Abstract is missing.
- Efficient Transfer Learning on Modeling Physical Unclonable FunctionsQian Wang, Omid Aramoon, Pengfei Qiu, Gang Qu. 1-6 [doi]
- SeqL: Secure Scan-Locking for IP ProtectionSeetal Potluri, Aydin Aysu, Akash Kumar 0001. 7-13 [doi]
- A Survey of DMFBs Security: State-of-the-Art Attack and DefenseChen Dong, Lingqing Liu, Huangda Liu, Wenzhong Guo, Xing Huang, Sihuang Lian, Ximeng Liu, Tsung-Yi Ho. 14-20 [doi]
- How to Retrieve PUF Response from a Fabricated Chip Securely?Aijiao Cui, Yuxi Wang. 21-26 [doi]
- Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial AttacksFarnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Saj Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao 0002, Houman Homayoun, Avesta Sasan. 27-32 [doi]
- A Survey on Neural TrojansYuntao Liu 0001, Ankit Mondal, Abhishek Chakraborty 0001, Michael Zuzak, Nina Jacobsen, Daniel Xing, Ankur Srivastava. 33-39 [doi]
- LASCA: Learning Assisted Side Channel Delay Analysis for Hardware Trojan DetectionAshkan Vakil, Farnaz Behnia, Ali Mirzaeian, Houman Homayoun, Naghmeh Karimi, Avesta Sasan. 40-45 [doi]
- Rethinking FPGA Security in the New Era of Artificial IntelligenceXiaolin Xu, Jiliang Zhang 0002. 46-51 [doi]
- CDS-RSRAM: a Reconfigurable SRAM Architecture to Reduce Read Power with Column Data SegmentationHan Xu, Ziru Li, Fei Qiao, Qi Wei 0001, Xinjun Liu, Huazhong Yang. 52-59 [doi]
- RARA: Dataflow Based Error Compensation Methods with Runtime Accuracy-Reconfigurable AdderShujuan Yin, Zheyu Liu, Guihong Li, Fei Qiao, Qi Wei 0001, Yuanfeng Wu, LianRu Gao, Xinjun Liu, Huazhong Yang. 60-66 [doi]
- Low-power Accuracy-configurable Carry Look-ahead Adder Based on Voltage Overscaling TechniqueHassan Afzali-Kusha, Mehdi Kamal, Massoud Pedram. 67-72 [doi]
- Design Space Exploration Driven by Lifetime Concerns due to ElectromigrationFrancis G. Wolff, Daniel J. Weyer, Christos A. Papachristou, Steve Clay. 73-80 [doi]
- Integrated CAM-RAM Functionality using Ferroelectric FETsSumitha George, Nicholas Jao, Akshay Krishna Ramanathan, Xueqing Li, Sumeet Kumar Gupta, John Sampson, Vijaykrishnan Narayanan. 81-86 [doi]
- Statistical Analysis of Temperature Variability on the Write Efficiency of Spin-Orbit Torque MRAM using Polynomial Chaos MetamodelsSonal Shreya, Surila Guglani, Brajesh Kumar Kaushik, Sourajeet Roy. 87-92 [doi]
- Multi-Bit Read and Write Methodologies for Diode-MTJ Crossbar ArrayMohammad Nasim Imtiaz Khan, Swaroop Ghosh. 93-98 [doi]
- Compression or Corruption? A Study on the Effects of Transient Faults on BNN Inference AcceleratorsNavid Khoshavi, Connor Broyles, Yu Bi. 99-104 [doi]
- A Low-Power LSTM Processor for Multi-Channel Brain EEG Artifact DetectionHasib-Al-Rashid, Nitheesh Kumar Manjunath, Hirenkumar Paneliya, Morteza Hosseini, W. David Hairston, Tinoosh Mohsenin. 105-110 [doi]
- Formal Verification of a Fully Automated Out-of-Plane Cell Injection SystemIram Tariq Bhatti, Osman Hasan. 111-116 [doi]
- An NBTI-aware Task Parallelism Scheme for Improving Lifespan of Multi-core SystemsYu-Guang Chen, Yu-Yi Lin, Ing-Chao Lin. 117-122 [doi]
