Articles with "monospace" as a keyword



Designing RISC-V Instruction Set Extensions for Artificial Neural Networks: An LLVM Compiler-Driven Perspective

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3389673

Abstract: The demand for Artificial Intelligence (AI) based solutions is exponentially increasing in all application fields, including low-power devices on the edge. However, due to their limited computational capabilities, these devices, which run Central Processing Units… read more here.

Keywords: inline formula; instruction set; tex math; monospace ... See more keywords

elfPlace: Electrostatics-Based Placement for Large-Scale Heterogeneous FPGAs

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2021.3053191

Abstract: elfPlace is a flat nonlinear placement algorithm for large-scale heterogeneous field-programmable gate arrays (FPGAs). We adopt the analogy between placement and electrostatic systems initially proposed by ePlace and extend it to tackle heterogeneous blocks in… read more here.

Keywords: elfplace; large scale; electrostatics; scale heterogeneous ... See more keywords

Network Structure and Pinning Control for Stable Behaviors of Boolean Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Circuits and Systems II: Express Briefs"

DOI: 10.1109/tcsii.2021.3116033

Abstract: In this brief, stabilization for Boolean networks (BNs) has been studied, based on network structure (NS) and pinning control (PC). Firstly, the concept of NS for BNs is defined by searching all the relevant variables… read more here.

Keywords: network structure; monospace monospace; boolean networks; pinning control ... See more keywords

EC2: Ensemble Clustering and Classification for Predicting Android Malware Families

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2017.2739145

Abstract: As the most widely used mobile platform, Android is also the biggest target for mobile malware. Given the increasing number of Android malware variants, detecting malware families is crucial so that security analysts can identify… read more here.

Keywords: monospace ec2; android malware; ec2 monospace; malware families ... See more keywords

Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2022.3141391

Abstract: Neural network (NN) inference services enrich many applications, like image classification, object recognition, facial verification, and more. These NN inference services are increasingly becoming an essential offering from cloud computing providers, where end-users’ data are… read more here.

Keywords: neural network; mml; model; cloud ... See more keywords

Fine-Grained Poisoning Framework Against Federated Learning

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2025.3604514

Abstract: Federated learning (FL) is one of the most widely used distributed machine learning frameworks. However, FL is susceptible to poisoning attacks that can degrade the quality of the global model. Recent studies on fine-grained poisoning… read more here.

Keywords: grained poisoning; fine grained; mml mml; model ... See more keywords

PriVDT: An Efficient Two-Party Cryptographic Framework for Vertical Decision Trees

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3231784

Abstract: Privacy-preserving decision trees (DTs) in vertical federated learning are one of the most effective tools to facilitate various privacy-critical applications in reality. However, the main bottleneck of current solutions is their huge overhead, mainly due… read more here.

Keywords: efficient two; decision trees; framework; monospace privdt ... See more keywords

FastSecNet: An Efficient Cryptographic Framework for Private Neural Network Inference

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2023.3262149

Abstract: Private neural network inference has demonstrated great importance in various privacy-critical scenarios. However, the primary challenge remaining in prior works is that the evaluation on encrypted data levies prohibitively high runtime and communication overhead. In… read more here.

Keywords: neural network; fastsecnet; network; private neural ... See more keywords

Congruent Differential Cluster for Binary SPN Ciphers

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2024.3350374

Abstract: This study is focused on the differential clustering effect of the SPN block cipher, which employs a binary matrix as its diffusion layer. We present a novel strategy for differential estimation, named the congruent differential… read more here.

Keywords: semicongruent differential; cluster; congruent differential; monospace ... See more keywords

Ruyi: A Configurable and Efficient Secure Multi-Party Learning Framework With Privileged Parties

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2024.3488507

Abstract: Secure multi-party learning (MPL) enables multiple parties to train machine learning models with privacy preservation. MPL frameworks typically follow the peer-to-peer architecture, where each party has the same chance to handle the results. However, the… read more here.

Keywords: inline formula; party; tex math; monospace ... See more keywords

Universal Feedback Gain for Modulo-Sum Computation Over the Erasure MAC

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2021.3134827

Abstract: The problem of computing the modulo-sum of independent messages over a finite-field erasure multiple access channel is investigated. The focus is on the role of delayed state feedback for function computation over state dependent multiple… read more here.

Keywords: computation; tex math; inline formula; case ... See more keywords