The backpropagation algorithm implemented on spiking neuromorphic hardware

A Renner, F Sheldon, A Zlotnik, L Tao… - Nature …, 2024 - nature.com
The capabilities of natural neural systems have inspired both new generations of machine
learning algorithms as well as neuromorphic, very large-scale integrated circuits capable of …

Spiking lca in a neural circuit with dictionary learning and synaptic normalization

D Chavez Arana, A Renner, A Sornborger - Proceedings of the 2023 …, 2023 - dl.acm.org
The Locally Competitive Algorithm (LCA)[17, 18] was put forward as a model of primary
visual cortex [14, 17] and has been used extensively as a sparse coding algorithm for …

Neko: a library for exploring neuromorphic learning rules

Z Zhao, N Wycoff, N Getty, R Stevens… - … on Neuromorphic Systems …, 2021 - dl.acm.org
The field of neuromorphic computing is in a period of active exploration. While many tools
have been developed to simulate neuronal dynamics or convert deep networks to spiking …

Robust Intrusion Detection for Industrial IoT

H Ren, L Gong, X Mo, L Yang… - 2023 19th International …, 2023 - ieeexplore.ieee.org
Due to the significant role of Industrial Internet of Things (IIoT) in industrial systems, it often
faces numerous network attacks. Therefore, intrusion detection systems are crucial for real …

Implementing backpropagation for learning on neuromorphic spiking hardware

A Renner, F Sheldon, A Zlotnik, L Tao… - Proceedings of the 2020 …, 2020 - dl.acm.org
Many contemporary advances in the theory and practice of neural networks are inspired by
our understanding of how information is processed by natural neural systems. However, the …

A Neuromorphic Normalization Algorithm for Stabilizing Synaptic Weights with Application to Dictionary Learning in LCA

D Chavez Arana, A Renner, A Sornborger - Proceedings of the 2022 …, 2022 - dl.acm.org
Instabilities in neuromorphic machine learning can occur when synaptic updates meant to
encode matrix transforms are not normalized. This phenomenon is encountered in Hebbian …

Determining sequences of interactions, process extraction, and robot generation using artificial intelligence/machine learning models

P Singh - US Patent 11,340,917, 2022 - Google Patents
Use of artificial intelligence (AI)/machine learning (ML) models is disclosed to determine
sequences of user interactions with computing systems, extract common processes, and …

Determining sequences of interactions, process extraction, and robot generation using artificial intelligence/machine learning models

P Singh - US Patent 11,301,269, 2022 - Google Patents
Use of artificial intelligence (AI)/machine learning (ML) models is disclosed to determine
sequences of user interac tions with computing systems, extract common processes, and …

基于代价敏感学**的恶意 URL 检测研究

蔡勍萌, 王健, **鹏博 - Journal of Cyber Security, 2023 - jcs.iie.ac.cn
随着大数据时代的到来, 恶意URL 作为Web 攻击的媒介渐渐威胁着用户的信息安全.
传统的恶意URL 检测手段如黑名单检测, 签名匹配方法**逐步暴露缺陷, 为此本文提出一种基于 …

Determining sequences of interactions, process extraction, and robot generation using artificial intelligence/machine learning models

P Singh - US Patent 11,803,397, 2023 - Google Patents
Use of artificial intelligence (AI)/machine learning (ML) models is disclosed to determine
sequences of user interactions with computing systems, extract common processes, and …