![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
IEEE Transactions on Computers, Volume 73
Volume 73, Number 1, January 2024
- Avinash Karanth:
Editorial: EiC Farewell and Introduction of new EiC. 1-2 - Dezhong Yao
, Wanning Pan
, Yutong Dai
, Yao Wan
, Xiaofeng Ding
, Chen Yu
, Hai Jin
, Zheng Xu
, Lichao Sun
:
FedGKD: Toward Heterogeneous Federated Learning via Global Knowledge Distillation. 3-17 - Zheng Wei
, Xingjun Zhang
, Zeyu Ji
, Jingbo Li
, Jia Wei
:
Revisit and Benchmarking of Automated Quantization Toward Fair Comparison. 18-29 - Zhaoyan Shen
, Qingxiang Tang
, Tianren Zhou
, Yuhao Zhang
, Zhiping Jia
, Dongxiao Yu
, Zhiyong Zhang
, Bingzhe Li
:
ASHL: An Adaptive Multi-Stage Distributed Deep Learning Training Scheme for Heterogeneous Environments. 30-43 - Mingyu Wu
, Zhe Li
, Haibo Chen
, Binyu Zang
, Shaojun Wang
, Lei Yu
, Sanhong Li
, Haitao Song
:
Toward an SGX-Friendly Java Runtime. 44-57 - Ju Jia
, Siqi Ma
, Lina Wang
, Yang Liu
, Robert H. Deng
:
A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services. 58-72 - Yucheng Zhang
, Hong Jiang
, Chunzhi Wang
, Wei Huang
, Meng Chen
, Yongxuan Zhang
, Le Zhang
:
Applying Delta Compression to Packed Datasets for Efficient Data Reduction. 73-85 - Andrey Kim
, Maxim Deryabin
, Jieun Eom
, Rakyong Choi
, Yongwoo Lee
, Whan Ghang
, Donghoon Yoo
:
General Bootstrapping Approach for RLWE-Based Homomorphic Encryption. 86-96 - Wenbo Guo
, Shuguo Li
:
Split-Radix Based Compact Hardware Architecture for CRYSTALS-Kyber. 97-108 - Chuanwen Luo
, Jian Zhang
, Xiaolu Cheng
, Yi Hong
, Zhibo Chen
, Xiaoshuang Xing
:
Computation Off-Loading in Resource-Constrained Edge Computing Systems Based on Deep Reinforcement Learning. 109-122 - Zhanhui Shi
, Jie Xiao
, Weidong Zhu, Jianhui Jiang
:
A Reliability-Critical Path Identifying Method With Local and Global Adjacency Probability Matrix in Combinational Circuits. 123-137 - Lucas Morais
, Carlos Álvarez
, Daniel Jiménez-González
, Juan Miguel De Haro Ruiz
, Guido Araujo
, Michael Frank
, Alfredo Goldman
, Xavier Martorell
:
Enabling HW-Based Task Scheduling in Large Multicore Architectures. 138-151 - Wenhao Sun
, Zhiwei Zou
, Deng Liu
, Wendi Sun
, Song Chen
, Yi Kang
:
Bit-Balance: Model-Hardware Codesign for Accelerating NNs by Exploiting Bit-Level Sparsity. 152-163 - Yang Zhou
, Fang Wang
, Zhan Shi
, Dan Feng
:
An Efficient Deep Reinforcement Learning-Based Automatic Cache Replacement Policy in Cloud Block Storage Systems. 164-177 - Jiguo Yu
, Biwei Yan
, Huayi Qi
, Shengling Wang
, Wei Cheng
:
An Efficient and Secure Data Sharing Scheme for Edge-Enabled IoT. 178-191 - Jiangjiang Zhang
, Zhenhu Ning
, Muhammad Waqas
, Hisham Alasmary
, Shanshan Tu
, Sheng Chen
:
Hybrid Edge-Cloud Collaborator Resource Scheduling Approach Based on Deep Reinforcement Learning and Multiobjective Optimization. 192-205 - Miao Cai
, Xuzhen Jiang
, Junru Shen
, Baoliu Ye
:
SplitDB: Closing the Performance Gap for LSM-Tree-Based Key-Value Stores. 206-220 - Benjamin R. Willis
, Aviral Shrivastava
, Joshua Mack
, Shail Dave
, Chaitali Chakrabarti
, John S. Brunhaver
:
Cyclebite: Extracting Task Graphs From Unstructured Compute-Programs. 221-234 - Yue Zeng
, Zhihao Qu
, Song Guo
, Baoliu Ye
, Jie Zhang
, Jing Li
, Bin Tang
:
SafeDRL: Dynamic Microservice Provisioning With Reliability and Latency Guarantees in Edge Environments. 235-248 - Myeongjae Jang
, Jinkwon Kim
, Haejin Nam
, Soontae Kim
:
Zero and Narrow-Width Value-Aware Compression for Quantized Convolutional Neural Networks. 249-262 - Thomas Benz
, Michael Rogenmoser
, Paul Scheffler
, Samuel Riedel
, Alessandro Ottaviano
, Andreas Kurth
, Torsten Hoefler
, Luca Benini
:
A High-Performance, Energy-Efficient Modular DMA Engine Architecture. 263-277 - Jin Yang
, Zhenkun Yang
, Jeremy Casas
, Sandip Ray
:
Correct-by-Construction Design of Custom Accelerator Microarchitectures. 278-291 - David M. Harris
, James E. Stine
, Milos D. Ercegovac
, Alberto Nannarelli
, Katherine Parry
, Cedar Turek
:
Unified Digit Selection for Radix-4 Recurrence Division and Square Root. 292-300
Volume 73, Number 2, February 2024
- Hao Jiang
, Jintao Yang
, Guang Hua
, Lixia Li, Ying Wang, Shenghui Tu, Song Xia:
FAWA: Fast Adversarial Watermark Attack. 301-313 - Juzhen Wang
, Yiqi Hu
, Yiren Qi, Ziwen Peng
, Changjia Zhou:
