{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T05:02:37Z","timestamp":1772082157886,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/spw54247.2022.9833894","type":"proceedings-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:14:47Z","timestamp":1658780087000},"page":"312-322","source":"Crossref","is-referenced-by-count":9,"title":["Clairvoyance: Exploiting Far-field EM Emanations of GPU to \"See\" Your DNN Models through Obstacles at a Distance"],"prefix":"10.1109","author":[{"given":"Sisheng","family":"Liang","sequence":"first","affiliation":[{"name":"Clemson University,Clemson,SC,USA"}]},{"given":"Zihao","family":"Zhan","sequence":"additional","affiliation":[{"name":"University of Florida,Gainesville,FL,USA"}]},{"given":"Fan","family":"Yao","sequence":"additional","affiliation":[{"name":"University of Central Florida,Orlando,FL,USA"}]},{"given":"Long","family":"Cheng","sequence":"additional","affiliation":[{"name":"Clemson University,Clemson,SC,USA"}]},{"given":"Zhenkai","family":"Zhang","sequence":"additional","affiliation":[{"name":"Clemson University,Clemson,SC,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Can one hear the shape of a neural network?: Snooping the GPU via magnetic side channel","volume-title":"31st USENIX Security Symposium (USENIX Security 22)"},{"key":"ref2","first-page":"515","article-title":"CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Batina"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750394"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.691"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC42613.2021.9365803"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046770"},{"key":"ref7","volume-title":"Deep learning","author":"Goodfellow","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134081"},{"key":"ref9","article-title":"Deep speech: Scaling up end-to-end speech recognition","author":"Hannun","year":"2014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.1994.385656"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378460"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465773"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243831"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080223"},{"key":"ref18","article-title":"Nvidia ampere ga102 gpu architecture","volume-title":"Technical Note V2.1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28954-6_7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00509"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2017.19.AVM-023"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1982.1095547"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1038\/nature16961"},{"key":"ref24","author":"Simonyan","year":"2014","journal-title":"Very deep convolutional networks for large-scale image recognition"},{"key":"ref25","first-page":"3104","article-title":"Sequence to sequence learning with neural networks","author":"Sutskever","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref28","author":"Tan","journal-title":"Invisible probe: Timing attacks with pcie congestion side-channel"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00038"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2011.24"},{"key":"ref31","first-page":"2003","article-title":"Cache telepathy: Leveraging shared resource attacks to learn DNN architectures","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Yan"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300274"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300268"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833773"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00060"},{"key":"ref37","article-title":"Hermes attack: Steal DNN models with lossless inference accuracy","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Zhu"}],"event":{"name":"2022 IEEE Security and Privacy Workshops (SPW)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833855\/9833856\/09833894.pdf?arnumber=9833894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T03:00:04Z","timestamp":1706065204000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833894\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/spw54247.2022.9833894","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}