Journal: VLSI Signal Processing

Volume 96, Issue 8-9

415 -- 429Hoang-Yang Lu, Mao-Hsu Yen, Yi-Jang Li, Guang-yan Li. VLSI-Implementation-Based Fast Symbol Detector for PQSM MIMO Systems
431 -- 447Sushmitha Sajeevu, Sakthivel Vellaisamy. Hardware Efficient Reconfigurable Digital Hearing aid using Pascal Structure
449 -- 462Haifeng Sang, Yumeng Liu. Supernode Fusion Model Based on Bimodal Action Recognition
463 -- 477Wenrui Xu, Keshab K. Parhi. Multi-Class Classification of Abnormal Heartbeat Detection using Hyperdimensional Computing
479 -- 493Grégoire de Broglie, Louis Morge-Rollet, Denis Le Jeune, Frédéric Le Roy, Christian Roland, Charles Canaff, Jean-Philippe Diguet. New LTE-A Low-Latency Detectors for Cognitive Radio on Low-Cost FPGA SoC
495 -- 507Roselin Clara Angel, PL. Chithra. Complexity Reduction in Intra Prediction of HEVC Using a Modified Convolutional Neural Network Model Incorporating Depth Map and RGB Texture
509 -- 523Lulu Ge, Aaron N. McInnes, Alik S. Widge, Keshab K. Parhi. Determining the Number of Clusters in Clinical Response of TMS Treatment using Hyperdimensional Computing
525 -- 0Hamid Banirostam, Touraj Banirostam, Mir Mohsen Pedram, Amir Masoud Rahmani. Correction: A Model to Detect the Fraud of Electronic Payment Card Transactions Based on Stream Processing in Big Data

Volume 96, Issue 6-7

333 -- 356Elham Shamsinejad, Touraj Banirostam, Mir Mohsen Pedram, Amir Masoud Rahmani. Anonymizing Big Data Streams Using In-memory Processing: A Novel Model Based on One-time Clustering
357 -- 368Yinghao Zhuang, Yue Zhang, Yibin Li 0002, Tianze Zhang, Yan Song. Intelligent AUV Surfacing Control in Network Attack Scenario
369 -- 383Xuemin Zhang, Haitao Deng, Zenggang Xiong, Ying Rao, Yanchao Liu, Yuan Li, Delin Hou. Self-Organizing Key Security Management Algorithm in Socially Aware Networking
385 -- 399Muath AlShaikh. Robust and Recovery Watermarking Approach Based on SVD and OTP Encryption
401 -- 414Caiyun Liu, Jun Li, Yan Sun. Deep Learning-based Privacy-preserving Publishing Method for Location Big Data in Vehicular Networks

Volume 96, Issue 4-5

273 -- 285Tarik Ayabakan, Feza Kerestecioglu. Fault Tolerant Indoor Positioning Based on Federated Kalman Filter
287 -- 300Martí Caro, Jaume Abella 0001. Energy-Efficient Object Detection: Impact of Weight Clustering for Different Arithmetic Representations
301 -- 312Hussein M. H. Al-Rikabi, Balázs Renczes. Floating-Point Quantization Analysis of Multi-Layer Perceptron Artificial Neural Networks
313 -- 326John Bob Gali, Priyadip Ray, Goutam Das. GLRT Based Adaptive-Thresholding for CFAR-Detection of Pareto-Target in Pareto-Distributed Clutter
327 -- 332Alexander Stotsky. Kaczmarz Projection Algorithms with Rank Two Gain Update

Volume 96, Issue 3

179 -- 189Sungdae Baek, Jonghong Kim, Junwon Lee, Minho Lee 0001. Implementation of a Virtual Assistant System Based on Deep Multi-modal Data Integration
191 -- 202Ju O. Kim, Jieun Kim, Deokwoo Lee. Calibrating a Three-Viewpoints Thermal Camera with Few Correspondences
203 -- 214Vaishanth Ramaraj, Atharva Paralikar, Eung-Joo Lee, Syed Muhammad Anwar, Reza Monfaredi. Development of a Modular Real-time Shared-control System for a Smart Wheelchair
215 -- 237Lejun Zhang, Yuan Li, Ran Guo, Guopeng Wang, Jing Qiu 0002, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen 0001, Zhihong Tian. A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS
239 -- 256Xuan You, Changsong Zhou, Zeng Chen, Rui Han, Yu Gu, Guozi Sun. Large File Security Outsourcing and Sharing Method Based on Blockchain
257 -- 271Tarek Frikha, Jalel Ktari, Nader Ben Amor, Faten Chaabane, Monia Hamdi, Fehmi Denguir, Habib Hamam. Low Power Blockchain in Industry 4.0 Case Study: Water Management in Tunisia

Volume 96, Issue 2

99 -- 112Peng Su, Hui Zhao, Ying Wang. A Novel Model Based on Big Data Environment for Text Content Security Recognition
113 -- 129Zhian Yang, Hao Jiang 0010, Lingyue Huang, Yiming Liu. Multi Feature Extraction and Trend Prediction for Weibo Topic Dissemination Network
131 -- 151Zhian Yang, Hao Jiang, Aobo Deng, Yang Li. Topic-Oriented Controlled Text Generation for Social Networks
153 -- 168Xueming Zhang, Haitao Deng, Zenggang Xiong, Yanchao Liu, Ying Rao, Yuanlin Lyu, Yuan Li, Delin Hou, Youfeng Li. Secure Routing Strategy Based on Attribute-Based Trust Access Control in Social-Aware Networks
169 -- 178Min Deng, SongHao Jiang, Fang Xu 0001, Chunmeng Yang, Na Yang, Yuanlin Lyu, Zenggang Xiong, Manzoor Ahmed. Energy and Cache Aware Routing for Socially Aware Networking in the Big Data Environment

