TDPP: 2-D Permutation-Based Protection of Memristive Deep Neural Networks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., March, 2024
TDPP: Two-Dimensional Permutation-Based Protection of Memristive Deep Neural Networks.
CoRR, 2023
Improved analysis and optimal priority assignment for communicating threads on uni-processor.
J. Syst. Archit., 2022
Multiserver configuration for cloud service profit maximization in the presence of soft errors based on grouped grey wolf optimizer.
J. Syst. Archit., 2022
Review of security techniques for memristor computing systems.
CoRR, 2022
Efficient Training of the Memristive Deep Belief Net Immune to Non-Idealities of the Synaptic Devices.
,
,
,
,
,
,
,
,
,
,
Adv. Intell. Syst., 2022
Enhancing Security of Memristor Computing System Through Secure Weight Mapping.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2022
Improving Efficiency and Lifetime of Logic-in-Memory by Combining IMPLY and MAGIC Families.
J. Syst. Archit., 2021
EC-BAAS: Elliptic curve-based batch anonymous authentication scheme for Internet of Vehicles.
J. Syst. Archit., 2021
Makespan-minimization workflow scheduling for complex networks with social groups in edge computing.
J. Syst. Archit., 2020
Security Enhancement for RRAM Computing System through Obfuscating Crossbar Row Connections.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
Study on Optimal Allocation of Inference Nodes for Distributed Inference in Smart Environment.
Proceedings of the 2019 IEEE SmartWorld, 2019
Potential Trigger Detection for Hardware Trojans.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018
Secure distributed framework based on seamless key session for smart home environment.
Int. J. Distributed Sens. Networks, 2018
Network Phenotyping for Network Traffic Classification and Anomaly Detection.
CoRR, 2018
PoTrojan: powerful neural-level trojan designs in deep learning models.
CoRR, 2018
Towards trustable storage using SSDs with proprietary FTL.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015
Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists.
J. Comput. Sci. Technol., 2014