Search
Search Results
-
Design and analysis of DDoS mitigating network architecture
Distributed Denial of Service (DDoS) attacks have emerged as the top security threat with the rise of e-commerce in recent years. Volumetric attacks...
-
Hardware Security Analysis
Hardware is the backbone of all computing resources, and its security is of great importance. Compared with software vulnerabilities, hardware... -
FPGA-Based Hardware Accelerator for Matrix Inversion
Matrix inversion is a computationally expensive operation in many scientific applications. Performing matrix inversion of rank deficient large order...
-
Hardware-friendly architecture for a pseudo 2D weighted median filter based on sparse-window approach
Stereo matching, which is conventionally used for three-dimensional (3D) information acquisition through cameras, is the most actively studied...
-
NVM Hardware and Software
This chapter provides the necessary background on NVM hardware, how it fits in modern computer systems and the way software can program it. -
Hardware 101
AIoT hardware includes all the physical components required to build an AIoT product or retrofit solution. For the retrofit solution, this will... -
Hardware Architecture for GRAND Markov Order (GRAND-MO)
This chapter introduces the GRAND Markov Order (GRAND-MO), a hard-input variant of GRAND designed specifically for communication channels with memory... -
VLSI architecture and implementation of HDR camera signal processor
The camera imaging built with high dynamic range (HDR) techniques can effectively improve the quality of images and so increase the recognition rate...
-
Differential fault analysis attack-tolerant hardware implementation of AES
Cryptographic circuits contain various confidential information and are susceptible to fraudulent manipulations, commonly called attacks, performed...
-
An efficient hardware accelerator for NTT-based polynomial multiplication using FPGA
The number theoretic transform (NTT) is used to efficiently execute polynomial multiplication. It has become an important part of lattice-based...
-
A multiple-UAV architecture for autonomous media production
Cinematography with Unmanned Aerial Vehicles (UAVs) is an emerging technology promising to revolutionize media production. On the one hand, manually...
-
Int-Monitor: a model triggered hardware trojan in deep learning accelerators
Deep learning accelerators have domain-specific architectures, this special memory hierarchy and working mode could bring about new crucial security...
-
Digital-to-analog converter free architecture for digital reconfigurable intelligent surface
This research investigates the digital-to-analog converter (DAC) free architecture for the digital reconfigurable intelligent surface (RIS) system,...
-
Software and hardware realizations for different designs of chaos-based secret image sharing systems
Secret image sharing (SIS) conveys a secret image to mutually suspicious receivers by sending meaningless shares to the participants, and all shares...
-
Machine Learning Method with Applications in Hardware Security of Post-Quantum Cryptography
Machine learning (ML) is the core of Artificial Intelligence (AI), and it is the fundamental way to make computer have intelligence. ML is a...
-
Evolutionary approximation and neural architecture search
Automated neural architecture search (NAS) methods are now employed to routinely deliver high-quality neural network architectures for various...
-
Isadora: automated information-flow property generation for hardware security verification
Isadora is a specification mining tool for creating information-flow properties for hardware. Isadora combines hardware information-flow tracking and...
-
A hybrid memory architecture supporting fine-grained data migration
Hybrid memory systems composed of dynamic random access memory (DRAM) and Non-volatile memory (NVM) often exploit page migration technologies to...
-
High throughput architecture for multiscale variational optical flow
Computation of high-quality Optical Flow ( OF ) for fast-moving objects in real time is still an unsolved issue for High Definition (HD) images. The...
-
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium
During the standardisation process of post-quantum cryptography, NIST encourages research on side-channel analysis for candidate schemes. As the...