Completed
Summary
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Security of Edge AI Against Hardware Attacks
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Overview
- 3 Side channel analysis
- 4 Differential power analysis
- 5 Fault attacks
- 6 Neural Network
- 7 Network Structure
- 8 Neuron Parameters
- 9 Power Trace
- 10 Activation Function
- 11 Retrieving Weights
- 12 Increasing Traces
- 13 Results
- 14 Counter measures
- 15 Masking
- 16 Takeaways
- 17 Questions
- 18 Thank you
- 19 Poll
- 20 Q1 How many neurons do the mentioned MLCN networks contain
- 21 How many neurons do the mentioned MLCN networks contain
- 22 How well does it scale with the network size
- 23 Does it make any difference
- 24 Generating adversarial examples
- 25 IP theft
- 26 Least negative impact
- 27 Hardware counter measures
- 28 How successful is an attack
- 29 Prior Knowledge
- 30 Random Input
- 31 Retrieve Network
- 32 Network Security
- 33 Parallel Implementation
- 34 Noise
- 35 Other attacks
- 36 Summary
- 37 Audience questions
- 38 Sponsors