Article,

A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA).

, , and .
CoRR, (2019)

Meta data

Tags

Users

  • @dblp

Comments and Reviews