no code implementations • 27 Jul 2022 • Abhishek Chakraborty, Daniel Xing, Yuntao Liu, Ankur Srivastava
The functionality of a deep learning (DL) model can be stolen via model extraction where an attacker obtains a surrogate model by utilizing the responses from a prediction API of the original model.
no code implementations • 7 Jan 2021 • Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava
(3) Our experiments show that SAS and RSAS exhibit better SAT resilience than SFLL and have similar effectiveness.
Cryptography and Security Hardware Architecture Formal Languages and Automata Theory
no code implementations • 24 Jun 2018 • Ankit Mondal, Ankur Srivastava
Owing to high device density, scalability and non-volatility, Magnetic Tunnel Junction-based crossbars have garnered significant interest for implementing the weights of an artificial neural network.
no code implementations • 3 Oct 2017 • Yuntao Liu, Yang Xie, Ankur Srivastava
In many cases, it is more practical to use a neural network intellectual property (IP) that an IP vendor has already trained.
Cryptography and Security
no code implementations • 17 Aug 2017 • Ankit Mondal, Ankur Srivastava
In this work, we propose an energy-efficient use of MTJs, which exhibit probabilistic switching behavior, as Stochastic Number Generators (SNGs), which forms the basis of our NN implementation in the SC domain.