يعرض 1 - 18 نتائج من 18 نتيجة بحث عن 'Liu, Wenye', وقت الاستعلام: 0.04s
تنقيح النتائج
-
1
Fault-injection based attacks and countermeasure on deep neural network accelerators حسب Liu, Wenye
منشور في 2021
Thesis-Doctor of Philosophy -
2
Analysis of circuit aging on accuracy degradation of deep neural network accelerator حسب Liu, Wenye, Chang, Chip-Hong
منشور في 2020
Conference Paper -
3
A forward error compensation approach for fault resilient deep neural network accelerator design حسب Liu, Wenye, Chang, Chip Hong
منشور في 2022
Conference Paper -
4
Vulnerability analysis on noise-injection based hardware attack on deep neural networks حسب Liu, Wenye, Wang, Si, Chang, Chip-Hong
منشور في 2020
Conference Paper -
5
Detecting adversarial examples for deep neural networks via layer directed discriminative noise injection حسب Wang, Si, Liu, Wenye, Chang, Chip-Hong
منشور في 2020
Conference Paper -
6
Fired neuron rate based decision tree for detection of adversarial examples in DNNs حسب Wang, Si, Liu, Wenye, Chang, Chip-Hong
منشور في 2020
Conference Paper -
7
-
8
A new lightweight in-situ adversarial sample detector for edge deep neural network حسب Wang, Si, Liu, Wenye, Chang, Chip-Hong
منشور في 2021
Journal Article -
9
Deep texture-depth-based attention for face recognition on IoT devices حسب Lin, Yuxin, Liu, Wenye, Chang, Chip Hong
منشور في 2024
Conference Paper -
10
A lightweight PUF-based secure group key agreement protocol for wireless sensor networks حسب Zheng, Yue, Liu, Wenye, Chang, Chip Hong
منشور في 2024
Conference Paper -
11
Imperceptible misclassification attack on deep learning accelerator by glitch injection حسب Liu, Wenye, Chang, Chip-Hong, Zhang, Fan, Lou, Xiaoxuan
منشور في 2021
Conference Paper -
12
PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications حسب Zheng, Yue, Liu, Wenye, Gu, Chongyan, Chang, Chip Hong
منشور في 2022
Journal Article -
13
-
14
-
15
An imperceptible data augmentation based blackbox clean-label backdoor attack on deep neural networks حسب Xu, Chaohui, Liu, Wenye, Zheng, Yue, Wang, Si, Chang, Chip Hong
منشور في 2024
Journal Article -
16
Live demonstration: man-in-the-middle attack on edge artificial intelligence حسب Hu, Bowen, He, Weiyang, Wang, Si, Liu, Wenye, Chang, Chip Hong
منشور في 2024
احصل على النص الكامل
Conference Paper -
17
-
18