A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Review of Confidentiality Threats Against Embedded Neural Network Models
[article]
2021
arXiv
pre-print
In this review, we cover the landscape of attacks targeting the confidentiality of embedded DNN models that may have a major impact on critical IoT systems, with a particular focus on model extraction ...
Utilization of Machine Learning (ML) algorithms, especially Deep Neural Network (DNN) models, becomes a widely accepted standard in many domains more particularly IoT-based systems. ...
of the Investissements d'avenir program (ANR-10-AIRT-05, irtnanoelec); and supported (Mines Saint-Etienne) by the French funded ANR program PICTURE (AAPG2020). ...
arXiv:2105.01401v1
fatcat:fo6kowqg2rfvxeqcoxuroeeefe
An Overview of Laser Injection against Embedded Neural Network Models
[article]
2021
arXiv
pre-print
The latest is particularly critical since the demonstrations of severe flaws impacting the integrity, confidentiality and accessibility of neural network models. ...
However, the attack surface of such embedded systems cannot be reduced to abstract flaws but must encompass the physical threats related to the implementation of these models within hardware platforms ...
of the Investissements d'avenir program (ANR-10-AIRT-05, irtnanoelec); and supported (for Mines Saint-Etienne) by the French funded ANR program PICTURE (AAPG2020). ...
arXiv:2105.01403v1
fatcat:i3y5cmwyorc4jgedxx35izbvea
Artificial Neural Networks and Fault Injection Attacks
[article]
2021
arXiv
pre-print
This chapter is on the security assessment of artificial intelligence (AI) and neural network (NN) accelerators in the face of fault injection attacks. ...
This is a crucial step that must be taken in order to define the threat models precisely. With respect to that, fault attacks mounted on NNs and AI accelerators are explored. ...
In this regard, we briefly review a few examples of threat models and the main target assets in NNs. ...
arXiv:2008.07072v2
fatcat:guzvxrv6pfahdc6t4ack57p6ua
Security Threats and Artificial Intelligence based Countermeasures for Internet of Things Networks: A Comprehensive Survey
2021
IEEE Access
Network (CNN), Deep Q Network (DQN), Deep Neural Network (DNN), Recurrent Neural Network (RNN), Long Short Term Memory (LSTM); Extreme Gradient Boosting (EGB)) for countermeasure of the layer wise threats ...
[81] have reviewed ML-based network layer anomaly detection systems to impede the most common network threats by explaining cyber kill chain models and cyber-attacks. ...
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/ ...
doi:10.1109/access.2021.3089681
fatcat:fatpywnjzzfilidakyduz6qz44
Physical Side-Channel Attacks on Embedded Neural Networks: A Survey
2021
Applied Sciences
Without a complete review of this emerging field in the literature so far, this paper surveys state-of-the-art physical SCA attacks relative to the implementation of embedded DNNs on micro-controllers ...
During the last decade, Deep Neural Networks (DNN) have progressively been integrated on all types of platforms, from data centers to embedded systems including low-power processors and, recently, FPGAs ...
Conflicts of Interest: The authors declare no conflicts of interest. ...
doi:10.3390/app11156790
fatcat:h6ucd5p5yrgbnbrco2t2o3s2rm
Hardware-assisted Machine Learning in Resource-constrained IoT Environments for Security: Review and Future Prospective
2022
IEEE Access
This review aims to illuminate the value of various approaches for addressing IoT security in a truly effective, flexible, and seamless manner, as well as to provide answers to questions about tradeoffs ...
computing and user privacy, as well as protecting against attacks such as spoofing, denial of service (DoS), jamming, and eavesdropping. ...
of ML models and derived services against malicious actors. ...
doi:10.1109/access.2022.3179047
fatcat:damwrncpzzbxzamtghwlmrg6v4
A novel approach for Linguistic steganography evaluation based on artificial neural networks
2021
IEEE Access
Here the RNN model follows Long Short Term Memory (LSTM) neural network. ...
The embedding rate, volume, and other attributes of Recurrent Neural Networks (RNN) Steganographic schemes are contrasted in this article between RNN-Stega and RNN-generated Lyrics, two RNN methods. ...