Mitigating Adversarial Attacks Based on Denoising & Reconstruction With Finance Authentication System Case Study. 314-326 - Tianze Zhang
, Xuhong Miao, Yibin Li
, Lei Jia
, Yinghao Zhuang
:
AUV Surfacing Control With Adversarial Attack Against DLaaS Framework. 327-339 - Zhihua Xia
, Qi Gu
, Wenhao Zhou, Lizhi Xiong
, Jian Weng
, Naixue Xiong
:
STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy. 340-352 - Hyeonuk Kim
, Youngbeom Jung
, Lee-Sup Kim
:
ADC-Free ReRAM-Based In-Situ Accelerator for Energy-Efficient Binary Neural Networks. 353-365 - Hongyi Li
, Songchen Ma
, Taoyi Wang
, Weihao Zhang
, Guanrui Wang
, Chenhang Song
, Huanyu Qu
, Junfeng Lin
, Cheng Ma
, Jing Pei
, Rong Zhao
:
HASP: Hierarchical Asynchronous Parallelism for Multi-NN Tasks. 366-379 - Kota Asanuma, Hiroshi Yamada
:
DBMS-Assisted Live Migration of Virtual Machines. 380-393 - Zaobo He
, Zhipeng Cai
:
Trading Aggregate Statistics Over Private Internet of Things Data. 394-407 - Wanqing Jie
, Wangjie Qiu
, Arthur Sandor Voundi Koe
, Jianhong Li, Yin Wang
, Yaqi Wu
, Jin Li
:
A Secure and Flexible Blockchain-Based Offline Payment Protocol. 408-421 - Mingyang Song
, Zhongyun Hua
, Yifeng Zheng
, Hejiao Huang
, Xiaohua Jia
:
LSDedup: Layered Secure Deduplication for Cloud Storage. 422-435 - Rajat Sadhukhan
, Sayandeep Saha
, Sudipta Paria
, Swarup Bhunia
, Debdeep Mukhopadhyay
:
VALIANT: An EDA Flow for Side-Channel Leakage Evaluation and Tailored Protection. 436-450 - Giuliano Casale
, Manuel Roveri
:
Scheduling Inputs in Early Exit Neural Networks. 451-465 - Zichuan Xu
, Lin Wang
, Weifa Liang
, Qiufen Xia
, Wenzheng Xu
, Pan Zhou
, Omer F. Rana
:
Age-Aware Data Selection and Aggregator Placement for Timely Federated Continual Learning in Mobile Edge Computing. 466-480 - Guorui Xie
, Qing Li
, Zhenning Shi
, Hanbin Fang
, Shengpeng Ji
, Yong Jiang
, Zhenhui Yuan
, Lianbo Ma
, Mingwei Xu
:
Generating Neural Networks for Diverse Networking Classification Tasks via Hardware-Aware Neural Architecture Search. 481-494 - Trevor E. Pogue
, Nicola Nicolici
:
Fast Inner-Product Algorithms and Architectures for Deep Neural Network Accelerators. 495-509 - Hai Jin
, Zhanyang Zhu
, Ligang He
, Yuhao Li
, Yusheng Hua
, Xuanhua Shi
:
MMDataLoader: Reusing Preprocessed Data Among Concurrent Model Training Tasks. 510-522 - Yuxing Chen
, Xinrui Wang
, Suwen Song, Lang Feng
, Zhongfeng Wang
:
RISC-V Custom Instructions of Elementary Functions for IoT Endpoint Devices. 523-535 - Abrar A. Ibrahim
, Ahmed M. Y. Ibrahim
, M. Watheq El-Kharashi
, Mona Safar
:
Adaptive SAT Modeling for Optimal Pattern Retargeting in IEEE 1687 Networks. 536-547 - Alberto Ros
, Alexandra Jimborean
:
Wrong-Path-Aware Entangling Instruction Prefetcher. 548-559 - Kari Hepola
, Joonas Multanen
, Pekka Jääskeläinen
:
Energy-Efficient Exposed Datapath Architecture With a RISC-V Instruction Set Mode. 560-573 - Tianyang Yu
, Bi Wu
, Ke Chen
, Gong Zhang
, Weiqiang Liu
:
Fully Learnable Hyperdimensional Computing Framework With Ultratiny Accelerator for Edge-Side Applications. 574-585 - Ruirui Zhang
, Zhenzhen Xie
, Dongxiao Yu
, Weifa Liang
, Xiuzhen Cheng
:
Digital Twin-Assisted Federated Learning Service Provisioning Over Mobile Edge Networks. 586-598 - Rodion Novkin
, Florian Klemme
, Hussam Amrouch
:
Approximation- and Quantization-Aware Training for Graph Neural Networks. 599-612 - Kai Zhang
, Xuejia Lai
, Lei Wang
, Jie Guan
, Bin Hu, Senpeng Wang
, Tairong Shi:
Real-Time Related-Key Attack on Full-Round Shadow Designed for IoT Nodes. 613-620 - Shao-I Chu
, Chi-Long Wu, Tzu-Heng Chien, Bing-Hong Liu
, Tu N. Nguyen
:
Stochastic Circuits for Computing Weighted Ratio With Applications to Multiclass Bayesian Inference Machine. 621-630
Volume 73, Number 3, March 2024
- Laizhong Cui
, Ziteng Chen
, Shu Yang
, Ruiyu Chen, Zhong Ming
:
A Secure and Decentralized DLaaS Platform for Edge Resource Scheduling Against Adversarial Attacks. 631-644 - Han Qiu
, Yi Zeng, Qinkai Zheng
, Shangwei Guo
, Tianwei Zhang
, Hewu Li
:
An Efficient Preprocessing-Based Approach to Mitigate Advanced Adversarial Attacks. 645-655 - Zhihan Lv
, Dongliang Chen, Bin Cao
, Houbing Song
, Haibin Lv
:
Secure Deep Learning in Defense in Deep-Learning-as-a-Service Computing Systems in Digital Twins. 656-668 - Wei Liang
, Yuhui Li, Jianlong Xu
, Zheng Qin
, Dafang Zhang, Kuan-Ching Li
:
