1 code implementation • 7 Feb 2020 • Soham Pal, Yash Gupta, Aditya Shukla, Aditya Kanade, Shirish Shevade, Vinod Ganapathy
We demonstrate that (1) it is possible to use ACTIVETHIEF to extract deep classifiers trained on a variety of datasets from image and text domains, while querying the model with as few as 10-30% of samples from public datasets, (2) the resulting model exhibits a higher transferability success rate of adversarial examples than prior work, and (3) the attack evades detection by the state-of-the-art model extraction detection method, PRADA.
no code implementations • 22 May 2019 • Soham Pal, Yash Gupta, Aditya Shukla, Aditya Kanade, Shirish Shevade, Vinod Ganapathy
Machine learning models trained on confidential datasets are increasingly being deployed for profit.
no code implementations • 13 Mar 2018 • Aditya Shukla, Sidharth Prasad, Sandip Lashkare, Udayan Ganguly
As a solution, we propose the use of multiple PCMO-RRAMs in parallel within a synapse.
no code implementations • 8 Sep 2017 • Aditya Shukla, Udayan Ganguly
This enables learning and recognition simultaneously on an SNN.
no code implementations • 6 Apr 2017 • Aditya Shukla, Vinay Kumar, Udayan Ganguly
Spiking Neural Network (SNN) naturally inspires hardware implementation as it is based on biology.