共 26 条
[1]
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[2]
Baraniuk R., 2006, PREPRINT
[3]
Batina L, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P515
[4]
IPGuard: Protecting Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary
[J].
ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2021,
:14-25
[5]
DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks
[J].
PROCEEDINGS OF THE 2019 46TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '19),
2019,
:487-498
[7]
DeVries T, 2017, Arxiv, DOI [arXiv:1708.04552, DOI 10.48550/ARXIV.1708.04552]
[8]
Gongye C., 2020, Design Automation Conference, P1
[9]
Deep Residual Learning for Image Recognition
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:770-778
[10]
Reverse Engineering Convolutional Neural Networks Through Side-channel Information Leaks
[J].
2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC),
2018,