QoS Prediction and Adversarial Attack Protection for Distributed Services Under DLaaS. 669-682 - Jun Feng
, Laurence T. Yang
, Bocheng Ren
, Deqing Zou
, Mianxiong Dong
, Shunli Zhang
:
Tensor Recurrent Neural Network With Differential Privacy. 683-693 - Wan-Ling Wu, Jen-Wei Hsieh
, Hao-Yu Ku:
CDS: Coupled Data Storage to Enhance Read Performance of 3D TLC NAND Flash Memory. 694-707 - Kai Tan
, Dongyang Zhan
, Lin Ye
, Hongli Zhang
, Binxing Fang
:
A Practical Adversarial Attack Against Sequence-Based Deep Learning Malware Classifiers. 708-721 - Mengying Zhao
, Shuo Xu
, Lihao Dong
, Chun Jason Xue
, Dongxiao Yu
, Xiaojun Cai
, Zhiping Jia
:
Branch Predictor Design for Energy Harvesting Powered Nonvolatile Processors. 722-734 - Muhammad Hamis Haider
, Hao Zhang
, Seok-Bum Ko
:
Decoder Reduction Approximation Scheme for Booth Multipliers. 735-746 - Chong Zhang
, Songfan Li
, Yihang Song
, Qianhe Meng
, Li Lu
, Hongzi Zhu
, Xin Wang
:
A Lightweight and Chip-Level Reconfigurable Architecture for Next-Generation IoT End Devices. 747-763 - Da Yang
, Zhenglong Cui
, Hao Sheng
, Rongshan Chen
, Ruixuan Cong
, Shuai Wang
, Zhang Xiong
:
An Occlusion and Noise-Aware Stereo Framework Based on Light Field Imaging for Robust Disparity Estimation. 764-777 - Jiahao Shen
, Hao Sheng
, Shuai Wang
, Ruixuan Cong
, Da Yang
, Yang Zhang
:
Blockchain-Based Distributed Multiagent Reinforcement Learning for Collaborative Multiobject Tracking Framework. 778-788 - Dongxiao Yu
, Ruopeng Chen
, Xin Li
, Mengbai Xiao
, Guanghui Zhang
, Yao Liu
:
A GPU-Enabled Real-Time Framework for Compressing and Rendering Volumetric Videos. 789-800 - Ting Wang
, Xin Jiang
, Qin Li
, Haibin Cai
:
GreedW: A Flexible and Efficient Decentralized Framework for Distributed Machine Learning. 801-814 - Hao Wang
, Bo Tang
, Chi Harold Liu
, Shangqin Mao
, Jiahong Zhou
, Zipeng Dai
, Yaqi Sun
, Qianlong Xie
, Xingxing Wang
, Dong Wang
:
HiBid: A Cross-Channel Constrained Bidding System With Budget Allocation by Hierarchical Offline Deep Reinforcement Learning. 815-828 - Francesco Tosoni
, Nicola Dall'Ora
, Enrico Fraccaroli
, Sara Vinco
, Franco Fummi
:
Multidomain Fault Models Covering the Analog Side of a Smart or Cyber-Physical System. 829-841 - Hai Mo
, Yong Wu
, Honglan Jiang
, Zining Ma
, Fabrizio Lombardi
, Jie Han
, Leibo Liu
:
Learning the Error Features of Approximate Multipliers for Neural Network Applications. 842-856 - Junyi Liu
, Aleksandar Dragojevic, Shane T. Fleming, Antonios Katsarakis, Dario Korolija, Igor Zablotchi, Ho-Cheung Ng
, Anuj Kalia, Miguel Castro:
Honeycomb: Ordered Key-Value Store Acceleration on an FPGA-Based SmartNIC. 857-871 - Yingling Mao
, Xiaojun Shang
, Yu Liu
, Yuanyuan Yang
:
Joint Virtual Network Function Placement and Flow Routing in Edge-Cloud Continuum. 872-886 - Yingxue Gao
, Teng Wang
, Lei Gong
, Chao Wang
, Yiqing Hu, Yi Yang, Zhongming Liu, Xi Li, Xuehai Zhou
:
Enhancing Graph Random Walk Acceleration via Efficient Dataflow and Hybrid Memory Architecture. 887-901 - Yudi Qiu
, Tao Huang
, Yuxin Tang
, Yanwei Liu
, Yang Kong
, Xulin Yu
, Xiaoyang Zeng
, Yibo Fan
:
Gem5Tune: A Parameter Auto-Tuning Framework for Gem5 Simulator to Reduce Errors. 902-914 - Jianfeng Xu
:
Research and Application of General Information Measures Based on a Unified Model. 915-927 - Chen Zhang
, Qingyuan Xie
, Mingyue Wang
, Yu Guo
, Xiaohua Jia
:
Optimal Compression for Encrypted Key-Value Store in Cloud Systems. 928-941 - Liyuan Ma
, Xiulong Liu
, Yuhan Li
, Chenyu Zhang
, Gaowei Shi
, Keqiu Li
:
GFBE: A Generalized and Fine-Grained Blockchain Evaluation Framework. 942-955
Volume 73, Number 4, April 2024
- Guangquan Xu
, Guohua Xin
, Litao Jiao, Jian Liu
, Shaoying Liu
, Meiqi Feng, Xi Zheng
:
OFEI: A Semi-Black-Box Android Adversarial Sample Attack Framework Against DLaaS. 956-969 - Ying Zhao
, Jinjun Chen
:
Vector-Indistinguishability: Location Dependency Based Privacy Protection for Successive Location Data. 970-979 - Fangtian Zhong
, Xiuzhen Cheng
, Dongxiao Yu
, Bei Gong
, Shuaiwen Song, Jiguo Yu
:
MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors. 980-993 - Hexuan Hu, Zhen-Zhou Lin, Qiang Hu, Ye Zhang
, Wei Wei
, Wei Wang
:
Multi-Source Information Fusion Based DLaaS for Traffic Flow Prediction. 994-1003 - Yangguang Cui
, Zhixing Zhang
, Nuo Wang
, Liying Li
, Chunwei Chang
