default search action
IEEE Transactions on Emerging Topics in Computing, Volume 10
Volume 10, Number 1, January - March 2022
- Paolo Montuschi:
TETC's January 2022 Editor-in-Chief's Report on the State of the Journal. 4-5 - Daniele Jahier Pagliari
, Frank Schirrmeister, Nader Bagherzadeh
, Enrico Macii
:
Guest Editorial: Thematic Section on Applications of Emerging Computing Technologies in Smart Manufacturing and Industry 4.0. 6-8 - Zijie Ren
, Jiafu Wan
, Pan Deng:
Machine-Learning-Driven Digital Twin for Lifecycle Management of Complex Equipment. 9-22 - Charles Steinmetz
, Greyce N. Schroeder, Ricardo Nagel Rodrigues, Achim Rettberg, Carlos Eduardo Pereira
:
Key-Components for Digital Twin Modeling With Granularity: Use Case Car-as-a-Service. 23-33 - Trier Mortlock
, Deepan Muthirayan
, Shih-Yuan Yu
, Pramod P. Khargonekar
, Mohammad Abdullah Al Faruque
:
Graph Learning for Cognitive Digital Twins in Manufacturing Systems. 34-45 - Nicola Dall'Ora
, Khaled Alamin
, Enrico Fraccaroli
, Massimo Poncino
, Davide Quaglia
, Sara Vinco
:
Digital Transformation of a Production Line: Network Design, Online Data Collection and Energy Monitoring. 46-59 - Birgit Vogel-Heuser
, Juliane Fischer
, Dieter Hess, Eva-Maria Neumann
, Marcus Würr
:
Boosting Extra-Functional Code Reusability in Cyber-Physical Production Systems: The Error Handling Case Study. 60-73 - Davide Cannizzaro
, Antonio Giuseppe Varrella, Stefano Paradiso
, Roberta Sampieri, Yukai Chen
, Alberto Macii
, Edoardo Patti
, Santa Di Cataldo
:
In-Situ Defect Detection of Metal Additive Manufacturing: An Integrated Framework. 74-86 - Florian Fricke
, Marcelo Brandalero
, Sascha Liehr, Simon Kern, Klas Meyer, Stefan Kowarik, Robin Hierzegger
, Stephan Westerdick, Michael Maiwald
, Michael Hübner
:
Artificial Intelligence for Mass Spectrometry and Nuclear Magnetic Resonance Spectroscopy Using a Novel Data Augmentation Method. 87-98 - Jilong Wang
, Rui Li
, Renfa Li
, Bin Fu, Danny Z. Chen
:
HMCKRAutoEncoder: An Interpretable Deep Learning Framework for Time Series Analysis. 99-111 - Zubair Md. Fadlullah
, Nei Kato
:
HCP: Heterogeneous Computing Platform for Federated Learning Based Collaborative Content Caching Towards 6G Networks. 112-123 - Chia-Yu Lin
, Li-Chun Wang
, Shu-Ping Chang:
Incremental Checkpointing for Fault-Tolerant Stream Processing Systems: A Data Structure Approach. 124-136 - Nikhil Rangarajan
, Satwik Patnaik
, Johann Knechtel
, Ramesh Karri
, Ozgur Sinanoglu
, Shaloo Rakheja
:
Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices. 137-156 - Carl Chalmers
, Paul Fergus
, C. Aday Curbelo Montañez
, Sudip Sikdar, Freya Ball, Bryony Kendall:
Detecting Activities of Daily Living and Routine Behaviours in Dementia Patients Living Alone Using Smart Meter Load Disaggregation. 157-169 - Peng Qi
, Yan Sun
, Hong Luo
, Mohsen Guizani
:
Scratch-DKG: A Framework for Constructing Scratch Domain Knowledge Graph. 170-185 - Gian Carlo Cardarilli
, Luca Di Nunzio
, Rocco Fazzolari
, Alberto Nannarelli
, Massimo Petricca
, Marco Re
:
Design Space Exploration Based Methodology for Residue Number System Digital Filters Implementation. 186-198 - Michal Drozdowicz
, Maria Ganzha, Marcin Paprzycki
:
Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities. 199-210 - Yaochong Li
, Ri-Gui Zhou
, Ruiqing Xu
, Jia Luo
, She-Xiang Jiang
:
A Quantum Mechanics-Based Framework for EEG Signal Feature Extraction and Classification. 211-222 - Hao Zheng