- Synthesis and Generalization of Parallel Algorithms Considering Communication ConstraintsAkihiro Goda, Yukio Miyasaka, Amir Masoud Gharehbaghi, Masahiro Fujita. 123-128 [doi]
- Optimal Choice of Waveform for Library Characterization for Accurate Delay CalculationAjoy Mandal, Saili Shete. 129-133 [doi]
- Spintronics-based Reconfigurable Ising Model ArchitectureAnkit Mondal, Ankur Srivastava. 134-140 [doi]
- A Statistical Methodology for Post-Fabrication Weight Tuning in a Binary PerceptronElham Azari, Ankit Wagle, Sunil Khatri, Sarma B. K. Vrudhula. 141-148 [doi]
- Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL DesignsSheikh Ariful Islam, Love Kumar Sah, Srinivas Katkoori. 149-154 [doi]
- SATConda: SAT to SAT-Hard Clause TranslatorRakibul Hassan, Gaurav Kolhe, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao. 155-160 [doi]
- Entropy-Shield: Side-Channel Entropy Maximization for Timing-based Side-Channel AttacksAbhijitt Dhavlle, Raj Mehta, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao. 161-166 [doi]
- Integrated Implantable Electrode Array and Amplifier Design for Single-chip Wireless Neural RecordingsHengying Shan, Nathan J. Conrad, Shabnam Ghotbi, John Peterson, Saeed Mohammadi. 167-172 [doi]
- IMU-based Smart Knee Pad for Walking Distance and Stride Count MeasurementTeng-Chia Wang, Yan-Ping Chang, Chun-Jui Chen, Yun-Ju Lee, Chia-Chun Lin, Yung-Chih Chen, Chun-Yao Wang. 173-178 [doi]
- Secure, Scalable and Low-Power Junction Temperature Sensing for Multi-Processor Systems-on-ChipG. Anand Kumar. 179-182 [doi]
- Saving Time and Energy Using Partial Flash Memory Operations in Low-Power MicrocontrollersPrawar Poudel, Aleksandar Milenkovic. 183-189 [doi]
- Variation-Aware Heterogeneous Voltage Regulation for Multi-Core Systems-on-a-Chip with On-Chip Machine LearningJoseph Riad, Jianhao Chen, Edgar Sánchez-Sinencio, Peng Li 0001. 190-194 [doi]
- Performance Boost Scheme with Activated Dummy Fin in 12-nm FinFET Technology for High-Performance Logic ApplicationMotoi Ichihashi, Jia Zeng, Youngtag Woo, Xuelian Zhu, Chenchen Wang, James Mazza. 196 [doi]
- A Morphable Physically Unclonable Function and True Random Number Generator using a Commercial Magnetic MemoryMohammad Nasim Imtiaz Khan, Chak Yuen Cheng, Sung-Hao Lin, Abdullah Ash-Saki, Swaroop Ghosh. 197 [doi]
- Extracting Power Signature from Low Dropout Voltage Regulator for IoT SecurityDavid Thompson, Haibo Wang 0005. 198 [doi]
- Strong Anti-SAT: Secure and Effective Logic LockingYuntao Liu 0001, Michael Zuzak, Yang Xie, Abhishek Chakraborty 0001, Ankur Srivastava. 199-205 [doi]
- EM Fault Injection on ARM and RISC-VMahmoud A. Elmohr, Haohao Liao, Catherine H. Gebotys. 206-212 [doi]
- On Securing Scan Obfuscation Strategies Against ScanSAT AttackRajit Karmakar, Santanu Chattopadhyay. 213-218 [doi]
- Fault Attack Detection in AES by Monitoring Power Side-Channel StatisticsAhish Shylendra, Priyesh Shukla, Swarup Bhunia, Amit Ranjan Trivedi. 219-224 [doi]
- Accurate Estimation of Dynamic Timing Slacks using Event-Driven SimulationDimitrios Garyfallou, Ioannis Tsiokanos, Nestor E. Evmorfopoulos, Georgios I. Stamoulis, Georgios Karakonstantis. 225-230 [doi]