Volume 96, Issue 12

763 -- 777Mina Etehadi Abari, Ahmad Reza Naghsh-Nilchi, Reza Hoseinnezhad. An Optimized Non-deep Learning Defense Against Adversarial Attacks for Pedestrian Detection
779 -- 790Wanwei Wang, Feng Wang, Jinxuan Wu. ULE-Net: Unsupervised Low-Light Enhancement without Paired Data
791 -- 807Wenrui Xu, Evan Krainess, Ali Payani, Hugo Latapie, Keshab K. Parhi. IFODHD: Improved Feature Selection Based Outlier Detection using Hyperdimensional Computing
809 -- 820Hakan Cevikalp, Kaya Turgut, Cihan Topal. Discriminative Frontal Face Synthesis by Using Attention and Metric Learning
821 -- 835Yiping Shi, Mingyuan Ma, Sunan He, Yanfei Ren, Li Du, Yuan Du. Elimination of Non-Idealities for Multi-Channel Phased Array Systems with Zero-IF Receiver
837 -- 848Dongyue Li, Hongxi Chen, Shuanghong Zhou, Yuting Zhang. Electromagnetic Compatibility Test Signal Prediction Method Based on LSTM Network
849 -- 870Hamid Banirostam, Touraj Banirostam, Mir Mohsen Pedram, Amir Masoud Rahmani. Analysis and Evaluation of Various Fraud Detection Methods for Electronic Payment Cards Transactions in Big Data
871 -- 886Fang Xu 0001, Yuquan Zhang, Yi Ma, Yan Zhang, Umer Sadiq Khan, Zhimin Li, Zhen Liu 0015, Na Yang. SIS-CAM: An Interpretability Analysis Method for the Security of Convolutional Neural Network Models Based on Image Big Data

Volume 96, Issue 11

627 -- 650Fabian Stuckmann, Moritz Weißbrich, Guillermo Payá Vayá. Energy-Aware Register Allocation for VLIW Processors
651 -- 671André Bannwart Perina, Jürgen Becker 0001, Vanderlei Bonato. Memory Aware Design Optimisation for High-Level Synthesis
673 -- 684Tao Wu 0018. Fast RNS Implementation of Elliptic Curve Point Multiplication on FPGAs
685 -- 696Sai Sanjay Balaji, Keshab K. Parhi. Graph Convolution Network Based Classification of Subjects with Prefrontal Cortex Lesion via Information-theoretic Brain Network Features
697 -- 715Pawan Kumar, Karan Nathwani. Exploiting Compress Sensing in Training of Deep Neural Network for Self-Noise Cancellation in Underwater Acoustics
717 -- 745Harith H. Thannoon, Ivan A. Hashim. A Novel Design of Combined Systolic and Convex Architectures for Efficient High-Speed Adaptive Filter
747 -- 762Yujun Liao, Yan Wu 0011, Yujian Mo, Yufei He, Yinghao Hu, Junqiao Zhao. SAPT: Saliency Augmentation and Unsupervised Pre-trained Model Fusion for Few-Shot Object Detection

Volume 96, Issue 10

527 -- 539Sheikh Faizan Qureshi, Stefan A. Damjancevic, Emil Matús, Pieter van der Wolf, Dmitry Utyansky, Gerhard P. Fettweis. Efficient Handover Mode Synchronization for NR-REDCAP on a Vector DSP
541 -- 554Mingjun Feng, Caiyun Liu, Yan Sun, Yidong Wu, Bo Li. Distribution Network Anomaly Detection Based on Graph Contrastive Learning
555 -- 567Binbin Ge, Jingru Bao, Bo Li 0005, Xudong Mou, Jun Zhao 0017, Xudong Liu 0001. IMG: Deep Representation Graph Learning for Anomaly Detection in Industrial Control System
569 -- 585Laxmi Kantham Durgam, Ravi Kumar Jatoth. Age Estimation from Speech Using Tuned CNN Model on Edge Devices
587 -- 600Diba Das, Mehdi Hasan Chowdhury, Aditta Chowdhury, Quazi Delwar Hossain, Ray C. C. Cheung. EOG Signal Processor: An SVM-based Multiclass Classifier to Detect Eye Movements
601 -- 615Bahram Rashidi. An Image Encryption Method Based on a High-performance and Efficient Block Cipher
617 -- 626Friedrich R. Münke, Manuel Schenk, Sandra Murr, Markus Reischl. Adaptable Accelerometer Signal Processing Pipelines for Smartphone based Evenness Estimation

Volume 96, Issue 1

1 -- 14Joe Gould, Keshab K. Parhi. Backpropagation Computation for Training Graph Attention Networks
15 -- 29Yu Yuan, Kushal Virupakshappa, Erdal Oruklu. Accelerating a Meta Learning Model for Ultrasonic Non-Destructive Testing Applications Using Model Compression and FPGA Hardware
31 -- 50N. S. Sathyavathi, P. Augusta Sophy Beulet. Deca-Rounding Methods for Floating Point Numbers: Error Analysis & Hardware Implementation
51 -- 65C. Santhiya, S. Padmavathi 0001. Bio-Inspired Crossover Cosine Swarm Optimization Algorithm Based Task Scheduling for Quality of Service Improvement Under Cloud Environment
67 -- 79Hyeonjun Shin, Jooheung Lee. Hardware Multi-Threaded System for High-Performance JPEG Decoding
81 -- 97Dorsaf Sebai, Maryem Sehli, Faouzi Ghorbel. End-to-End Variable-Rate Learning-Based Depth Compression Guided by Deep Correlation Features