.9K
30,426
0
02 Dec 2015
Resiliency of Deep Neural Networks under Quantization
Resiliency of Deep Neural Networks under Quantization
Wonyong Sung
Sungho Shin
Kyuyeon Hwang
MQ
247
168
0
20 Nov 2015
Explaining and Harnessing Adversarial Examples
Explaining and Harnessing Adversarial ExamplesInternational Conference on Learning Representations (ICLR), 2014
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAMLGAN
1.8K
21,520
0
20 Dec 2014
Qualitatively characterizing neural network optimization problems
Qualitatively characterizing neural network optimization problemsInternational Conference on Learning Representations (ICLR), 2014
Ian Goodfellow
Oriol Vinyals
Andrew M. Saxe
ODL
646
558
0
19 Dec 2014
Going Deeper with Convolutions
Going Deeper with ConvolutionsComputer Vision and Pattern Recognition (CVPR), 2014
Christian Szegedy
Wei Liu
Yangqing Jia
P. Sermanet
Scott E. Reed
Dragomir Anguelov
D. Erhan
Vincent Vanhoucke
Andrew Rabinovich
4.0K
46,738
0
17 Sep 2014
Very Deep Convolutional Networks for Large-Scale Image Recognition
Very Deep Convolutional Networks for Large-Scale Image RecognitionInternational Conference on Learning Representations (ICLR), 2014
Karen Simonyan
Andrew Zisserman
FAttMDE
3.8K
109,835
0
04 Sep 2014
1
Page 1 of 1