![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
IEEE Transactions on Emerging Topics in Computing, Volume 12
Volume 12, Number 1, January - March 2024
- Alberto Bosio
, Ronald F. DeMara, Deliang Fan, Nima TaheriNejad
:
Guest Editorial IEEE Transactions on Emerging Topics in Special Section on Emerging In-Memory Computing Architectures and Applications. 4-6 - Ben Perach
, Ronny Ronen
, Benny Kimelfeld
, Shahar Kvatinsky
:
Understanding Bulk-Bitwise Processing In-Memory Through Database Analytics. 7-22 - Yandong Luo
, Johan Vanderhaegen, Oleg Rybakov
, Martin Kraemer
, Niel Warren
, Shimeng Yu
:
A FeFET-Based ADC Offset Robust Compute-In-Memory Architecture for Streaming Keyword Spotting (KWS). 23-34 - Marco Paul E. Apolinario
, Adarsh Kumar Kosta
, Utkarsh Saxena
, Kaushik Roy
:
Hardware/Software Co-Design With ADC-Less In-Memory Computing Hardware for Spiking Neural Networks. 35-47 - Khakim Akhunov
, Kasim Sinan Yildirim
:
CRAM-Based Acceleration for Intermittent Computing of Parallelizable Tasks. 48-59 - Purab Ranjan Sutradhar
, Sathwika Bavikadi
, Sai Manoj Pudukotai Dinakarrao
, Mark A. Indovina
, Amlan Ganguly
:
3DL-PIM: A Look-Up Table Oriented Programmable Processing in Memory Architecture Based on the 3-D Stacked Memory for Data-Intensive Applications. 60-72 - Shaahin Angizi
, Mehrdad Morsali
, Sepehr Tabrizchi
, Arman Roohi
:
A Near-Sensor Processing Accelerator for Approximate Local Binary Pattern Networks. 73-83 - Yiming Chen, Mingyen Lee, Guohao Dai, Mufeng Zhou, Nagadastagiri Challapalle, Tianyi Wang, Yao Yu, Yongpan Liu, Yu Wang, Huazhong Yang, Vijaykrishnan Narayanan, Xueqing Li:
GRAPHIC: Gather and Process Harmoniously in the Cache With High Parallelism and Flexibility. 84-96 - Jia-Le Cui
, Yanan Guo
, Juntong Chen
, Bo Liu
, Hao Cai
:
Sparsity-Oriented MRAM-Centric Computing for Efficient Neural Network Inference. 97-108 - Ziyu Wang
, Fan-Hsuan Meng, Yongmo Park
, Jason K. Eshraghian
, Wei D. Lu
:
Side-Channel Attack Analysis on In-Memory Computing Architectures. 109-121 - Alessandro D'Amelio
, Jianyi Lin, Jean-Yves Ramel, Raffaella Lanzarotti:
Guest Editorial Emerging Trends and Advances in Graph-Based Methods and Applications. 122-125 - Meixia He, Jianrui Chen
, Maoguo Gong
, Zhongshi Shao:
HDGCN: Dual-Channel Graph Convolutional Network With Higher-Order Information for Robust Feature Learning. 126-138 - Xiaolin Li
, Qikui Xu, Zhenyu Xu, Hongyan Zhang, Li Xu
:
Graph Reconfigurable Pooling for Graph Representation Learning. 139-149 - Yong-Min Shin
, Cong Tran
, Won-Yong Shin
, Xin Cao
:
Edgeless-GNN: Unsupervised Representation Learning for Edgeless Nodes. 150-162 - Bo-Wei Zhao
, Lei Wang
, Peng-Wei Hu
, Leon Wong, Xiao-Rui Su
, Bao-Quan Wang, Zhu-Hong You, Lun Hu:
Fusing Higher and Lower-Order Biological Information for Drug Repositioning via Graph Representation Learning. 163-176 - Davide Bacciu
, Federico Errica
, Alessio Gravina
, Lorenzo Madeddu
, Marco Podda
, Giovanni Stilo
:
Deep Graph Networks for Drug Repurposing With Multi-Protein Targets. 177-189 - Binon Teji
, Swarup Roy
, Devendra Singh Dhami
, Dinabandhu Bhandari
, Pietro Hiram Guzzi
:
Graph Embedding Techniques for Predicting Missing Links in Biological Networks: An Empirical Evaluation. 190-201 - Benjamin Filtjens
, Bart Vanrumste
, Peter Slaets
:
Skeleton-Based Action Segmentation With Multi-Stage Spatial-Temporal Graph Convolutional Neural Networks. 202-212 - Federico Becattini
