2023
DOI: 10.1109/tii.2022.3177442
|View full text |Cite
|
Sign up to set email alerts
|

An Interpretive Perspective: Adversarial Trojaning Attack on Neural-Architecture-Search Enabled Edge AI Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 13 publications
0
0
0
Order By: Relevance
“…The malicious program changes the coordination of the pump, turbine and valve, which changes the pressure in the pipeline and doubles the power of the explosion. The article in [113] provides attack methodologies to neural-architecturesearch (NAS) enabled edge devices for identifying NAS's vulnerability to trojaning attacks and interpret the backdoor attack, and it illustrates that the occurrence of high impact nodes decreases the robustness of the systems.…”
Section: Cyber-physical Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…The malicious program changes the coordination of the pump, turbine and valve, which changes the pressure in the pipeline and doubles the power of the explosion. The article in [113] provides attack methodologies to neural-architecturesearch (NAS) enabled edge devices for identifying NAS's vulnerability to trojaning attacks and interpret the backdoor attack, and it illustrates that the occurrence of high impact nodes decreases the robustness of the systems.…”
Section: Cyber-physical Attackmentioning
confidence: 99%
“…In [43], Hu and Evans propose a strategy to use directional antennas. In this proposed cooperation agreement, nodes share direction information to prevent wormhole endpoints from Defense coding, SQLIV detection, and SQLIA runtime prevention [48], [113], [114]…”
Section: B Cyber Domain Attack Defensementioning
confidence: 99%