, Ahmed Louri:
Agile: A Learning-Enabled Power and Performance-Efficient Network-on-Chip Design. 223-236 - Ye Yu
, Niraj K. Jha
:
SPRING: A Sparsity-Aware Reduced-Precision Monolithic 3D CNN Accelerator Architecture for Training and Inference. 237-249 - Eberle A. Rambo
, Bryan Donyanavard, Minjun Seo, Florian Maurer
, Thawra Kadeed
, Caio Batista de Melo
, Biswadip Maity
, Anmol Surhonne, Andreas Herkersdorf
, Fadi J. Kurdahi
, Nikil D. Dutt
, Rolf Ernst
:
The Self-Aware Information Processing Factory Paradigm for Mixed-Critical Multiprocessing. 250-266 - Yuejie Zeng, Kenli Li
, Lin Xiao
, Qing Liao
:
Design and Analysis of a Novel Integral Design Scheme for Finding Finite-Time Solution of Time-Varying Matrix Inequalities. 267-279 - Yasir Saleem
, Pablo Sotres
, Samuel Fricker, Carmen López de la Torre, Noël Crespi, Gyu Myoung Lee
, Roberto Minerva
, Luis Sánchez
:
IoTRec: The IoT Recommender for Smart Parking System. 280-296 - Bo Yin
, Xuetao Wei
:
Efficient Crowdsourced Pareto-Optimal Queries Over Partial Orders With Quality Guarantee. 297-311 - Amir Yeganeh-Khaksar
, Mohsen Ansari
, Alireza Ejlali
:
ReMap: Reliability Management of Peak-Power-Aware Real-Time Embedded Systems Through Task Replication. 312-323 - M. Meraj Ahmed
, Naseef Mansoor, Amlan Ganguly
:
An Asymmetric, One-To-Many Traffic-Aware mm-Wave Wireless Interconnection Architecture for Multichip Systems. 324-338 - Weiqiang Liu
, Tao Xu, Jing Li
, Chenghua Wang, Paolo Montuschi
, Fabrizio Lombardi
:
Design of Unsigned Approximate Hybrid Dividers Based on Restoring Array and Logarithmic Dividers. 339-350 - Nihat Akkan
, Serzat Safaltin
, Levent Aksoy
, Ismail Cevik, Herman Sedef
, Csaba Andras Moritz, Mustafa Altun
:
Technology Development and Modeling of Switching Lattices Using Square and H Shaped Four-Terminal Switches. 351-360 - Kingsley Nketia Acheampong
, Wenhong Tian
:
Advancement of Textual Answer Triggering: Cognitive Boosting. 361-372 - Kuen-Jong Lee
, Ching-An Liu
, Chia-Chi Wu
:
A Dynamic-Key Based Secure Scan Architecture for Manufacturing and In-Field IC Testing. 373-385 - Nithyashankari Gummidipoondi Jayasankaran
, Adriana C. Sanabria-Borbon
, Edgar Sánchez-Sinencio
, Jiang Hu, Jeyavijayan Rajendran
:
Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction. 386-403 - Aibin Yan
, Zhelong Xu, Xiangfeng Feng, Jie Cui
, Zhili Chen
, Tianming Ni
, Zhengfeng Huang
, Patrick Girard
, Xiaoqing Wen
:
Novel Quadruple-Node-Upset-Tolerant Latch Designs With Optimized Overhead for Reliable Computing in Harsh Radiation Environments. 404-413 - Anran Li
, Shuangshuang Xue, Xiang-Yang Li
, Lan Zhang
, Jianwei Qian
:
AppDNA: Profiling App Behavior via Deep-Learning Function Call Graphs. 414-427 - Abdolah Amirany
, Mohammad Hossein Moaiyeri
, Kian Jafari
:
Nonvolatile Associative Memory Design Based on Spintronic Synapses and CNTFET Neurons. 428-437 - Xiao Liu
, Zaiyang Tang, Peng Li
, Song Guo
, Xuepeng Fan, Jinbo Zhang:
A Graph Learning Based Approach for Identity Inference in DApp Platform Blockchain. 438-449 - Geon Kang
, Seung-Chan Kim
:
DeepEcho: Echoacoustic Recognition of Materials Using Returning Echoes With Deep Neural Networks. 450-462 - Guangmo Tong
, Ruiqi Wang:
On Adaptive Influence Maximization Under General Feedback Models. 463-475 - Ali Hoseinghorban
, Mohammad Abbasinia
, Alireza Ejlali
:
PROWL: A Cache Replacement Policy for Consistency Aware Renewable Powered Devices. 476-487 - Mohammad Saeed Ansari
, Bruce F. Cockburn
, Jie Han
:
Low-Power Approximate Logarithmic Squaring Circuit Design for DSP Applications. 500-506 - Haroon Waris
, Chenghua Wang, Weiqiang Liu
, Jie Han
, Fabrizio Lombardi
:
Hybrid Partial Product-Based High-Performance Approximate Recursive Multipliers. 507-513 - Jasmin Kaur
, Mehran Mozaffari Kermani
, Reza Azarderakhsh
:
Hardware Constructions for Lightweight Cryptographic Block Cipher QARMA With Error Detection Mechanisms. 514-519
Volume 10, Number 2, April - June 2022
- Yiannakis Sazeides
, Arkady Bramnik, Ron Gabor, Ramon Canal
:
A Real-Time Error Detection (RTD) Architecture and Its Use for Reliability and Post-Silicon Validation for F/F Based Memory Arrays. 524-536 - Padmaja Bhamidipati
, Avinash Karanth
:
HREN: A Hybrid Reliable and Energy-Efficient Network-on-Chip Architecture. 537-548 - Corrado De Sio
, Sarah Azimi
, Luca Sterpone
:
FireNN: Neural Networks Reliability Evaluation on Hybrid Platforms. 549-563 - Junchao Chen
, Thomas Lange, Marko S. Andjelkovic
, Aleksandar Simevski
, Lu Li
, Milos Krstic
:
Solar Particle Event and Single Event Upset Prediction from SRAM-Based Monitor and Supervised Machine Learning. 564-580 - Lorena Anghel
, Florian Cacho:
Design-Time Exploration for Process, Environment and Aging Compensation Techniques for Low Power Reliable-Aware Design. 581-590 - Zhen Gao
, Jinhua Zhu, Tong Yan Tyan, Anees Ullah
, Pedro Reviriego
:
Fault Tolerant Polyphase Filters-Based Decimators for SRAM-Based FPGA Implementations. 591-601 - Khanh N. Dang
, Nguyen Anh Vu Doan
, Abderazek Ben Abdallah
:
MigSpike: A Migration Based Algorithms and Architecture for Scalable Robust Neuromorphic Systems. 602-617 - Sergi Alcaide
, Leonidas Kosmidis
, Carles Hernández
, Jaume Abella
:
Achieving Diverse Redundancy for GPU Kernels. 618-634 - Alfonso Sánchez-Macián
, Alonso Martín-Toledano
, Jefferson Andres Bravo-Montes
, Francisco Garcia-Herrero
, Juan Antonio Maestro
:
Reducing the Impact of Defects in Quantum-Dot Cellular Automata (QCA) Approximate Adders at Nano Scale. 635-647 - Matteo Biasielli
, Cristiana Bolchini
, Luca Cassano
, Andrea Mazzeo, Antonio Miele
:
Approximation-Based Fault Tolerance in Image Processing Applications. 648-661 - Jianrong Yao
, Lihui Pang
, Yang Su
, Zhi Zhang
, Wei Yang
, Anmin Fu
, Yansong Gao
:
Design and Evaluate Recomposited OR-AND-XOR-PUF. 662-677 - Elzbieta Burek
, Michal Wronski
, Krzysztof Mank
, Michal Misztal
:
Algebraic Attacks on Block Ciphers Using Quantum Annealing. 678-689 - Yunpeng Xiao
, Wen Li, Shuai Qiang, Qian Li
, Hanchun Xiao, Yanbing Liu
:
A Rumor & Anti-Rumor Propagation Model Based on Data Enhancement and Evolutionary Game. 690-703 - Tingyang Wei
, Wei-Li Liu
, Jinghui Zhong
, Yue-Jiao Gong
:
Multiclass Classification on High Dimension and Low Sample Size Data Using Genetic Programming. 704-718 - Jianyuan Sun
, Zidong Wang
, Hui Yu
, Shu Zhang
, Junyu Dong
, Pengxiang Gao:
Two-Stage Deep Regression Enhanced Depth Estimation From a Single RGB Image. 719-727 - Samuele Germiniani
, Alessandro Danese, Graziano Pravadelli
:
Automatic Generation of Assertions for Detection of Firmware Vulnerabilities Through Alignment of Symbolic Sequences. 728-739 - Gor Piliposyan
, Saqib Khursheed, Daniele Rossi
:
Hardware Trojan Detection on a PCB Through Differential Power Monitoring. 740-751 - Xiaoliang Dai
, Hongxu Yin
