Deep learning network security
The explosion of data usage has contributed to the requirement of processing extensive amount of data for most of the applications on smart devices and edge- and fog- computing nodes. Due to the scale and complexity of the tasks, decision support systems can greatly benefit from the use of machin...
Saved in:
Main Authors: | Wang, Si, Chang, Chip-Hong |
---|---|
Other Authors: | C. H. Chang |
Format: | Book Chapter |
Language: | English |
Published: |
The Institution of Engineering and Technology
2021
|
Subjects: | |
Online Access: | https://digital-library.theiet.org/content/books/cs/pbcs066e https://hdl.handle.net/10356/152816 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Fingerprinting deep neural networks - a DeepFool approach
by: Wang, Si, et al.
Published: (2021) -
Inconspicuous data augmentation based backdoor attack on deep neural networks
by: Xu, Chaohui, et al.
Published: (2023) -
Secure and verifiable inference in deep neural networks
by: XU, Guowen, et al.
Published: (2020) -
Vulnerability analysis on noise-injection based hardware attack on deep neural networks
by: Liu, Wenye, et al.
Published: (2020) -
Privacy and security issues in deep learning : a survey
by: Liu, Ximeng, et al.
Published: (2021)