Cited By
View all- Zou MZhu ZGreenberg-Toledo TLeitersdorf OLi JZhou JWang YDu NKvatinsky S(2024)TDPP: 2-D Permutation-Based Protection of Memristive Deep Neural NetworksIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.332235143:3(742-755)Online publication date: Mar-2024
- Liu RLi ZZhang XLi WShen LTang RLuo ZChen XHan YTang M(2024)Crypto-DSEDA: A Domain-Specific EDA Flow for CiM-Based Cryptographic AcceleratorsIEEE Design & Test10.1109/MDAT.2024.339598741:5(46-54)Online publication date: Oct-2024
- Thomas SWorkneh KIshimwe AMcKevitt ZCurlin PBahar RIzraelevitz JLehman T(2024)Baobab Merkle Tree for Efficient Secure MemoryIEEE Computer Architecture Letters10.1109/LCA.2024.336070923:1(33-36)Online publication date: Jan-2024
- Show More Cited By