A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)

I tiakina i:
Ngā taipitopito rārangi puna kōrero
I whakaputaina i:arXiv.org (Jan 27, 2021), p. n/a
Kaituhi matua: Odetola, Tolulope A
Ētahi atu kaituhi: Hawzhin Raoof Mohammed, Syed Rafay Hasan
I whakaputaina:
Cornell University Library, arXiv.org
Ngā marau:
Urunga tuihono:Citation/Abstract
Full text outside of ProQuest
Ngā Tūtohu: Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
Me noho koe te mea tuatahi ki te waiho tākupu!
Me takiuru i te tuatahi