xinghu7788 / DeepSnifferLinks
☆25Updated 5 years ago
Alternatives and similar repositories for DeepSniffer
Users that are interested in DeepSniffer are comparing it to the libraries listed below
Sorting:
- Pytorch implementation of Bit-Flip based adversarial weight Attack (BFA)☆33Updated 4 years ago
- Changing several bit which overwhelms the quantized CNN☆43Updated 5 years ago
- AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks☆46Updated 2 years ago
- ☆39Updated 5 months ago
- ☆10Updated 2 years ago
- ☆19Updated 3 years ago
- ☆27Updated last year
- Computational Memory Neural Network Compiler☆11Updated 4 years ago
- ☆14Updated 3 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆34Updated 4 years ago
- ☆11Updated 4 years ago
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆19Updated 4 years ago
- Source code for the paper: "A Latency-Predictable Multi-Dimensional Optimization Framework forDNN-driven Autonomous Systems"☆22Updated 4 years ago
- This adds partial support of AVX2 and AVX-512 to gem5.☆15Updated last year
- ☆28Updated 2 years ago
- ☆21Updated 3 years ago
- ☆68Updated 5 months ago
- Ares: A framework for quantifying the resilience of deep neural networks☆38Updated 5 years ago
- A runtime fault injection tool for PyTorch☆118Updated last year
- ☆14Updated 2 years ago
- ☆15Updated last month
- ☆14Updated 3 years ago
- [FPGA'21] Microbenchmarks for Demystifying the Memory System of Modern Datacenter FPGAs for Software Programmers☆31Updated 3 years ago
- Benchmark for matrix multiplications between dense and block sparse (BSR) matrix in TVM, blocksparse (Gray et al.) and cuSparse.☆23Updated 5 years ago
- Privacy Budget Orchestration in Machine Learning Workloads (OSDI '21)☆25Updated last year
- ☆28Updated 2 months ago
- A portable framework to map DFG (dataflow graph, representing an application) on spatial accelerators.☆39Updated 2 years ago
- Stencil with Optimized Dataflow Architecture Compiler☆17Updated 5 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆60Updated 5 years ago
- BEER determines an ECC code's parity-check matrix based on the uncorrectable errors it can cause. BEER targets Hamming codes that are use…☆19Updated 4 years ago