共 19 条
[1]
Barenghi A, 2012, P IEEE, V100, P3056, DOI 10.1109/JPROC.2012.2188769
[2]
Carlini N, 2019, Arxiv, DOI arXiv:1902.06705
[3]
Colombier B, 2019, PROCEEDINGS OF THE 2019 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P1, DOI 10.1109/HST.2019.8741030
[4]
Defending and Harnessing the Bit-Flip based Adversarial Weight Attack
[J].
2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2020),
2020,
:14083-14091
[5]
A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks
[J].
2022 IEEE 28TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2022),
2022,
[6]
Security Evaluation of Deep Neural Network Resistance Against Laser Fault Injection
[J].
2020 IEEE INTERNATIONAL SYMPOSIUM ON THE PHYSICAL AND FAILURE ANALYSIS OF INTEGRATED CIRCUITS (IPFA),
2020,
[7]
HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks on Deep Neural Networks
[J].
2021 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN (ICCAD),
2021,
[8]
A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters
[J].
SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2022,
2023, 13820
:45-65
[10]
Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
[J].
2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2022),
2022,
:15084-15093