, Niraj K. Jha
:
Incremental Learning Using a Grow-and-Prune Paradigm With Efficient Neural Networks. 752-762 - Shubham Rai
, Satwik Patnaik
, Ansh Rupani
, Johann Knechtel
, Ozgur Sinanoglu
, Akash Kumar
:
Security Promises and Vulnerabilities in Emerging Reconfigurable Nanotechnology-Based Circuits. 763-778 - Haozhao Wang
, Zhihao Qu
, Song Guo
, Xin Gao, Ruixuan Li
, Baoliu Ye
:
Intermittent Pulling With Local Compensation for Communication-Efficient Distributed Learning. 779-791 - Ali A. El-Moursy
, Abdollah Masoud Darya
, Ahmed S. Elwakil
, Abhinand Jha, Sohaib Majzoub
:
Chaotic Clock Driven Cryptographic Chip: Towards a DPA Resistant AES Processor. 792-805 - Rajit Karmakar
, Suman Sekhar Jana, Santanu Chattopadhyay
:
A Cellular Automata Guided Finite-State-Machine Watermarking Strategy for IP Protection of Sequential Circuits. 806-823 - Junxiu Liu
, Shunsheng Zhang
, Yuling Luo
, Lvchen Cao:
Machine Learning-Based Similarity Attacks for Chaos-Based Cryptosystems. 824-837 - Dixon Vimalajeewa
, Chamil Kulatunga
, Donagh P. Berry, Sasitharan Balasubramaniam
:
A Service-Based Joint Model Used for Distributed Learning: Application for Smart Agriculture. 838-854 - Mitali Sinha
, Pramit Bhattacharyya
, Sidhartha Sankar Rout
, Neha Bhairavi Prakriya, Sujay Deb
:
Securing an Accelerator-Rich System From Flooding-Based Denial-of-Service Attacks. 855-869 - Tanujay Saha
, Najwa Aaraj
, Neel Ajjarapu
, Niraj K. Jha
:
SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems Based on Machine Learning. 870-885 - Qi Qi
, Yan Lu, Jiashi Li, Jing-Yu Wang
, Haifeng Sun
, Jianxin Liao
:
Learning Low Resource Consumption CNN Through Pruning and Quantization. 886-903 - Min Soo Kim
, Alberto A. Del Barrio
, Hyun Jin Kim
, Nader Bagherzadeh
:
The Effects of Approximate Multiplication on Convolutional Neural Networks. 904-916 - Xiaolin Chai
, Yan Sun
, Hong Luo
, Mohsen Guizani
:
DWES: A Dynamic Weighted Evaluation System for Scratch based on Computational Thinking. 917-932 - Jialu Hao
, Wenjuan Tang
, Cheng Huang, Jian Liu
, Huimei Wang
, Ming Xian:
Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT. 933-947 - Yucen Nan
, Wei Li
, Feng Lu, Chengwen Luo
, Jianqiang Li
, Albert Y. Zomaya
:
Developing Practical Multi-View Learning for Clinical Analytics in P4 Medicine. 948-961 - Wenhan Xia
, Hongxu Yin
, Xiaoliang Dai
, Niraj K. Jha
:
Fully Dynamic Inference With Deep Neural Networks. 962-972 - Ying Liufu
, Long Jin
, Jinqiang Xu, Xiuchun Xiao, Dongyang Fu
:
Reformative Noise-Immune Neural Network for Equality-Constrained Optimization Applied to Image Target Detection. 973-984 - Amin Naghavi
, Sepideh Safari
, Shaahin Hessabi
:
Tolerating Permanent Faults With Low-Energy Overhead in Multicore Mixed-Criticality Systems. 985-996 - Jesús Mayor
, Laura Raya
, Sofia Bayona
, Alberto Sánchez
:
Multi-Technique Redirected Walking Method. 997-1008 - Zhiwei Wang
:
Blockchain-Based Edge Computing Data Storage Protocol Under Simplified Group Signature. 1009-1019 - Akash Yadav
, Joydeep Chandra
, Ashok Singh Sairam
:
A Budget and Deadline Aware Task Assignment Scheme for Crowdsourcing Environment. 1020-1034 - Yufeng Zhan, Jie Zhang
, Zicong Hong
, Leijie Wu, Peng Li
, Song Guo
:
A Survey of Incentive Mechanism Design for Federated Learning. 1035-1044 - Jie Lu
, Naveen Verma, Niraj K. Jha
:
Convolutional Autoencoder-Based Transfer Learning for Multi-Task Image Inferences. 1045-1057 - Jinghui Zhong