, Tongquan Wei
:
User-Distribution-Aware Federated Learning for Efficient Communication and Fast Inference. 1004-1018 - Wei Song
, Zihan Xue
, Jinchi Han
, Zhenzhen Li
, Peng Liu
:
Randomizing Set-Associative Caches Against Conflict-Based Cache Side-Channel Attacks. 1019-1033 - Binqi Sun
, Mirco Theile
, Ziyuan Qin
, Daniele Bernardini
, Debayan Roy, Andrea Bastoni
, Marco Caccamo
:
Edge Generation Scheduling for DAG Tasks Using Deep Reinforcement Learning. 1034-1047 - Jianqi Shi
, Yinghao Chen
, Qin Li
, Yanhong Huang
, Yang Yang
, Mengyan Zhao
:
Automated Test Cases Generator for IEC 61131-3 Structured Text Based Dynamic Symbolic Execution. 1048-1059 - Yuan Yuan
, Shuzhen Chen
, Dongxiao Yu
, Zengrui Zhao
, Yifei Zou
, Lizhen Cui
, Xiuzhen Cheng
:
Distributed Learning for Large-Scale Models at Edge With Privacy Protection. 1060-1070 - Zhaorui Wu
, Yuhui Deng
, Yi Zhou
, Jie Li
, Shujie Pang
, Xiao Qin
:
FaaSBatch: Boosting Serverless Efficiency With In-Container Parallelism and Resource Multiplexing. 1071-1085 - Biwei Yan
, Hongliang Zhang
, Minghui Xu
, Dongxiao Yu
, Xiuzhen Cheng
:
FedRFQ: Prototype-Based Federated Learning With Reduced Redundancy, Minimal Failure, and Enhanced Quality. 1086-1098 - Xin Niu
, Yajing Huang
, Zhiwei Wang
, Chen Yu
, Hai Jin
:
Game-Based Adaptive FLOPs and Partition Point Decision Mechanism With Latency and Energy-Efficient Tradeoff for Edge Intelligence. 1099-1113 - Shiyu Li
, Yuan Zhang
, Yaqing Song
, Nan Cheng
, Kan Yang
, Hongwei Li
:
Blockchain-Based Portable Authenticated Data Transmission for Mobile Edge Computing: A Universally Composable Secure Solution. 1114-1125 - Wenjie Huang
, Zhiwei Zhao
, Geyong Min
, Jiajun Chen:
Distributed Multihop Task Offloading in Massive Heterogeneous IoT Systems. 1126-1137 - Yanling Wang
, Xiaolin Chang
, Haoran Zhu
, Jianhua Wang
, Yanwei Gong
, Lin Li
:
Towards Secure Runtime Customizable Trusted Execution Environment on FPGA-SoC. 1138-1151 - Yifei Zou
, Shikun Shen
, Mengbai Xiao
, Peng Li
, Dongxiao Yu
, Xiuzhen Cheng
:
Value of Information: A Comprehensive Metric for Client Selection in Federated Edge Learning. 1152-1164 - Zhiyong Lin, Hai Liu
, Xiaowen Chu
, Yiu-Wing Leung
, Ivan Stojmenovic:
Constructing Connected-Dominating-Set with Maximum Lifetime in Cognitive Radio Networks. 1165-1179 - Irina Alam
, Puneet Gupta
:
Achieving DRAM-Like PCM by Trading Off Capacity for Latency. 1180-1189
Volume 73, Number 5, May 2024
- Jianting Zhang
, Wuhui Chen
, Zicong Hong
, Gang Xiao, Linlin Du, Zibin Zheng
:
Efficient Execution of Arbitrarily Complex Cross-Shard Contracts for Blockchain Sharding. 1190-1205 - Zülal Bingöl
, Mohammed Alser
, Onur Mutlu
, Ozcan Ozturk
, Can Alkan
:
GateKeeper-GPU: Fast and Accurate Pre-Alignment Filtering in Short Read Mapping. 1206-1218 - Jie-Fang Zhang
, Cheng-Hsun Lu
, Zhengya Zhang
:
TetriX: Flexible Architecture and Optimal Mapping for Tensorized Neural Network Processing. 1219-1232 - Chao Chen
, Jinhan Xin
, Zhibin Yu
:
TIE: Fast Experiment-Driven ML-Based Configuration Tuning for In-Memory Data Analytics. 1233-1247 - Shiyu Li
, Yitu Wang
, Edward Hanson
, Andrew Chang, Yang-Seok Ki, Hai Li
, Yiran Chen
:
NDRec: A Near-Data Processing System for Training Large-Scale Recommendation Models. 1248-1261 - Yueyao Wang
, Samuel Furman, Nicolás Hardy, Margaret Ellis
, Godmar Back, Yili Hong
, Kirk W. Cameron
:
A Detailed Historical and Statistical Analysis of the Influence of Hardware Artifacts on SPEC Integer Benchmark Performance. 1262-1274 - Cong Guo
, Fengchen Xue
, Jingwen Leng
, Yuxian Qiu
, Yue Guan
, Weihao Cui
, Quan Chen
, Minyi Guo
:
Accelerating Sparse DNNs Based on Tiled GEMM. 1275-1289 - Lin Ding
, Zhengting Li
, Ziyu Guan
, Xinhai Wang
, Zheng Wu
:
Breaking the DECT Standard Cipher With Lower Time Cost. 1290-1299 - Hechuan Guo
, Minghui Xu
, Jiahao Zhang
, Chunchi Liu
, Rajiv Ranjan
, Dongxiao Yu
, Xiuzhen Cheng
:
BFT-DSN: A Byzantine Fault-Tolerant Decentralized Storage Network. 1300-1312 - Yucong Chen
, Yanshan Tian
, Rui Zhou, Diego Martínez-Castro
, Deke Guo
, Qingguo Zhou
:
NDSTRNG: Non-Deterministic Sampling-Based True Random Number Generator on SoC FPGA Systems. 1313-1326 - Haikun Liu
, Xiaozhong Jin
, Chencheng Ye
, Xiaofei Liao
, Hai Jin
, Yu Zhang
:
I/O Causality Based In-Line Data Deduplication for Non-Volatile Memory Enabled Storage Systems. 1327-1340 - Pouya Esmaili-Dokht
