Side channel attacks(SCAs)on neural networks(NNs)are particularly efficient for retrieving secret information from NNs.We differentiate multiple types of threat scenarios regarding what kind of information is availabl...Side channel attacks(SCAs)on neural networks(NNs)are particularly efficient for retrieving secret information from NNs.We differentiate multiple types of threat scenarios regarding what kind of information is available before the attack and its purpose:recovering hyperparameters(the architecture)of the targeted NN,its weights(parameters),or its inputs.In this survey article,we consider the most relevant attacks to extract the architecture of CNNs.We also categorize SCAs,depending on access with respect to the victim:physical,local,or remote.Attacks targeting the architecture via local SCAs are most common.As of today,physical access seems necessary to retrieve the weights of an NN.We notably describe cache attacks,which are local SCAs aiming to extract the NN's underlying architecture.Few countermeasures have emerged;these are presented at the end of the survey.展开更多
This paper treats the digital design of a probabilistic energy equalizer for impulse radio (IR) UWB receiver in high data rate (100Mbps). The aim of this study is to bypass certain complex mathematical function as a c...This paper treats the digital design of a probabilistic energy equalizer for impulse radio (IR) UWB receiver in high data rate (100Mbps). The aim of this study is to bypass certain complex mathematical function as a chi-squared distribution and reduce the computational complexity of the equalizer for a low cost hardware implementation. As in Sub-MAP algorithm, the max* operation is investigated for complexity reduction and tested by computer simulation with fixed point data types under 802.15.3a channel models. The obtained re-sults prove that the complexity reduction involves a very slight algorithm deterioration and still meet the low-cost constraint of the implementation.展开更多
文摘Side channel attacks(SCAs)on neural networks(NNs)are particularly efficient for retrieving secret information from NNs.We differentiate multiple types of threat scenarios regarding what kind of information is available before the attack and its purpose:recovering hyperparameters(the architecture)of the targeted NN,its weights(parameters),or its inputs.In this survey article,we consider the most relevant attacks to extract the architecture of CNNs.We also categorize SCAs,depending on access with respect to the victim:physical,local,or remote.Attacks targeting the architecture via local SCAs are most common.As of today,physical access seems necessary to retrieve the weights of an NN.We notably describe cache attacks,which are local SCAs aiming to extract the NN's underlying architecture.Few countermeasures have emerged;these are presented at the end of the survey.
文摘This paper treats the digital design of a probabilistic energy equalizer for impulse radio (IR) UWB receiver in high data rate (100Mbps). The aim of this study is to bypass certain complex mathematical function as a chi-squared distribution and reduce the computational complexity of the equalizer for a low cost hardware implementation. As in Sub-MAP algorithm, the max* operation is investigated for complexity reduction and tested by computer simulation with fixed point data types under 802.15.3a channel models. The obtained re-sults prove that the complexity reduction involves a very slight algorithm deterioration and still meet the low-cost constraint of the implementation.