Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence 2018
DOI: 10.1145/3297156.3297224
|View full text |Cite
|
Sign up to set email alerts
|

Convolutional Neural Network Protection Method of Lenet-5-Like Structure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Sun et al [48] showed-using the example of a LeNet-5 CNN-that adapting the activation function of the convolutional layers to be dependent on a random number only known to the legitimate user can provide effective protection.…”
Section: B Model Parameter Protectionmentioning
confidence: 99%
“…Sun et al [48] showed-using the example of a LeNet-5 CNN-that adapting the activation function of the convolutional layers to be dependent on a random number only known to the legitimate user can provide effective protection.…”
Section: B Model Parameter Protectionmentioning
confidence: 99%
“…The reason for their popularity is they can be seen as multiple layers of approximation functions, i.e., f (X) = f l • ... • f 2 • f 1 (X), where f s are some set of "functions" that are comprised of different weighted multiplications and additions called a neuron. In particular, fully connected deep neural networks have become the most popular because of their success in areas such as image processing [36].…”
Section: Neural Accelerationmentioning
confidence: 99%
“…The second fact is that these are relatively simple models compared to other neural network models used in machine learning. For example, consider Lenet-5 [36] which is used for handwritten digit recognition (numbers 0-9) and is a very common framework to build other networks. If the same Lenet-5 framework was applied to this problem with sparse matrix input of size 128 (i.e., n=128 in place of current n=512), there would be approximately 6.8 million trainable perimeters.…”
Section: B Ordering Selectionmentioning
confidence: 99%