


default search action
IEEE Transactions on Emerging Topics in Computing, Volume 10
Volume 10, Number 1, January - March 2022
- Paolo Montuschi:

TETC's January 2022 Editor-in-Chief's Report on the State of the Journal. 4-5 - Daniele Jahier Pagliari

, Frank Schirrmeister, Nader Bagherzadeh
, Enrico Macii
:
Guest Editorial: Thematic Section on Applications of Emerging Computing Technologies in Smart Manufacturing and Industry 4.0. 6-8 - Zijie Ren

, Jiafu Wan
, Pan Deng:
Machine-Learning-Driven Digital Twin for Lifecycle Management of Complex Equipment. 9-22 - Charles Steinmetz

, Greyce N. Schroeder, Ricardo Nagel Rodrigues, Achim Rettberg, Carlos Eduardo Pereira
:
Key-Components for Digital Twin Modeling With Granularity: Use Case Car-as-a-Service. 23-33 - Trier Mortlock

, Deepan Muthirayan
, Shih-Yuan Yu
, Pramod P. Khargonekar
, Mohammad Abdullah Al Faruque
:
Graph Learning for Cognitive Digital Twins in Manufacturing Systems. 34-45 - Nicola Dall'Ora

, Khaled Alamin
, Enrico Fraccaroli
, Massimo Poncino
, Davide Quaglia
, Sara Vinco
:
Digital Transformation of a Production Line: Network Design, Online Data Collection and Energy Monitoring. 46-59 - Birgit Vogel-Heuser

, Juliane Fischer
, Dieter Hess, Eva-Maria Neumann
, Marcus Würr
:
Boosting Extra-Functional Code Reusability in Cyber-Physical Production Systems: The Error Handling Case Study. 60-73 - Davide Cannizzaro

, Antonio Giuseppe Varrella, Stefano Paradiso
, Roberta Sampieri, Yukai Chen
, Alberto Macii
, Edoardo Patti
, Santa Di Cataldo
:
In-Situ Defect Detection of Metal Additive Manufacturing: An Integrated Framework. 74-86 - Florian Fricke

, Marcelo Brandalero
, Sascha Liehr, Simon Kern, Klas Meyer, Stefan Kowarik, Robin Hierzegger
, Stephan Westerdick, Michael Maiwald
, Michael Hübner
:
Artificial Intelligence for Mass Spectrometry and Nuclear Magnetic Resonance Spectroscopy Using a Novel Data Augmentation Method. 87-98 - Jilong Wang

, Rui Li
, Renfa Li
, Bin Fu, Danny Z. Chen
:
HMCKRAutoEncoder: An Interpretable Deep Learning Framework for Time Series Analysis. 99-111 - Zubair Md Fadlullah

, Nei Kato
:
HCP: Heterogeneous Computing Platform for Federated Learning Based Collaborative Content Caching Towards 6G Networks. 112-123 - Chia-Yu Lin

, Li-Chun Wang
, Shu-Ping Chang:
Incremental Checkpointing for Fault-Tolerant Stream Processing Systems: A Data Structure Approach. 124-136 - Nikhil Rangarajan

, Satwik Patnaik
, Johann Knechtel
, Ramesh Karri
, Ozgur Sinanoglu
, Shaloo Rakheja
:
Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices. 137-156 - Carl Chalmers

, Paul Fergus
, C. Aday Curbelo Montañez
, Sudip Sikdar, Freya Ball, Bryony Kendall:
Detecting Activities of Daily Living and Routine Behaviours in Dementia Patients Living Alone Using Smart Meter Load Disaggregation. 157-169 - Peng Qi

, Yan Sun
, Hong Luo
, Mohsen Guizani
:
Scratch-DKG: A Framework for Constructing Scratch Domain Knowledge Graph. 170-185 - Gian Carlo Cardarilli

, Luca Di Nunzio
, Rocco Fazzolari
, Alberto Nannarelli
, Massimo Petricca
, Marco Re
:
Design Space Exploration Based Methodology for Residue Number System Digital Filters Implementation. 186-198 - Michal Drozdowicz

, Maria Ganzha, Marcin Paprzycki
:
Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities. 199-210 - YaoChong Li

, Ri-Gui Zhou
, RuiQing Xu
, Jia Luo
, She-Xiang Jiang
:
A Quantum Mechanics-Based Framework for EEG Signal Feature Extraction and Classification. 211-222 - Hao Zheng

, Ahmed Louri:
Agile: A Learning-Enabled Power and Performance-Efficient Network-on-Chip Design. 223-236 - Ye Yu

