Author of the publication

Runtime Row/Column Activation Pruning for ReRAM-based Processing-in-Memory DNN Accelerators.

, , , , , , , and . ICCAD, page 1-9. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Noisy training for deep neural networks., , , and . ChinaSIP, page 16-20. IEEE, (2014)Recurrent neural network training with dark knowledge transfer., , and . ICASSP, page 5900-5904. IEEE, (2016)TDNN-Based Multilingual Mix-Synthesis with Language Discriminative Training., , and . APSIPA, page 605-610. IEEE, (2018)Music removal by convolutional denoising autoencoder in speech recognition., , , and . APSIPA, page 338-341. IEEE, (2015)A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks., , , and . IEEE Trans. Big Data, 5 (4): 520-528 (2019)Design of Cylindrical Error Assessment Software Based on Genetic Algorithm., and . CAIBDA, volume 373 of Frontiers in Artificial Intelligence and Applications, page 221-228. IOS Press, (2023)NeuFlow: Real-time, High-accuracy Optical Flow Estimation on Robots Using Edge Devices., , and . CoRR, (2024)Advance on Trust Model and Evaluation Method in Social Networks., , , and . ICGEC, page 9-14. IEEE, (2012)CSKG4APT: A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organization Attribution., , , , and . IEEE Trans. Knowl. Data Eng., 35 (6): 5695-5709 (June 2023)A crowdsourcing method for online social networks security assessment based on human-centric computing., , , , and . Hum. centric Comput. Inf. Sci., (2020)