{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T12:30:20Z","timestamp":1776774620781,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T00:00:00Z","timestamp":1583712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1725447, 1730309, 192571"],"award-info":[{"award-number":["1725447, 1730309, 192571"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["CRISP"],"award-info":[{"award-number":["CRISP"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,9]]},"DOI":"10.1145\/3373376.3378460","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T22:37:01Z","timestamp":1584139021000},"page":"385-399","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":102,"title":["DeepSniffer"],"prefix":"10.1145","author":[{"given":"Xing","family":"Hu","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Ling","family":"Liang","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Shuangchen","family":"Li","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Lei","family":"Deng","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara &amp; Tsinghua University, Santa Barbara, CA, USA"}]},{"given":"Pengfei","family":"Zuo","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara &amp; Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Yu","family":"Ji","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara &amp; Tsinghua University, Beijing, China"}]},{"given":"Xinfeng","family":"Xie","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, Uganda"}]},{"given":"Yufei","family":"Ding","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[{"name":"Citadel Securities, Chicago, IL, USA"}]},{"given":"Timothy","family":"Sherwood","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Yuan","family":"Xie","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. HMTT: Hybrid Memory Trace Toolkit. http:\/\/asg.ict.ac.cn\/hmtt\/  2019. HMTT: Hybrid Memory Trace Toolkit. http:\/\/asg.ict.ac.cn\/hmtt\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"e_1_3_2_1_3_1","volume-title":"Data Poisoning Attacks Against Autoregressive Models (AAAI'16)","author":"Alfeld Scott","unstructured":"Scott Alfeld , Xiaojin Zhu , and Paul Barford . 2016. Data Poisoning Attacks Against Autoregressive Models (AAAI'16) . AAAI Press , 1452? 1458. Scott Alfeld, Xiaojin Zhu, and Paul Barford. 2016. Data Poisoning Attacks Against Autoregressive Models (AAAI'16). AAAI Press, 1452? 1458."},{"key":"e_1_3_2_1_4_1","volume-title":"Adversarial transformation networks: Learning to generate adversarial examples. arXiv preprint arXiv:1703.09387","author":"Baluja Shumeet","year":"2017","unstructured":"Shumeet Baluja and Ian Fischer . 2017. Adversarial transformation networks: Learning to generate adversarial examples. arXiv preprint arXiv:1703.09387 ( 2017 ). Shumeet Baluja and Ian Fischer. 2017. Adversarial transformation networks: Learning to generate adversarial examples. arXiv preprint arXiv:1703.09387 (2017)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420961"},{"key":"e_1_3_2_1_6_1","volume-title":"A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events (MICRO-47)","author":"Callan Robert","unstructured":"Robert Callan , Alenka Zajic , and Milos Prvulovic . 2014. A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events (MICRO-47) . IEEE Computer Society , Washington, DC, USA , 242?254. Robert Callan, Alenka Zajic, and Milos Prvulovic. 2014. A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events (MICRO-47). IEEE Computer Society, Washington, DC, USA, 242?254."