Filter by type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

2 results

    • Article

    « Energy backdoor attack to deep neural networks »

    The transition to deep learning has led to a significant surge in computing complexity and energy consumption. This trend has prompted the adoption of acceleration hardware like tensor processing units (TPUs) and application specific integrated circuits (ASICs) to facilitate energy-efficient deployment on edge and mobile devices. However, recent studies have revealed their vulnerability to energy[…]
    • Article

    « BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports »

    Malware analysis consists of studying a sample of suspicious code to understand it and producing a representation or explanation of this code that can be used by a human expert or a clustering/classification/detection tool.