共 15 条
[1]
Batina L, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P515
[3]
Cryptanalytic Extraction of Neural Network Models
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT III,
2020, 12172
:189-218
[5]
Dubey A, 2020, PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P197, DOI [10.1109/HOST45689.2020.9300276, 10.1109/host45689.2020.9300276]
[6]
Dumont Mathieu, 2021, 2021 IEEE 7th World Forum on Internet of Things (WF-IoT), P616, DOI 10.1109/WF-IoT51360.2021.9595075
[7]
Gongye C., 2020, Design Automation Conference, P1
[8]
Reverse Engineering Convolutional Neural Networks Through Side-channel Information Leaks
[J].
2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC),
2018,
[9]
Jagielski M, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1345
[10]
Joud R., 2021, 2021 IEEE 7 WORLD FO