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_8_1","volume-title":"TVM: End-to-End Optimization Stack for Deep Learning. CoRR abs\/1802.04799","author":"Chen Tianqi","year":"2018","unstructured":"Tianqi Chen , Thierry Moreau , Ziheng Jiang , Haichen Shen , Eddie Q. Yan , Leyuan Wang , Yuwei Hu , Luis Ceze , Carlos Guestrin , and Arvind Krishnamurthy . 2018 . TVM: End-to-End Optimization Stack for Deep Learning. CoRR abs\/1802.04799 (2018). arXiv:1802.04799 Tianqi Chen, Thierry Moreau, Ziheng Jiang, Haichen Shen, Eddie Q. Yan, Leyuan Wang, Yuwei Hu, Luis Ceze, Carlos Guestrin, and Arvind Krishnamurthy. 2018. TVM: End-to-End Optimization Stack for Deep Learning. CoRR abs\/1802.04799 (2018). arXiv:1802.04799"},{"key":"e_1_3_2_1_9_1","volume-title":"Houdini: Fooling deep structured prediction models. arXiv preprint arXiv:1707.05373","author":"Cisse Moustapha","year":"2017","unstructured":"Moustapha Cisse , Yossi Adi , Natalia Neverova , and Joseph Keshet . 2017 . Houdini: Fooling deep structured prediction models. arXiv preprint arXiv:1707.05373 (2017). Moustapha Cisse, Yossi Adi, Natalia Neverova, and Joseph Keshet. 2017. Houdini: Fooling deep structured prediction models. arXiv preprint arXiv:1707.05373 (2017)."},{"key":"e_1_3_2_1_10_1","volume-title":"A Unified Architecture for Natural Language Processing: Deep Neural Networks with Multitask Learning (ICML '08)","author":"Collobert Ronan","unstructured":"Ronan Collobert and Jason Weston . 2008. A Unified Architecture for Natural Language Processing: Deep Neural Networks with Multitask Learning (ICML '08) . ACM , New York, NY, USA , 160--167. Ronan Collobert and Jason Weston. 2008. A Unified Architecture for Natural Language Processing: Deep Neural Networks with Multitask Learning (ICML '08). ACM, New York, NY, USA, 160--167."},{"key":"e_1_3_2_1_11_1","volume-title":"Differential evolution: a survey of the state-of-the-art","author":"Das Swagatam","year":"2011","unstructured":"Swagatam Das and Ponnuthurai Nagaratnam Suganthan . 2011. Differential evolution: a survey of the state-of-the-art . IEEE transactions on evolutionary computation 15, 1 ( 2011 ), 4--31. Swagatam Das and Ponnuthurai Nagaratnam Suganthan. 2011. Differential evolution: a survey of the state-of-the-art. IEEE transactions on evolutionary computation 15, 1 (2011), 4--31."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_13_1","volume-title":"EMPROF: Memory Profiling Via EM-Emanation in IoT and Hand-Held Devices. In 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 881--893","author":"Dey M.","unstructured":"M. Dey , A. Nazari , A. Zajic , and M. Prvulovic . 2018 . EMPROF: Memory Profiling Via EM-Emanation in IoT and Hand-Held Devices. In 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 881--893 . M. Dey, A. Nazari, A. Zajic, and M. Prvulovic. 2018. EMPROF: Memory Profiling Via EM-Emanation in IoT and Hand-Held Devices. In 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 881--893."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Goodfellow Ian J","year":"2015","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and harnessing adversarial examples . Proceedings of the International Conference on Learning Representations (2015). Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. Proceedings of the International Conference on Learning Representations (2015)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143891"},{"key":"e_1_3_2_1_16_1","unstructured":"Alex Graves and Navdeep Jaitly. 2014. Towards End-to-end Speech Recognition with Recurrent Neural Networks (ICML'14). II-1764- 1772.  Alex Graves and Navdeep Jaitly. 2014. Towards End-to-end Speech Recognition with Recurrent Neural Networks (ICML'14). II-1764- 1772."