Hermes Attack - Steal DNN Models in AI Privatization Deployment Scenarios

Hermes Attack - Steal DNN Models in AI Privatization Deployment Scenarios

Black Hat via YouTube Direct link

Introduction

1 of 27

1 of 27

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hermes Attack - Steal DNN Models in AI Privatization Deployment Scenarios

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Motivations
  3. 3 Cost
  4. 4 Leak
  5. 5 Hermes Attack
  6. 6 Challenges
  7. 7 Attack Overview
  8. 8 Hardware
  9. 9 Package Relationships
  10. 10 Quick Facts
  11. 11 Out of Order Issues
  12. 12 GPU Command
  13. 13 Data Movement Command
  14. 14 Reverse Engineer
  15. 15 Split Command
  16. 16 Command Data Noise
  17. 17 Semantic Reconstruction
  18. 18 Offline Database Generation
  19. 19 Hyperparameter Reconstruct
  20. 20 No Directed Connections
  21. 21 Evaluation
  22. 22 Architecture Comparison
  23. 23 VGG Architecture
  24. 24 Accuracy Evaluation
  25. 25 Reconstruction Performance Evaluation
  26. 26 Countermeasures
  27. 27 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.