, Niraj K. Jha
:
SPRING: A Sparsity-Aware Reduced-Precision Monolithic 3D CNN Accelerator Architecture for Training and Inference. 237-249 - Eberle A. Rambo

, Bryan Donyanavard, Minjun Seo, Florian Maurer
, Thawra Kadeed
, Caio Batista de Melo
, Biswadip Maity
, Anmol Surhonne, Andreas Herkersdorf
, Fadi J. Kurdahi
, Nikil D. Dutt
, Rolf Ernst
:
The Self-Aware Information Processing Factory Paradigm for Mixed-Critical Multiprocessing. 250-266 - Yuejie Zeng, Kenli Li

, Lin Xiao
, Qing Liao
:
Design and Analysis of a Novel Integral Design Scheme for Finding Finite-Time Solution of Time-Varying Matrix Inequalities. 267-279 - Yasir Saleem

, Pablo Sotres
, Samuel Fricker, Carmen López de la Torre, Noël Crespi, Gyu Myoung Lee
, Roberto Minerva
, Luis Sánchez
:
IoTRec: The IoT Recommender for Smart Parking System. 280-296 - Bo Yin

, Xuetao Wei
:
Efficient Crowdsourced Pareto-Optimal Queries Over Partial Orders With Quality Guarantee. 297-311 - Amir Yeganeh-Khaksar

, Mohsen Ansari
, Alireza Ejlali
:
ReMap: Reliability Management of Peak-Power-Aware Real-Time Embedded Systems Through Task Replication. 312-323 - M. Meraj Ahmed

, Naseef Mansoor, Amlan Ganguly
:
An Asymmetric, One-To-Many Traffic-Aware mm-Wave Wireless Interconnection Architecture for Multichip Systems. 324-338 - Weiqiang Liu

, Tao Xu, Jing Li
, Chenghua Wang, Paolo Montuschi
, Fabrizio Lombardi
:
Design of Unsigned Approximate Hybrid Dividers Based on Restoring Array and Logarithmic Dividers. 339-350 - Nihat Akkan

, Serzat Safaltin
, Levent Aksoy
, Ismail Cevik, Herman Sedef
, Csaba Andras Moritz, Mustafa Altun
:
Technology Development and Modeling of Switching Lattices Using Square and H Shaped Four-Terminal Switches. 351-360 - Kingsley Nketia Acheampong

, Wenhong Tian
:
Advancement of Textual Answer Triggering: Cognitive Boosting. 361-372 - Kuen-Jong Lee

, Ching-An Liu
, Chia-Chi Wu
:
A Dynamic-Key Based Secure Scan Architecture for Manufacturing and In-Field IC Testing. 373-385 - Nithyashankari Gummidipoondi Jayasankaran

, Adriana C. Sanabria-Borbon
, Edgar Sánchez-Sinencio
, Jiang Hu, Jeyavijayan Rajendran
:
Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction. 386-403 - Aibin Yan

, Zhelong Xu, Xiangfeng Feng, Jie Cui
, Zhili Chen
, Tianming Ni
, Zhengfeng Huang
, Patrick Girard
, Xiaoqing Wen
:
Novel Quadruple-Node-Upset-Tolerant Latch Designs With Optimized Overhead for Reliable Computing in Harsh Radiation Environments. 404-413 - Anran Li

, Shuangshuang Xue, Xiang-Yang Li
, Lan Zhang
, Jianwei Qian
:
AppDNA: Profiling App Behavior via Deep-Learning Function Call Graphs. 414-427 - Abdolah Amirany

, Mohammad Hossein Moaiyeri
, Kian Jafari
:
Nonvolatile Associative Memory Design Based on Spintronic Synapses and CNTFET Neurons. 428-437 - Xiao Liu

, Zaiyang Tang, Peng Li
, Song Guo
, Xuepeng Fan, Jinbo Zhang:
A Graph Learning Based Approach for Identity Inference in DApp Platform Blockchain. 438-449 - Geon Kang

, Seung-Chan Kim
:
DeepEcho: Echoacoustic Recognition of Materials Using Returning Echoes With Deep Neural Networks. 450-462 - Guangmo Tong

, Ruiqi Wang:
On Adaptive Influence Maximization Under General Feedback Models. 463-475 - Ali Hoseinghorban

, Mohammad Abbasinia
, Alireza Ejlali
:
PROWL: A Cache Replacement Policy for Consistency Aware Renewable Powered Devices. 476-487 - Mohammad Saeed Ansari

, Bruce F. Cockburn
, Jie Han
:
Low-Power Approximate Logarithmic Squaring Circuit Design for DSP Applications. 500-506 - Haroon Waris

