CSpace

浏览/检索结果: 共338条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:  Han, Husheng;  Hu, Xing;  Hao, Yifan;  Xu, Kaidi;  Dang, Pucheng;  Wang, Ying;  Zhao, Yongwei;  Du, Zidong;  Guo, Qi;  Wang, Yanzhi;  Zhang, Xishan;  Chen, Tianshi
收藏  |  浏览/下载:3/0  |  提交时间:2024/05/20
Object detection  Streaming media  Optical flow  Feature extraction  Real-time systems  Task analysis  Detectors  Adversarial patch attack  deep learning security  domain-specific accelerator  hardware/software co-design  real time  
Macro-influencers or meso-influencers, how do companies choose? 期刊论文
INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2023, 页码: 20
作者:  Lv, Junjie;  Yang, Ruyu;  Yu, Jianye;  Yao, Wenjing;  Wang, Yuanzhuo
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Influencer marketing  Social commerce  Social media  Information dissemination  Social evolutionary game  
Toward Developing High-Performance RISC-V Processors Using Agile Methodology 期刊论文
IEEE MICRO, 2023, 卷号: 43, 期号: 4, 页码: 98-106
作者:  Xu, Yinan;  Yu, Zihao;  Tang, Dan;  Cai, Ye;  Huan, Dandan;  He, Wei;  Sun, Ninghui;  Bao, Yungang
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Program processors  Behavioral sciences  Chip scale packaging  Microarchitecture  Hardware  Analytical models  Layout  
Functional Verification for Agile Processor Development: A Case for Workflow Integration 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2023, 卷号: 38, 期号: 4, 页码: 737-753
作者:  Xu, Yi-Nan;  Yu, Zi-Hao;  Wang, Kai-Fan;  Wang, Hua-Qiang;  Lin, Jia-Wei;  Jin, Yue;  Zhang, Lin-Juan;  Zhang, Zi-Fei;  Tang, Dan;  Wang, Sa;  Shi, Kan;  Sun, Ning-Hui;  Bao, Yun-Gang
收藏  |  浏览/下载:2/0  |  提交时间:2024/05/20
functional verification  agile development  open-source hardware  workflow integration  
Scalable and Conflict-Free NTT Hardware Accelerator Design: Methodology, Proof, and Implementation 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 5, 页码: 1504-1517
作者:  Mu, Jianan;  Ren, Yi;  Wang, Wen;  Hu, Yizhong;  Chen, Shuai;  Chang, Chip-Hong;  Fan, Junfeng;  Ye, Jing;  Cao, Yuan;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:9/0  |  提交时间:2023/12/04
Memory access pattern  number theoretic transform (NTT)  post-quantum cryptography (PQC)  scalable hardware design  
A Framework for Neural Network Architecture and Compile Co-optimization 期刊论文
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2023, 卷号: 22, 期号: 1, 页码: 24
作者:  Chen, Weiwei;  Wang, Ying;  Xu, Ying;  Gao, Chengsi;  Liu, Cheng;  Zhang, Lei
收藏  |  浏览/下载:13/0  |  提交时间:2023/07/12
DNN-scheduling Co-design  hardware-aware neural architecture search  compiler optimization  
Rubik: A Hierarchical Architecture for Efficient Graph Neural Network Training 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 卷号: 41, 期号: 4, 页码: 936-949
作者:  Chen, Xiaobing;  Wang, Yuke;  Xie, Xinfeng;  Hu, Xing;  Basak, Abanti;  Liang, Ling;  Yan, Mingyu;  Deng, Lei;  Ding, Yufei;  Du, Zidong;  Xie, Yuan
收藏  |  浏览/下载:21/0  |  提交时间:2022/12/07
Deep learning accelerator  graph neural network (GNN)  
Exploring Adversarial Attack in Spiking Neural Networks With Spike-Compatible Gradient 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 页码: 15
作者:  Liang, Ling;  Hu, Xing;  Deng, Lei;  Wu, Yujie;  Li, Guoqi;  Ding, Yufei;  Li, Peng;  Xie, Yuan
收藏  |  浏览/下载:26/0  |  提交时间:2022/06/21
Spatiotemporal phenomena  Computational modeling  Perturbation methods  Biological neural networks  Backpropagation  Unsupervised learning  Training  Adversarial attack  backpropagation through time (BPTT)  neuromorphic computing  spike-compatible gradient  spiking neural networks (SNNs)  
Leveraging online behaviors for interpretable knowledge-aware patent recommendation 期刊论文
INTERNET RESEARCH, 2021, 页码: 20
作者:  Du, Wei;  Yan, Qiang;  Zhang, Wenping;  Ma, Jian
收藏  |  浏览/下载:47/0  |  提交时间:2021/12/01
Interpretable knowledge-aware recommendation  Patent recommendation  Online behaviors  
Practical Attacks on Deep Neural Networks by Memory Trojaning 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 卷号: 40, 期号: 6, 页码: 1230-1243
作者:  Hu, Xing;  Zhao, Yang;  Deng, Lei;  Liang, Ling;  Zuo, Pengfei;  Ye, Jing;  Lin, Yingyan;  Xie, Yuan
收藏  |  浏览/下载:35/0  |  提交时间:2021/12/01
Trojan horses  Hardware  Integrated circuit modeling  Computational modeling  Security  Payloads  Convolutional neural networks (CNNs)  deep learning accelerator  deep learning attack  hardware Trojan