2021
DOI: 10.1109/tcsi.2021.3110487
|View full text |Cite
|
Sign up to set email alerts
|

DetectX—Adversarial Input Detection Using Current Signatures in Memristive XBar Arrays

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…Computational overhead: Besides high adversarial detection, our method requires ∼ 10×−100× less number of operations and parameters for adversarial detection compared to works [11,22,25,29,30]. Although we require more parameters compared to [23], the number of computations in our detection is significantly less. This makes our approach suitable for deployment in resource constrained computing systems.…”
Section: Comparison With Prior Workmentioning
confidence: 98%
See 4 more Smart Citations
“…Computational overhead: Besides high adversarial detection, our method requires ∼ 10×−100× less number of operations and parameters for adversarial detection compared to works [11,22,25,29,30]. Although we require more parameters compared to [23], the number of computations in our detection is significantly less. This makes our approach suitable for deployment in resource constrained computing systems.…”
Section: Comparison With Prior Workmentioning
confidence: 98%
“…Here, the target models are trained on natural inputs with different feature squeezing techniques at the inputs. Moitra et al [23] uses the features from the first layer of the underlying model to perform adversarial detection. In particular, they perform adversarial detection using hardware signatures in DNN accelerators.…”
Section: Work Requiring Target Model Trainingmentioning
confidence: 99%
See 3 more Smart Citations