Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3389673
Abstract: The demand for Artificial Intelligence (AI) based solutions is exponentially increasing in all application fields, including low-power devices on the edge. However, due to their limited computational capabilities, these devices, which run Central Processing Units…
read more here.
Keywords:
inline formula;
instruction set;
tex math;
monospace ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"
DOI: 10.1109/tcad.2021.3053191
Abstract: elfPlace is a flat nonlinear placement algorithm for large-scale heterogeneous field-programmable gate arrays (FPGAs). We adopt the analogy between placement and electrostatic systems initially proposed by ePlace and extend it to tackle heterogeneous blocks in…
read more here.
Keywords:
elfplace;
large scale;
electrostatics;
scale heterogeneous ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2022 at "IEEE Transactions on Circuits and Systems II: Express Briefs"
DOI: 10.1109/tcsii.2021.3116033
Abstract: In this brief, stabilization for Boolean networks (BNs) has been studied, based on network structure (NS) and pinning control (PC). Firstly, the concept of NS for BNs is defined by searching all the relevant variables…
read more here.
Keywords:
network structure;
monospace monospace;
boolean networks;
pinning control ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2017.2739145
Abstract: As the most widely used mobile platform, Android is also the biggest target for mobile malware. Given the increasing number of Android malware variants, detecting malware families is crucial so that security analysts can identify…
read more here.
Keywords:
monospace ec2;
android malware;
ec2 monospace;
malware families ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2022.3141391
Abstract: Neural network (NN) inference services enrich many applications, like image classification, object recognition, facial verification, and more. These NN inference services are increasingly becoming an essential offering from cloud computing providers, where end-users’ data are…
read more here.
Keywords:
neural network;
mml;
model;
cloud ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2025.3604514
Abstract: Federated learning (FL) is one of the most widely used distributed machine learning frameworks. However, FL is susceptible to poisoning attacks that can degrade the quality of the global model. Recent studies on fine-grained poisoning…
read more here.
Keywords:
grained poisoning;
fine grained;
mml mml;
model ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3231784
Abstract: Privacy-preserving decision trees (DTs) in vertical federated learning are one of the most effective tools to facilitate various privacy-critical applications in reality. However, the main bottleneck of current solutions is their huge overhead, mainly due…
read more here.
Keywords:
efficient two;
decision trees;
framework;
monospace privdt ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2023.3262149
Abstract: Private neural network inference has demonstrated great importance in various privacy-critical scenarios. However, the primary challenge remaining in prior works is that the evaluation on encrypted data levies prohibitively high runtime and communication overhead. In…
read more here.
Keywords:
neural network;
fastsecnet;
network;
private neural ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2024.3350374
Abstract: This study is focused on the differential clustering effect of the SPN block cipher, which employs a binary matrix as its diffusion layer. We present a novel strategy for differential estimation, named the congruent differential…
read more here.
Keywords:
semicongruent differential;
cluster;
congruent differential;
monospace ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2024.3488507
Abstract: Secure multi-party learning (MPL) enables multiple parties to train machine learning models with privacy preservation. MPL frameworks typically follow the peer-to-peer architecture, where each party has the same chance to handle the results. However, the…
read more here.
Keywords:
inline formula;
party;
tex math;
monospace ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Information Theory"
DOI: 10.1109/tit.2021.3134827
Abstract: The problem of computing the modulo-sum of independent messages over a finite-field erasure multiple access channel is investigated. The focus is on the role of delayed state feedback for function computation over state dependent multiple…
read more here.
Keywords:
computation;
tex math;
inline formula;
case ... See more keywords