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Reverse Engineering Convolutional Neural Networks Through Side-channel Information Leaks (DAC '18). ACM, New York","volume":"4","author":"Hua Weizhe","year":"2018","unstructured":"Weizhe Hua , Zhiru Zhang , and G. Edward Suh . 2018 . Reverse Engineering Convolutional Neural Networks Through Side-channel Information Leaks (DAC '18). ACM, New York , NY, USA , 4 : 1 -- 4 :6. Weizhe Hua, Zhiru Zhang, and G. Edward Suh. 2018. Reverse Engineering Convolutional Neural Networks Through Side-channel Information Leaks (DAC '18). ACM, New York, NY, USA, 4:1--4:6.","journal-title":"NY, USA"},{"key":"e_1_3_2_1_19_1","volume-title":"Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES '02)","author":"Huang Andrew","unstructured":"Andrew Huang . 2003. Keeping Secrets in Hardware: The Microsoft Xbox Case Study . In Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES '02) . Springer-Verlag , London, UK , UK, 213--227. Andrew Huang. 2003. Keeping Secrets in Hardware: The Microsoft Xbox Case Study. In Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES '02). Springer-Verlag, London, UK, UK, 213--227."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2579668"},{"key":"e_1_3_2_1_22_1","unstructured":"Itay Hubara Matthieu Courbariaux Daniel Soudry Ran El-Yaniv and Yoshua Bengio. 2016. Binarized neural networks. In Advances in neural information processing systems. 4107--4115.  Itay Hubara Matthieu Courbariaux Daniel Soudry Ran El-Yaniv and Yoshua Bengio. 2016. Binarized neural networks. In Advances in neural information processing systems. 4107--4115."},{"key":"e_1_3_2_1_23_1","volume-title":"Squeezenet: Alexnet-level accuracy with 50x fewer parameters and < 0.5 mb model size. arXiv preprint arXiv:1602.07360","author":"Iandola Forrest N","year":"2016","unstructured":"Forrest N Iandola , Song Han , Matthew W Moskewicz , Khalid Ashraf , William J Dally , and Kurt Keutzer . 2016 . Squeezenet: Alexnet-level accuracy with 50x fewer parameters and < 0.5 mb model size. arXiv preprint arXiv:1602.07360 (2016). Forrest N Iandola, Song Han, Matthew W Moskewicz, Khalid Ashraf, William J Dally, and Kurt Keutzer. 2016. Squeezenet: Alexnet-level accuracy with 50x fewer parameters and < 0.5 mb model size. arXiv preprint arXiv:1602.07360 (2016)."},{"key":"e_1_3_2_1_24_1","volume-title":"Hinton","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky , Ilya Sutskever , and Geoffrey E . Hinton . 2012 . ImageNet Classification with Deep Convolutional Neural Networks (NIPS'12). Curran Associates Inc., USA , 1097--1105. Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks (NIPS'12). Curran Associates Inc., USA, 1097--1105."},{"key":"e_1_3_2_1_25_1","volume-title":"Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533","author":"Kurakin Alexey","year":"2016","unstructured":"Alexey Kurakin , Ian Goodfellow , and Samy Bengio . 2016. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 ( 2016 ). Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2016. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 (2016)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694385"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.11"},{"key":"e_1_3_2_1_28_1","volume-title":"Delving into Transferable Adversarial Examples and Black-box Attacks. ICLR abs\/1611.02770","author":"Liu Yanpei","year":"2017","unstructured":"Yanpei Liu , Xinyun Chen , Chang Liu , and Dawn Song . 2017. Delving into Transferable Adversarial Examples and Black-box Attacks. ICLR abs\/1611.02770 ( 2017 ). arXiv:1611.02770 Yanpei Liu, Xinyun Chen, Chang Liu, and Dawn Song. 2017. Delving into Transferable Adversarial Examples and Black-box Attacks. ICLR abs\/1611.02770 (2017). arXiv:1611.02770"},{"key":"e_1_3_2_1_29_1","volume-title":"Universal adversarial perturbations. arXiv preprint","author":"Moosavi-Dezfooli Seyed-Mohsen","year":"2017","unstructured":"Seyed-Mohsen Moosavi-Dezfooli , Alhussein Fawzi , Omar Fawzi , and Pascal Frossard . 