The following publications are possibly variants of this publication:
- 2: Stealth infection on neural network - A low-cost agile neural Trojan attack methodologyTao Liu, Wujie Wen, Yier Jin. host 2018: 227-230 [doi]
- Safeguarding the Intelligence of Neural Networks with Built-in Light-weight Integrity MArks (LIMA)Fateme S. Hosseini, Qi Liu, Fanruo Meng, Chengmo Yang, Wujie Wen. host 2021: 1-12 [doi]
- DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information LeakageHonggang Yu, Haocheng Ma, Kaichen Yang, Yiqiang Zhao, Yier Jin. host 2020: 209-218 [doi]