共 18 条
[1]
Courbariaux M., Hubara I., Soudry D., Yaniv R. E., Bengio Y., Binarized Neural Networks: Training Deep Neural Networks with Weights and Activations Constrained to +1 or −1, pp. 1-11, (2016)
[2]
Rastegari M., Ordonez V., Redmon J., Farhadi A., XNOR-Net: ImageNet Classification Using Binary Convolutional Neural Networks, Proc. European Conf. on Computer Vision (ECCV 2016), LNCS, 9908, pp. 525-542, (2016)
[3]
Nakahara H., Yonekawa H., Fujii T., Shimada M., Sato S., GUINNESS: A GUI Based Binarized Deep Neural Network Framework for Software Programmers, IEICE Trans. Information and Systems, E102-D, 5, pp. 1003-1011, (2019)
[4]
Fuchikami R., Issiki F., Fast and Light-weight Binarized Neural Network Implemented in an FPGA using LUT-based Signal Processing and its Time-domain Extension for Multi-bit Processing, Proc. 9th IEEE Int. Conf. on Consumer Electronics (ICCE-Berlin 2019), pp. 120-121, (2019)
[5]
Artificial Intelligence White Paper 2019, (2018)
[6]
Kurakin A., Goodfellow I., Bengio S., Adversarial examples in the physical world, pp. 1-14, (2016)
[7]
Tramer F., Zhang F., Juels A., Reiter M. K., Ristenpart T., Stealing Machine Learning Models via Prediction APIs, Proc. 25th USENIX Security Symposium, pp. 601-618, (2016)
[8]
Kawamura S., Hayashi Y., Domestic Hardware Trojan Research Trends, IEICE Technical Reports, IEICE-HWS, 120, 211, pp. 54-58, (2020)
[9]
Kinugawa M., Hayashi Y., Mori T., Evaluation of EM Information Leakage caused by IEMI with Hardware Trojan, IEEJ Trans. Fundamentals and Materials, 137, 3, pp. 153-157, (2017)
[10]
Kumaki T., Tsukada Y., Yoshikawa M., Ogura T., Fujino T., Implementation and Evaluation of Hardware Trojan-Implanted Cipher Processing Circuit with Development Verification Board, IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences (Japanese Edition), J98-A, 4, pp. 313-326, (2015)