As a type of valuable intellectual property (IP), deep neural network (D...
Fast model updates for unseen tasks on intelligent edge devices are cruc...
Online optimization with multiple budget constraints is challenging sinc...
Continual learning faces a crucial challenge of catastrophic forgetting....
Malicious architecture extraction has been emerging as a crucial concern...
By integrating domain knowledge with labeled samples, informed machine
l...
In view of the performance limitations of fully-decoupled designs for ne...
Hyperdimensional Computing (HDC) is facing infringement issues due to
st...
Thanks to the tiny storage and efficient execution, hyperdimensional
Com...
By mimicking brain-like cognition and exploiting parallelism,
hyperdimen...
Learning to optimize (L2O) has recently emerged as a promising approach ...
The rapid uptake of intelligent applications is pushing deep learning (D...
Convolutional neural networks (CNNs) are used in numerous real-world
app...
A standard assumption in contextual multi-arm bandit is that the true co...
We study a cooperative multi-agent multi-armed bandits with M agents and...
With the exploding popularity of machine learning, domain knowledge in
v...
Deep neural networks (DNNs) have been increasingly deployed on and integ...
Inference accuracy of deep neural networks (DNNs) is a crucial performan...
To increase the trustworthiness of deep neural network (DNN) classifiers...
Being an emerging class of in-memory computing architecture, brain-inspi...
Running deep neural network (DNN) inference on mobile devices, i.e., mob...
Attacks based on power analysis have been long existing and studied, wit...
Shared edge computing platforms deployed at the radio access network are...