Author of the publication

TDPP: 2-D Permutation-Based Protection of Memristive Deep Neural Networks.

, , , , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 43 (3): 742-755 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Efficiency and Lifetime of Logic-in-Memory by Combining IMPLY and MAGIC Families., , , , and . J. Syst. Archit., (2021)Improved analysis and optimal priority assignment for communicating threads on uni-processor., , , , and . J. Syst. Archit., (2022)TDPP: Two-Dimensional Permutation-Based Protection of Memristive Deep Neural Networks., , , , , , , , and . CoRR, (2023)PoTrojan: powerful neural-level trojan designs in deep learning models., , , , , and . CoRR, (2018)Enhancing Security of Memristor Computing System Through Secure Weight Mapping., , , , and . ISVLSI, page 182-187. IEEE, (2022)Multiserver configuration for cloud service profit maximization in the presence of soft errors based on grouped grey wolf optimizer., , , , , and . J. Syst. Archit., (2022)Review of security techniques for memristor computing systems., , and . CoRR, (2022)TDPP: 2-D Permutation-Based Protection of Memristive Deep Neural Networks., , , , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 43 (3): 742-755 (March 2024)Security Enhancement for RRAM Computing System through Obfuscating Crossbar Row Connections., , , , , and . DATE, page 466-471. IEEE, (2020)