Document Preview Unavailable

A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)

Odetola, Tolulope A; Hawzhin Raoof Mohammed; Syed Rafay Hasan.  arXiv.org, Jan 27, 2021.

You might have access to this document