, Jiaquan Yang, Yongliang Chen
, Wei-Li Liu
, Liang Feng
:
Mining Implicit Equations From Data Using Gene Expression Programming. 1058-1074 - Fangqing Liu, Han Huang
, Junpeng Su
, Stuart D. Semujju
, Zhongming Yang, Zhifeng Hao:
Manifold-Inspired Search-Based Algorithm for Automated Test Case Generation. 1075-1090 - Yale Wang
, Chenghua Wang, Chongyan Gu
, Yijun Cui
, Máire O'Neill
, Weiqiang Liu
:
A Dynamically Configurable PUF and Dynamic Matching Authentication Protocol. 1091-1104 - Mohammad Ahmadinejad, Mohammad Hossein Moaiyeri
:
Energy- and Quality-Efficient Approximate Multipliers for Neural Network and Image Processing Applications. 1105-1116 - Maged AbdelAty
, Roberto Doriguzzi Corin
, Domenico Siracusa
:
DAICS: A Deep Learning Solution for Anomaly Detection in Industrial Control Systems. 1117-1129 - Tinghui Wang
, Diane J. Cook
:
Multi-Person Activity Recognition in Continuously Monitored Smart Homes. 1130-1141 - Kunpeng Yang
, Hangguan Shan
, Tengxu Sun, Haoji Hu
, Yingxiao Wu, Lu Yu
, Zhaoyang Zhang
, Tony Q. S. Quek
:
Reinforcement Learning-Based Mobile Edge Computing and Transmission Scheduling for Video Surveillance. 1142-1156 - Krzysztof Rzecki
, Mateusz Baran
:
Application of Elastic Shape Analysis to User Authentication and Identification. 1157-1165 - Fahimeh Bahrami
, Behnaz Ranjbar
, Nezam Rohbani, Alireza Ejlali
:
PVMC: Task Mapping and Scheduling Under Process Variation Heterogeneity in Mixed-Criticality Systems. 1166-1177 - Jong Kang Park
, Duckyong Kim
, Jong Tae Kim:
Efficient Error-Resilient Bus Coding Method Using Bit-Basis Orthogonal Integrative Multiplexing. 1178-1191 - Junqi Huang
, Haider A. F. Almurib
, T. Nandha Kumar
, Fabrizio Lombardi
:
An Inexact Newton Method For Unconstrained Total Variation-Based Image Denoising by Approximate Addition. 1192-1207 - Jasmin Kaur
, Ausmita Sarker
, Mehran Mozaffari Kermani
, Reza Azarderakhsh
:
Hardware Constructions for Error Detection in Lightweight Welch-Gong (WG)-Oriented Streamcipher WAGE Benchmarked on FPGA. 1208-1215 - Fabrizio Riente
, Giovanna Turvani
, Marco Vacca
, Mariagrazia Graziano
:
Parallel Computation in the Racetrack Memory. 1216-1221 - Jiafeng Xie
, Pengzhou He
, Xiaofang Wang, José Luis Imaña
:
Efficient Hardware Implementation of Finite Field Arithmetic $AB+C$AB+C for Binary Ring-LWE Based Post-Quantum Cryptography. 1222-1228 - Haroon Waris
, Chenghua Wang, Chenyu Xu, Weiqiang Liu
:
AxRMs: Approximate Recursive Multipliers Using High-Performance Building Blocks. 1229-1235
Volume 10, Number 3, July - September 2022
- Stuart F. Oberman
, Leonel Sousa, Bogdan Pasca
, Alberto Nannarelli:
Guest Editorial: Special Section on Emerging and Impacting Trends on Computer Arithmetic. 1239-1240 - David Mallasén
, Raul Murillo
, Alberto A. Del Barrio
, Guillermo Botella
, Luis Piñuel, Manuel Prieto-Matías
:
PERCIVAL: Open-Source Posit RISC-V Core With Quire Capability. 1241-1252 - Louise Ben Salem-Knapp, Sylvie Boldo
, William Weens
:
Bounding the Round-Off Error of the Upwind Scheme for Advection. 1253-1262 - Fangan-Yssouf Dosso
, Jean-Marc Robert
, Pascal Véron
:
PMNS for Efficient Arithmetic and Small Memory Cost. 1263-1277 - Nicolas Méloni
:
An Alternative Approach to Polynomial Modular Number System Internal Reduction. 1278-1288 - Jean-Claude Bajard, Kazuhide Fukushima, Thomas Plantard
, Arnaud Sipasseuth
:
Generating Very Large RNS Bases. 1289-1301 - John Osorio Ríos