, Chenghua Wang, Weiqiang Liu
, Jie Han
, Fabrizio Lombardi
:
Hybrid Partial Product-Based High-Performance Approximate Recursive Multipliers. 507-513 - Jasmin Kaur

, Mehran Mozaffari Kermani
, Reza Azarderakhsh
:
Hardware Constructions for Lightweight Cryptographic Block Cipher QARMA With Error Detection Mechanisms. 514-519
Volume 10, Number 2, April - June 2022
- Yiannakis Sazeides

, Arkady Bramnik, Ron Gabor, Ramon Canal
:
A Real-Time Error Detection (RTD) Architecture and Its Use for Reliability and Post-Silicon Validation for F/F Based Memory Arrays. 524-536 - Padmaja Bhamidipati

, Avinash Karanth
:
HREN: A Hybrid Reliable and Energy-Efficient Network-on-Chip Architecture. 537-548 - Corrado De Sio

, Sarah Azimi
, Luca Sterpone
:
FireNN: Neural Networks Reliability Evaluation on Hybrid Platforms. 549-563 - Junchao Chen

, Thomas Lange, Marko S. Andjelkovic
, Aleksandar Simevski
, Lu Li
, Milos Krstic
:
Solar Particle Event and Single Event Upset Prediction from SRAM-Based Monitor and Supervised Machine Learning. 564-580 - Lorena Anghel

, Florian Cacho:
Design-Time Exploration for Process, Environment and Aging Compensation Techniques for Low Power Reliable-Aware Design. 581-590 - Zhen Gao

, Jinhua Zhu, Tong Yan Tyan, Anees Ullah
, Pedro Reviriego
:
Fault Tolerant Polyphase Filters-Based Decimators for SRAM-Based FPGA Implementations. 591-601 - Khanh N. Dang

, Nguyen Anh Vu Doan
, Abderazek Ben Abdallah
:
MigSpike: A Migration Based Algorithms and Architecture for Scalable Robust Neuromorphic Systems. 602-617 - Sergi Alcaide

, Leonidas Kosmidis
, Carles Hernández
, Jaume Abella
:
Achieving Diverse Redundancy for GPU Kernels. 618-634 - Alfonso Sánchez-Macián

, Alonso Martín-Toledano
, Jefferson Andres Bravo-Montes
, Francisco Garcia-Herrero
, Juan Antonio Maestro
:
Reducing the Impact of Defects in Quantum-Dot Cellular Automata (QCA) Approximate Adders at Nano Scale. 635-647 - Matteo Biasielli

, Cristiana Bolchini
, Luca Cassano
, Andrea Mazzeo, Antonio Miele
:
Approximation-Based Fault Tolerance in Image Processing Applications. 648-661 - Jianrong Yao

, Lihui Pang
, Yang Su
, Zhi Zhang
, Wei Yang
, Anmin Fu
, Yansong Gao
:
Design and Evaluate Recomposited OR-AND-XOR-PUF. 662-677 - Elzbieta Burek

, Michal Wronski
, Krzysztof Mank
, Michal Misztal
:
Algebraic Attacks on Block Ciphers Using Quantum Annealing. 678-689 - Yunpeng Xiao

, Wen Li, Shuai Qiang, Qian Li
, Hanchun Xiao, Yanbing Liu
:
A Rumor & Anti-Rumor Propagation Model Based on Data Enhancement and Evolutionary Game. 690-703 - Tingyang Wei

, Wei-Li Liu
, Jinghui Zhong
, Yue-Jiao Gong
:
Multiclass Classification on High Dimension and Low Sample Size Data Using Genetic Programming. 704-718 - Jianyuan Sun

, Zidong Wang
, Hui Yu
, Shu Zhang
, Junyu Dong
, Pengxiang Gao:
Two-Stage Deep Regression Enhanced Depth Estimation From a Single RGB Image. 719-727 - Samuele Germiniani

, Alessandro Danese, Graziano Pravadelli
:
Automatic Generation of Assertions for Detection of Firmware Vulnerabilities Through Alignment of Symbolic Sequences. 728-739 - Gor Piliposyan

, Saqib Khursheed
, Daniele Rossi
:
Hardware Trojan Detection on a PCB Through Differential Power Monitoring. 740-751 - Xiaoliang Dai

, Hongxu Yin
, Niraj K. Jha
:
Incremental Learning Using a Grow-and-Prune Paradigm With Efficient Neural Networks. 752-762 - Shubham Rai

