CSpace

浏览/检索结果: 共5条,第1-5条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
An Application-oblivious Memory Scheduling System for DNN Accelerators 期刊论文
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2022, 卷号: 19, 期号: 4, 页码: 26
作者:  Li, Jiansong;  Wang, Xueying;  Chen, Xiaobing;  Li, Guangli;  Dong, Xiao;  Zhao, Peng;  Yu, Xianzhi;  Yang, Yongxin;  Cao, Wei;  Liu, Lei;  Feng, Xiaobing
收藏  |  浏览/下载:14/0  |  提交时间:2023/07/12
Deep learning  memory scheduling  runtime system  DNN accelerators  
A Systematic View of Model Leakage Risks in Deep Neural Network Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2022, 卷号: 71, 期号: 12, 页码: 3254-3267
作者:  Hu, Xing;  Liang, Ling;  Chen, Xiaobing;  Deng, Lei;  Ji, Yu;  Ding, Yufei;  Du, Zidong;  Guo, Qi;  Sherwood, Tim;  Xie, Yuan
收藏  |  浏览/下载:14/0  |  提交时间:2023/07/12
Domain-specific architecture  deep learning security  model security  
An Automated Quantization Framework for High-Utilization RRAM-Based PIM 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 卷号: 41, 期号: 3, 页码: 583-596
作者:  Li, Bing;  Qu, Songyun;  Wang, Ying
收藏  |  浏览/下载:24/0  |  提交时间:2022/12/07
Quantization (signal)  Neural networks  Computational modeling  Data models  Hardware  Resource management  Arrays  AutoML  neural network  processing-in-memory (PIM)  quantization  resistive memory (RRAM)  
Attention-guided transformation-invariant attack for black-box adversarial examples 期刊论文
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 页码: 24
作者:  Zhu, Jiaqi;  Dai, Feng;  Yu, Lingyun;  Xie, Hongtao;  Wang, Lidong;  Wu, Bo;  Zhang, Yongdong
收藏  |  浏览/下载:18/0  |  提交时间:2022/12/07
adversarial examples  attention  media convergence  security  transformation-invariant  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:13/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack