FeSHI: Feature Map-Based Stealthy Hardware Intrinsic Attack
Convolutional Neural Networks (CNN) have shown impressive performance in computer vision, natural language processing, and many other applications, but they exhibit high computations and substantial memory requirements. To address these limitations, especially in resource-constrained devices, the us...
Main Authors: | Tolulope A. Odetola, Faiq Khalid, Hawzhin Mohammed, Travis C. Sandefur, Syed Rafay Hasan |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9514588/ |
Similar Items
-
LPAI—A Complete AIoT Framework Based on LPWAN Applicable to Acoustic Scene Classification Scenarios
by: Xinru Jing, et al.
Published: (2022-12-01) -
An edge-cloud collaborative computing platform for building AIoT applications efficiently
by: Guoping Rong, et al.
Published: (2021-07-01) -
Deep Learning Approach at the Edge to Detect Iron Ore Type
by: Emerson Klippel, et al.
Published: (2021-12-01) -
An automated approach for fibroblast cell confluency characterisation and sample handling using AIoT for bio-research and bio-manufacturing
by: Muaadh Shamhan, et al.
Published: (2023-12-01) -
Person Re-Identification Microservice over Artificial Intelligence Internet of Things Edge Computing Gateway
by: Ching-Han Chen, et al.
Published: (2021-09-01)