, Satwik Patnaik
, Ansh Rupani
, Johann Knechtel
, Ozgur Sinanoglu
, Akash Kumar
:
Security Promises and Vulnerabilities in Emerging Reconfigurable Nanotechnology-Based Circuits. 763-778 - Haozhao Wang

, Zhihao Qu
, Song Guo
, Xin Gao, Ruixuan Li
, Baoliu Ye
:
Intermittent Pulling With Local Compensation for Communication-Efficient Distributed Learning. 779-791 - Ali A. El-Moursy

, Abdollah Masoud Darya
, Ahmed S. Elwakil
, Abhinand Jha, Sohaib Majzoub
:
Chaotic Clock Driven Cryptographic Chip: Towards a DPA Resistant AES Processor. 792-805 - Rajit Karmakar

, Suman Sekhar Jana, Santanu Chattopadhyay
:
A Cellular Automata Guided Finite-State-Machine Watermarking Strategy for IP Protection of Sequential Circuits. 806-823 - Junxiu Liu

, Shunsheng Zhang
, Yuling Luo
, Lvchen Cao:
Machine Learning-Based Similarity Attacks for Chaos-Based Cryptosystems. 824-837 - Dixon Vimalajeewa

, Chamil Kulatunga
, Donagh P. Berry, Sasitharan Balasubramaniam
:
A Service-Based Joint Model Used for Distributed Learning: Application for Smart Agriculture. 838-854 - Mitali Sinha

, Pramit Bhattacharyya
, Sidhartha Sankar Rout
, Neha Bhairavi Prakriya, Sujay Deb
:
Securing an Accelerator-Rich System From Flooding-Based Denial-of-Service Attacks. 855-869 - Tanujay Saha

, Najwa Aaraj
, Neel Ajjarapu
, Niraj K. Jha
:
SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems Based on Machine Learning. 870-885 - Qi Qi

, Yan Lu, Jiashi Li, Jing-Yu Wang
, Haifeng Sun
, Jianxin Liao
:
Learning Low Resource Consumption CNN Through Pruning and Quantization. 886-903 - Min Soo Kim

, Alberto A. Del Barrio
, Hyun Jin Kim
, Nader Bagherzadeh
:
The Effects of Approximate Multiplication on Convolutional Neural Networks. 904-916 - Xiaolin Chai

, Yan Sun
, Hong Luo
, Mohsen Guizani
:
DWES: A Dynamic Weighted Evaluation System for Scratch based on Computational Thinking. 917-932 - Jialu Hao

, Wenjuan Tang
, Cheng Huang, Jian Liu
, Huimei Wang
, Ming Xian:
Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT. 933-947 - Yucen Nan

, Wei Li
, Feng Lu, Chengwen Luo
, Jianqiang Li
, Albert Y. Zomaya
:
Developing Practical Multi-View Learning for Clinical Analytics in P4 Medicine. 948-961 - Wenhan Xia

, Hongxu Yin
, Xiaoliang Dai
, Niraj K. Jha
:
Fully Dynamic Inference With Deep Neural Networks. 962-972 - Ying Liufu

, Long Jin
, Jinqiang Xu, Xiuchun Xiao, Dongyang Fu
:
Reformative Noise-Immune Neural Network for Equality-Constrained Optimization Applied to Image Target Detection. 973-984 - Amin Naghavi

, Sepideh Safari
, Shaahin Hessabi
:
Tolerating Permanent Faults With Low-Energy Overhead in Multicore Mixed-Criticality Systems. 985-996 - Jesús Mayor

, Laura Raya
, Sofia Bayona
, Alberto Sánchez
:
Multi-Technique Redirected Walking Method. 997-1008 - Zhiwei Wang

:
Blockchain-Based Edge Computing Data Storage Protocol Under Simplified Group Signature. 1009-1019 - Akash Yadav

, Joydeep Chandra
, Ashok Singh Sairam
:
A Budget and Deadline Aware Task Assignment Scheme for Crowdsourcing Environment. 1020-1034 - Yufeng Zhan, Jie Zhang

, Zicong Hong
, Leijie Wu, Peng Li
, Song Guo
:
A Survey of Incentive Mechanism Design for Federated Learning. 1035-1044 - Jie Lu

, Naveen Verma, Niraj K. Jha
:
Convolutional Autoencoder-Based Transfer Learning for Multi-Task Image Inferences. 1045-1057 - Jinghui Zhong

, Jiaquan Yang, Yongliang Chen
, Wei-Li Liu
, Liang Feng
:
Mining Implicit Equations From Data Using Gene Expression Programming. 1058-1074 - Fangqing Liu, Han Huang

