In this study, we explore the capability of Large Language Models (LLMs)...
Similarity metrics have played a significant role in computer vision to
...
This paper proposes a data-efficient detection method for deep neural
ne...
The robustness of image segmentation has been an important research topi...
Modern hardware design starts with specifications provided in natural
la...
Logic synthesis is the first and most vital step in chip design. This st...
Recent advancements in machine learning and computer vision have led to ...
In this paper, we study a navigation problem where a mobile robot needs ...
Oracle-less machine learning (ML) attacks have broken various logic lock...
Downlink massive multiple-input multiple-output (MIMO) precoding algorit...
Multi-armed adversarial attacks, in which multiple algorithms and object...
Fair machine learning methods seek to train models that balance model
pe...
This paper proposes an easy-to-compute upper bound for the overlap index...
Automating hardware design could obviate a significant amount of human e...
We propose a framework in which multiple entities collaborate to build a...
Advances in Deep Learning have led to the emergence of Large Language Mo...
Increasing privacy concerns have given rise to Private Inference (PI). I...
The success of DNNs is driven by the counter-intuitive ability of
over-p...
Deep learning techniques have shown promising results in image compressi...
Recent advances in computer vision has led to a growth of interest in
de...
Generating sub-optimal synthesis transformation sequences ("synthesis
re...
Private inference (PI) enables inference directly on cryptographically s...
The privacy concerns of providing deep learning inference as a service h...
The millimeter wave (mmWave) bands have attracted considerable attention...
Logic synthesis is a challenging and widely-researched combinatorial
opt...
Enhanced processing power in the cloud allows constrained devices to off...
The emergence of deep learning has been accompanied by privacy concerns
...
The simultaneous rise of machine learning as a service and concerns over...
The globalization of the electronics supply chain is requiring effective...
Extracting interesting scenarios from real-world data as well as generat...
The recent rise of privacy concerns has led researchers to devise method...
In this paper, matching pairs of stocahstically generated graphs in the
...
We show that by controlling parts of a physical environment in which a
p...
This paper proposes a new defense against neural network backdooring att...
Deep neural networks (DNNs) demonstrate superior performance in various
...
Semiconductor design companies are integrating proprietary intellectual
...
Unprecedented data collection and sharing have exacerbated privacy conce...
The graph matching problem emerges naturally in various applications suc...
In this paper we propose a new family of algorithms for training
adversa...
Machine learning as a service has given raise to privacy concerns surrou...
Deep learning (DL) offers potential improvements throughout the CAD
tool...
This paper proposes a novel two-stage defense (NNoculation) against
back...
Permutations of correlated sequences of random variables appear naturall...
There is substantial interest in the use of machine learning (ML) based
...
In several settings of practical interest, two parties seek to
collabora...
Conventional Hardware Trojan (HT) detection techniques are based on the
...
Deep neural networks (DNN) are increasingly being accelerated on
applica...
Deep neural networks (DNNs) provide excellent performance across a wide ...
Hardware accelerators are being increasingly deployed to boost the
perfo...
Due to their growing popularity and computational cost, deep neural netw...