CSpace

浏览/检索结果: 共235条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
GeneCompass: deciphering universal gene regulatory mechanisms with a knowledge-informed cross-species foundation model 期刊论文
CELL RESEARCH, 2024, 页码: 16
作者:  Yang, Xiaodong;  Liu, Guole;  Feng, Guihai;  Bu, Dechao;  Wang, Pengfei;  Jiang, Jie;  Chen, Shubai;  Yang, Qinmeng;  Miao, Hefan;  Zhang, Yiyang;  Man, Zhenpeng;  Liang, Zhongming;  Wang, Zichen;  Li, Yaning;  Li, Zheng;  Liu, Yana;  Tian, Yao;  Liu, Wenhao;  Li, Cong;  Li, Ao;  Dong, Jingxi;  Hu, Zhilong;  Fang, Chen;  Cui, Lina;  Deng, Zixu;  Jiang, Haiping;  Cui, Wentao;  Zhang, Jiahao;  Yang, Zhaohui;  Li, Handong;  He, Xingjian;  Zhong, Liqun;  Zhou, Jiaheng;  Wang, Zijian;  Long, Qingqing;  Xu, Ping;  Wang, Hongmei;  Meng, Zhen;  Wang, Xuezhi;  Wang, Yangang;  Wang, Yong;  Zhang, Shihua;  Guo, Jingtao;  Zhao, Yi;  Zhou, Yuanchun;  Li, Fei;  Liu, Jing;  Chen, Yiqiang;  Yang, Ge;  Li, Xin
收藏  |  浏览/下载:4/0  |  提交时间:2024/12/06
On Modeling and Detecting Trojans in Instruction Sets 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 10, 页码: 3226-3239
作者:  Zhang, Ying;  He, Aodi;  Li, Jiaying;  Rezine, Ahmed;  Peng, Zebo;  Larsson, Erik;  Yang, Tao;  Jiang, Jianhui;  Li, Huawei
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Trojan horses  Security  Program processors  Companies  Inspection  Hardware security  Reverse engineering  Deep test for security  hidden instruction Trojan (HIT)  unbounded model checking (UMC)  VLSI test  
A Task-Adaptive In-Situ ReRAM Computing for Graph Convolutional Networks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 9, 页码: 2635-2646
作者:  He, Yintao;  Li, Bing;  Wang, Ying;  Liu, Cheng;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:2/0  |  提交时间:2024/12/06
Task analysis  Sparse matrices  Convolution  Convolutional neural networks  Design automation  Neural networks  Integrated circuits  Graph convolutional network  hardware acceleration  processing-in-memory  
FastTuning: Enabling Fast and Efficient Hyper-Parameter Tuning With Partitioning and Parallelism of Search Space 期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2024, 卷号: 35, 期号: 7, 页码: 1174-1188
作者:  Li, Xiaqing;  Guo, Qi;  Zhang, Guangyan;  Ye, Siwei;  He, Guanhua;  Yao, Yiheng;  Zhang, Rui;  Hao, Yifan;  Du, Zidong;  Zheng, Weimin
收藏  |  浏览/下载:7/0  |  提交时间:2024/12/06
Deep learning  distributed hyper-parameter tuning (HPT) system  parallel computing  
An Energy-Efficient In-Memory Accelerator for Graph Construction and Updating 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 6, 页码: 1781-1793
作者:  Chen, Mingkai;  Liu, Cheng;  Liang, Shengwen;  He, Lei;  Wang, Ying;  Zhang, Lei;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:2/0  |  提交时间:2024/12/06
Memory management  Buildings  Bandwidth  Hardware  Social networking (online)  Energy efficiency  Parallel processing  Graph construction  graph updating  near-data processing  nearest neighbors  power gating  stacked memory  
SLAM-CIM: A Visual SLAM Backend Processor With Dynamic-Range-Driven-Skipping Linear-Solving FP-CIM Macros 期刊论文
IEEE JOURNAL OF SOLID-STATE CIRCUITS, 2024, 页码: 13
作者:  Li, Mengjie;  Zhu, Haozhe;  He, Siqi;  Zhang, Hongyi;  Liao, Jie;  Zhai, Danfeng;  Chen, Chixiao;  Liu, Qi;  Zeng, Xiaoyang;  Sun, Ninghui;  Liu, Ming
收藏  |  浏览/下载:3/0  |  提交时间:2024/12/06
Simultaneous localization and mapping  Sorting  In-memory computing  Visualization  Energy efficiency  Optimization  Common Information Model (computing)  Compute in memory (CIM)  floating point (FP)  linear system solver  simultaneous localization and mapping (SLAM)  
Adversarial Medical Image With Hierarchical Feature Hiding 期刊论文
IEEE TRANSACTIONS ON MEDICAL IMAGING, 2024, 卷号: 43, 期号: 4, 页码: 1296-1307
作者:  Yao, Qingsong;  He, Zecheng;  Li, Yuexiang;  Lin, Yi;  Ma, Kai;  Zheng, Yefeng;  Zhou, S. Kevin
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Security in machine learning  adversarial attacks and defense  
SPFL: A Self-Purified Federated Learning Method Against Poisoning Attacks 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 6604-6619
作者:  Liu, Zizhen;  He, Weiyang;  Chang, Chip-Hong;  Ye, Jing;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:2/0  |  提交时间:2024/12/06
Data models  Servers  Training  Hidden Markov models  Training data  Adaptation models  Security  Federated learning  poisoning attack  knowledge distillation  attention maps  deep neural network  
Chip design with machine learning: a survey from algorithm perspective 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2023, 卷号: 66, 期号: 11, 页码: 31
作者:  He, Wenkai;  Li, Xiaqing;  Song, Xinkai;  Hao, Yifan;  Zhang, Rui;  Du, Zidong;  Chen, Yunji
收藏  |  浏览/下载:16/0  |  提交时间:2023/12/04
chip design  machine learning  chip design automation  design result estimation  design optimization and correction  design construction  
MaxMatch: Semi-Supervised Learning With Worst-Case Consistency 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 5, 页码: 5970-5987
作者:  Jiang, Yangbangyan;  Li, Xiaodan;  Chen, Yuefeng;  He, Yuan;  Xu, Qianqian;  Yang, Zhiyong;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:14/0  |  提交时间:2023/12/04
Predictive models  Training  Data models  Semantics  Perturbation methods  Computational modeling  Benchmark testing  Semi-supervised learning  consistency regularization  worst-case consistency  image classification