, Miquel Guiot
, Petar Radojkovic
, Xavier Martorell
, Eduard Ayguadé
, Jesús Labarta
, Jason Adlard
, Paolo Amato
, Marco Sforzin
:
$\mathcal{O}(n)$O(n) Key-Value Sort With Active Compute Memory. 1341-1356 - Fuliang Li
, Songlin Chen, Xingxin Jia, Chengxi Gao
, Pengfei Wang
, Xingwei Wang
, Jiannong Cao
:
Distributed Program Deployment for Resource-Aware Programmable Switches. 1357-1370 - Shihang Wang
, Xingbo Wang
, Zhiyuan Xu
, Bingzhen Chen
, Chenxi Feng
, Qi Wang
, Terry Tao Ye
:
Optimizing CNN Computation Using RISC-V Custom Instruction Sets for Edge Platforms. 1371-1384 - Cai Deng
, Xiangyu Zou
, Qi Chen
, Bo Tang
, Wen Xia
:
The Design of a Lossless Deduplication Scheme to Eliminate Fine-Grained Redundancy for JPEG Image Storage Systems. 1385-1399 - Lianbo Ma
, Haidong Kang
, Guo Yu
, Qing Li
, Qiang He
:
Single-Domain Generalized Predictor for Neural Architecture Search System. 1400-1413 - Philippos Papaphilippou
, Thiem Van Chu
:
Efficient Deadlock Avoidance for 2-D Mesh NoCs That Use OQ or VOQ Routers. 1414-1426
Volume 73, Number 6, June 2024
- Xiaoyu Zhang
, Zerun Li
, Rui Liu
, Xiaoming Chen
, Yinhe Han
:
GAS: General-Purpose In-Memory-Computing Accelerator for Sparse Matrix Multiplication. 1427-1441 - Keisuke Sugiura
, Hiroki Matsutani
:
An Integrated FPGA Accelerator for Deep Learning-Based 2D/3D Path Planning. 1442-1456 - Luyi Li
, Jiayi Huang
, Lang Feng
, Zhongfeng Wang
:
Prefender: A Prefetching Defender Against Cache Side Channel Attacks as a Pretender. 1457-1471 - David Mallasén
, Alberto A. Del Barrio
, Manuel Prieto-Matías
:
Big-PERCIVAL: Exploring the Native Use of 64-Bit Posit Arithmetic in Scientific Computing. 1472-1485 - Yu Liu
, Qi Luo
, Mengbai Xiao
, Dongxiao Yu
, Huashan Chen
, Xiuzhen Cheng
:
Reordering and Compression for Hypergraph Processing. 1486-1499 - Wei Gao
, Zhisheng Ye
, Peng Sun
, Tianwei Zhang
, Yonggang Wen
:
UniSched: A Unified Scheduler for Deep Learning Training Jobs With Different User Demands. 1500-1515 - YongGang Li, Yu Bao, Yeh-Ching Chung
:
Randomize the Running Function When It Is Disclosed. 1516-1530 - Mantas Mikaitis
:
Monotonicity of Multi-term Floating-Point Adders. 1531-1543 - Chunshu Wu
, Chen Yang
, Sahan Bandara
, Tong Geng
, Anqi Guo
, Pouya Haghi
, Ang Li
, Martin C. Herbordt
:
FPGA-Accelerated Range-Limited Molecular Dynamics. 1544-1558 - Ruixuan Wang
, Sabrina Hassan Moon
, Xiaobo Sharon Hu
, Xun Jiao
, Dayane Reis
:
A Computing-in-Memory-Based One-Class Hyperdimensional Computing Model for Outlier Detection. 1559-1574 - Bihui Liu
, Zhenyu Ye
, Qiao Hu
, Yupeng Hu
, Yuchong Hu
, Yang Xu
, Keqin Li
:
HPDK: A Hybrid PM-DRAM Key-Value Store for High I/O Throughput. 1575-1587 - Lulu Yao
, Yongkun Li
, Patrick P. C. Lee
, Xiaoyang Wang
, Yinlong Xu
:
AdaptMD: Balancing Space and Performance in NUMA Architectures With Adaptive Memory Deduplication. 1588-1602 - Hongcai Lin
, Lei Yang
, Hao Guo
, Jiannong Cao
:
Decentralized Task Offloading in Edge Computing: An Offline-to-Online Reinforcement Learning Approach. 1603-1615 - Qinglong Zhang
, Rui Han
, Chi Harold Liu
, Guoren Wang
, Lydia Y. Chen
:
ElasticDNN: On-Device Neural Network Remodeling for Adapting Evolving Vision Domains at Edge. 1616-1630 - Sandip Kumar Mondal
, Prakash Dey
, Himadry Sekhar Roy
, Avishek Adhikari
, Subhamoy Maitra
:
Improved Fault Analysis on Subterranean 2.0. 1631-1639
Volume 73, Number 7, July 2024
- Zongpu Zhang
, Chenbo Xia
, Cunming Liang
, Jian Li
, Chen Yu, Tiwei Bie
, Roberts Martin
, Dan Daly
, Xiao Wang
, Yong Liu
, Haibing Guan
:
Un-IOV: Achieving Bare-Metal Level I/O Virtualization Performance for Cloud Usage With Migratability, Scalability and Transparency. 1655-1668 - Chunpei Li
, Wangjie Qiu
, Xianxian Li
, Chen Liu
, Zhiming Zheng:
A Dynamic Adaptive Framework for Practical Byzantine Fault Tolerance Consensus Protocol in the Internet of Things. 1669-1682 - Eric Guthmuller
, César Fuguet
, Andrea Bocco
, Jérôme Fereyre
, Riccardo Alidori
, Ihsane Tahir
, Yves Durand
:
Xvpfloat: RISC-V ISA Extension for Variable Extended Precision Floating Point Computation. 1683-1697 - Zhuo Huang, Qi Zhang, Hao Fan
, Song Wu
, Chen Yu, Hai Jin
, Jun Deng, Jing Gu, Zhimin Tang:
Multi-Grained Trace Collection, Analysis, and Management of Diverse Container Images. 1698-1710 - Hang Huang
