{"id":"https://openalex.org/W4289146347","doi":"https://doi.org/10.1145/3274694.3274696","title":"I Know What You See","display_name":"I Know What You See","publication_year":2018,"publication_date":"2018-12-03","ids":{"openalex":"https://openalex.org/W4289146347","doi":"https://doi.org/10.1145/3274694.3274696"},"language":"en","primary_location":{"id":"doi:10.1145/3274694.3274696","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3274694.3274696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1803.05847","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005629203","display_name":"Lingxiao Wei","orcid":null},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lingxiao Wei","raw_affiliation_strings":["CUhk REliable Computing Laboratory (CURE), Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"],"affiliations":[{"raw_affiliation_string":"CUhk REliable Computing Laboratory (CURE), Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052233895","display_name":"Bo Luo","orcid":"https://orcid.org/0000-0001-8196-2436"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Luo","raw_affiliation_strings":["CUhk REliable Computing Laboratory (CURE), Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"],"affiliations":[{"raw_affiliation_string":"CUhk REliable Computing Laboratory (CURE), Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100345753","display_name":"Yu Li","orcid":"https://orcid.org/0000-0002-3664-6722"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Li","raw_affiliation_strings":["CUhk REliable Computing Laboratory (CURE), Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"],"affiliations":[{"raw_affiliation_string":"CUhk REliable Computing Laboratory (CURE), Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038764214","display_name":"Yannan Liu","orcid":"https://orcid.org/0000-0002-7379-3385"},"institutions":[{"id":"https://openalex.org/I4210116924","display_name":"Chinese University of Hong Kong, Shenzhen","ror":"https://ror.org/02d5ks197","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633","https://openalex.org/I180726961","https://openalex.org/I4210116924"]},{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yannan Liu","raw_affiliation_strings":["CUhk REliable Computing Laboratory (CURE), Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong and Sangfor Technologies Inc., Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"CUhk REliable Computing Laboratory (CURE), Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong and Sangfor Technologies Inc., Shenzhen, China","institution_ids":["https://openalex.org/I177725633","https://openalex.org/I4210116924"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088556682","display_name":"Qiang Xu","orcid":"https://orcid.org/0000-0001-6747-126X"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiang Xu","raw_affiliation_strings":["CUhk REliable Computing Laboratory (CURE), Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"],"affiliations":[{"raw_affiliation_string":"CUhk REliable Computing Laboratory (CURE), Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5005629203"],"corresponding_institution_ids":["https://openalex.org/I177725633"],"apc_list":null,"apc_paid":null,"fwci":10.3107,"has_fulltext":false,"cited_by_count":164,"citation_normalized_percentile":{"value":0.98469865,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"393","last_page":"406"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mnist-database","display_name":"MNIST database","score":0.8817250728607178},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8400125503540039},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.8068125247955322},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7117925882339478},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6267940998077393},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5147702693939209},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5129997134208679},{"id":"https://openalex.org/keywords/de-facto","display_name":"De facto","score":0.49270227551460266},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.4687747061252594},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.43223682045936584},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.41835808753967285},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38086533546447754},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.20961403846740723},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.20468169450759888}],"concepts":[{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.8817250728607178},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8400125503540039},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.8068125247955322},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7117925882339478},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6267940998077393},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5147702693939209},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5129997134208679},{"id":"https://openalex.org/C2992317946","wikidata":"https://www.wikidata.org/wiki/Q712144","display_name":"De