All Stories

  1. On the Security Vulnerabilities of MRAM-based In-Memory Computing Architectures against Model Extraction Attacks