, Federico Maria Teotini, Alberto Del Bimbo
:
Transformer-Based Graph Neural Networks for Outfit Generation. 213-223 - Alejandro Álvarez-Ayllón
, Manuel Palomo-Duarte
, Juan Manuel Dodero
:
PresQ: Discovery of Multidimensional Equally-Distributed Dependencies via Quasi-Cliques on Hypergraphs. 224-239 - Feng Xia
, Xin Chen
, Shuo Yu
, Mingliang Hou
, Mujie Liu
, Linlin You
:
Coupled Attention Networks for Multivariate Time Series Anomaly Detection. 240-253 - Dongbo Zhou
, Hongwei Yu
, Jie Yu
, Shuai Zhao
, Wenhui Xu
, Qianqian Li
, Fengyin Cai
:
MFDS-STGCN: Predicting the Behaviors of College Students With Fine-Grained Spatial-Temporal Activities Data. 254-265 - Jinguang Han
, Patrick Schaumont
, Willy Susilo
:
Guest Editorial IEEE Transactions on Emerging Topics in Computing Special Section on Advances in Emerging Privacy-Preserving Computing. 266-268 - Aditya Pribadi Kalapaaking
, Ibrahim Khalil
, Xun Yi
:
Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems. 269-280 - Yaoqi Yang
, Bangning Zhang, Daoxing Guo
, Renhui Xu
, Chunhua Su
, Weizheng Wang
:
Age of Information Optimization for Privacy-Preserving Mobile Crowdsensing. 281-292 - Amir Fathalizadeh
, Vahideh Moghtadaiee
, Mina Alishahi:
Indoor Geo-Indistinguishability: Adopting Differential Privacy for Indoor Location Data Protection. 293-306 - Fangwei Wang
, Meiyun Xie, Zhiyuan Tan
, Qingru Li, Changguang Wang:
Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation. 307-315 - Yue Zhang
, Youwen Zhu
, Yuqian Zhou, Jiabin Yuan:
Frequency Estimation Mechanisms Under ϵδ-Utility-Optimized Local Differential Privacy. 316-327 - Kyung Hyun Han
, Wai-Kong Lee
, Angshuman Karmakar
, Jose Maria Bermudo Mera
, Seong Oun Hwang
:
cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption. 328-343 - Supriya Adhikary
, Angshuman Karmakar
:
A Fast RLWE-Based IPFE Library and its Application to Privacy-Preserving Biometric Authentication. 344-356 - Irina Arévalo
, Jose L. Salmeron
:
A Chaotic Maps-Based Privacy-Preserving Distributed Deep Learning for Incomplete and Non-IID Datasets. 357-367 - Abdul Majeed
, Safiullah Khan
, Seong Oun Hwang
:
Towards Optimization of Privacy-Utility Trade-Off Using Similarity and Diversity Based Clustering. 368-385 - Mathias Brossard
, Guilhem Bryant
, Basma El Gaabouri, Xinxin Fan
, Alexandre Ferreira
, Edmund Grimley-Evans
, Christopher Haster
, Evan Johnson
, Derek Miller
, Fan Mo, Dominic P. Mulligan
, Nick Spinale
, Eric Van Hensbergen
, Hugo J. M. Vincent
, Shale Xiong
:
Private Delegated Computations Using Strong Isolation. 386-398
Volume 12, Number 2, April - June 2024
- Jia Wu, Jian Yang, Philip S. Yu, Carlo Condo:
Special Section on Community Detection in Time-Varying Information and Computing Networks: Theory, Models, and Applications. 402 - Yuyao Wang
, Jie Cao
, Zhan Bu, Mingming Leng
:
Temporal Dual-Attributed Network Generation Oriented Community Detection Model. 403-418 - Guan Wang
, Weihua Li
, Quan Bai
, Edmund M.-K. Lai
:
Maximizing Social Influence With Minimum Information Alteration. 419-431 - Jin Fan
, Zehao Wang
, Danfeng Sun
, Huifeng Wu
:
Sepformer-Based Models: More Efficient Models for Long Sequence Time-Series Forecasting. 432-443 - Jianliang Gao
, Jiamin Chen
, Babatounde Moctard Oloulade
, Raeed Al-Sabri
, Tengfei Lyu
, Ji Zhang
, Zhao Li
:
CommGNAS: Unsupervised Graph Neural Architecture Search for Community Detection. 444-454 - Shengwei Ji