2017. Universal adversarial perturbations. arXiv preprint ( 2017 ). Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, Omar Fawzi, and Pascal Frossard. 2017. Universal adversarial perturbations. arXiv preprint (2017)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_31_1","volume-title":"Fast feature fool: A data independent approach to universal adversarial perturbations. arXiv preprint arXiv:1707.05572","author":"Mopuri Konda Reddy","year":"2017","unstructured":"Konda Reddy Mopuri , Utsav Garg , and R Venkatesh Babu . 2017. Fast feature fool: A data independent approach to universal adversarial perturbations. arXiv preprint arXiv:1707.05572 ( 2017 ). Konda Reddy Mopuri, Utsav Garg, and R Venkatesh Babu. 2017. Fast feature fool: A data independent approach to universal adversarial perturbations. arXiv preprint arXiv:1707.05572 (2017)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243831"},{"key":"e_1_3_2_1_33_1","volume-title":"The Limitations of Deep Learning in Adversarial Settings. CoRR abs\/1511.07528","author":"Nicolas Papernot","year":"2015","unstructured":"Papernot Nicolas , D. McDaniel Patrick , Jha Somesh , Fredrikson Matt , Celik Z. Berkay , and Swami Ananthram . 2015. The Limitations of Deep Learning in Adversarial Settings. CoRR abs\/1511.07528 ( 2015 ). arXiv:1511.07528 Papernot Nicolas, D. McDaniel Patrick, Jha Somesh, Fredrikson Matt, Celik Z. Berkay, and Swami Ananthram. 2015. The Limitations of Deep Learning in Adversarial Settings. CoRR abs\/1511.07528 (2015). arXiv:1511.07528"},{"key":"e_1_3_2_1_34_1","unstructured":"Nvidia. [n.d.]. CUDA toolkit documentation. http:\/\/docs.nvidia.com\/ cuda\/profiler-users-guide\/index.html  Nvidia. [n.d.]. CUDA toolkit documentation. http:\/\/docs.nvidia.com\/ cuda\/profiler-users-guide\/index.html"},{"key":"e_1_3_2_1_35_1","unstructured":"NVIDIA. 2016. NVIDIA Tesla K40 Active GPU Accelerator. http: \/\/www.pny.com\/nvidia-tesla-k40-active-gpu-accelerator.  NVIDIA. 2016. NVIDIA Tesla K40 Active GPU Accelerator. http: \/\/www.pny.com\/nvidia-tesla-k40-active-gpu-accelerator."},{"key":"e_1_3_2_1_36_1","unstructured":"Nvidia. 2017. NVIDIA cuDNN GPU Accelerated Deep Learning. https: \/\/developer.nvidia.com\/cudnn  Nvidia. 2017. NVIDIA cuDNN GPU Accelerated Deep Learning. https: \/\/developer.nvidia.com\/cudnn"},{"key":"e_1_3_2_1_37_1","volume-title":"Practical Black-Box Attacks Against Machine Learning (ASIA CCS '17)","author":"Papernot Nicolas","year":"2017","unstructured":"Nicolas Papernot , Patrick McDaniel , Ian Goodfellow , Somesh Jha , Z. Berkay Celik , and Ananthram Swami . 2017 . Practical Black-Box Attacks Against Machine Learning (ASIA CCS '17) . ACM, New York, NY, USA, 506--519. Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik, and Ananthram Swami. 2017. Practical Black-Box Attacks Against Machine Learning (ASIA CCS '17). ACM, New York, NY, USA, 506--519."},{"key":"e_1_3_2_1_38_1","volume-title":"Towards the science of security and privacy in machine learning. arXiv preprint arXiv:1611.03814","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick McDaniel , Arunesh Sinha , and MichaelWellman. 2016. Towards the science of security and privacy in machine learning. arXiv preprint arXiv:1611.03814 ( 2016 ). Nicolas Papernot, Patrick McDaniel, Arunesh Sinha, and MichaelWellman. 2016. Towards the science of security and privacy in machine learning. arXiv preprint arXiv:1611.03814 (2016)."