共 37 条
[1]
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[2]
Berger J. O., 1985, Statistical decision theory and Bayesian analysis, DOI 10.1007/978-1-4757-4286-2
[3]
Chen HL, 2018, Arxiv, DOI arXiv:1811.03713
[4]
Chen J., 2021, arXiv, DOI DOI 10.48550/ARXIV.2112.05588
[5]
T-DLA: An Open-source Deep Learning Accelerator for Ternarized DNN Models on Embedded FPGA
[J].
2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019),
2019,
:13-18
[6]
Ciresan D, 2012, PROC CVPR IEEE, P3642, DOI 10.1109/CVPR.2012.6248110
[7]
Watermarking Deep Neural Networks for Embedded Systems
[J].
2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS,
2018,
[8]
PUF Based Pay-per-Device Scheme for IP Protection of CNN Model
[J].
2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS),
2018,
:115-120
[9]
Deep Residual Learning for Image Recognition
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:770-778
[10]
Holcomb D.E., 2007, P C RFID SEC, V7, P01