With the rapid advancement of machine learning (ML) models and their widespread application across various sectors such as intrusion detection, medical diagnosis, natural language processing, and autonomous driving, t...
详细信息
ISBN:
(数字)9798331531195
ISBN:
(纸本)9798331531201
With the rapid advancement of machine learning (ML) models and their widespread application across various sectors such as intrusion detection, medical diagnosis, natural language processing, and autonomous driving, these technologies have achieved remarkable success. However, this progress has also raised significant concerns about ensuring the security of ML models and protecting both private training data and model outputs from getting exposed in a shared cloud environment. To address these challenges, researchers have proposed various methodologies to create privacy-preserving, secure, and trustworthy model execution environments to prevent adversarial attacks. This study provides a comprehensive review of Trusted Execution Environment (TEE) implementations across different hardware accelerators. It also offers an overview of modern techniques for preserving privacy and security in execution environments, while identifying critical research gaps that require attention. In essence, this survey is an important resource for researchers, providing insights into recent methodologies and guiding them to focus on pressing research challenges.
Leveraging D-NN trained on neuroimaging data, we can effectively estimate the chronological ages of normal persons;this projected brain age has potential as a biomarker for identifying age-related disorders. The sugge...
详细信息
Discrete Controller Synthesis (DCS) is an automated generation technique to generate controllers from environment models and requirements. The time and space complexities of DCS are critical because they directly gove...
详细信息
Edge devices have typically been used for DNN in-ferencing. The increase in the compute power of accelerated edges is leading to their use in DNN training also. As privacy becomes a concern on multi-tenant edge device...
Edge devices have typically been used for DNN in-ferencing. The increase in the compute power of accelerated edges is leading to their use in DNN training also. As privacy becomes a concern on multi-tenant edge devices, Docker containers provide a lightweight virtualization mechanism to sandbox models. But their overheads for edge devices are not yet explored. In this work, we study the impact of containerized DNN inference and training workloads on an NVIDIA AGX Orin edge device and contrast it against bare metal execution on running time, CPU, GPU and memory utilization, and energy consumption. Our analysis provides several interesting insights on these overheads.
Rapid identification of large vessel occlusions (LVOs) is crucial when treating and managing patients with acute ischemic strokes (AIS). This urgency is due to the fact that LVOs are associated with high rates of post...
详细信息
Edge devices are typically used to perform low-latency DNN inferencing close to the data source. However, with accelerated edge devices and privacy-oriented paradigms like Federated Learning, we can increasingly use t...
Edge devices are typically used to perform low-latency DNN inferencing close to the data source. However, with accelerated edge devices and privacy-oriented paradigms like Federated Learning, we can increasingly use them for DNN training too. This can require both training and inference workloads to be run concurrently on an edge device, without compromising on the inference latency. Here, we explore such concurrent scheduling on edge devices, and provide initial results demonstrating the interaction of training and inferencing on latency and throughput.
Malicious attackers often exploit anonymity networks like VPNs to conceal their identities. This paper introduces a novel real-time detection algorithm based on discrepancies in packet round-trip times (RTTs) and acti...
详细信息
Time series classification is a challenging research area where machine learning techniques such as deep learning perform well, yet lack interpretability. Identifying the most important features for such classifiers p...
详细信息
Hydrous phases play a fundamental role in the deep-water cycle on Earth. Understanding their stability and thermoelastic properties is essential for constraining their abundance using seismic tomography. However, dete...
详细信息
Hydrous phases play a fundamental role in the deep-water cycle on Earth. Understanding their stability and thermoelastic properties is essential for constraining their abundance using seismic tomography. However, determining their elastic properties at extreme conditions is notoriously challenging. The challenges stem from the complex behavior of hydrogen bonds under high pressures and temperatures (P,Ts). In this study, we evaluate how advanced molecular dynamics simulation techniques can address these challenges by investigating the adiabatic elasticity and acoustic velocities of δ−AlOOH, a critical and prototypical high-pressure hydrous phase. We compared the performances of three methods to assess their viability and accuracy. The thermoelastic tensor was computed up to 140 GPa and temperatures up to 2700 K using molecular dynamics with a DeePMD machine-learning interatomic potential based on the SCAN meta-GGA functional. The excellent agreement with ambient condition single-crystal ultrasound measurements and the correct description of velocity changes induced by H-bond disorder-symmetrization transition observed at 10 GPa in Brillouin scattering measurements underscores the accuracy and efficacy of our approach.
As we have entered Exascale computing, the faults in high-performance systems are expected to increase considerably. To compensate for a higher failure rate, the standard checkpoint/restart technique would need to cre...
详细信息
暂无评论