, Chenyang Bu
, Lei Li
, Xindong Wu
:
LocalTGEP: A Lightweight Edge Partitioner for Time-Varying Graph. 455-466 - Libing Wu
, Youhua Xia
, Shuwen Min
, Zhenchang Xia
:
Deep Attentive Interest Collaborative Filtering for Recommender Systems. 467-481 - Gang Qu, Debdeep Mukhopadhyay, Nele Mentens, Weiqiang Liu:
Special Section on Emerging Topics in Hardware Computing Systems Security. 482 - Thien Duc Nguyen
, Markus Miettinen
, Alexandra Dmitrienko
, Ahmad-Reza Sadeghi
, Ivan Visconti
:
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges. 483-495 - Pantea Kiaei
, Yuan Yao
, Zhenyuan Liu
, Nicole Fern, Cees-Bart Breunesse, Jasper Van Woudenberg, Kate Gillis, Alex Dich, Peter Grossmann, Patrick Schaumont
:
Gate-Level Side-Channel Leakage Ranking With Architecture Correlation Analysis. 496-507 - Nojan Sheybani
, Xinqiao Zhang
, Siam Umar Hussain, Farinaz Koushanfar:
SenseHash: Computing on Sensor Values Mystified at the Origin. 508-520 - Stefano Longari, Alessandro Pozone, Jessica Leoni, Mario Polino, Michele Carminati, Mara Tanelli, Stefano Zanero:
CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment. 521-531 - Huifeng Zhu
, Xiaolong Guo, Yier Jin
, Xuan Zhang
:
PowerScout: Security-Oriented Power Delivery Network Modeling for Side-Channel Vulnerability Analysis. 532-545 - Lichao Wu
, Guilherme Perin, Stjepan Picek
:
I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis. 546-557 - Francesco Flammini, Cristina Alcaraz
:
Guest Editorial Navigating the Nexus of Cyber Security and Resilience. 558 - Joseph Callenes
, Majid Poshtan
:
Dynamic Reconfiguration for Resilient State Estimation Against Cyber Attacks. 559-571 - Nelson L. Santos
, Bogdan Ghita
, Giovanni Luca Masala
:
Medical Systems Data Security and Biometric Authentication in Public Cloud Servers. 572-582 - Eduardo Alvarenga, Jan R. Brands, Peter Doliwa, Jerry den Hartog, Erik Kraft, Marcel Medwed, Ventzislav Nikov, Joost Renes, Martin Rosso, Tobias Schneider
, Nikita Veshchikov:
Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack Classifications. 583-600 - Francesco Flammini
, Cristina Alcaraz
, Emanuele Bellini
, Stefano Marrone, Javier López
, Andrea Bondavalli
:
Towards Trustworthy Autonomous Systems: Taxonomies and Future Perspectives. 601-614 - Emrah Tomur
, Zeki Bilgin
, Utku Gülen
, Elif Ustundag Soykan
, Leyli Karaçay
, Ferhat Karakoç
:
Intent-Based Security for Functional Safety in Cyber-Physical Systems. 615-630 - Valentina Casola
, Alessandra De Benedictis
, Carlo Mazzocca
, Rebecca Montanari
:
Designing Secure and Resilient Cyber-Physical Systems: A Model-Based Moving Target Defense Approach. 631-642 - Panagiotis I. Radoglou-Grammatikis
, Panagiotis G. Sarigiannidis
, Panagiotis D. Diamantoulakis
, Thomas Lagkas
, Theocharis Saoulidis, Eleftherios Fountoukidis, George K. Karagiannidis
:
Strategic Honeypot Deployment in Ultra-Dense Beyond 5G Networks: A Reinforcement Learning Approach. 643-655 - Nicolas Brisebarre
, Jean-Michel Muller
, Joris Picot
:
Error in Ulps of the Multiplication or Division by a Correctly-Rounded Function or Constant in Binary Floating-Point Arithmetic. 656-666 - Vasilis Sakellariou
, Vassilis Paliouras
, Ioannis Kouretas
, Hani H. Saleh
, Thanos Stouraitis
:
A Multiplier-Free RNS-Based CNN Accelerator Exploiting Bit-Level Sparsity. 667-683
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.