no code implementations • 29 Sep 2021 • Xiaoxuan Lou, Shangwei Guo, Tianwei Zhang, Jiwei Li, Yinqian Zhang, Yang Liu
We present a novel watermarking scheme to achieve the intellectual property (IP) protection and ownership verification of DNN architectures.
1 code implementation • 21 May 2019 • Juan Wang, Chengyang Fan, Jie Wang, Yueqiang Cheng, Yinqian Zhang, Wenhui Zhang, Peng Liu, Hongxin Hu
In this paper, we present SvTPM, a secure and efficient software-based vTPM implementation based on hardware-rooted Trusted Execution Environment (TEE), providing a whole life cycle protection of vTPMs in the cloud.
Cryptography and Security
no code implementations • 25 Feb 2018 • Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten H. Lai
Particularly, we show that when branch prediction of the enclave code can be influenced by programs outside the enclave, the control flow of the enclave program can be temporarily altered to execute instructions that lead to observable cache-state changes.
Cryptography and Security
no code implementations • 6 Jan 2018 • Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang
The overall accuracy of our liveness detection system is 98. 8\%, and its robustness was evaluated in different scenarios.