DNN security after installation
Mini Me, You Complete Me! Data Driven Drone Security via DNN based Approximate Computing
USENIX Security '24 - DeepEclipse: How to Break White-Box DNN-Watermarking Schemes
USENIX Security '22 - DnD: A Cross-Architecture Deep Neural Network Decompiler
How Important Is DNN Security?
Genetic Improvement for DNN Security
L20b DNN Hardware Security: Side Channel Attacks
USENIX Security '20 - DeepHammer: Depleting the Intelligence of Deep Neural Networks through Target
Upgrade DNN Site Security: Integrate SSO, MFA, and Third-Party Solutions
USENIX Security '21 - Hermes Attack: Steal DNN Models with Lossless Inference Accuracy
USENIX Security '21 - Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind
USENIX Security '23 - Decompiling x86 Deep Neural Network Executables
April 2018 DNN Security Webinar
How to manage security roles in DNN
How to Setup Two factor Authentication Provider (2FA) for DotNetNuke (DNN)
USENIX Security '24 - Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with...
Ryan Moore (DNN Security Headers - From an "F" to an "A" Grade!)
Telerik removal from DNN website
USENIX Security '20 - Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures
Xudong Pan (Fudan U.), The Security Pitfalls of DNN Watermarking Algorithms under Neural Obfuscation