Generative poisoning attack method against neural networks C Yang, Q Wu, H Li, Y Chen arXiv preprint arXiv:1703.01340, 2017 | 259 | 2017 |
A spiking neuromorphic design with resistive crossbar C Liu, B Yan, C Yang, L Song, Z Li, B Liu, Y Chen, H Li, Q Wu, H Jiang Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015 | 153 | 2015 |
Defending against gan-based deepfake attacks via transformation-aware adversarial faces C Yang, L Ding, Y Chen, H Li 2021 international joint conference on neural networks (IJCNN), 1-8, 2021 | 50 | 2021 |
Security of neuromorphic computing: thwarting learning attacks using memristor's obsolescence effect C Yang, B Liu, H Li, Y Chen, M Barnell, Q Wu, W Wen, J Rajendran 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-6, 2016 | 24 | 2016 |
Thwarting replication attack against memristor-based neuromorphic computing system C Yang, B Liu, H Li, Y Chen, M Barnell, Q Wu, W Wen, J Rajendran IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2019 | 21 | 2019 |
Hybrid spiking-based multi-layered self-learning neuromorphic system based on memristor crossbar arrays AM Hassan, C Yang, C Liu, HH Li, Y Chen Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 …, 2017 | 18 | 2017 |
An overview on memristor crossabr based neuromorphic circuit and architecture Z Li, C Liu, Y Wang, B Yan, C Yang, J Yang, H Li 2015 IFIP/IEEE International Conference on Very Large Scale Integration …, 2015 | 17 | 2015 |
Security of neuromorphic systems: Challenges and solutions B Liu, C Yang, H Li, Y Chen, Q Wu, M Barnell 2016 IEEE International Symposium on Circuits and Systems (ISCAS), 1326-1329, 2016 | 16 | 2016 |
The applications of NVM technology in hardware security C Yang, B Liu, Y Wang, Y Chen, H Li, X Zhang, G Sun Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 311-316, 2016 | 12 | 2016 |
Designing neuromorphic computing systems with memristor devices AM Hassan, C Liu, C Yang, H Li, Y Chen Handbook of Memristor Networks, 469-494, 2019 | 4 | 2019 |
Neuromorphic computing systems: From cmos to emerging nonvolatile memory C Yang, X Qiao, Y Chen IPSJ Transactions on System and LSI Design Methodology 12, 53-64, 2019 | 4 | 2019 |
AdaTT: Adaptive Task-to-Task Fusion Network for Multitask Learning in Recommendations D Li, Z Zhang, S Yuan, M Gao, W Zhang, C Yang, X Liu, J Yang Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and …, 2023 | 3 | 2023 |
Spiking-based matrix computation by leveraging memristor crossbar array HH Li, C Liu, B Yan, C Yang, L Song, Z Li, Y Chen, W Zhu, Q Wu, H Jiang 2015 IEEE Symposium on Computational Intelligence for Security and Defense …, 2015 | 3 | 2015 |
Enhancing generalization of wafer defect detection by data discrepancy-aware preprocessing and contrast-varied augmentation C Yang, H Li, Y Chen, J Hu 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), 145-150, 2020 | 1 | 2020 |
Security and Robustness in Neuromorphic Computing and Deep Learning C Yang Duke University, 2020 | 1 | 2020 |
Nanoscale Memory Architectures for Neuromorphic Computing C Yang, H Li, Y Chen Security Opportunities in Nano Devices and Emerging Technologies, 215-234, 2017 | | 2017 |
Security challenges in smart surveillance systems and the solutions based on emerging nano-devices C Yang, C Wu, H Li, Y Chen, M Barnell, Q Wu 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-6, 2016 | | 2016 |