2022 IEEE 40th VLSI Test Symposium (VTS) 2022
DOI: 10.1109/vts52500.2021.9794253
|View full text |Cite
|
Sign up to set email alerts
|

Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems

Abstract: The real-world use cases of Machine Learning (ML) have exploded over the past few years. However, the current computing infrastructure is insufficient to support all realworld applications and scenarios. Apart from high efficiency requirements, modern ML systems are expected to be highly reliable against hardware failures as well as secure against adversarial and IP stealing attacks. Privacy concerns are also becoming a first-order issue. This article summarizes the main challenges in agile development of effi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 127 publications
0
3
0
Order By: Relevance
“…For these reasons, testability and dependability of AI hardware accelerators are important issues that need to be addressed already from the design phase [12]. Inspiration can of course be drawn from known and mature methodologies applied to traditional computer architectures, but the architectural particularities of AI hardware accelerators often make such methodologies prohibitive in terms of cost and quality, requiring the development of new methodologies that are better suited and take full advantage of the said architectural particularities.…”
Section: Introductionmentioning
confidence: 99%
“…For these reasons, testability and dependability of AI hardware accelerators are important issues that need to be addressed already from the design phase [12]. Inspiration can of course be drawn from known and mature methodologies applied to traditional computer architectures, but the architectural particularities of AI hardware accelerators often make such methodologies prohibitive in terms of cost and quality, requiring the development of new methodologies that are better suited and take full advantage of the said architectural particularities.…”
Section: Introductionmentioning
confidence: 99%
“…Machine learning (ML) has witnessed significant development in recent years, finding diverse applications in various sectors such as robotics, automotive, smart industries, economics, medicine, and security [1][2][3]. Several models based on the structure of the human brain have been implemented [4], including the widely used deep neural networks (DNNs) [5,6] and spiking neural networks (SNNs) [7], which emulate the functioning of neurons relatively better than DNNs [8].…”
Section: Introductionmentioning
confidence: 99%
“…Owners of data covertly transfer their information to servers that train a certain neural network and break the law. SecureML trains a neural network with secure account protocols utilizing a more effective custom activation function [46], [47]. The managed model is afterwards secretly distributed across the servers at the conclusion of the account.…”
mentioning
confidence: 99%