Search
Search Results
-
LOCP: Latency-optimized channel pruning for CNN inference acceleration on GPUs
Channel pruning has recently become a widely used model compression method. However, most existing channel pruning methods only prune to decrease the...
-
Detection and Localization of Channel-Short Faults in Regular On-Chip Interconnection Networks
With the rapid developments in VLSI technology, the communication channels in networks-on-chip (NoCs) can place many wires for sustaining...
-
An Anti-jamming Game When None Player Knows Rival’s Channel Gain
We consider a user’s communication with a receiver in presence of a jammer, in the most competitive situation for user and jammer when they do not... -
Rethinking group activity recognition under the open set condition
In real-world scenarios, the recognition of unknown activities poses a significant challenge for group activity recognition. Existing methods...
-
Software Implementation of an Algorithm for Automatic Detection of Lineaments and Their Properties in Open-Pit Dumps
AbstractThis paper presents an algorithm and description of its software implementation for detection of lineaments (ground erosions or cracks) in...
-
Autoencoder-enabled model portability for reducing hyperparameter tuning efforts in side-channel analysis
Hyperparameter tuning represents one of the main challenges in deep learning-based profiling side-channel analysis. For each different side-channel...
-
Universal Model Adaptation by Style Augmented Open-set Consistency
Learning to recognize unknown target samples is of great importance for unsupervised domain adaptation (UDA). Open-set domain adaptation (OSDA) and...
-
Experiment Teaching Case Design of Computer I/O Channel Virtual Simulation
The principle of computer composition is an important basic course for undergraduates majoring in computer science, in which the I/O channel control... -
Toward finding best linear codes for side-channel protections (extended version)
Side-channel attacks aim at extracting secret keys from cryptographic devices. Randomly masking the implementation is a provable way to protect the...
-
Underwater image dehazing using a novel color channel based dual transmission map estimation
Underwater images typically suffer from color distortion and low contrast, owing to the light absorption and scattering. To handle the visual...
-
Information Support for Open Science: Practices of Libraries on the Net
AbstractData on the development of the infrastructure of open science, an overview of the best practices of libraries and web resources created...
-
Retinal artery/vein classification by multi-channel multi-scale fusion network
The automatic artery/vein (A/V) classification in retinal fundus images plays a significant role in detecting vascular abnormalities and could speed...
-
Channel Spatio-Temporal Convolutional Network for Trajectory Prediction
Accurate and timely prediction of the future path of agents in the vicinity of an agent is the core of avoiding conflict in automated applications.... -
Open-Set Adversarial Defense with Clean-Adversarial Mutual Learning
Open-set recognition and adversarial defense study two key aspects of deep learning that are vital for real-world deployment. The objective of...
-
OAVA: the open audio-visual archives aggregator
The purpose of the current article is to provide an overview of an open-access audiovisual aggregation and search service platform developed for...
-
Packet Level CTC Based on Channel Intervention
Cross-technology communication (CTC) is a technique that enables direct communication among different wireless technologies. Recent works in this... -
A lightweight convolutional neural network based on dense connection for open-pit coal mine service identification using the edge-cloud architecture
Remote sensing is an important technical tool for rapid detection of illegal mining behavior. Due to the complex features of open-pit coal mines,...
-
ConsenTrack—Blockchain Based Framework for Open Banking Consent Data Tracking
Consent management is most critical part of open banking. Customers, banks, third party service providers, regulators are various parties involved...
-
Open-Vocabulary Animal Keypoint Detection with Semantic-Feature Matching
Current image-based keypoint detection methods for animal (including human) bodies and faces are generally divided into fully supervised and few-shot...
-
Gaming the system: tetromino-based covert channel and its impact on mobile security
Trojan droppers consistently emerge as challenging malware threats, particularly within the Android ecosystem. Traditional malware detection...