{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T08:45:03Z","timestamp":1746434703771,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T00:00:00Z","timestamp":1647216000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T00:00:00Z","timestamp":1647216000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,3,14]]},"DOI":"10.23919\/date54114.2022.9774742","type":"proceedings-article","created":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T20:35:05Z","timestamp":1652992505000},"page":"1515-1520","source":"Crossref","is-referenced-by-count":6,"title":["Stealthy Inference Attack on DNN via Cache-based Side-Channel Attacks"],"prefix":"10.23919","author":[{"given":"Han","family":"Wang","sequence":"first","affiliation":[{"name":"University of California,Davis,CA,USA"}]},{"given":"Syed Mahbub","family":"Hafiz","sequence":"additional","affiliation":[{"name":"University of California,Davis,CA,USA"}]},{"given":"Kartik","family":"Patwari","sequence":"additional","affiliation":[{"name":"University of California,Davis,CA,USA"}]},{"given":"Chen-Nee","family":"Chuah","sequence":"additional","affiliation":[{"name":"University of California,Davis,CA,USA"}]},{"given":"Zubair","family":"Shafiq","sequence":"additional","affiliation":[{"name":"University of California,Davis,CA,USA"}]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[{"name":"University of California,Davis,CA,USA"}]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3207677.3278054"},{"key":"ref31","first-page":"22","article-title":"Flush+ reload: A high resolution, low noise, 13 cache side-channel attack","volume":"1","author":"yarom","year":"2014","journal-title":"USENIX Security Symposium"},{"key":"ref30","first-page":"2003","article-title":"Cache telepathy: Leveraging shared resource attacks to learn dnn architectures","author":"yan","year":"2020","journal-title":"29th USENIX Security Symposium (USENIX Security 20)"},{"key":"ref10","article-title":"How to Own nas in your spare time","author":"hong","year":"2020","journal-title":"ArXiv Preprint"},{"journal-title":"Security analysis of deep neural networks operating in the presence of cache side-channel attacks","year":"2018","author":"hong","key":"ref11"},{"key":"ref12","article-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications","author":"howard","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref13","first-page":"1","article-title":"Reverse engineering convolutional neural networks through side-channel information leaks","author":"hua","year":"2018","journal-title":"2018 55th DAC"},{"key":"ref14","first-page":"4700","article-title":"Densely connected convolutional networks","author":"huang","year":"2017","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.036"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24078-7_33"},{"journal-title":"The MNIST Database of Handwritten Digits","year":"0","author":"lecun","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3411495.3421356"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248110"},{"key":"ref28","first-page":"604","article-title":"Hybridg: Hybrid dynamic time warping and gaussian distribution model for detecting emerging zero-day microar-chitectural side-channel attacks","author":"sayadi","year":"2020","journal-title":"2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-335-6.50012-X"},{"key":"ref27","first-page":"1","article-title":"Scarf: Detecting side-channel attacks at real-time using low-level hardware features","author":"sayadi","year":"2020","journal-title":"2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT.2019.00032"},{"key":"ref5","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274696"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2020.110170"},{"key":"ref7","first-page":"17","article-title":"Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing","author":"fredrikson","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"key":"ref2","article-title":"Language models are few-shot learners","author":"brown","year":"2020","journal-title":"ArXiv Preprint"},{"journal-title":"Flower dataset","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref20","first-page":"859","article-title":"Stealthy tracking of autonomous vehicles with cache side channels","author":"luo","year":"2020","journal-title":"29th USENIX Security Symposium (USENIX Security 20)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-15432-4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683468"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"journal-title":"Tesla's autonomy event impressive progress with an unrealistic timeline","year":"2019","author":"lee","key":"ref26"},{"key":"ref25","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014","journal-title":"ArXiv Preprint"}],"event":{"name":"2022 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2022,3,14]]},"location":"Antwerp, Belgium","end":{"date-parts":[[2022,3,23]]}},"container-title":["2022 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9774496\/9774497\/09774742.pdf?arnumber=9774742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T20:05:40Z","timestamp":1657569940000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9774742\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,14]]},"references-count":32,"URL":"https:\/\/doi.org\/10.23919\/date54114.2022.9774742","relation":{},"subject":[],"published":{"date-parts":[[2022,3,14]]}}}