Search Results for author: Yier Jin

Found 9 papers, 0 papers with code

A Review and Comparison of AI Enhanced Side Channel Analysis

no code implementations3 Feb 2024 Max Panoff, Honggang Yu, Haoqi Shan, Yier Jin

In this work, we will examine the latest state-of-the-art deep learning techniques for side channel analysis, the theory behind them, and how they are conducted.

Side Channel Analysis

Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge

no code implementations27 Jan 2024 Weimin Fu, Shijie Li, Yifang Zhao, Haocheng Ma, Raj Dutta, Xuan Zhang, Kaichen Yang, Yier Jin, Xiaolong Guo

The creation of this first pretrained, hardware domain specific large language model marks a significant advancement, offering improved performance in hardware design and verification tasks and illustrating a promising path forward for AI applications in the semiconductor sector.

Language Modelling Large Language Model

Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers

no code implementations22 Sep 2021 Honggang Yu, Shihfeng Zeng, Teng Zhang, Ing-Chao Lin, Yier Jin

As a result, our theoretical proofs provide support to more efficient active learning methods with the help of adversarial examples, contrary to previous works where adversarial examples are often used as destructive solutions.

Active Learning Adversarial Attack +1

CHIMERA: A Hybrid Estimation Approach to Limit the Effects of False Data Injection Attacks

no code implementations25 Mar 2021 Xiaorui Liu, Yaodan Hu, Charalambos Konstantinou, Yier Jin

Our simulation experiments based on the load data from New York state demonstrate that CHIMERA can effectively mitigate 91. 74% of the cases in which FDIAs can maliciously modify the contingencies.

energy management Management

IoT Security: An End-to-End View and Case Study

no code implementations15 May 2018 Zhen Ling, Kaizheng Liu, Yiling Xu, Chao GAO, Yier Jin, Cliff Zou, Xinwen Fu, Wei Zhao

The work in this paper raises the alarm again for the IoT device manufacturers to better secure their products in order to prevent malware attacks like Mirai.

Cryptography and Security

MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation

no code implementations14 Mar 2018 Tao Liu, Zihao Liu, Fuhong Lin, Yier Jin, Gang Quan, Wujie Wen

Modern deep learning enabled artificial neural networks, such as Deep Neural Network (DNN) and Convolutional Neural Network (CNN), have achieved a series of breaking records on a broad spectrum of recognition applications.

PT-Spike: A Precise-Time-Dependent Single Spike Neuromorphic Architecture with Efficient Supervised Learning

no code implementations14 Mar 2018 Tao Liu, Lei Jiang, Yier Jin, Gang Quan, Wujie Wen

One of the most exciting advancements in AI over the last decade is the wide adoption of ANNs, such as DNN and CNN, in many real-world applications.

Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks

no code implementations14 Feb 2018 Qi Liu, Tao Liu, Zihao Liu, Yanzhi Wang, Yier Jin, Wujie Wen

In this work, we for the first time investigate the multi-factor adversarial attack problem in practical model optimized deep learning systems by jointly considering the DNN model-reshaping (e. g. HashNet based deep compression) and the input perturbations.

Adversarial Attack

Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications

no code implementations21 Dec 2017 Qixue Xiao, Kang Li, Deyue Zhang, Yier Jin

This paper presents a downscaling attack that targets the data scaling process in deep learning applications.

Data Poisoning Image Classification

Cannot find the paper you are looking for? You can Submit a new open access paper.