Author of the publication

PhD Forum Abstract: Understanding Deep Model Compression for IoT Devices.

. IPSN, page 385-386. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A mafia and distance fraud high-resistance RFID distance bounding protocol., , and . ISCISC, page 67-72. IEEE, (2014)The Role of Permutation Invariance in Linear Mode Connectivity of Neural Networks., , , and . ICLR, OpenReview.net, (2022)The Role of Pre-training Data in Transfer Learning., , , , , and . CoRR, (2023)Deep Neural Network Pruning for Nuclei Instance Segmentation in Hematoxylin and Eosin-Stained Histological Images., , , and . AMAI@MICCAI, volume 13540 of Lecture Notes in Computer Science, page 108-117. Springer, (2022)PhD Forum Abstract: Understanding Deep Model Compression for IoT Devices.. IPSN, page 385-386. IEEE, (2020)AVID: Adversarial Visual Irregularity Detection., , , , , , and . ACCV (6), volume 11366 of Lecture Notes in Computer Science, page 488-505. Springer, (2018)Studying the impact of magnitude pruning on contrastive learning methods., , , , and . CoRR, (2022)RFID unilateral distance bounding protocols: A trade-off between mafia and distance fraud., , and . Comput. Commun., (2017)To Share or Not to Share: On Location Privacy in IoT Sensor Data., , , and . IoTDI, page 128-140. IEEE, (2022)REPAIR: REnormalizing Permuted Activations for Interpolation Repair., , , , and . ICLR, OpenReview.net, (2023)