facto","level":2,"score":0.49270227551460266},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.4687747061252594},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.43223682045936584},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.41835808753967285},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38086533546447754},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.20961403846740723},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.20468169450759888},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3274694.3274696","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3274694.3274696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1803.05847","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1803.05847","pdf_url":"https://arxiv.org/pdf/1803.05847","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1803.05847","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1803.05847","pdf_url":"https://arxiv.org/pdf/1803.05847","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4300000071525574}],"awards":[{"id":"https://openalex.org/G3547655306","display_name":null,"funder_award_id":"61432017","funder_id":"https://openalex.org/F4320335595","funder_display_name":"National Natural Science Foundation of China-Yunnan Joint Fund"},{"id":"https://openalex.org/G7596357937","display_name":null,"funder_award_id":"GRF-14205018","funder_id":"https://openalex.org/F4320321592","funder_display_name":"Research Grants Council, University Grants Committee"}],"funders":[{"id":"https://openalex.org/F4320321592","display_name":"Research Grants Council, University Grants Committee","ror":"https://ror.org/00djwmt25"},{"id":"https://openalex.org/F4320335595","display_name":"National Natural Science Foundation of China-Yunnan Joint Fund","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W41027960","https://openalex.org/W65544044","https://openalex.org/W1473189865","https://openalex.org/W1490557050","https://openalex.org/W1503689022","https://openalex.org/W1540404582","https://openalex.org/W1562542037","https://openalex.org/W1862426464","https://openalex.org/W2051267297","https://openalex.org/W2135252045","https://openalex.org/W2154909745","https://openalex.org/W2180612164","https://openalex.org/W2276486856","https://openalex.org/W2291944856","https://openalex.org/W2473418344","https://openalex.org/W2533642151","https://openalex.org/W2535690855","https://openalex.org/W2584616277","https://openalex.org/W2585560244","https://openalex.org/W2604319603","https://openalex.org/W2701059868","https://openalex.org/W2809523935","https://openalex.org/W2964082701","https://openalex.org/W2964318098","https://openalex.org/W3029743714","https://openalex.org/W4206314719","https://openalex.org/W4233528918","https://openalex.org/W4246001895","https://openalex.org/W4247537352","https://openalex.org/W4295262505"],"related_works":["https://openalex.org/W2794898833","https://openalex.org/W4385524141","https://openalex.org/W3018979822","https://openalex.org/W4297776111","https://openalex.org/W3026616975","https://openalex.org/W2989784533","https://openalex.org/W4288018014","https://openalex.org/W2996058201","https://openalex.org/W2946347869","https://openalex.org/W3127679336"],"abstract_inverted_index":{"Deep":[0],"learning":[1,34,51,66],"has":[2],"become":[3],"the":[4,28,58,62,73,87,91,97,101,105],"de-facto":[5],"computational":[6],"paradigm":[7],"for":[8],"various":[9],"kinds":[10],"of":[11,31,64],"perception":[12],"problems,":[13],"including":[14],"many":[15],"privacy-sensitive":[16],"applications":[17],"such":[18],"as":[19],"online":[20],"medical":[21],"image":[22,89],"analysis.":[23],"No":[24],"doubt":[25],"to":[26,85,114,117],"say,":[27],"data":[29],"privacy":[30,47],"these":[32],"deep":[33,50,65],"systems":[35],"is":[36,112],"a":[37],"serious":[38],"concern.":[39],"Different":[40],"from":[41,49,90],"previous":[42],"research":[43],"focusing":[44],"on":[45,61,75],"exploiting":[46],"leakage":[48],"models,":[52],"in":[53,100],"this":[54],"paper,":[55],"we":[56,71,83],"present":[57],"first":[59],"attack":[60,74,111],"implementation":[63],"models.":[67],"To":[68],"be":[69],"specific,":[70],"perform":[72],"an":[76],"FPGA-based":[77],"convolutional":[78],"neural":[79,102],"network":[80],"accelerator":[81],"and":[82],"manage":[84],"recover":[86],"input":[88],"collected":[92],"power":[93,109],"traces":[94],"without":[95],"knowing":[96],"detailed":[98],"parameters":[99],"network.":[103],"For":[104],"MNIST":[106],"dataset,":[107],"our":[108],"side-channel":[110],"able":[113],"achieve":[115],"up":[116],"89%":[118],"recognition":[119],"accuracy.":[120]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":27},{"year":2024,"cited_by_count":23},{"year":2023,"cited_by_count":24},{"year":2022,"cited_by_count":28},{"year":2021,"cited_by_count":35},{"year":2020,"cited_by_count":15},{"year":2019,"cited_by_count":11}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2022-08-01T00:00:00"}