, Adrià Armejach
, Eric Petit, Greg Henry, Marc Casas:
A BF16 FMA is All You Need for DNN Training. 1302-1314 - Efstratios Zacharelos
, Italo Nunziata
, Gerardo Saggese
, Antonio G. M. Strollo
, Ettore Napoli:
Approximate Recursive Multipliers Using Low Power Building Blocks. 1315-1330 - Jacob Brown
, Tanujay Saha
, Niraj K. Jha
:
GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security. 1331-1348 - Krishna Prasad Gnawali
, Spyros Tragoudas:
High-Speed Memristive Ternary Content Addressable Memory. 1349-1360 - Yu-Jun Zheng
, Si-Lan Yu, Qin Song, Yu-Jiao Huang, Wei-Guo Sheng
, Sheng-Yong Chen
:
Co-Evolutionary Fuzzy Deep Transfer Learning for Disaster Relief Demand Forecasting. 1361-1373 - Carmen Delgado
, Jeroen Famaey
:
Optimal Energy-Aware Task Scheduling for Batteryless IoT Devices. 1374-1387 - Hikaru Tsuchida
, Yuichi Kawamoto
, Nei Kato
, Kazuma Kaneko, Shigenori Tani
, Masatake Hangai, Hiroshi Aruga
:
Improvement of Battery Lifetime Based on Communication Resource Control in Low-Earth-Orbit Satellite Constellations. 1388-1398 - Tengfei Song
, Wenming Zheng
, Suyuan Liu, Yuan Zong
, Zhen Cui
, Yang Li
:
Graph-Embedded Convolutional Neural Network for Image-Based EEG Emotion Recognition. 1399-1413 - Tiago Koketsu Rodrigues
, Jiajia Liu
, Nei Kato
:
Offloading Decision for Mobile Multi-Access Edge Computing in a Multi-Tiered 6G Network. 1414-1427 - Sehun Park
, Jae-Joon Kim
, Jaeha Kung
:
AutoRelax: HW-SW Co-Optimization for Efficient SpGEMM Operations With Automated Relaxation in Deep Learning. 1428-1442 - Nimisha Limaye
, Nikhil Rangarajan
, Satwik Patnaik
, Ozgur Sinanoglu, Kanad Basu
:
PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans. 1443-1455 - Norita B. Ahmad
, Phillip A. Laplante
, Joanna F. DeFranco
, Mohamad Kassab
:
A Cybersecurity Educated Community. 1456-1463 - Fazal Hameed
, Asif Ali Khan
, Jerónimo Castrillón
:
ALPHA: A Novel Algorithm-Hardware Co-Design for Accelerating DNA Seed Location Filtering. 1464-1475 - Amar Rasheed
, Rabi N. Mahapatra, Cihan Varol
, Narasimha Karpoor:
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT. 1476-1491 - Shahriar Ebrahimi
, Reza Salkhordeh
, Seyed Ali Osia
, Ali Taheri, Hamid R. Rabiee
, Hossein Asadi
:
RC-RNN: Reconfigurable Cache Architecture for Storage Systems Using Recurrent Neural Networks. 1492-1506 - Nimisha Limaye
, Christian Wachsmann, Mohammed Nabeel, Mohammed Ashraf, Arun K. Kanuparthi, Ozgur Sinanoglu
:
AntiDOTE: Protecting Debug Against Outsourced Test Entities. 1507-1518 - Jing Li
, Dong Hye Ye, Mathias Kolsch, Juan P. Wachs
, Charles A. Bouman
:
Fast and Robust UAV to UAV Detection and Tracking From Video. 1519-1531 - Ching-Hu Lu
, Hao-Chung Ku:
Goal and Elite-Data-Driven Anthropomorphic Learning for Streaming-Image Analytics. 1532-1545 - Antonio Leonel Hernández Martínez, Saqib Khursheed, Turki Alnuayri
, Daniele Rossi
:
Online Remaining Useful Lifetime Prediction Using Support Vector Regression. 1546-1557 - Dingding Li
, Niyang Zhang, Mianxiong Dong
, Hao Chen
, Kaoru Ota
, Yong Tang:
PM-AIO: An Effective Asynchronous I/O System for Persistent Memory. 1558-1574 - Lilas Alrahis
, Satwik Patnaik
, Muhammad Abdullah Hanif
, Hani H. Saleh, Muhammad Shafique
, Ozgur Sinanoglu
:
GNNUnlock+: A Systematic Methodology for Designing Graph Neural Networks-Based Oracle-Less Unlocking Schemes for Provably Secure Logic Locking. 1575-1592 - Pedro Reviriego
, Shanshan Liu