, Honglei Wang
, Jia Rao
, Song Wu
, Hao Fan
, Chen Yu, Hai Jin
, Kun Suo
, Lisong Pan
:
vKernel: Enhancing Container Isolation via Private Code and Data. 1711-1723 - Qinyun Cai
, Guanghua Tan
, Wangdong Yang
, Xianhao He
, Yuwei Yan
, Keqin Li
, Kenli Li
:
COALA: A Compiler-Assisted Adaptive Library Routines Allocation Framework for Heterogeneous Systems. 1724-1737 - Hui Sun
, Haoqiang Tong
, Yinliang Yue
, Xiao Qin
:
LAC: A Workload Intensity-Aware Caching Scheme for High-Performance SSDs. 1738-1752 - Michael Garrett Bechtel, Heechul Yun
:
Analysis and Mitigation of Shared Resource Contention on Heterogeneous Multicore: An Industrial Case Study. 1753-1766 - Marco Angioli
, Marcello Barbirotta
, Abdallah Cheikh
, Antonio Mastrandrea
, Francesco Menichelli
, Saeid Jamili
, Mauro Olivieri
:
Design, Implementation and Evaluation of a New Variable Latency Integer Division Scheme. 1767-1779 - Xinquan Cai
, Qianlong Sang
, Chuang Hu
, Yili Gong
, Kun Suo
, Xiaobo Zhou
, Dazhao Cheng
:
Incendio: Priority-Based Scheduling for Alleviating Cold Start in Serverless Computing. 1780-1794 - Ron M. Roth
:
Error-Detection Schemes for Analog Content-Addressable Memories. 1795-1808 - Jiaxing Qi
, Zhongzhi Luan
, Shaohan Huang
, Carol J. Fung
, Hailong Yang
:
LogSay: An Efficient Comprehension System for Log Numerical Reasoning. 1809-1821 - Matteo Perotti
, Matheus A. Cavalcante
, Renzo Andri
, Lukas Cavigelli
, Luca Benini
:
Ara2: Exploring Single- and Multi-Core Vector Processing With an Efficient RVV 1.0 Compliant Open-Source Processor. 1822-1836 - Jing Li
, Song Guo
, Weifa Liang
, Jianping Wang
, Quan Chen
, Wenchao Xu
, Kang Wei
, Xiaohua Jia
:
Mobility-Aware Utility Maximization in Digital Twin-Enabled Serverless Edge Computing. 1837-1851 - Hulin Wang
, Donglin Yang
, Yaqi Xia
, Zheng Zhang
, Qigang Wang
, Jianping Fan
, Xiaobo Zhou
, Dazhao Cheng
:
Raptor-T: A Fused and Memory-Efficient Sparse Transformer for Long and Variable-Length Sequences. 1852-1865 - Zhang Jiang
, Xianduo Li
, Tianxiang Peng
, Haoran Li
, Jingxuan Hong
, Jin Zhang
, Xiaoli Gong
:
Hybrid-Memcached: A Novel Approach for Memcached Persistence Optimization With Hybrid Memory. 1866-1874 - Leilei Yu
, Yunghsiang S. Han
:
Construction of Reed-Solomon Erasure Codes With Four Parities Based on Systematic Vandermonde Matrices. 1875-1882
Volume 73, Number 8, August 2024
- Abhijit Das
, Enrico Russo
, Maurizio Palesi
:
Multi-Objective Hardware-Mapping Co-Optimisation for Multi-DNN Workloads on Chiplet-Based Accelerators. 1883-1898 - Fuyu Wang
, Minghua Shen
, Yutong Lu
, Nong Xiao
:
TensorMap: A Deep RL-Based Tensor Mapping Framework for Spatial Accelerators. 1899-1912 - Furkan Koltuk
, Ece Güran Schmidt
:
Uniformity and Independence of H3 Hash Functions for Bloom Filters. 1913-1923 - Wenjie Li
, Aokun Hu
, Ningyi Xu, Guanghui He
:
CoDA: A Co-Design Framework for Versatile and Efficient Attention Accelerators. 1924-1938 - Ronglong Wu
, Zhirong Shen
, Jianqiang Chen
, Chengshuo Zheng
, Zhiwei Yang
, Jiwu Shu
:
Relieving Write Disturbance for Phase Change Memory With RESET-Aware Data Encoding. 1939-1952 - Jing Wang
, Jinbin Zhu
, Xin Fu
, Di Zang, Keyao Li, Weigong Zhang
:
Enhancing Neural Network Reliability: Insights From Hardware/Software Collaboration With Neuron Vulnerability Quantization. 1953-1966 - Yunfei Gu
, Linhui Liu
, Chentao Wu
, Jie Li
, Minyi Guo
:
Ada-WL: An Adaptive Wear-Leveling Aware Data Migration Approach for Flexible SSD Array Scaling in Clusters. 1967-1982 - Weiwei Jia
, Jiyuan Zhang
, Jianchen Shan
, Xiaoning Ding
:
Effective Huge Page Strategies for TLB Miss Reduction in Nested Virtualization. 1983-1996 - Meng Han
, Liang Wang
, Limin Xiao
, Tianhao Cai
, Zeyu Wang
, Xiangrong Xu
, Chenhao Zhang
:
ReDas: A Lightweight Architecture for Supporting Fine-Grained Reshaping and Multiple Dataflows on Systolic Array. 1997-2011 - Qingyang Zhang
, Chang Xu
, Hong Zhong
, Chengjie Gu
, Jie Cui
:
Revocable and Efficient Blockchain-Based Fine-Grained Access Control Against EDoS Attacks in Cloud Storage. 2012-2024 - Yun Wang
, Qiang Liu
:
AQA: An Adaptive Post-Training Quantization Method for Activations of CNNs. 2025-2035 - Yongjin Jeon
, Seungjun Baek
, Jongsung Kim
:
Toward Finding S-Box Circuits With Optimal Multiplicative Complexity. 2036-2050 - Haotian Deng
, Jinwen Liang
, Chuan Zhang
, Ximeng Liu