},{"key":"e_1_3_2_1_39_1","volume-title":"Goodfellow","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick D. McDaniel , and Ian J . Goodfellow . 2016 . Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples. CoRR abs\/1605.07277 (2016). arXiv:1605.07277 http:\/\/arxiv.org\/abs\/1605.07277 Nicolas Papernot, Patrick D. McDaniel, and Ian J. Goodfellow. 2016. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples. CoRR abs\/1605.07277 (2016). arXiv:1605.07277 http:\/\/arxiv.org\/abs\/1605.07277"},{"key":"e_1_3_2_1_40_1","unstructured":"PyTorch. [n.d.]. Pytorch Tutorials. http:\/\/pytorch.org\/tutorials\/  PyTorch. [n.d.]. Pytorch Tutorials. http:\/\/pytorch.org\/tutorials\/"},{"key":"e_1_3_2_1_41_1","unstructured":"Tractica Report. 2016. Artificial Intelligience Market Forecasts.  Tractica Report. 2016. Artificial Intelligience Market Forecasts."},{"key":"e_1_3_2_1_42_1","volume-title":"Compressing DMA Engine: Leveraging Activation Sparsity for Training Deep Neural Networks. In 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA). 78--91","author":"Rhu M.","unstructured":"M. Rhu , M. O'Connor , N. Chatterjee , J. Pool , Y. Kwon , and S.W. Keckler . 2018 . Compressing DMA Engine: Leveraging Activation Sparsity for Training Deep Neural Networks. In 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA). 78--91 . M. Rhu, M. O'Connor, N. Chatterjee, J. Pool, Y. Kwon, and S.W. Keckler. 2018. Compressing DMA Engine: Leveraging Activation Sparsity for Training Deep Neural Networks. In 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA). 78--91."},{"key":"e_1_3_2_1_43_1","volume-title":"UPSET and ANGRI: Breaking High Performance Image Classifiers. arXiv preprint arXiv:1707.01159","author":"Sarkar Sayantan","year":"2017","unstructured":"Sayantan Sarkar , Ankan Bansal , Upal Mahbub , and Rama Chellappa . 2017. UPSET and ANGRI: Breaking High Performance Image Classifiers. arXiv preprint arXiv:1707.01159 ( 2017 ). Sayantan Sarkar, Ankan Bansal, Upal Mahbub, and Rama Chellappa. 2017. UPSET and ANGRI: Breaking High Performance Image Classifiers. arXiv preprint arXiv:1707.01159 (2017)."},{"key":"e_1_3_2_1_44_1","volume-title":"Towards Reverse-Engineering Black-Box Neural Networks. ICLR abs\/1605.07277","author":"Mario Fritz Seong Bernt Schiele","year":"2018","unstructured":"Bernt Schiele Mario Fritz Seong Joon Oh , Max Augustin . 2018. Towards Reverse-Engineering Black-Box Neural Networks. ICLR abs\/1605.07277 ( 2018 ). https:\/\/arxiv.org\/abs\/1711.01768 Bernt Schiele Mario Fritz Seong Joon Oh, Max Augustin. 2018. Towards Reverse-Engineering Black-Box Neural Networks. ICLR abs\/1605.07277 (2018). https:\/\/arxiv.org\/abs\/1711.01768"},{"key":"e_1_3_2_1_45_1","volume-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition. CoRR abs\/1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. CoRR abs\/1409.1556 ( 2014 ). arXiv:1409.1556 http:\/\/arxiv.org\/abs\/1409.1556 Karen Simonyan and Andrew Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. CoRR abs\/1409.1556 (2014). arXiv:1409.1556 http:\/\/arxiv.org\/abs\/1409.1556"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_47_1","volume-title":"Danilo Vasconcellos Vargas, and Sakurai Kouichi","author":"Su Jiawei","year":"2017","unstructured":"Jiawei Su , Danilo Vasconcellos Vargas, and Sakurai Kouichi . 2017 . One pixel attack for fooling deep neural networks. arXiv preprint arXiv:1710.08864 (2017). Jiawei Su, Danilo Vasconcellos Vargas, and Sakurai Kouichi. 2017. One pixel attack for fooling deep neural networks. arXiv preprint arXiv:1710.08864 (2017)."