- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources4
- Resource Type
-
10030
- Availability
-
31
- Author / Contributor
- Filter by Author / Creator
-
-
Eshraghian, Jason K. (4)
-
Lu, Wei D. (3)
-
Wang, Xinxin (3)
-
Bennamoun, Mohammed (1)
-
Dwivedi, Girish (1)
-
Guthaus, Matthew (1)
-
Jeong, Doo Seok (1)
-
Lenz, Gregor (1)
-
Modaresi, Farhad (1)
-
Neftci, Emre O. (1)
-
Park, Yongmo (1)
-
Wang, Ziyu (1)
-
Ward, Max (1)
-
Wu, Yuting (1)
-
Yoo, Sangmin (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
- (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Free, publicly-accessible full text available May 21, 2024
-
Eshraghian, Jason K. ; Wang, Xinxin ; Lu, Wei D. ( , IEEE Nanotechnology Magazine)
-
Wang, Ziyu ; Wu, Yuting ; Park, Yongmo ; Yoo, Sangmin ; Wang, Xinxin ; Eshraghian, Jason K. ; Lu, Wei D. ( , Advanced Intelligent Systems)
Analog compute‐in‐memory (CIM) systems are promising candidates for deep neural network (DNN) inference acceleration. However, as the use of DNNs expands, protecting user input privacy has become increasingly important. Herein, a potential security vulnerability is identified wherein an adversary can reconstruct the user's private input data from a power side‐channel attack even without knowledge of the stored DNN model. An attack approach using a generative adversarial network is developed to achieve high‐quality data reconstruction from power leakage measurements. The analyses show that the attack methodology is effective in reconstructing user input data from power leakage of the analog CIM accelerator, even at large noise levels and after countermeasures. To demonstrate the efficacy of the proposed approach, an example of CIM inference of U‐Net for brain tumor detection is attacked, and the original magnetic resonance imaging medical images can be successfully reconstructed even at a noise level of 20% standard deviation of the maximum power signal value. This study highlights a potential security vulnerability in emerging analog CIM accelerators and raises awareness of needed safety features to protect user privacy in such systems.
-
Eshraghian, Jason K. ; Ward, Max ; Neftci, Emre O. ; Wang, Xinxin ; Lenz, Gregor ; Dwivedi, Girish ; Bennamoun, Mohammed ; Jeong, Doo Seok ; Lu, Wei D. ( , Proceedings of the IEEE)