Journal: IEEE Transactions on Computers

Volume 74, Issue 5

1470 -- 1481Peijun Ma, Jie Li, Hongjin Liu, Jiangyi Shi, Shaolin Zhang, Weitao Pan, Yue Hao 0001. Hardware Trojan Detection Methods for Gate-Level Netlists Based on Graph Neural Networks
1482 -- 1494Agustín Navarro-Torres, Biswabandan Panda, Jesús Alastruey-Benedé, Pablo Ibáñez 0001, Víctor Viñals Yúfera, Alberto Ros 0001. A Complexity-Effective Local Delta Prefetcher
1495 -- 1509Chuang Li 0004, Changyao Tan, Gang Liu, Yanhua Wen, Yan Wang 0022, Kenli Li 0001. DC-ORAM: An ORAM Scheme Based on Dynamic Compression of Data Blocks and Position Map
1510 -- 1523Liang Zhao 0004, Zijia Zhao, Ammar Hawbani, Zhi Liu 0002, Zhiyuan Tan 0001, Keping Yu. Dynamic Caching Dependency-Aware Task Offloading in Mobile Edge Computing
1524 -- 1537Chengqing Li, Kai Tan 0006. The Graph Structure of Baker's Maps Implemented on a Computer
1538 -- 1548Dongxiao Yu, Yuan Yuan, Yifei Zou, Xiao Zhang 0015, Yu Liu, LiZhen Cui, Xiuzhen Cheng 0001. Pruning-Based Adaptive Federated Learning at the Edge
1549 -- 1564Johannes Bund, Christoph Lenzen 0001, Moti Medina. Small Hazard-Free Transducers
1565 -- 1576Xin Niu 0001, Xianwei Lv 0001, Wang Chen, Chen Yu 0003, Hai Jin 0001. Computing Tasks Saving Schemes Through Early Exit in Edge Intelligence-Assisted Systems
1577 -- 1588Yiwen Zhang 0002, Hui Zheng. Slack Time Management for Imprecise Mixed-Criticality Systems With Reliability Constraints
1589 -- 1604Liangyuan Wang, Xudong Liu, Haonan Ding, Yi Hu, Kai Peng 0001, Menglan Hu. Energy-Delay-Aware Joint Microservice Deployment and Request Routing With DVFS in Edge: A Reinforcement Learning Approach
1605 -- 1619Hui Sun 0002, Xiangxiang Jiang, Yinliang Yue, Xiao Qin 0001. RGKV: A GPGPU-Empowered Compaction Framework for LSM-Tree-Based KV Stores With Optimized Data Transfer and Parallel Processing
1620 -- 1633Jaekang Shin, Myeonggu Kang, Yunki Han, Junyoung Park, Lee-Sup Kim. AToM: Adaptive Token Merging for Efficient Acceleration of Vision Transformer
1634 -- 1648Xun Wang, Xiangyu Meng 0005, Zhuoqiang Guo, Mingzhen Li, Lijun Liu, Mingfan Li, Qian Xiao, Tong Zhao, Ninghui Sun, Guangming Tan, Weile Jia. 29-Billion Atoms Molecular Dynamics Simulation With Ab Initio Accuracy on 35 Million Cores of New Sunway Supercomputer
1649 -- 1662Zewen Ye, Junhao Huang 0001, Tianshun Huang, Yudan Bai, Jinze Li, Hao Zhang, Guangyan Li, Donglong Chen, Ray C. C. Cheung, Kejie Huang. PQNTRU: Acceleration of NTRU-Based Schemes via Customized Post-Quantum Processor
1663 -- 1677Shiyuan Xu, Xue Chen, Yu Guo 0003, Yuer Yang, Shengling Wang 0001, Siu-Ming Yiu, Xiuzhen Cheng 0001. Lattice-Based Forward Secure Multi-User Authenticated Searchable Encryption for Cloud Storage Systems
1678 -- 1689Lianbo Ma, Yuee Zhou, Ye Ma, Guo Yu 0001, Qing Li 0006, Qiang He 0002, Yan Pei 0001. Defying Multi-Model Forgetting in One-Shot Neural Architecture Search Using Orthogonal Gradient Learning
1690 -- 1701Hao Lu, Jian Liu 0012, Kui Ren 0001. $\mathsf{Aurora}$Aurora: Leaderless State-Machine Replication With High Throughput
1702 -- 1716Haiyang Yu 0001, Hui Zhang, Zhen Yang 0004, Yuwen Chen, Huan Liu 0001. Efficient and Secure Storage Verification in Cloud-Assisted Industrial IoT Networks
1717 -- 1729Qingyang Zhang, Shuai Qian, Jie Cui 0004, Hong Zhong 0001, Fengqun Wang, Debiao He. Blockchain-Based Privacy-Preserving Deduplication and Integrity Auditing in Cloud Storage
1730 -- 1742Jaeyoung Kang 0001, Minxuan Zhou, Weihong Xu, Tajana Rosing. RelHDx: Hyperdimensional Computing for Learning on Graphs With FeFET Acceleration
1743 -- 1757Kaiqi Yang 0002, Qiang He 0002, Xingwei Wang 0001, Zhi Liu 0002, Yufei Liu, Min Huang 0001, Liang Zhao 0004. KDN-Based Adaptive Computation Offloading and Resource Allocation Strategy Optimization: Maximizing User Satisfaction
1758 -- 1770Dan Tang, Rui Dai, Chenguang Zuo, Jingwen Chen, Keqin Li 0001, Zheng Qin 0001. A Low-Rate DoS Attack Mitigation Scheme Based on Port and Traffic State in SDN
1771 -- 1785Zhetao Li, Yong Xiao, Haolin Liu, Xiaofei Liao, Ye Yuan 0001, Junzhao Du. Dynamic Graph Publication With Differential Privacy Guarantees for Decentralized Applications
1786 -- 1799Mahsa Heidari, Bijan Alizadeh. Localizing Multiple Bugs in RTL Designs by Classifying Hit-Statements Using Neural Networks
1800 -- 1813Fei Lyu 0002, Yuanyong Luo, Weiqiang Liu 0001. An Efficient Methodology for Binary Logarithmic Computations of Floating-Point Numbers With Normalized Output Within One ulp of Accuracy