, Junpeng Su
, Stuart D. Semujju
, Zhongming Yang, Zhifeng Hao:
Manifold-Inspired Search-Based Algorithm for Automated Test Case Generation. 1075-1090 - Yale Wang

, Chenghua Wang, Chongyan Gu
, Yijun Cui
, Máire O'Neill
, Weiqiang Liu
:
A Dynamically Configurable PUF and Dynamic Matching Authentication Protocol. 1091-1104 - Mohammad Ahmadinejad, Mohammad Hossein Moaiyeri

:
Energy- and Quality-Efficient Approximate Multipliers for Neural Network and Image Processing Applications. 1105-1116 - Maged AbdelAty

, Roberto Doriguzzi Corin
, Domenico Siracusa
:
DAICS: A Deep Learning Solution for Anomaly Detection in Industrial Control Systems. 1117-1129 - Tinghui Wang

, Diane J. Cook
:
Multi-Person Activity Recognition in Continuously Monitored Smart Homes. 1130-1141 - Kunpeng Yang

, Hangguan Shan
, Tengxu Sun, Haoji Hu
, Yingxiao Wu, Lu Yu
, Zhaoyang Zhang
, Tony Q. S. Quek
:
Reinforcement Learning-Based Mobile Edge Computing and Transmission Scheduling for Video Surveillance. 1142-1156 - Krzysztof Rzecki

, Mateusz Baran
:
Application of Elastic Shape Analysis to User Authentication and Identification. 1157-1165 - Fahimeh Bahrami

, Behnaz Ranjbar
, Nezam Rohbani, Alireza Ejlali
:
PVMC: Task Mapping and Scheduling Under Process Variation Heterogeneity in Mixed-Criticality Systems. 1166-1177 - Jong Kang Park

, Duckyong Kim
, Jong Tae Kim:
Efficient Error-Resilient Bus Coding Method Using Bit-Basis Orthogonal Integrative Multiplexing. 1178-1191 - Junqi Huang

, Haider A. F. Almurib
, T. Nandha Kumar
, Fabrizio Lombardi
:
An Inexact Newton Method For Unconstrained Total Variation-Based Image Denoising by Approximate Addition. 1192-1207 - Jasmin Kaur

, Ausmita Sarker
, Mehran Mozaffari Kermani
, Reza Azarderakhsh
:
Hardware Constructions for Error Detection in Lightweight Welch-Gong (WG)-Oriented Streamcipher WAGE Benchmarked on FPGA. 1208-1215 - Fabrizio Riente

, Giovanna Turvani
, Marco Vacca
, Mariagrazia Graziano
:
Parallel Computation in the Racetrack Memory. 1216-1221 - Jiafeng Xie

, Pengzhou He
, Xiaofang Wang, José Luis Imaña
:
Efficient Hardware Implementation of Finite Field Arithmetic $AB+C$AB+C for Binary Ring-LWE Based Post-Quantum Cryptography. 1222-1228 - Haroon Waris

, Chenghua Wang, Chenyu Xu, Weiqiang Liu
:
AxRMs: Approximate Recursive Multipliers Using High-Performance Building Blocks. 1229-1235
Volume 10, Number 3, July - September 2022
- Stuart F. Oberman

, Leonel Sousa, Bogdan Pasca
, Alberto Nannarelli:
Guest Editorial: Special Section on Emerging and Impacting Trends on Computer Arithmetic. 1239-1240 - David Mallasén

, Raul Murillo
, Alberto A. Del Barrio
, Guillermo Botella
, Luis Piñuel, Manuel Prieto-Matías
:
PERCIVAL: Open-Source Posit RISC-V Core With Quire Capability. 1241-1252 - Louise Ben Salem-Knapp, Sylvie Boldo

, William Weens
:
Bounding the Round-Off Error of the Upwind Scheme for Advection. 1253-1262 - Fangan-Yssouf Dosso

, Jean-Marc Robert
, Pascal Véron
:
PMNS for Efficient Arithmetic and Small Memory Cost. 1263-1277 - Nicolas Méloni

:
An Alternative Approach to Polynomial Modular Number System Internal Reduction. 1278-1288 - Jean-Claude Bajard, Kazuhide Fukushima, Thomas Plantard

, Arnaud Sipasseuth
:
Generating Very Large RNS Bases. 1289-1301 - John Osorio Ríos

, Adrià Armejach
, Eric Petit, Greg Henry, Marc Casas:
A BF16 FMA is All You Need for DNN Training. 1302-1314 - Efstratios Zacharelos

