Using model optimization as countermeasure against model recovery attacks

Machine learning (ML) and Deep learning (DL) have been widely studied and adopted for different applications across various fields. There is a growing demand for ML implementations as well as ML accelerators for small devices for Internet-of-Things (IoT) applications. Often, these accelerators allow...

Full description

Bibliographic Details
Main Authors: Jap, Dirmanto, Bhasin, Shivam
Other Authors: Applied Cryptography and Network Security Workshops (ACNS 2023)
Format: Conference Paper
Language:English
Published: 2024
Subjects:
Online Access:https://hdl.handle.net/10356/173621