CSpace

浏览/检索结果: 共44条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Customized Federated Learning for accelerated edge computing with heterogeneous task targets 期刊论文
COMPUTER NETWORKS, 2020, 卷号: 183, 页码: 13
作者:  Jiang, Hui;  Liu, Min;  Yang, Bo;  Liu, Qingxiang;  Li, Jizhong;  Guo, Xiaobing
收藏  |  浏览/下载:31/0  |  提交时间:2021/12/01
Edge computing  Federated Learning  Convergence performance  
Long Live TIME: Improving Lifetime and Security for NVM-Based Training-in-Memory Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4707-4720
作者:  Cai, Yi;  Lin, Yujun;  Xia, Lixue;  Chen, Xiaoming;  Han, Song;  Wang, Yu;  Yang, Huazhong
收藏  |  浏览/下载:42/0  |  提交时间:2021/12/01
Gradient sparsification  lifetime  neural networks  training-in-memory  wear-leveling  
Swallow: A Versatile Accelerator for Sparse Neural Networks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4881-4893
作者:  Liu, Bosheng;  Chen, Xiaoming;  Han, Yinhe;  Xu, Haobo
收藏  |  浏览/下载:32/0  |  提交时间:2021/12/01
Accelerator  convolutional (Conv) layers  fully connected (FC) layers  sparse neural networks (SNNs)  
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:  Lan, Yazhu;  Nixon, Kent W.;  Guo, Qingli;  Zhang, Guohe;  Xu, Yuanchao;  Li, Hai;  Chen, Yiran
收藏  |  浏览/下载:46/0  |  提交时间:2021/12/01
Perturbation methods  Computational modeling  Data integrity  Detectors  Optimization  Field programmable gate arrays  Hardware  Adversarial attacks  confidence detection  deep neural networks (DNNs)  FPGA-based hardware architecture  sensor pattern noise (SPN)  
A Guaranteed Secure Scan Design Based on Test Data Obfuscation by Cryptographic Hash 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4524-4536
作者:  Cui, Aijiao;  Li, Mengyang;  Qu, Gang;  Li, Huawei
收藏  |  浏览/下载:33/0  |  提交时间:2021/12/01
Ciphers  Encryption  Integrated circuits  Side-channel attacks  Testing  Cryptographic hash function  obfuscation logic  scan design  scan-based side-channel attack  
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:  Cai, Yi;  Chen, Xiaoming;  Tian, Lu;  Wang, Yu;  Yang, Huazhong
收藏  |  浏览/下载:325/0  |  提交时间:2020/12/10
Artificial neural networks  Nonvolatile memory  Encryption  Computational modeling  Hardware  Non-volatile memory (NVM)  compute-in-memory (CIM)  neural network  security  encryption  
Fusion-Catalyzed Pruning for Optimizing Deep Learning on Intelligent Edge Devices 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 11, 页码: 3614-3626
作者:  Li, Guangli;  Ma, Xiu;  Wang, Xueying;  Liu, Lei;  Xue, Jingling;  Feng, Xiaobing
收藏  |  浏览/下载:52/0  |  提交时间:2021/12/01
Deep learning system  edge intelligence  model compression and acceleration  neural networks  
A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0 期刊论文
COMPUTER NETWORKS, 2020, 卷号: 179, 页码: 18
作者:  Zhang, Qianying;  Zhao, Shijun
收藏  |  浏览/下载:53/0  |  提交时间:2020/12/10
Security analysis  Authenticated key exchange  TPM 2.0  
BZIP: A compact data memory system for UTXO-based blockchains 期刊论文
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 卷号: 109, 页码: 8
作者:  Jiang, Shuhao;  Li, Jiajun;  Gong, Shijun;  Yan, Junchao;  Yan, Guihai;  Sun, Yi;  Li, Xiaowei
收藏  |  浏览/下载:52/0  |  提交时间:2020/12/10
UTXO  Blockchain  Data Compression  IoT  
Cascaded Write Amplification of LSM-tree-based Key-Value Stores underlying Solid-State Disks 期刊论文
MICROPROCESSORS AND MICROSYSTEMS, 2020, 卷号: 78, 页码: 16
作者:  Sun, Hui;  Dai, Shangshang;  Huang, Jianzhong
收藏  |  浏览/下载:62/0  |  提交时间:2020/12/10
Log-structured merge tree  Write amplification  Solid state disks  Key-value stores