- A Layout-Based Soft Error Rate Estimation and Mitigation in the Presence of Multiple Transient Faults in Combinational LogicChristos Georgakidis, Georgios Ioannis Paliaroutis, Nikolaos Sketopoulos, Pelopidas Tsoumanis, Christos P. Sotiriou, Nestor E. Evmorfopoulos, Georgios I. Stamoulis. 231-236 [doi]
- Stress-Induced Performance Shifts in Flexible System-in-Foils Using Ultra-Thin ChipsTengtao Li, Sachin S. Sapatnekar. 237-242 [doi]
- A Methodology for Reusable Physical DesignEdward Wang, Colin Schmidt, Adam M. Izraelevitz, John Wright, Borivoje Nikolic, Elad Alon, Jonathan Bachrach. 243-249 [doi]
- Error Coverage, Reliability and Cost Analysis of Fault Tolerance Techniques for 32-bit Memories used on Space MissionsD. C. C. Freitas, D. Mota, D. Simões, C. Lopes, Roger C. Goerl, César Augusto Missio Marcon, J. Silveira, J. C. M. Mota. 250-254 [doi]
- Vulnerability-aware Dynamic Reconfiguration of Partially Protected CachesYuanwen Huang, Prabhat Mishra 0001. 255-260 [doi]
- Alleviating Bottlenecks for DNN Execution on GPUs via Opportunistic ComputingXianwei Cheng, Hui Zhao 0013, Mahmut T. Kandemir, Saraju P. Mohanty, Beilei Jiang. 261-267 [doi]
- Learning-Enabled NoC Design for Heterogeneous Manycore SystemsRyan Gary Kim. 268-272 [doi]
- Improving Reliability of Quantum True Random Number Generator using Machine LearningAbdullah Ash-Saki, Mahabubul Alam, Swaroop Ghosh. 273-279 [doi]
- Reducing Impact of CNFET Process Imperfections on Shape of Activation Function by Using Connection Pruning and Approximate Neuron CircuitKaship Sheikh, Lan Wei. 279-284 [doi]
- Rehabilitation System for Limbs using IMUsChun-Jui Chen, Yi-Ting Lin, Chia-Chun Lin, Yung-Chih Chen, Yun-Ju Lee, Chun-Yao Wang. 285-291 [doi]
- Piezoelectric CMOS Charger: Highest Output-Power DesignSiyu Yang, Gabriel A. Rincón-Mora. 292-297 [doi]
- Highest Wireless Power: Inductively Coupled Or RF?Nan Xing, Gabriel A. Rincón-Mora. 298-301 [doi]
- Self-Powered IOT System for Edge InferenceDileep Kurian, Tanay Karnik, Saksham Soni, Saransh Chhabra, Suhwan Kim, Jaykant Timbadiya, Ankit Gupta, Krishnan Ravichandran, Mukesh Bhartiya, Angela Nicoara. 302-305 [doi]
- BNN Pruning: Pruning Binary Neural Network Guided by Weight Flipping FrequencyYixing Li, Fengbo Ren. 306-311 [doi]
- CSCMAC - Cyclic Sparsely Connected Neural Network Manycore AcceleratorHirenkumar Paneliya, Morteza Hosseini, Avesta Sasan, Houman Homayoun, Tinoosh Mohsenin. 311-316 [doi]
- FeFET-Based Neuromorphic Architecture with On-Device Feedback Alignment TrainingSumin Jot, Abdullah M. Zyarah, Santosh Kurinec, Kai Ni, Fatima Tuz Zohora, Dhireesha Kudithipudi. 317-322 [doi]
- An Efficient Deep Reinforcement Learning Framework for UAVsShanglin Zhou, Bingbing Li, Caiwu Ding, Lu Lu 0003, Caiwen Ding. 323-328 [doi]
- Integration and Evaluation of Quantum Accelerators for Data-Driven User FunctionsThomas Hubregtsen, Christoph Segler, Josef Pichlmeier, Aritra Sarkar, Thomas Gabor, Koen Bertels. 329-334 [doi]