, Italo Nunziata
, Gerardo Saggese
, Antonio G. M. Strollo
, Ettore Napoli:
Approximate Recursive Multipliers Using Low Power Building Blocks. 1315-1330 - Jacob Brown

, Tanujay Saha
, Niraj K. Jha
:
GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security. 1331-1348 - Krishna Prasad Gnawali

, Spyros Tragoudas:
High-Speed Memristive Ternary Content Addressable Memory. 1349-1360 - Yu-Jun Zheng

, Si-Lan Yu, Qin Song, Yu-Jiao Huang, Wei-Guo Sheng
, Sheng-Yong Chen
:
Co-Evolutionary Fuzzy Deep Transfer Learning for Disaster Relief Demand Forecasting. 1361-1373 - Carmen Delgado

, Jeroen Famaey
:
Optimal Energy-Aware Task Scheduling for Batteryless IoT Devices. 1374-1387 - Hikaru Tsuchida

, Yuichi Kawamoto
, Nei Kato
, Kazuma Kaneko, Shigenori Tani
, Masatake Hangai, Hiroshi Aruga
:
Improvement of Battery Lifetime Based on Communication Resource Control in Low-Earth-Orbit Satellite Constellations. 1388-1398 - Tengfei Song

, Wenming Zheng
, Suyuan Liu, Yuan Zong
, Zhen Cui
, Yang Li
:
Graph-Embedded Convolutional Neural Network for Image-Based EEG Emotion Recognition. 1399-1413 - Tiago Koketsu Rodrigues

, Jiajia Liu
, Nei Kato
:
Offloading Decision for Mobile Multi-Access Edge Computing in a Multi-Tiered 6G Network. 1414-1427 - Sehun Park

, Jae-Joon Kim
, Jaeha Kung
:
AutoRelax: HW-SW Co-Optimization for Efficient SpGEMM Operations With Automated Relaxation in Deep Learning. 1428-1442 - Nimisha Limaye

, Nikhil Rangarajan
, Satwik Patnaik
, Ozgur Sinanoglu, Kanad Basu
:
PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans. 1443-1455 - Norita B. Ahmad

, Phillip A. Laplante
, Joanna F. DeFranco
, Mohamad Kassab
:
A Cybersecurity Educated Community. 1456-1463 - Fazal Hameed

, Asif Ali Khan
, Jerónimo Castrillón
:
ALPHA: A Novel Algorithm-Hardware Co-Design for Accelerating DNA Seed Location Filtering. 1464-1475 - Amar Rasheed

, Rabi N. Mahapatra, Cihan Varol
, Narasimha Karpoor:
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT. 1476-1491 - Shahriar Ebrahimi

, Reza Salkhordeh
, Seyed Ali Osia
, Ali Taheri, Hamid R. Rabiee
, Hossein Asadi
:
RC-RNN: Reconfigurable Cache Architecture for Storage Systems Using Recurrent Neural Networks. 1492-1506 - Nimisha Limaye

, Christian Wachsmann, Mohammed Nabeel, Mohammed Ashraf, Arun K. Kanuparthi, Ozgur Sinanoglu
:
AntiDOTE: Protecting Debug Against Outsourced Test Entities. 1507-1518 - Jing Li

, Dong Hye Ye, Mathias Kolsch, Juan P. Wachs
, Charles A. Bouman
:
Fast and Robust UAV to UAV Detection and Tracking From Video. 1519-1531 - Ching-Hu Lu

, Hao-Chung Ku:
Goal and Elite-Data-Driven Anthropomorphic Learning for Streaming-Image Analytics. 1532-1545 - Antonio Leonel Hernández Martínez, Saqib Khursheed

, Turki Alnuayri
, Daniele Rossi
:
Online Remaining Useful Lifetime Prediction Using Support Vector Regression. 1546-1557 - Dingding Li

, Niyang Zhang, Mianxiong Dong
, Hao Chen
, Kaoru Ota
, Yong Tang:
PM-AIO: An Effective Asynchronous I/O System for Persistent Memory. 1558-1574 - Lilas Alrahis

, Satwik Patnaik
, Muhammad Abdullah Hanif
, Hani H. Saleh, Muhammad Shafique
, Ozgur Sinanoglu
:
GNNUnlock+: A Systematic Methodology for Designing Graph Neural Networks-Based Oracle-Less Unlocking Schemes for Provably Secure Logic Locking. 1575-1592 - Pedro Reviriego

, Shanshan Liu
, Otmar Ertl
, Farzad Niknia, Fabrizio Lombardi
:
Computing the Similarity Estimate Using Approximate Memory. 1593-1604 - Antonio Corradi