The authors declare that there is no conflict of interest regarding the publication of this paper References. ...
doi:10.1109/access.2021.3108183
fatcat:or6kkpbyqncwnnyhvazzxdndsi
An Overview on CryptDb and Word2vec Approaches
2020
Advances in Science, Technology and Engineering Systems
CryptDB is a functional system that provides security and confidentiality through a set of operations. The obvious confidentiality of these attacks is for applications supported by SQL databases. ...
Online applications are subject to theft of confidential information because opponents can exploit software errors to access private data, and because curious or malicious officials can capture and lose ...
Acknowledgment This is a part of project done in British University in Dubai. ...
doi:10.25046/aj0505154
fatcat:zzs7mmrji5b5dnq3uaqw6xadty
Crypto Makes AI Evolve
[article]
2022
arXiv
pre-print
We start with reviewing existing relevant surveys, noting their shortcomings, especially the lack of a close look at the evolution process and solid future roadmap. ...
Then, we establish a future roadmap for further research in this area, focusing on the role of quantum-inspired and bio-inspired AI. ...
Security threats against ML, along with the related defensive techniques, have been reviewed in [36] . ...
arXiv:2206.12669v1
fatcat:gm7hoplpnngrnc3ty53yfyfcrq
How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing
[article]
2022
arXiv
pre-print
Finally, this review presents future research directions to guide successive research and development of privacy-preserving NLP models. ...
Deep learning (DL) models for natural language processing (NLP) tasks often handle private data, demanding protection against breaches and disclosures. ...
To provide defenses against these threats, a model has to meet functional requirements related to data types and PETs. ...
arXiv:2205.10095v1
fatcat:rksy7oxxlbde5bol3ay44yycru
Information Security Methods—Modern Research Directions
2019
Symmetry
This direction includes the construction of an information security threats model and a protection system model, which allow to compile a complete list of threats and methods of protection against them ...
One of the directions is the development of a comprehensive approach to assessing the security of the information systems. ...
Table 1 shows the classification of security mechanisms against confidentiality threats in a virtual environment. ...
doi:10.3390/sym11020150
fatcat:mf7w3jloszgw7pqb7pj53x27lm
A Study of Data Security on E-Governance using Steganographic Optimization Algorithms
2022
International Journal on Recent and Innovation Trends in Computing and Communication
In this study, a comprehensive review of steganographic algorithms using optimization techniques is presented. ...
A new perspective on using this technique to protect the information for e-governance is also presented. ...
ACKNOWLEDGEMENTS This review work was supported and got technical help from the department of computer science, The University of Burdwan, West Bengal, India. We are especially thanks to Dr. ...
doi:10.17762/ijritcc.v10i5.5548
fatcat:vxojh7t5tnao7dhkntchh3uuja
A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis
2020
Sensors
Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. ...
Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. ...
(LVQ) model of Artificial Neural Network (ANN), and the Back-Propagation (BP) model of ANN. ...
doi:10.3390/s20133625
pmid:32605178
pmcid:PMC7374330
fatcat:rk52vsqrrzd2hebt2xddhrdt54
Toward Identifying APT Malware through API System Calls
2021
Security and Communication Networks
This study aims to reduce the burden of network security staff from reviewing a large number of suspicious files when defending against APT attacks. ...
The model of similar studies also lacks an explanation about it. ...
the complexity of the neural network model. ...
doi:10.1155/2021/8077220
fatcat:3ycfzgdhajfeldpkjp7ccertoe
A Comprehensive Study of Deep Learning Based Covert Communication
2022
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
This paper presents a review of deep learning-based covert communication scheme for protecting digital contents, devices and models. ...
In addition to conventional applications, this model can be widely used for cover communication, i.e., information hiding. ...
Deep neural network (DNN), convolutional neural network (CNN) and recurrent neural network (RNN) are some of the commonly used deep learning models. ...
doi:10.1145/3508365
fatcat:kboo4h4gn5gahd6yimd3i4d5my
« Previous
Showing results 1 — 15 out of 2,983 results