- Hierarchical Improvement of Quantum Approximate Optimization Algorithm for Object Detection: (Invited Paper)Junde Li, Mahabubul Alam, Abdullah Ash-Saki, Swaroop Ghosh. 335-340 [doi]
- Efficient Training of Deep Convolutional Neural Networks by Augmentation in Embedding SpaceMohammad Saeed Abrishami, Amir Erfan Eshratifar, David Eigen, Yanzhi Wang, Shahin Nazarian, Massoud Pedram. 347-351 [doi]
- Impacts of Machine Learning on Counterfeit IC Detection and Avoidance TechniquesOmid Aramoon, Gang Qu. 352-357 [doi]
- TS-EFA: Resource-efficient High-precision Approximation of Exponential Functions Based on Template-scaling MethodJeeson Kim, Vladimir Kornijcuk, Doo Seok Jeong. 358-363 [doi]
- Accurate and Efficient Quantized Reservoir Computing SystemShiya Liu, Yibin Liang, Victor Gan, Lingjia Liu 0001, Yang Yi 0002. 364-369 [doi]
- A Scalable FPGA Engine for Parallel Acceleration of Singular Value DecompositionYu Wang, Jeong Jun Lee, Yu Ding, Peng Li. 370-376 [doi]
- Deep Neural Network Based Speech Recognition Systems Under Noise PerturbationsQiyuan An, Kangjun Bai, Moqi Zhang, Yang Yi, Yifang Liu. 377-382 [doi]
- Electrostatic Discharge Physical Verification of 2.5D/3D Integrated CircuitsDina Medhat, Mohamed Dessouky, DiaaEldin Khalil. 383-388 [doi]
- Mining Message Flows using Recurrent Neural Networks for System-on-Chip DesignsYuting Cao, Parijat Mukherjee, Mahesh Ketkar, Jin Yang, Hao Zheng. 389-394 [doi]
- Diagnostic Circuit for Latent Fault Detection in SRAM Row DecoderShivendra Singh, Varshita Gupta, Anuj Grover, Kedar Janardan Dhori. 395-400 [doi]
- Signal Selection Heuristics for Post-Silicon ValidationSuprajaa Tummala, Xiaobang Liu, Ranga Vemuri. 401-407 [doi]
- DOVA: A Dynamic Overwriting Voltage Adjustment for STT-RAM L1 CacheJinbo Chen, Keren Liu, Xiaochen Guo, Patrick Girard 0001, Yuanqing Cheng. 408-414 [doi]
- Energy-Efficient Edge Detection using Approximate Ramanujan SumsArchisman Ghosh, K. Gaurav Kumar, Debaprasad De, Arnab Raha, Mrinal Kanti Naskar. 414-420 [doi]
- Comparative Framework for the Analysis of Thermal and Resource Management Algorithms for Multi-Core ArchitecturesMoeez Akmal, Muhammad Sarmad Saeed, Muhammad Usama Sardar, Hareem Shafi, Osman Hasan, Heba Khdr, Jörg Henkel. 421-425 [doi]
- Energy-aware Scheduling of Jobs in Heterogeneous Cluster Systems Using Deep Reinforcement LearningAmirhossein Esmaili, Massoud Pedram. 426-431 [doi]
- Two-Graph Approach to Temperature Dependent Skew SchedulingMineo Kaneko. 432-437 [doi]
- EGAN: A Framework for Exploring the Accuracy vs. Energy Efficiency Trade-off in Hardware Implementation of Error Resilient ApplicationsMarzieh Vaeztourshizi, Mehdi Kamal, Massoud Pedram. 438-443 [doi]
- Insulator-Metal Transition Material Based Artificial Neurons: A Design PerspectiveAhmedullah Aziz, Kaushik Roy. 444-451 [doi]
- NN-PARS: A Parallelized Neural Network Based Circuit Simulation FrameworkMohammad Saeed Abrishami, Hao Ge, Justin F. Calderon, Massoud Pedram, Shahin Nazarian. 452-456 [doi]
- Layout Capacitance Extraction Using Automatic Pre-Characterization and Machine LearningZhixing Li, Weiping Shi. 457-464 [doi]