, Giuseppe Di Modica
, Luca Foschini
, Lorenzo Patera
, Michele Solimando
:
SIRDAM4.0: A Support Infrastructure for Reliable Data Acquisition and Management in Industry 4.0. 1605-1620 - Anita Aghaie

, Maik Ender
, Amir Moradi
:
PUFs Physical Learning: Accelerating the Enrollment via Delay-Based Model Extraction. 1621-1632 - Takahiro Ohyama

, Yuichi Kawamoto
, Nei Kato
:
Intelligent Reflecting Surface (IRS) Allocation Scheduling Method Using Combinatorial Optimization by Quantum Computing. 1633-1644 - Haoyu Zhao

, Weidong Min
, Jianqiang Xu
, Qing Han
, Wei Li
, Qi Wang
, Ziyuan Yang
, Linghua Zhou
:
SPACE: Finding Key-Speaker in Complex Multi-Person Scenes. 1645-1656 - Maryam S. Hosseini

, Masoumeh Ebrahimi
, Pooria M. Yaghini
, Nader Bagherzadeh
:
Near Volatile and Non-Volatile Memory Processing in 3D Systems. 1657-1664
Volume 10, Number 4, October - December 2022
- Shanshan Liu

, Pedro Reviriego
, Fabrizio Lombardi
, Patrick Girard:
Guest Editorial: Special Section on "To be Safe and Dependable in the Era of Artificial Intelligence: Emerging Techniques for Trusted and Reliable Machine Learning". 1668-1670 - Mohamad Gharib

, Tommaso Zoppi
, Andrea Bondavalli
:
On the Properness of Incorporating Binary Classification Machine Learning Algorithms Into Safety-Critical Systems. 1671-1686 - Tianshun Wang

, Yang Li
, Yuan Wu
, Tony Q. S. Quek
:
Secrecy Driven Federated Learning via Cooperative Jamming: An Approach of Latency Minimization. 1687-1703 - Bo Yang

, Chaofan Ma
, Xiaofang Xia
:
An Interrelated Imitation Learning Method for Heterogeneous Drone Swarm Coordination. 1704-1716 - Roberto Magán-Carrión

, Daniel Urda
, Ignacio Díaz-Cano
, Bernabé Dorronsoro
:
Improving the Reliability of Network Intrusion Detection Systems Through Dataset Integration. 1717-1732 - Qian Xu

, Md Tanvir Arafin
, Gang Qu
:
An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks. 1733-1745 - Yan Jia

, John A. McDermid
, Tom Lawton
, Ibrahim Habli
:
The Role of Explainability in Assuring Safety of Machine Learning in Healthcare. 1746-1760 - Yishi Zhu

, Bomin Mao
, Nei Kato
:
A Dynamic Task Scheduling Strategy for Multi-Access Edge Computing in IRS-Aided Vehicular Networks. 1761-1771 - Hooman Alavizadeh

, Samin Aref
, Dong Seong Kim
, Julian Jang-Jaccard
:
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud. 1772-1788 - Songxiang Yang

, Lin Ma
, Xuezhi Tan:
Weakly Supervised Class-Agnostic Image Similarity Search Based on Convolutional Neural Network. 1789-1798 - Hongxu Yin

, Guoyang Chen, Yingmin Li, Shuai Che, Weifeng Zhang
, Niraj K. Jha
:
Towards Execution-Efficient LSTMs via Hardware-Guided Grow-and-Prune Paradigm. 1799-1809 - Xiaoping Zhou, Zhenlong Liu, Maozu Guo

, Jichao Zhao, Jialin Wang:
SACC: A Size Adaptive Content Caching Algorithm in Fog/Edge Computing Using Deep Reinforcement Learning. 1810-1820 - Mojtaba Tarihi

, Soheil Azadvar
, Arash Tavakkol
, Hossein Asadi
, Hamid Sarbazi-Azad
:
Quick Generation of SSD Performance Models Using Machine Learning. 1821-1836 - Shichao Yu

, Chongyan Gu
, Weiqiang Liu
, Máire O'Neill
:
Deep Learning-Based Hardware Trojan Detection With Block-Based Netlist Information Extraction. 1837-1853 - Yun Wu

, Andreas Aßmann
, Brian Stewart
, Andrew M. Wallace
:
Energy Efficient Approximate 3D Image Reconstruction. 1854-1866 - Lucas Matana Luza

