CSpace

浏览/检索结果: 共180条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Functional Testing and Repair for ReRAM-Based Deep-Learning Accelerators 期刊论文
IEEE DESIGN & TEST, 2025, 卷号: 42, 期号: 3, 页码: 66-73
作者:  Li, Wen;  Wang, Ying;  Li, Huawei;  Li, Xiaowei;  Zou, Kaiwei
收藏  |  浏览/下载:4/0  |  提交时间:2025/06/25
Accuracy  Fault tolerant systems  Fault tolerance  Deep learning  Image edge detection  Fault detection  Computational modeling  Training  Reliability  Hafnium  Deep Neural Network  ReRAM  Functional Test  Computing-in-Memory  
Dominate data by yourself: a decentralized scheme for data interoperation when data is decoupled from applications 期刊论文
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2025, 卷号: 28, 期号: 3, 页码: 39
作者:  Wei, Jiuqi;  Lee, Xiaodong;  Fu, Yufan;  Li, Ying;  Peng, Botao
收藏  |  浏览/下载:2/0  |  提交时间:2025/06/25
Data Ownership  Web 3.0  Decouple data from applications  Data interoperation  Co-governance  Blockchain  
Attar: RRAM-based in-memory attention accelerator with software-hardware co-optimization 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2025, 卷号: 68, 期号: 3, 页码: 17
作者:  Li, Bing;  Qi, Ying;  Wang, Ying;  Han, Yinhe
收藏  |  浏览/下载:1/0  |  提交时间:2025/06/25
RRAM  computing-in-memory  attention  pruning  quantization  
APoX-M: Accelerate deep point cloud analysis via adaptive graph construction 期刊论文
INTEGRATION-THE VLSI JOURNAL, 2025, 卷号: 101, 页码: 10
作者:  Dai, Lei;  Liang, Shengwen;  Wang, Ying;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:2/0  |  提交时间:2025/06/25
K nearest neighbor  Approximate nearest neighbor  Point cloud  Graph construction  
DiSAuth: A DNS-based secure authorization framework for protecting data decoupled from applications 期刊论文
COMPUTER NETWORKS, 2024, 卷号: 254, 页码: 18
作者:  Li, Ying;  Wei, Jiuqi;  Fei, Ziyu;  Fu, Yufan;  Lee, Xiaodong
收藏  |  浏览/下载:12/0  |  提交时间:2024/12/06
Authorization  Data security and privacy  DNS  Blockchain  
Securing the internet's backbone: A blockchain-based and incentive-driven architecture for DNS cache poisoning defense 期刊论文
COMPUTER NETWORKS, 2024, 卷号: 254, 页码: 18
作者:  Fu, Yufan;  Lee, Xiaodong;  Wei, Jiuqi;  Li, Ying;  Peng, Botao
收藏  |  浏览/下载:14/0  |  提交时间:2024/12/06
DNS  Cache poisoning attack  Blockchain  Smart contract  Incentive mechanism  
On Modeling and Detecting Trojans in Instruction Sets 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 10, 页码: 3226-3239
作者:  Zhang, Ying;  He, Aodi;  Li, Jiaying;  Rezine, Ahmed;  Peng, Zebo;  Larsson, Erik;  Yang, Tao;  Jiang, Jianhui;  Li, Huawei
收藏  |  浏览/下载:15/0  |  提交时间:2024/12/06
Trojan horses  Security  Program processors  Companies  Inspection  Hardware security  Reverse engineering  Deep test for security  hidden instruction Trojan (HIT)  unbounded model checking (UMC)  VLSI test  
A Task-Adaptive In-Situ ReRAM Computing for Graph Convolutional Networks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 9, 页码: 2635-2646
作者:  He, Yintao;  Li, Bing;  Wang, Ying;  Liu, Cheng;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:23/0  |  提交时间:2024/12/06
Task analysis  Sparse matrices  Convolution  Convolutional neural networks  Design automation  Neural networks  Integrated circuits  Graph convolutional network  hardware acceleration  processing-in-memory  
Streaming Data Collection With a Private Sketch-Based Protocol 期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2024, 卷号: 11, 期号: 15, 页码: 25950-25967
作者:  Li, Ying;  Lee, Xiaodong;  Peng, Botao;  Palpanas, Themis;  Xue, Jingan
收藏  |  浏览/下载:14/0  |  提交时间:2024/12/06
Privacy  Estimation  Data collection  Frequency estimation  Protocols  Protection  Internet  local differential privacy (LDP)  mean estimation  sketch  
An Energy-Efficient In-Memory Accelerator for Graph Construction and Updating 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 6, 页码: 1781-1793
作者:  Chen, Mingkai;  Liu, Cheng;  Liang, Shengwen;  He, Lei;  Wang, Ying;  Zhang, Lei;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:23/0  |  提交时间:2024/12/06
Memory management  Buildings  Bandwidth  Hardware  Social networking (online)  Energy efficiency  Parallel processing  Graph construction  graph updating  near-data processing  nearest neighbors  power gating  stacked memory