},{"key":"e_1_3_2_1_48_1","volume-title":"Advances in Neural Information Processing Systems 27","author":"Sutskever Ilya","unstructured":"Ilya Sutskever , Oriol Vinyals , and Quoc V Le. 2014. Sequence to Sequence Learning with Neural Networks . In Advances in Neural Information Processing Systems 27 , Z. Ghahramani, M.Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc. , 3104--3112. Ilya Sutskever, Oriol Vinyals, and Quoc V Le. 2014. Sequence to Sequence Learning with Neural Networks. In Advances in Neural Information Processing Systems 27, Z. Ghahramani, M.Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 3104--3112."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Christian Szegedy Sergey Ioffe Vincent Vanhoucke and Alexander A Alemi. 2017. Inception-v4 Inception-ResNet and the Impact of Residual Connections on Learning.. In AAAI. 4278--4284.  Christian Szegedy Sergey Ioffe Vincent Vanhoucke and Alexander A Alemi. 2017. Inception-v4 Inception-ResNet and the Impact of Residual Connections on Learning.. In AAAI. 4278--4284.","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"e_1_3_2_1_50_1","volume-title":"Rethinking the Inception Architecture for Computer Vision. CoRR abs\/1512.00567","author":"Szegedy Christian","year":"2015","unstructured":"Christian Szegedy , Vincent Vanhoucke , Sergey Ioffe , Jonathon Shlens , and Zbigniew Wojna . 2015. Rethinking the Inception Architecture for Computer Vision. CoRR abs\/1512.00567 ( 2015 ). arXiv:1512.00567 Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jonathon Shlens, and Zbigniew Wojna. 2015. Rethinking the Inception Architecture for Computer Vision. CoRR abs\/1512.00567 (2015). arXiv:1512.00567"},{"key":"e_1_3_2_1_51_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 ( 2013 ). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_1_52_1","volume-title":"Cong Liu, Hai-Feng Liu, Shan Tang, and Allen Rush.","author":"Tao Jin-Hua","year":"2017","unstructured":"Jin-Hua Tao , Zi-Dong Du , Qi Guo , Hui-Ying Lan , Lei Zhang , Sheng- Yuan Zhou , Cong Liu, Hai-Feng Liu, Shan Tang, and Allen Rush. 2017 . BENCHIP : Benchmarking Intelligence Processors . arXiv preprint arXiv:1710.08315 (2017). Jin-Hua Tao, Zi-Dong Du, Qi Guo, Hui-Ying Lan, Lei Zhang, Sheng- Yuan Zhou, Cong Liu, Hai-Feng Liu, Shan Tang, and Allen Rush. 2017. BENCHIP: Benchmarking Intelligence Processors. arXiv preprint arXiv:1710.08315 (2017)."},{"key":"e_1_3_2_1_53_1","unstructured":"TechCrunch. 2017. Nvidia is powering the world's first level 3 selfdriving production car.  TechCrunch. 2017. Nvidia is powering the world's first level 3 selfdriving production car."},{"key":"e_1_3_2_1_54_1","unstructured":"TensorFlow. [n.d.]. Post-training quantization. https:\/\/www. tensorflow.org\/lite\/performance\/post_training_quantization.  TensorFlow. [n.d.]. Post-training quantization. https:\/\/www. tensorflow.org\/lite\/performance\/post_training_quantization."},{"key":"e_1_3_2_1_55_1","volume-title":"Stealing Machine Learning Models via Prediction APIs (SEC'16)","author":"Tram\u00e8r Florian","unstructured":"Florian Tram\u00e8r , Fan Zhang , Ari Juels , Michael K. Reiter , and Thomas Ristenpart . 2016. Stealing Machine Learning Models via Prediction APIs (SEC'16) . USENIX Association , Berkeley, CA, USA , 601--618. Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. 2016. Stealing Machine Learning Models via Prediction APIs (SEC'16). USENIX Association, Berkeley, CA, USA, 601--618."},{"key":"e_1_3_2_1_56_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in Neural Information Processing Systems. 6000--6010.  Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in Neural Information Processing Systems. 6000--6010."