Survey of intrusion detection systems: techniques, datasets and challenges

A Khraisat, I Gondal, P Vamplew, J Kamruzzaman - Cybersecurity, 2019 - Springer
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …

A survey of techniques for approximate computing

S Mittal - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Approximate computing trades off computation quality with effort expended, and as rising
performance demands confront plateauing resource budgets, approximate computing has …

ISAAC: A convolutional neural network accelerator with in-situ analog arithmetic in crossbars

A Shafiee, A Nag, N Muralimanohar… - ACM SIGARCH …, 2016 - dl.acm.org
A number of recent efforts have attempted to design accelerators for popular machine
learning algorithms, such as those involving convolutional and deep neural networks (CNNs …

Cambricon-X: An accelerator for sparse neural networks

S Zhang, Z Du, L Zhang, H Lan, S Liu… - 2016 49th Annual …, 2016 - ieeexplore.ieee.org
Neural networks (NNs) have been demonstrated to be useful in a broad range of
applications such as image recognition, automatic translation and advertisement …

ShiDianNao: Shifting vision processing closer to the sensor

Z Du, R Fasthuber, T Chen, P Ienne, L Li… - Proceedings of the …, 2015 - dl.acm.org
In recent years, neural network accelerators have been shown to achieve both high energy
efficiency and high performance for a broad application scope within the important category …

Data-driven prediction of a multi-scale Lorenz 96 chaotic system using deep learning methods: Reservoir computing, ANN, and RNN-LSTM

A Chattopadhyay, P Hassanzadeh… - Nonlinear Processes …, 2020 - npg.copernicus.org
In this paper, the performance of three deep learning methods for predicting short-term
evolution and for reproducing the long-term statistics of a multi-scale spatio-temporal Lorenz …

Diannao: A small-footprint high-throughput accelerator for ubiquitous machine-learning

T Chen, Z Du, N Sun, J Wang, C Wu, Y Chen… - ACM SIGARCH …, 2014 - dl.acm.org
Machine-Learning tasks are becoming pervasive in a broad range of domains, and in a
broad range of systems (from embedded systems to data centers). At the same time, a small …

Redeye: analog convnet image sensor architecture for continuous mobile vision

R LiKamWa, Y Hou, J Gao, M Polansky… - ACM SIGARCH …, 2016 - dl.acm.org
Continuous mobile vision is limited by the inability to efficiently capture image frames and
process vision features. This is largely due to the energy burden of analog readout circuitry …

ApproxANN: An approximate computing framework for artificial neural network

Q Zhang, T Wang, Y Tian, F Yuan… - 2015 Design, Automation …, 2015 - ieeexplore.ieee.org
Artificial Neural networks (ANNs) are one of the most well-established machine learning
techniques and have a wide range of applications, such as Recognition, Mining and …

Communication-efficient federated learning with adaptive parameter freezing

C Chen, H Xu, W Wang, B Li, B Li… - 2021 IEEE 41st …, 2021 - ieeexplore.ieee.org
Federated learning allows edge devices to collaboratively train a global model by
synchronizing their local updates without sharing private data. Yet, with limited network …