, Annachiara Ruospo
, Daniel Söderström
, Carlo Cazzaniga
, Maria Kastriotou
, Ernesto Sánchez
, Alberto Bosio
, Luigi Dilillo
:
Emulating the Effects of Radiation-Induced Soft-Errors for the Reliability Assessment of Neural Networks. 1867-1882 - Mohsen Ansari

, Sepideh Safari
, Sina Yari-Karin
, Pourya Gohari-Nazari
, Heba Khdr
, Muhammad Shafique
, Jörg Henkel
, Alireza Ejlali
:
Thermal-Aware Standby-Sparing Technique on Heterogeneous Real-Time Embedded Systems. 1883-1897 - Marco Cococcioni

, Federico Rossi
, Emanuele Ruffaldi
, Sergio Saponara
:
A Lightweight Posit Processing Unit for RISC-V Processors in Deep Neural Network Applications. 1898-1908 - Yuichi Kawamoto

, Takuto Mitsuhashi, Nei Kato
:
UAV-Aided Information Diffusion for Vehicle-to-Vehicle (V2V) in Disaster Scenarios. 1909-1917 - Syed Sadaf Ali

, Vivek Singh Baghel
, Iyyakutti Iyappan Ganapathi, Surya Prakash
, Ngoc-Son Vu
, Naoufel Werghi
:
A Novel Technique for Fingerprint Based Secure User Authentication. 1918-1931 - Abdulqader Nael Mahmoud

, Frederic Vanderveken
, Florin Ciubotaru
, Christoph Adelmann
, Said Hamdioui
, Sorin Cotofana
:
Spin Wave Based Approximate Computing. 1932-1940 - Jing Bi

, Haitao Yuan
, Kaiyi Zhang, MengChu Zhou
:
Energy-Minimized Partial Computation Offloading for Delay-Sensitive Applications in Heterogeneous Edge Networks. 1941-1954 - Thomas Plantard

, Arnaud Sipasseuth
, Willy Susilo
, Vincent Zucca
:
Tight Bound on NewHope Failure Probability. 1955-1965 - Chenyan Zhang

, Jing Li
, Jia Wu
, Donghua Liu
, Jun Chang
, Rong Gao:
Deep Recommendation With Adversarial Training. 1966-1978 - Debanjan Sadhya

, Bodhi Chakraborty
:
Quantifying the Effects of Anonymization Techniques Over Micro-Databases. 1979-1992 - Dur-e-Shahwar Kundi

, Yuqing Zhang, Chenghua Wang, Ayesha Khalid
, Máire O'Neill
, Weiqiang Liu
:
Ultra High-Speed Polynomial Multiplications for Lattice-Based Cryptography on FPGAs. 1993-2005 - Tanujay Saha

, Najwa Aaraj
, Niraj K. Jha
:
Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems. 2006-2024 - Aijiao Cui

, Zhen Weng, Hui Zhang, Gang Qu
, Huawei Li
:
SATAM: A SAT Attack Resistant Active Metering Against IC Overbuilding. 2025-2041 - Ruben Tolosana

, Juan-Carlos Ruiz-Garcia
, Rubén Vera-Rodríguez
, Jaime Herreros-Rodriguez
, Sergio Romero-Tapiador, Aythami Morales
, Julian Fiérrez
:
Child-Computer Interaction With Mobile Devices: Recent Works, New Dataset, and Age Detection. 2042-2054 - Zamshed I. Chowdhury

, S. Karen Khatamifard
, Salonik Resch
, M. Hüsrev Cilasun
, Zhengyang Zhao
, Masoud Zabihi
, Meisam Razaviyayn
, Jian-Ping Wang
, Sachin S. Sapatnekar
, Ulya R. Karpuzcu
:
CRAM-Seq: Accelerating RNA-Seq Abundance Quantification Using Computational RAM. 2055-2071 - Avishek Sinha Roy

, Hardik Agrawal, Anindya Sundar Dhar
:
ACBAM-Accuracy-Configurable Sign Inclusive Broken Array Booth Multiplier Design. 2072-2078 - Raul Murillo

, Alberto A. Del Barrio
, Guillermo Botella
, Min Soo Kim
, Hyun Jin Kim
, Nader Bagherzadeh
:
PLAM: A Posit Logarithm-Approximate Multiplier. 2079-2085 - Martin Omaña

, Sejuti Bardhan
, Cecilia Metra
:
Reliability Risks Due to Faults Affecting Selectors of ReRAMs and Possible Solutions. 2086-2091 - Eungeun Yoo

, Haneul Ko
, Sangheon Pack
:
Fuzzy Clustered Federated Learning Algorithm for Solar Power Generation Forecasting. 2092-2098

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