, Otmar Ertl
, Farzad Niknia, Fabrizio Lombardi
:
Computing the Similarity Estimate Using Approximate Memory. 1593-1604 - Antonio Corradi
, Giuseppe Di Modica
, Luca Foschini
, Lorenzo Patera
, Michele Solimando
:
SIRDAM4.0: A Support Infrastructure for Reliable Data Acquisition and Management in Industry 4.0. 1605-1620 - Anita Aghaie
, Maik Ender
, Amir Moradi
:
PUFs Physical Learning: Accelerating the Enrollment via Delay-Based Model Extraction. 1621-1632 - Takahiro Ohyama
, Yuichi Kawamoto
, Nei Kato
:
Intelligent Reflecting Surface (IRS) Allocation Scheduling Method Using Combinatorial Optimization by Quantum Computing. 1633-1644 - Haoyu Zhao
, Weidong Min
, Jianqiang Xu
, Qing Han
, Wei Li
, Qi Wang
, Ziyuan Yang
, Linghua Zhou
:
SPACE: Finding Key-Speaker in Complex Multi-Person Scenes. 1645-1656 - Maryam S. Hosseini
, Masoumeh Ebrahimi
, Pooria M. Yaghini
, Nader Bagherzadeh
:
Near Volatile and Non-Volatile Memory Processing in 3D Systems. 1657-1664
Volume 10, Number 4, October - December 2022
- Shanshan Liu
, Pedro Reviriego
, Fabrizio Lombardi
, Patrick Girard:
Guest Editorial: Special Section on "To be Safe and Dependable in the Era of Artificial Intelligence: Emerging Techniques for Trusted and Reliable Machine Learning". 1668-1670 - Mohamad Gharib
, Tommaso Zoppi
, Andrea Bondavalli
:
On the Properness of Incorporating Binary Classification Machine Learning Algorithms Into Safety-Critical Systems. 1671-1686 - Tianshun Wang
, Yang Li
, Yuan Wu
, Tony Q. S. Quek
:
Secrecy Driven Federated Learning via Cooperative Jamming: An Approach of Latency Minimization. 1687-1703 - Bo Yang
, Chaofan Ma
, Xiaofang Xia
:
An Interrelated Imitation Learning Method for Heterogeneous Drone Swarm Coordination. 1704-1716 - Roberto Magán-Carrión
, Daniel Urda
, Ignacio Díaz-Cano
, Bernabé Dorronsoro
:
Improving the Reliability of Network Intrusion Detection Systems Through Dataset Integration. 1717-1732 - Qian Xu
, Md Tanvir Arafin
, Gang Qu
:
An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks. 1733-1745 - Yan Jia
, John A. McDermid
, Tom Lawton
, Ibrahim Habli
:
The Role of Explainability in Assuring Safety of Machine Learning in Healthcare. 1746-1760 - Yishi Zhu
, Bomin Mao
, Nei Kato
:
A Dynamic Task Scheduling Strategy for Multi-Access Edge Computing in IRS-Aided Vehicular Networks. 1761-1771 - Hooman Alavizadeh
, Samin Aref
, Dong Seong Kim
, Julian Jang-Jaccard
:
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud. 1772-1788 - Songxiang Yang
, Lin Ma
, Xuezhi Tan:
Weakly Supervised Class-Agnostic Image Similarity Search Based on Convolutional Neural Network. 1789-1798 - Hongxu Yin
, Guoyang Chen, Yingmin Li, Shuai Che, Weifeng Zhang
, Niraj K. Jha
:
Towards Execution-Efficient LSTMs via Hardware-Guided Grow-and-Prune Paradigm. 1799-1809 - Xiaoping Zhou, Zhenlong Liu, Maozu Guo
, Jichao Zhao, Jialin Wang:
SACC: A Size Adaptive Content Caching Algorithm in Fog/Edge Computing Using Deep Reinforcement Learning. 1810-1820 - Mojtaba Tarihi
, Soheil Azadvar
, Arash Tavakkol
, Hossein Asadi
, Hamid Sarbazi-Azad
:
Quick Generation of SSD Performance Models Using Machine Learning. 1821-1836 - Shichao Yu
, Chongyan Gu
, Weiqiang Liu
, Máire O'Neill
:
Deep Learning-Based Hardware Trojan Detection With Block-Based Netlist Information Extraction. 1837-1853 - Yun Wu
, Andreas Aßmann
, Brian Stewart
, Andrew M. Wallace
:
Energy Efficient Approximate 3D Image Reconstruction. 1854-1866 - Lucas Matana Luza
