Search Results for author: Yinqian Zhang

Found 4 papers, 1 papers with code

A Novel Watermarking Framework for Ownership Verification of DNN Architectures

no code implementations29 Sep 2021 Xiaoxuan Lou, Shangwei Guo, Tianwei Zhang, Jiwei Li, Yinqian Zhang, Yang Liu

We present a novel watermarking scheme to achieve the intellectual property (IP) protection and ownership verification of DNN architectures.

Model extraction Neural Architecture Search

SvTPM: A Secure and Efficient vTPM in the Cloud

1 code implementation21 May 2019 Juan Wang, Chengyang Fan, Jie Wang, Yueqiang Cheng, Yinqian Zhang, Wenhui Zhang, Peng Liu, Hongxin Hu

In this paper, we present SvTPM, a secure and efficient software-based vTPM implementation based on hardware-rooted Trusted Execution Environment (TEE), providing a whole life cycle protection of vTPMs in the cloud.

Cryptography and Security

SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution

no code implementations25 Feb 2018 Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten H. Lai

Particularly, we show that when branch prediction of the enclave code can be influenced by programs outside the enclave, the control flow of the enclave program can be temporarily altered to execute instructions that lead to observable cache-state changes.

Cryptography and Security

Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections

no code implementations6 Jan 2018 Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang

The overall accuracy of our liveness detection system is 98. 8\%, and its robustness was evaluated in different scenarios.

Face Verification

Cannot find the paper you are looking for? You can Submit a new open access paper.