Machine learning and data analytics applications increasingly suffer fro...
Privacy has rapidly become a major concern/design consideration. Homomor...
Compute-in-Memory (CiM), built upon non-volatile memory (NVM) devices, i...
Lattice-based cryptographic algorithms built on ring learning with error...
Deep Neural Networks (DNNs) have demonstrated impressive performance acr...
Compute-in-Memory (CiM) utilizing non-volatile memory (NVM) devices pres...
Edge training of Deep Neural Networks (DNNs) is a desirable goal for
con...
In a number of machine learning models, an input query is searched acros...
Computing-in-Memory (CiM) architectures based on emerging non-volatile m...
Computing-in-memory with emerging non-volatile memory (nvCiM) is shown t...
Recommendation systems (RecSys) suggest items to users by predicting the...
Computing-in-Memory architectures based on non-volatile emerging memorie...
This paper proposes IMCRYPTO, an in-memory computing (IMC) fabric for
ac...
Differentiable neural architecture search (DNAS) is known for its capaci...
Emerging device-based Computing-in-memory (CiM) has been proved to be a
...
Homomorphic encryption (HE) allows direct computations on encrypted data...
Co-exploration of neural architectures and hardware design is promising ...
Along with the rapid growth of Industrial Internet-of-Things (IIoT)
appl...
Computing-in-Memory (CiM) architectures aim to reduce costly data transf...
Computing-in-Memory (CiM) architectures aim to reduce costly data transf...