},{"key":"e_1_3_2_1_57_1","volume-title":"Stealing Hyperparameters in Machine Learning. CoRR abs\/1802.05351","author":"Wang Binghui","year":"2018","unstructured":"Binghui Wang and Neil Zhenqiang Gong . 2018. Stealing Hyperparameters in Machine Learning. CoRR abs\/1802.05351 ( 2018 ). arXiv:1802.05351 Binghui Wang and Neil Zhenqiang Gong. 2018. Stealing Hyperparameters in Machine Learning. CoRR abs\/1802.05351 (2018). arXiv:1802.05351"},{"key":"e_1_3_2_1_58_1","unstructured":"Waymo. 2017. IntroducingWaymo's suite of custom-build self-driving hardware. https:\/\/medium.com\/waymo\/introducing-waymos-suiteof- custom-built-self-driving-hardware-c47d1714563\/  Waymo. 2017. IntroducingWaymo's suite of custom-build self-driving hardware. https:\/\/medium.com\/waymo\/introducing-waymos-suiteof- custom-built-self-driving-hardware-c47d1714563\/"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274696"},{"key":"e_1_3_2_1_60_1","unstructured":"Nicholas Wilt. 2013. The cuda handbook: A comprehensive guide to gpu programming. Pearson Education.  Nicholas Wilt. 2013. The cuda handbook: A comprehensive guide to gpu programming. Pearson Education."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953159"},{"key":"e_1_3_2_1_62_1","volume-title":"Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures. CoRR abs\/1808.04761","author":"Yan Mengjia","year":"2018","unstructured":"Mengjia Yan , Christopher W. Fletcher , and Josep Torrellas . 2018 . Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures. CoRR abs\/1808.04761 (2018). arXiv:1808.04761 Mengjia Yan, ChristopherW. Fletcher, and Josep Torrellas. 2018. Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures. CoRR abs\/1808.04761 (2018). arXiv:1808.04761"},{"key":"e_1_3_2_1_63_1","volume-title":"Chen Change Loy, and Dahua Lin","author":"Zhang Xingcheng","year":"2016","unstructured":"Xingcheng Zhang , Zhizhong Li , Chen Change Loy, and Dahua Lin . 2016 . PolyNet:APursuit of Structural Diversity in Very Deep Networks. CoRR abs\/1611.05725 (2016). arXiv:1611.05725 Xingcheng Zhang, Zhizhong Li, Chen Change Loy, and Dahua Lin. 2016. PolyNet:APursuit of Structural Diversity in Very Deep Networks. CoRR abs\/1611.05725 (2016). arXiv:1611.05725"},{"key":"e_1_3_2_1_64_1","volume-title":"Le","author":"Zoph Barret","year":"2017","unstructured":"Barret Zoph , Vijay Vasudevan , Jonathon Shlens , and Quoc V . Le . 2017 . Learning Transferable Architectures for Scalable Image Recognition. CoRR abs\/1707.07012 (2017). arXiv:1707.07012 Barret Zoph, Vijay Vasudevan, Jonathon Shlens, and Quoc V. Le. 2017. Learning Transferable Architectures for Scalable Image Recognition. CoRR abs\/1707.07012 (2017). arXiv:1707.07012"}],"event":{"name":"ASPLOS '20: Architectural Support for Programming Languages and Operating Systems","location":"Lausanne Switzerland","acronym":"ASPLOS '20","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378460","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3373376.3378460","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373376.3378460","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373376.3378460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:59Z","timestamp":1750199579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378460"}},"subtitle":["A DNN Model Extraction Framework Based on Learning Architectural Hints"],"short-title":[],"issued":{"date-parts":[[2020,3,9]]},"references-count":64,"alternative-id":["10.1145\/3373376.3378460","10.1145\/3373376"],"URL":"https:\/\/doi.org\/10.1145\/3373376.3378460","relation":{},"subject":[],"published":{"date-parts":[[2020,3,9]]},"assertion":[{"value":"2020-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}