Testability and dependability of AI hardware: Survey, trends, challenges, and perspectives
F Su, C Liu, HG Stratigopoulos - IEEE Design & Test, 2023 - ieeexplore.ieee.org
Hardware realization of artificial intelligence (AI) requires new design styles and even
underlying technologies than those used in traditional digital processors or logic circuits …
underlying technologies than those used in traditional digital processors or logic circuits …
Exploring Winograd convolution for cost-effective neural network fault tolerance
Winograd is generally utilized to optimize convolution performance and computational
efficiency because of the reduced multiplication operations, but the reliability issues brought …
efficiency because of the reduced multiplication operations, but the reliability issues brought …
SwiftTron: An efficient hardware accelerator for quantized transformers
A Marchisio, D Dura, M Capra… - … Joint Conference on …, 2023 - ieeexplore.ieee.org
Transformers' compute-intensive operations pose enormous challenges for their deployment
in resource-constrained EdgeAI/tiny ML devices. As an established neural network …
in resource-constrained EdgeAI/tiny ML devices. As an established neural network …
A Homomorphic Encryption Framework for Privacy-Preserving Spiking Neural Networks
F Nikfam, R Casaburi, A Marchisio, M Martina… - Information, 2023 - mdpi.com
Machine learning (ML) is widely used today, especially through deep neural networks
(DNNs); however, increasing computational load and resource requirements have led to …
(DNNs); however, increasing computational load and resource requirements have led to …
Embodied neuromorphic artificial intelligence for robotics: Perspectives, challenges, and research development stack
Robotic technologies have been an indispensable part for improving human productivity
since they have been helping humans in completing diverse, complex, and intensive tasks …
since they have been helping humans in completing diverse, complex, and intensive tasks …
Rohnas: A neural architecture search framework with conjoint optimization for adversarial robustness and hardware efficiency of convolutional and capsule networks
Neural Architecture Search (NAS) algorithms aim at finding efficient Deep Neural Network
(DNN) architectures for a given application under given system constraints. DNNs are …
(DNN) architectures for a given application under given system constraints. DNNs are …
fakeWeather: Adversarial attacks for deep neural networks emulating weather conditions on the camera lens of autonomous systems
A Marchisio, G Caramia, M Martina… - … Joint Conference on …, 2022 - ieeexplore.ieee.org
Recently, Deep Neural Networks (DNNs) have achieved remarkable performances in many
applications, while several studies have enhanced their vulnerabilities to malicious attacks …
applications, while several studies have enhanced their vulnerabilities to malicious attacks …
Explainable-DSE: An Agile and Explainable Exploration of Efficient HW/SW Codesigns of Deep Learning Accelerators Using Bottleneck Analysis
Effective design space exploration (DSE) is paramount for hardware/software codesigns of
deep learning accelerators that must meet strict execution constraints. For their vast search …
deep learning accelerators that must meet strict execution constraints. For their vast search …
RobCaps: evaluating the robustness of capsule networks against affine transformations and adversarial attacks
A Marchisio, A De Marco, A Colucci… - … Joint Conference on …, 2023 - ieeexplore.ieee.org
Capsule Networks (CapsNets) are able to hierarchically preserve the pose relationships
between multiple objects for image classification tasks. Other than achieving high accuracy …
between multiple objects for image classification tasks. Other than achieving high accuracy …
Adversarial ML for DNNs, CapsNets, and SNNs at the Edge
A Marchisio, MA Hanif, M Shafique - … Learning for Cyber-Physical, IoT, and …, 2023 - Springer
Recent studies have shown that Machine Learning (ML) algorithm suffers from several
vulnerability threats. Among them, adversarial attacks represent one of the most critical …
vulnerability threats. Among them, adversarial attacks represent one of the most critical …