, Liehuang Zhu
, Song Guo
:
FutureDID: A Fully Decentralized Identity System With Multi-Party Verification. 2051-2065 - Hui Sun
, Chen Sun
, Haoqiang Tong
, Yinliang Yue
, Xiao Qin
:
A Machine Learning-Empowered Cache Management Scheme for High-Performance SSDs. 2066-2080 - Yunkun Liao
, Jingya Wu
, Wenyan Lu, Xiaowei Li
, Guihai Yan
:
DPU-Direct: Unleashing Remote Accelerators via Enhanced RDMA for Disaggregated Datacenters. 2081-2095 - Honghong Zeng
, Jie Li
, Jiong Lou
, Shijing Yuan
, Chentao Wu
, Wei Zhao
, Sijin Wu
, Zhiwen Wang
:
BSR-FL: An Efficient Byzantine-Robust Privacy-Preserving Federated Learning Framework. 2096-2110 - Mohammadreza Rasolroveicy
, Wejdene Haouari
, Marios Fokaefs
:
BlockCompass: A Benchmarking Platform for Blockchain Performance. 2111-2122
Volume 73, Number 9, September 2024
- Thai-Hoang Nguyen
, Muhammad Imran
, Jaehyuk Choi
, Joon-Sung Yang
:
HYDRA: A Hybrid Resistance Drift Resilient Architecture for Phase Change Memory-Based Neural Network Accelerators. 2123-2135 - Yun-Chen Lo
, Jun-Shen Wu
, Chia-Chun Wang
, Yu-Chih Tsai
, Chih-Chen Yeh
, Wen-Chien Ting
, Ren-Shuo Liu
:
ISSA: Architecting CNN Accelerators Using Input-Skippable, Set-Associative Computing-in-Memory. 2136-2149 - Yuxuan Chen
, Zhen Zhang
, Yuhui Deng
, Geyong Min
, Lin Cui
:
A Combined Trend Virtual Machine Consolidation Strategy for Cloud Data Centers. 2150-2164 - Pedro Reviriego
, Miguel González
, Niv Dayan
, Gabriel Huecas
, Shanshan Liu
, Fabrizio Lombardi
:
On the Security of Quotient Filters: Attacks and Potential Countermeasures. 2165-2177 - Dengcheng Hu
, Jianrong Wang
, Xiulong Liu
, Qi Li
, Keqiu Li
:
LMChain: An Efficient Load-Migratable Beacon-Based Sharding Blockchain System. 2178-2191 - Alireza Khataei
, Gaurav Singh
, Kia Bazargan
:
SimBU: Self-Similarity-Based Hybrid Binary-Unary Computing for Nonlinear Functions. 2192-2205 - Qianmei Wu
, Fan Zhang
, Shize Guo
, Kun Yang
, Haoting Shen
:
A Unified and Fully Automated Framework for Wavelet-Based Attacks on Random Delay. 2206-2219 - Liang Zhang
, Hongzi Zhu
, Wen Fei
, Yunzhe Li
, Mingjin Zhang
, Jiannong Cao
, Minyi Guo
:
Novas: Tackling Online Dynamic Video Analytics With Service Adaptation at Mobile Edge Servers. 2220-2232 - Jiaye Li
, Yangding Li
, Jiagang Song
, Jian Zhang
, Shichao Zhang
:
Quantum Support Vector Machine for Classifying Noisy Data. 2233-2247 - Myeonggu Kang
, Junyoung Park
, Hyein Shin
, Jaekang Shin
, Lee-Sup Kim
:
ToEx: Accelerating Generation Stage of Transformer-Based Language Models via Token-Adaptive Early Exit. 2248-2261 - Qilin Hu
, Yan Ding
, Chubo Liu
, Keqin Li
, Kenli Li
, Albert Y. Zomaya
:
CBANA: A Lightweight, Efficient, and Flexible Cache Behavior Analysis Framework. 2262-2274 - Lois Orosa
, Skanda Koppula
, Yaman Umuroglu
, Konstantinos Kanellopoulos
, Juan Gómez-Luna
, Michaela Blott
, Kees A. Vissers
, Onur Mutlu
:
EcoFlow: Efficient Convolutional Dataflows on Low-Power Neural Network Accelerators. 2275-2289 - Bo Ding
, Wei Tong
, Yu Hua
, Zhangyu Chen
, Xueliang Wei
, Dan Feng
:
Enabling Reliable Memory-Mapped I/O With Auto-Snapshot for Persistent Memory Systems. 2290-2304 - Weibei Fan
, Fu Xiao
, Mengjie Lv
, Lei Han
, Shui Yu
:
Efficient Fault-Tolerant Path Embedding for 3D Torus Network Using Locally Faulty Blocks. 2305-2319 - Fangxin Liu
, Wenbo Zhao
, Zongwu Wang
, Yongbiao Chen
, Xiaoyao Liang
, Li Jiang
:
ERA-BS: Boosting the Efficiency of ReRAM-Based PIM Accelerator With Fine-Grained Bit-Level Sparsity. 2320-2334 - Charles Gouert
, Dimitris Mouris
, Nektarios Georgios Tsoutsos
:
Juliet: A Configurable Processor for Computing on Encrypted Data. 2335-2349 - Lingxin Jin
, Wei Jiang
, Jinyu Zhan
, Xiangyu Wen
:
Highly Evasive Targeted Bit-Trojan on Deep Neural Networks. 2350-2363
Volume 73, Number 10, October 2024
- Wei Cheng
, Jingdian Ming
, Sylvain Guilley
, Jean-Luc Danger
:
Statistical Higher-Order Correlation Attacks Against Code-Based Masking. 2364-2377 - Chen Nie
, Chenyu Tang
, Jie Lin
, Huan Hu
, Chenyang Lv
, Ting Cao
, Weifeng Zhang
, Li Jiang
, Xiaoyao Liang
, Weikang Qian
, Yanan Sun
, Zhezhi He
:
VSPIM: SRAM Processing-in-Memory DNN Acceleration via Vector-Scalar Operations. 2378-2390 - Sungmin Yun
, Hwayong Nam
, Jaehyun Park
, Byeongho Kim
, Jung Ho Ahn
, Eojin Lee
:
GraNDe: Efficient Near-Data Processing Architecture for Graph Neural Networks. 2391-2404 - Haiyan Zhang
