![]() Music |
![]() Video |
![]() Movies |
![]() Chart |
![]() Show |
![]() |
Detecting AI Trojans Using Meta Neural Analysis (IEEE Symposium on Security and Privacy) View |
![]() |
Detecting AI Trojans Using Meta Neural Analysis (All Hacking Cons) View |
![]() |
An Embarrassingly Simple Approach for Trojan Attack in Deep Neural Networks (AI Paper Summary) (Marktechpost AI) View |
![]() |
GNN4TJ: Graph neural networks for hardware trojan detection at register transfer level (AICPS) View |
![]() |
NDSS 2018 - Trojaning Attack on Neural Networks (NDSS Symposium) View |
![]() |
Hardware Trojan Detection Methods - Hardware Security (Trieu Truong Nhan) View |
![]() |
USENIX Security '21 - T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based (USENIX) View |
![]() |
USENIX Security '21 - Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor (USENIX) View |
![]() |
Project 5 Trojan Detection (mralihenry12) View |
![]() |
[Paper Review] Distilling a Neural Network Into a Soft Decision Tree (Tommy's Lab) View |