91 results on '"Ihsen Alouani"'
Search Results
2. Hardware Support for Trustworthy Machine Learning: A Survey.
3. Harnessing ML Privacy by Design Through Crossbar Array Non-Idealities.
4. Jedi: Entropy-Based Localization and Removal of Adversarial Patches.
5. VPP: Privacy Preserving Machine Learning via Undervolting.
6. A Brain-inspired Approach for Malware Detection using Sub-semantic Hardware Features.
7. Exploring Machine Learning Privacy/Utility Trade-Off from a Hyperparameters Lens.
8. Stochastic-HMDs: Adversarial-Resilient Hardware Malware Detectors via Undervolting.
9. Breaking (and Fixing) Channel-based Cryptographic Key Generation: A Machine Learning Approach.
10. ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints.
11. Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems.
12. Defensive approximation: securing CNNs using approximate computing.
13. Lower Voltage for Higher Security: Using Voltage Overscaling to Secure Deep Neural Networks.
14. An Investigation on Inherent Robustness of Posit Data Representation.
15. Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters.
16. LSTM-based System for Multiple Obstacle Detection using Ultra-wide Band Radar.
17. Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability.
18. Deep CNN-based Pedestrian Detection for Intelligent Infrastructure.
19. Cross-layer CNN Approximations for Hardware Implementation.
20. NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips.
21. Facial Expression Recognition Based on DWT Feature for Deep CNN.
22. HEAP: A Heterogeneous Approximate Floating-Point Multiplier for Error Tolerant Applications.
23. MDAD: A Multimodal and Multiview in-Vehicle Driver Action Dataset.
24. A new memory reliability technique for multiple bit upsets mitigation.
25. A Comprehensive Fault Injection Strategy for Embedded Systems Reliability Assessment.
26. A Reliability Study on CNNs for Critical Embedded Systems.
27. Safe Driving : Driver Action Recognition using SURF Keypoints.
28. Adaptive Reliability for Fault Tolerant Multicore Systems.
29. Reconfigurable Hardened Latch and Flip-Flop for FPGAs.
30. Register file reliability enhancement through adjacent narrow-width exploitation.
31. NS-SRAM: Neighborhood Solidarity SRAM for Reliability Enhancement of SRAM Memories.
32. Auto-tuning Fault Tolerance Technique for DSP-Based Circuits in Transportation Systems.
33. Modeling transistor level masking of soft errors in combinational circuits.
34. A multi-objective approach for software/hardware partitioning in a multi-target tracking system.
35. VPP: Privacy Preserving Machine Learning via Undervolting
36. Ternary SRAM circuit designs with CNTFETs
37. ARABICA: A Reconfigurable Arithmetic Block for ISA Customization.
38. Toward a Reliable Estimation of Fluid Concentration Using High Frequency Acoustic Waves: A Machine Learning Approach
39. Enabling User Relaying in MCM-NOMA Under Doubly Selective Channels Using Iterative Interference Cancellation Schemes for Wireless IoT Networks
40. BM-Seg: A new bone metastases segmentation dataset and ensemble of CNN-based segmentation approach
41. Hand gesture recognition with focus on leap motion: An overview, real world challenges and future directions
42. Parity-based mono-Copy Cache for low power consumption and high reliability.
43. Identification of Ultra High Frequency Acoustic Coda Waves Using Deep Neural Networks
44. CNTFET‐based ternary address decoder design
45. Deep learning-based hard spatial attention for driver in-vehicle action monitoring
46. SIT: Stochastic Input Transformation to Defend Against Adversarial Attacks on Deep Neural Networks
47. Entropy-Based Ultra-Wide Band Radar Signals Segmentation for Multi Obstacle Detection
48. Soft Spatial Attention-Based Multimodal Driver Action Recognition Using Deep Learning
49. A novel multi-view pedestrian detection database for collaborative Intelligent Transportation Systems
50. On the Error Rate Performance of Full-Duplex Cooperative NOMA in Wireless Networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.