1. Lejla Batina , Shivam Bhasin , Dirmanto Jap , and Stjepan Picek . 2019 . CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel . In 28th USENIX Security Symposium (USENIX Security 19) . 515--532. Lejla Batina, Shivam Bhasin, Dirmanto Jap, and Stjepan Picek. 2019. CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel. In 28th USENIX Security Symposium (USENIX Security 19). 515--532.
2. Swarup Bhunia and Mark Tehranipoor . 2018 . Hardware Security: A Hands-on Learning Approach. Swarup Bhunia and Mark Tehranipoor. 2018. Hardware Security: A Hands-on Learning Approach.
3. Jennifer Callen and Jason E James . 2020 . CYBERSECURITY ENGINEERING: THE GROWING NEED. Issues in Information Systems 21, 4 (2020). Jennifer Callen and Jason E James. 2020. CYBERSECURITY ENGINEERING: THE GROWING NEED. Issues in Information Systems 21, 4 (2020).
4. Joseph Clements and Yingjie Lao . 2019 . Hardware Trojan Design on Neural Networks. In 2019 IEEE International Symposium on Circuits and Systems. 1--5. Joseph Clements and Yingjie Lao. 2019. Hardware Trojan Design on Neural Networks. In 2019 IEEE International Symposium on Circuits and Systems. 1--5.
5. Matthieu Courbariaux and Yoshua Bengio . 2016. BinaryNet: Training Deep Neural Networks with Weights and Activations Constrained to +1 or -1. CoRR abs/1602.02830 ( 2016 ). arXiv:1602.02830 http://arxiv.org/abs/1602.02830 Matthieu Courbariaux and Yoshua Bengio. 2016. BinaryNet: Training Deep Neural Networks with Weights and Activations Constrained to +1 or -1. CoRR abs/1602.02830 (2016). arXiv:1602.02830 http://arxiv.org/abs/1602.02830