News

Use case model is normally used to model software requirement. Reverse engineering of the high-level requirement model from the source code of target system is an important way to promote the program ...
This article demonstrates that architectural side-channel attacks (i.e., memory access patterns) can help leak the parameters of a convolutional neural network.