, Xinghua Li
, Jiawei Tang
, Chunlei Peng
, Yunwei Wang
, Ning Zhang
, Yinbin Miao
, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Hiding in Plain Sight: Adversarial Attack via Style Transfer on Image Borders. 2405-2419 - Junfeng Lin
, Huanyu Qu
, Songchen Ma
, Xinglong Ji
, Hongyi Li
, Xiaochuan Li
, Chenhang Song
, Weihao Zhang
:
SongC: A Compiler for Hybrid Near-Memory and In-Memory Many-Core Architecture. 2420-2433 - Chao Su
, Xiaoshuang Xing
, Xiaolu Cheng
, Rui Guo
, Chuanwen Luo
:
LPAH: Illustrating Efficient Live Patching With Alignment Holes in Kernel Data. 2434-2448 - Jonathan Takeshita
, Dayane Reis
, Ting Gong, Michael T. Niemier
, Xiaobo Sharon Hu
, Taeho Jung
:
Accelerating Finite-Field and Torus Fully Homomorphic Encryption via Compute-Enabled (S)RAM. 2449-2462 - Itay Merlin
, Esteban Garzón
, Alexander Fish
, Leonid Yavits
:
DIPER: Detection and Identification of Pathogens Using Edit Distance-Tolerant Resistive CAM. 2463-2473
Volume 73, Number 12, December 2024
- Jiesong Liu
, Feng Zhang
, Jiawei Guan
, Hsin-Hsuan Sung
, Xiaoguang Guo
, Saiqin Long
, Xiaoyong Du
, Xipeng Shen
:
Enabling Efficient Deep Learning on MCU With Transient Redundancy Elimination. 2649-2663 - Zhe Pan
, Xu Li
, Shuibing He
, Xuechen Zhang
, Rui Wang
, Yunjun Gao
, Gang Chen
, Xian-He Sun
:
AMBEA: Aggressive Maximal Biclique Enumeration in Large Bipartite Graph Computing. 2664-2677 - Luca Valente
, Francesco Restuccia
, Davide Rossi
, Ryan Kastner
, Luca Benini
:
TOP: Towards Open & Predictable Heterogeneous SoCs. 2678-2692 - Ao Zhou
, Jianlei Yang
, Yingjie Qi, Tong Qiao
, Yumeng Shi
, Cenlin Duan
, Weisheng Zhao
, Chunming Hu
:
HGNAS: Hardware-Aware Graph Neural Architecture Search for Edge Devices. 2693-2707 - Mingeon Park, Seokjin Hwang, Hyungmin Cho
:
BiRD: Bi-Directional Input Reuse Dataflow for Enhancing Depthwise Convolution Performance on Systolic Arrays. 2708-2721 - Wende Tan
, Chenyang Li
, Yangyu Chen
, Yuan Li
, Chao Zhang
, Jianping Wu:
ROLoad-PMP: Securing Sensitive Operations for Kernels and Bare-Metal Firmware. 2722-2733 - Lalit Bandil
, Bal Chand Nagar
:
Hardware Implementation of Unsigned Approximate Hybrid Square Rooters for Error-Resilient Applications. 2734-2746 - Zhenzheng Li
, Jiong Lou
, Jianfei Wu
, Jianxiong Guo
, Zhiqing Tang
, Ping Shen
, Weijia Jia
, Wei Zhao
:
Online Container Scheduling With Fast Function Startup and Low Memory Cost in Edge Computing. 2747-2760 - Mohammad Eslami
, Tara Ghasempouri
, Samuel Pagliarini
:
SCARF: Securing Chips With a Robust Framework Against Fabrication-Time Hardware Trojans. 2761-2775 - Yuhan Zhang
, Wenling Wu
, Lei Zhang
, Yafei Zheng
:
Single-Key Attack on Full-Round Shadow Designed for IoT Nodes. 2776-2790 - Yongkui Yang
, Zhenyan Lu
, Jingwei Zeng, Xingguo Liu, Xuehai Qian, Zhibin Yu
:
Falic: An FPGA-Based Multi-Scalar Multiplication Accelerator for Zero-Knowledge Proof. 2791-2804 - Letian Huang
, Tianjin Zhao
, Ziren Wang
, Junkai Zhan
, Junshi Wang
, Xiaohang Wang
:
Component Dependencies Based Network-on-Chip Test. 2805-2816 - Shiyu Shen
, Hao Yang
, Wangchen Dai
, Lu Zhou
, Zhe Liu
, Yunlei Zhao
:
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants. 2817-2829 - Divya Praneetha Ravipati
, Ramanuj Goel
, Victor M. van Santen
, Hussam Amrouch
, Preeti Ranjan Panda
:
CAPE: Criticality-Aware Performance and Energy Optimization Policy for NCFET-Based Caches. 2830-2843 - Yongsheng Chen
, Zhuowei Wang
, Xiaoyu Song
, Zhe Yan
, Lianglun Cheng
:
Deep Learning Acceleration Optimization of Stress Boundary Value Problem Solvers. 2844-2854 - Kui Ye
, Shengxin Dai
, Bing Guo
, Yan Shen
, Chuanjie Liu
, Kejun Bi
, Fei Chen
, Yuchuan Hu
, Mingjie Zhao
:
A Mutual-Influence-Aware Heuristic Method for Quantum Circuit Mapping. 2855-2867 - Liang Zhao
, Tianyu Li
, Guiying Meng
, Ammar Hawbani
, Geyong Min
, Ahmed Yassin Al-Dubai
, Albert Y. Zomaya
:
Novel Lagrange Multipliers-Driven Adaptive Offloading for Vehicular Edge Computing. 2868-2881 - Yongqi Xue
, Jinlun Ji
, Xinming Yu
, Shize Zhou
, Siyue Li
, Xinyi Li
, Tong Cheng
, Shiping Li
, Kai Chen
, Zhonghai Lu
, Li Li
, Yuxiang Fu
:
Automatic Generation and Optimization Framework of NoC-Based Neural Network Accelerator Through Reinforcement Learning. 2882-2896
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.