Research Article

Inversion Attacks against CNN Models Based on Timing Attack

Table 2

Functions of TCF profiler.

 Whether to provide

Memory ratio
Execution time of functions
Frequency of calling functions
Instruction usage