Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Flash-cosmos: In-flash bulk bitwise operations using inherent computation capability of nand flash memory
Bulk bitwise operations, ie, bitwise operations on large bit vectors, are prevalent in a wide
range of important application domains, including databases, graph processing, genome …
range of important application domains, including databases, graph processing, genome …
HAIMA: A hybrid SRAM and DRAM accelerator-in-memory architecture for transformer
Y Ding, C Liu, M Duan, W Chang… - 2023 60th ACM/IEEE …, 2023 - ieeexplore.ieee.org
Through the attention mechanism, Transformer-based large-scale deep neural networks
(LSDNNs) have demonstrated remarkable achievements in artificial intelligence …
(LSDNNs) have demonstrated remarkable achievements in artificial intelligence …
Bp-ntt: Fast and compact in-sram number theoretic transform with bit-parallel modular multiplication
Number Theoretic Transform (NTT) is an essential mathematical tool for computing
polynomial multiplication in promising lattice-based cryptography. However, costly division …
polynomial multiplication in promising lattice-based cryptography. However, costly division …
Inhale: Enabling high-performance and energy-efficient in-sram cryptographic hash for iot
In the age of big data, information security has become a major issue of debate, especially
with the rise of the Internet of Things (IoT), where attackers can effortlessly obtain physical …
with the rise of the Internet of Things (IoT), where attackers can effortlessly obtain physical …
Power side-channel attacks and countermeasures on computation-in-memory architectures and technologies
To overcome the bottleneck of the classical processor-centric architectures, Computation-in-
Memory (CiM) is a promising paradigm where operations are performed directly in memory …
Memory (CiM) is a promising paradigm where operations are performed directly in memory …
BCIM: Constant-Time and High-Throughput Block-Cipher-In-Memory With Massively-Parallel Bit-Serial Execution
A Dervay, W Zhao - IEEE Transactions on Emerging Topics in …, 2025 - ieeexplore.ieee.org
In-memory computing (IMC) emerges as one of the most promising computing technologies
for data-intensive applications to ameliorate the “memory wall” bottleneck in von Neumann …
for data-intensive applications to ameliorate the “memory wall” bottleneck in von Neumann …
Multi-Dimensional Vector ISA Extension for Mobile In-Cache Computing
In-cache computing technology transforms existing caches into long-vector compute units
and offers low-cost alternatives to building expensive vector engines for mobile CPUs …
and offers low-cost alternatives to building expensive vector engines for mobile CPUs …
Power Side-Channel Analysis and Mitigation for Neural Network Accelerators based on Memristive Crossbars
The modern trend of exploring Artificial Intelligence (AI) in various industries, such as big
data, edge computing, automobile, and medical applications, has increased tremendously …
data, edge computing, automobile, and medical applications, has increased tremendously …
Enabling Low-Cost Secure Computing on Untrusted In-Memory Architectures
Modern computing systems are limited in performance by the memory bandwidth available
to processors, a problem known as the memory wall. Processing-in-Memory (PIM) promises …
to processors, a problem known as the memory wall. Processing-in-Memory (PIM) promises …
In-memory encryption using the advanced encryption standard
T Kovats, N Rameshan… - Philosophical …, 2025 - royalsocietypublishing.org
Encryption and decryption of data with very low latency and high energy efficiency is
desirable in almost every application that deals with sensitive data. The advanced …
desirable in almost every application that deals with sensitive data. The advanced …