xinghu7788 / DeepSniffer
☆24Updated 5 years ago
Alternatives and similar repositories for DeepSniffer:
Users that are interested in DeepSniffer are comparing it to the libraries listed below
- Pytorch implementation of Bit-Flip based adversarial weight Attack (BFA)☆32Updated 3 years ago
- Changing several bit which overwhelms the quantized CNN☆42Updated 5 years ago
- ☆11Updated 3 years ago
- Implementation of our proposed defense strategy against adversarial attacks "Defensive Approximation (DA)"☆8Updated 3 years ago
- Computational Memory Neural Network Compiler☆10Updated 3 years ago
- ☆31Updated 6 months ago
- ☆25Updated last year
- ☆18Updated 2 years ago
- ☆14Updated 3 years ago
- ☆49Updated 2 weeks ago
- ☆25Updated 3 years ago
- Chameleon: Adaptive Code Optimization for Expedited Deep Neural Network Compilation☆27Updated 5 years ago
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆19Updated 4 years ago
- ☆22Updated last year
- AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks☆44Updated last year
- Shielded Enclaves for Cloud FPGAs☆15Updated 3 years ago
- A portable framework to map DFG (dataflow graph, representing an application) on spatial accelerators.☆36Updated 2 years ago
- GPU-enabled Hardware Fuzzer using Genetic Algorithm☆17Updated last year
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆31Updated 4 years ago
- This is the experiment code for the OCGGS problem.☆10Updated 4 years ago
- Benchmark for matrix multiplications between dense and block sparse (BSR) matrix in TVM, blocksparse (Gray et al.) and cuSparse.☆24Updated 4 years ago
- Stencil with Optimized Dataflow Architecture Compiler☆16Updated 4 years ago
- Source code for the paper: "A Latency-Predictable Multi-Dimensional Optimization Framework forDNN-driven Autonomous Systems"☆22Updated 4 years ago
- Implementation of "NITI: Training Integer Neural Networks Using Integer-only Arithmetic" on arxiv☆80Updated 2 years ago
- ANT-ACE: Advanced Compiler Ecosystem for Fully Homomorphic Encryption and Domain Specific Computing☆25Updated last week
- ☆10Updated last year
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆59Updated 4 years ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆34Updated 11 months ago
- [FPGA'21] Microbenchmarks for Demystifying the Memory System of Modern Datacenter FPGAs for Software Programmers☆30Updated 3 years ago
- ☆33Updated 3 years ago