CAAD VILLAGE - GeekPwn - The Uprising Geekpwn AI/Robotics Cybersecurity Contest U.S. 2018 - Hardware Trojan Attacks on Neural Networks
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 322 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/39826 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
Trojanisches Pferd <Informatik>Computer hardwareArtificial neural networkStudent's t-testMusical ensembleArtificial neural networkApproximationAreaCryptographyComputerInformation securityComputer hardwareLatent heatHomomorphismusMachine learningFocus (optics)DistanceGroup actionComputer scientist
00:45
Content (media)Information securityDomain nameField (computer science)Computer hardwareMachine learningVirtual machineDirection (geometry)Presentation of a groupMereologyOnline help
01:17
Point cloudWave packetPersonal digital assistantSet (mathematics)MalwarePoint cloudMachine learningInferenceVirtual machineProgramming paradigmRevision controlPattern recognitionPhase transitionData modelFunction (mathematics)AreaImplementationCartesian coordinate systemPhysical systemInformation securityEmailHypermediaObservational studySpacetimeComputer animation
02:59
Machine learningCloud computingInformation securityInferencePoint cloudPhysical systemVirtual machineMobile appCASE <Informatik>Cartesian coordinate system
03:50
Graph (mathematics)InferenceInfinite conjugacy class propertyChainMaxima and minimaInformation securityComputerData modelPhase transitionVirtual machineCloud computingInferenceComputer hardwarePhysical systemChainSoftwareComputing platformAdditionTelecommunicationPower (physics)TwitterPoint cloudArtificial neural networkProduct (business)Wave packetConstraint (mathematics)Pairwise comparisonImplementationLimit (category theory)Information securityAlgorithmMathematical optimizationMaterialization (paranormal)Level (video gaming)Cartesian coordinate systemSystem administratorState of matterMachine learningMereology
06:23
Data modelDigital electronicsIP addressChainMathematical analysisBusiness modelPhysical systemInformation securityFamilyLogic gateDigital photographyVulnerability (computing)
07:33
Computer hardwareTime domainComputer hardwareDomain nameInformation privacyCopyright infringementSide channel attackRevision controlSoftware development kit
07:56
Copyright infringementSoftware developerCopyright infringementPeripheralChainCategory of beingComputer hardwareIP addressSoftwareGroup actionBuildingMultiplication sign
09:15
Infinite conjugacy class propertyPhysicalismMereologyFunctional (mathematics)SoftwareChainRevision controlComputer hardwareDigital electronicsReverse engineeringReal numberGame theoryLogical constant
10:39
Infinite conjugacy class propertyAbsolute valueVulnerability (computing)Physical systemComputerEncryptionImplementationChainComputer hardwarePeripheralSide channel attackFunctional (mathematics)Information securityAlgorithmGraph (mathematics)InformationClassical physicsCybersexQuantumBit
11:39
ChainTrojanisches Pferd <Informatik>Data typeKey (cryptography)Digital electronicsComputer hardwareSoftwareFunctional (mathematics)Mathematics
12:34
Trojanisches Pferd <Informatik>Computer hardwareComputer hardwareDifferent (Kate Ryan album)Information securityTrojanisches Pferd <Informatik>Computer worm2 (number)Digital electronicsConnectivity (graph theory)Sound effectRadical (chemistry)
13:51
Computer hardwareTrojanisches Pferd <Informatik>Artificial neural networkKey (cryptography)Operator (mathematics)ImplementationWave packetWeightArtificial neural networkBackdoor (computing)Network socketoutputParameter (computer programming)Product (business)ChainComputer hardwareComputer engineeringFunction (mathematics)Phase transitionFunctional (mathematics)Connectivity (graph theory)Trojanisches Pferd <Informatik>CASE <Informatik>SoftwareAffine space2 (number)Category of beingContext awarenessDifferent (Kate Ryan album)Forcing (mathematics)
15:44
outputImplementationArtificial neural networkOperator (mathematics)Level (video gaming)Functional (mathematics)Function (mathematics)Flow separationUsabilityBinary multiplierCASE <Informatik>2 (number)QuicksortType theoryComputer animation
16:41
outputKey (cryptography)Artificial neural networkoutputOperator (mathematics)Selectivity (electronic)Constraint (mathematics)Function (mathematics)Form (programming)Intermediate value theoremSet (mathematics)Randomization
17:53
Perturbation theoryRevision controlPerturbation theoryIntermediate value theoremParameter (computer programming)Operator (mathematics)Computer hardwareoutputImplementationFunction (mathematics)Artificial neural networkInformation2 (number)PerimeterComputer animation
18:48
ImplementationComputer hardwareMilitary operationSubsetAxiom of choiceOperator (mathematics)CASE <Informatik>1 (number)
19:12
Trojanisches Pferd <Informatik>Computer hardwareComputer hardwareVirtual machineTrojanisches Pferd <Informatik>Operator (mathematics)Binary multiplierPower (physics)Data modelFunction (mathematics)Software testing1 (number)Revision controlConstraint (mathematics)Functional (mathematics)Different (Kate Ryan album)outputCombinational logicSound effectMetric systemMachine learningDistribution (mathematics)Side channel attackConcentricCategory of beingCASE <Informatik>RandomizationBit rateSet (mathematics)Multiplication sign
22:54
Direction (geometry)Information securitySoftware developerTrojanisches Pferd <Informatik>Physical systemComputer hardwareVirtual machineMachine learningWave packetProgramming paradigmField (computer science)ImplementationContext awarenessInferenceData modelSound effectPhysicalismPhase transitionObservational studyAnnihilator (ring theory)ResultantChainPoint cloud
Transcript: English(auto-generated)