Alert button
Picture for Anantha P. Chandrakasan

Anantha P. Chandrakasan

Alert button

Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images

Add code
Bookmark button
Alert button
Apr 29, 2022
Maitreyi Ashok, Matthew J. Turner, Ronald L. Walsworth, Edlyn V. Levine, Anantha P. Chandrakasan

Figure 1 for Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images
Figure 2 for Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images
Figure 3 for Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images
Figure 4 for Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images
Viaarxiv icon

Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels -- Attacks and Defenses

Add code
Bookmark button
Alert button
Mar 26, 2021
Saurav Maji, Utsav Banerjee, Anantha P. Chandrakasan

Figure 1 for Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels -- Attacks and Defenses
Figure 2 for Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels -- Attacks and Defenses
Figure 3 for Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels -- Attacks and Defenses
Figure 4 for Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels -- Attacks and Defenses
Viaarxiv icon

Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods

Add code
Bookmark button
Alert button
Jun 01, 2020
Kyungmi Lee, Anantha P. Chandrakasan

Figure 1 for Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods
Figure 2 for Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods
Figure 3 for Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods
Figure 4 for Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods
Viaarxiv icon