, Annachiara Ruospo
, Daniel Söderström
, Carlo Cazzaniga
, Maria Kastriotou
, Ernesto Sánchez
, Alberto Bosio
, Luigi Dilillo
:
Emulating the Effects of Radiation-Induced Soft-Errors for the Reliability Assessment of Neural Networks. 1867-1882 - Mohsen Ansari
, Sepideh Safari
, Sina Yari-Karin
, Pourya Gohari-Nazari
, Heba Khdr
, Muhammad Shafique
, Jörg Henkel
, Alireza Ejlali
:
Thermal-Aware Standby-Sparing Technique on Heterogeneous Real-Time Embedded Systems. 1883-1897 - Marco Cococcioni
, Federico Rossi
, Emanuele Ruffaldi
, Sergio Saponara
:
A Lightweight Posit Processing Unit for RISC-V Processors in Deep Neural Network Applications. 1898-1908 - Yuichi Kawamoto
, Takuto Mitsuhashi, Nei Kato
:
UAV-Aided Information Diffusion for Vehicle-to-Vehicle (V2V) in Disaster Scenarios. 1909-1917 - Syed Sadaf Ali
, Vivek Singh Baghel
, Iyyakutti Iyappan Ganapathi, Surya Prakash
, Ngoc-Son Vu
, Naoufel Werghi
:
A Novel Technique for Fingerprint Based Secure User Authentication. 1918-1931 - Abdulqader Nael Mahmoud
, Frederic Vanderveken
, Florin Ciubotaru
, Christoph Adelmann
, Said Hamdioui
, Sorin Cotofana
:
Spin Wave Based Approximate Computing. 1932-1940 - Jing Bi
, Haitao Yuan
, Kaiyi Zhang, MengChu Zhou
:
Energy-Minimized Partial Computation Offloading for Delay-Sensitive Applications in Heterogeneous Edge Networks. 1941-1954 - Thomas Plantard
, Arnaud Sipasseuth
, Willy Susilo
, Vincent Zucca
:
Tight Bound on NewHope Failure Probability. 1955-1965 - Chenyan Zhang
, Jing Li
, Jia Wu
, Donghua Liu
, Jun Chang
, Rong Gao:
Deep Recommendation With Adversarial Training. 1966-1978 - Debanjan Sadhya
, Bodhi Chakraborty
:
Quantifying the Effects of Anonymization Techniques Over Micro-Databases. 1979-1992 - Dur-e-Shahwar Kundi
, Yuqing Zhang, Chenghua Wang, Ayesha Khalid
, Máire O'Neill
, Weiqiang Liu
:
Ultra High-Speed Polynomial Multiplications for Lattice-Based Cryptography on FPGAs. 1993-2005 - Tanujay Saha
, Najwa Aaraj
, Niraj K. Jha
:
Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems. 2006-2024 - Aijiao Cui
, Zhen Weng, Hui Zhang, Gang Qu
, Huawei Li
:
SATAM: A SAT Attack Resistant Active Metering Against IC Overbuilding. 2025-2041 - Ruben Tolosana
, Juan-Carlos Ruiz-Garcia
, Rubén Vera-Rodríguez
, Jaime Herreros-Rodriguez
, Sergio Romero-Tapiador, Aythami Morales
, Julian Fiérrez
:
Child-Computer Interaction With Mobile Devices: Recent Works, New Dataset, and Age Detection. 2042-2054 - Zamshed I. Chowdhury
, S. Karen Khatamifard
, Salonik Resch
, M. Hüsrev Cilasun
, Zhengyang Zhao
, Masoud Zabihi
, Meisam Razaviyayn
, Jian-Ping Wang
, Sachin S. Sapatnekar
, Ulya R. Karpuzcu
:
CRAM-Seq: Accelerating RNA-Seq Abundance Quantification Using Computational RAM. 2055-2071 - Avishek Sinha Roy
, Hardik Agrawal, Anindya Sundar Dhar
:
ACBAM-Accuracy-Configurable Sign Inclusive Broken Array Booth Multiplier Design. 2072-2078 - Raul Murillo
, Alberto A. Del Barrio
, Guillermo Botella
, Min Soo Kim
, Hyun Jin Kim
, Nader Bagherzadeh
:
PLAM: A Posit Logarithm-Approximate Multiplier. 2079-2085 - Martin Omaña
, Sejuti Bardhan
, Cecilia Metra
:
Reliability Risks Due to Faults Affecting Selectors of ReRAMs and Possible Solutions. 2086-2091 - Eungeun Yoo
, Haneul Ko
, Sangheon Pack
:
Fuzzy Clustered Federated Learning Algorithm for Solar Power Generation Forecasting. 2092-2098
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.