{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T03:08:00Z","timestamp":1761102480624,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T00:00:00Z","timestamp":1623628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T00:00:00Z","timestamp":1623628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T00:00:00Z","timestamp":1623628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,14]]},"DOI":"10.1109\/wf-iot51360.2021.9595434","type":"proceedings-article","created":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T15:44:20Z","timestamp":1636472660000},"page":"610-615","source":"Crossref","is-referenced-by-count":6,"title":["A Review of Confidentiality Threats Against Embedded Neural Network Models"],"prefix":"10.1109","author":[{"given":"Raphael","family":"Joud","sequence":"first","affiliation":[]},{"given":"Pierre-Alain","family":"Moellic","sequence":"additional","affiliation":[]},{"given":"Remi","family":"Bernhard","sequence":"additional","affiliation":[]},{"given":"Jean-Baptiste","family":"Rigaud","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300274"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300276"},{"journal-title":"Privacy risk in machine learning Analyzing the connection to overfitting","year":"2017","author":"yeom","key":"ref10"},{"key":"ref11","article-title":"Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models","author":"salem","year":"2018","journal-title":"arXiv preprint arXiv 1806 01246"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243855"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363201"},{"key":"ref14","article-title":"Use the spear as a shield: A novel adversarial example based privacy-preserving technique against membership inference attacks","author":"xue","year":"2020","journal-title":"arXiv preprint arXiv 2011 13439"},{"key":"ref15","article-title":"Label-only membership inference attacks","author":"choo","year":"2020","journal-title":"arXiv preprint arXiv 2007 14638"},{"key":"ref16","article-title":"Systematic evaluation of privacy risks of machine learning models","author":"song","year":"2020","journal-title":"arXiv preprint arXiv 2003 11055"},{"journal-title":"White-box vs black-box Bayes optimal strategies for membership inference","year":"2019","author":"sablayrolles","key":"ref17"},{"key":"ref18","article-title":"Data and model dependencies of membership inference attack","author":"tonni","year":"2020","journal-title":"arXiv preprint arXiv 2002 05155"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354211"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2020.2973007"},{"journal-title":"The secret sharer Evaluating and testing unintended memorization in neural networks","year":"2019","author":"carlini","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3061314"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref6","article-title":"Sniff: Reverse engineering of neural networks with fault attacks","author":"breier","year":"2020","journal-title":"arXiv preprint arXiv 2002 11040"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465773"},{"key":"ref5","first-page":"337","article-title":"Power Analysis attacks: Revealing the secrets of smart cards","author":"mangard","year":"2007","journal-title":"Power Analysis Attacks Revealing the Secrets of Smart Cards"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00027"},{"key":"ref7","article-title":"The algorithmic foundations of differential privacy","author":"dwork","year":"2014","journal-title":"Found Trends Theor Comput Sci"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274696"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref20","article-title":"Membership inference attacks and defenses in supervised learning via generalization gap","author":"li","year":"2020","journal-title":"arXiv preprint arXiv 2002 12271"},{"key":"ref22","first-page":"1345","article-title":"High accuracy and high fidelity extraction of neural networks","author":"jagielski","year":"2020","journal-title":"29th USENIX Security Symposium USENIX Security 20"},{"key":"ref21","article-title":"Membership inference attack against differentially private deep learning model","volume":"11","author":"rahman","year":"2018","journal-title":"Transactions on Data Privacy"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28954-6_7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_7"},{"key":"ref26","first-page":"1","article-title":"Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-","volume":"2020 november","author":"regazzoni","year":"2020","journal-title":"2020 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)"},{"key":"ref25","first-page":"515","article-title":"{CSI} {NN}: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel","author":"batina","year":"2019","journal-title":"28th USENIX Security Symposium ( USENIX Security 19)"}],"event":{"name":"2021 IEEE 7th World Forum on Internet of Things (WF-IoT)","start":{"date-parts":[[2021,6,14]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2021,7,31]]}},"container-title":["2021 IEEE 7th World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9594899\/9594917\/09595434.pdf?arnumber=9595434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:50:42Z","timestamp":1652187042000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9595434\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,14]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/wf-iot51360.2021.9595434","relation":{},"subject":[],"published":{"date-parts":[[2021,6,14]]}}}