Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 526 matches
- 2024
- Edut Katz, Moshe Avital, Itamar Levi:
Refined Analytical EM Model of IC-Internal Shielding for Hardware-Security and Intra-Device Simulative Framework. IEEE Access 12: 22205-22218 (2024) - Swati G. Mavinkattimath, Rajashri Khanai, Dattaprasad Torse, Nalini Iyer:
Design and implementation of low-power, high-speed, reliable and secured Hardware Accelerator using 28 nm technology for biomedical devices. Biomed. Signal Process. Control. 88(Part B): 105554 (2024) - Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez:
Single-board device individual authentication based on hardware performance and autoencoder transformer models. Comput. Secur. 137: 103596 (2024) - Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez:
Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification. Future Gener. Comput. Syst. 152: 30-42 (2024) - Negin Moghadasi, Mai Luu, Rahman O. Adekunle, Thomas L. Polmateer, Mark C. Manasco, John Marty Emmert, James H. Lambert:
Research and Development Priorities for Security of Embedded Hardware Devices. IEEE Trans. Engineering Management 71: 2800-2811 (2024) - Bowen Yao, Liansheng Liu, Yu Peng, Xiyuan Peng:
Intelligent Measurement on Edge Devices Using Hardware Memory-Aware Joint Compression Enabled Neural Networks. IEEE Trans. Instrum. Meas. 73: 1-13 (2024) - Zimeng Fan, Wei Hu, Fang Liu, Dian Xu, Hong Guo, Yanxiang He, Min Peng:
A Hardware Design Framework for Computer Vision Models Based on Reconfigurable Devices. ACM Trans. Reconfigurable Technol. Syst. 17(1): 2:1-2:31 (2024) - Abdurrahman Elmaghbub, Bechir Hamdaoui:
Domain-Agnostic Hardware Fingerprinting-Based Device Identifier for Zero-Trust IoT Security. IEEE Wirel. Commun. 31(2): 42-48 (2024) - Andrea Mattia Garavagno, Edoardo Ragusa, Antonio Frisoli, Paolo Gastaldo:
Running hardware-aware neural architecture search on embedded devices under 512MB of RAM. ICCE 2024: 1-2 - Abdurrahman Elmaghbub, Bechir Hamdaoui:
Domain-Agnostic Hardware Fingerprinting-Based Device Identifier for Zero-Trust IoT Security. CoRR abs/2402.05332 (2024) - Elia Cereda, Manuele Rusci, Alessandro Giusti, Daniele Palossi:
On-device Self-supervised Learning of Visual Perception Tasks aboard Hardware-limited Nano-quadrotors. CoRR abs/2403.04071 (2024) - Booy Vitas Faassen, Jorge Serrano, Paul D. Rosero-Montalvo:
Micro-Fracture Detection in Photovoltaic Cells with Hardware-Constrained Devices and Computer Vision. CoRR abs/2403.05694 (2024) - Andreas Ziegler, Karl Vetter, Thomas Gossard, Jonas Tebbe, Andreas Zell:
Spiking Neural Networks for Fast-Moving Object Detection on Neuromorphic Hardware Devices Using an Event-Based Camera. CoRR abs/2403.10677 (2024) - Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. CoRR abs/2403.15271 (2024) - 2023
- Larissa Groth:
A Vulnerability Management Solution for constrained IoT devices with a Trusted Execution Environment using a Hardware Root of Trust. Free University of Berlin, Germany, 2023 - Paul L. R. Olivier:
Improving Hardware-in-the-loop Dynamic Security Testing For Linux-based Embedded Devices. (Amélioration des tests de sécurité dynamiques "Hardware-in-the-Loop" pour les dispositifs embarqués basés sur Linux). Sorbonne University, Paris, France, 2023 - Mostafa Elbediwy, Bill Pontikakis, Jean-Pierre David, Yvon Savaria:
A Hardware Architecture of a Dynamic Ranking Packet Scheduler for Programmable Network Devices. IEEE Access 11: 61422-61436 (2023) - Issei Makino, Nobuhiko Miki:
Open-Source Hardware-Based Three-Dimensional Positioning Device for Indoor Measurement and Positioning. IEEE Access 11: 11254-11267 (2023) - Carsten Funck, Stefan Wiefels, Christopher Bengel, Kristoffer Schnieders, Susanne Hoffmann-Eifert, Regina Dittmann, Stephan Menzel:
A Physical Description of the Variability in Single-ReRAM Devices and Hardware-Based Neuronal Networks. Adv. Intell. Syst. 5(11) (2023) - Rama Muni Reddy Yanamala, Muralidhar Pullakandam:
A high-speed reusable quantized hardware accelerator design for CNN on constrained edge device. Des. Autom. Embed. Syst. 27(3): 165-189 (2023) - Sofana Reka Sudhakar Govindarajulu, Robin Karipat Justine, V. Ravi, Prakash Venugopal, Hassan Haes Alhelou:
Design and hardware demonstration of smart meter by cloud interface. IET Circuits Devices Syst. 17(2): 62-74 (2023) - Satish Mulleti, Eliya Reznitskiy, Shlomi Savariego, Moshe Namer, Nimrod Glazer, Yonina C. Eldar:
A hardware prototype of wideband high-dynamic range analog-to-digital converter. IET Circuits Devices Syst. 17(4): 181-192 (2023) - Mahan Rezaei, Abdolah Amirany, Mohammad Hossein Moaiyeri, Kian Jafari:
A high-capacity and nonvolatile spintronic associative memory hardware accelerator. IET Circuits Devices Syst. 17(4): 205-212 (2023) - Yongjia Yang, Jinyu Zhan, Wei Jiang, Yucheng Jiang, Antai Yu:
Neural architecture search for resource constrained hardware devices: A survey. IET Cyper-Phys. Syst.: Theory & Appl. 8(3): 149-159 (2023) - Ehsan Tanghatari, Mehdi Kamal, Ali Afzali-Kusha, Massoud Pedram:
Federated learning by employing knowledge distillation on edge devices with limited hardware resources. Neurocomputing 531: 87-99 (2023) - Argyrios Sideris, Theodora Sanida, Minas Dasygenis:
A Novel Hardware Architecture for Enhancing the Keccak Hash Function in FPGA Devices. Inf. 14(9): 475 (2023) - Yuan Gao, Yew-Soon Ong, Maoguo Gong, Fenlong Jiang, Yuanqiao Zhang, Shanfeng Wang:
Breaking Hardware Boundaries of IoT Devices via Inverse Feature Completion. IEEE Internet Things J. 10(6, March 15): 5519-5529 (2023) - Yuhong Song, Edwin Hsing-Mean Sha, Qingfeng Zhuge, Rui Xu, Xiaowei Xu, Bingzhe Li, Lei Yang:
Hardware-aware neural architecture search for stochastic computing-based neural networks on tiny devices. J. Syst. Archit. 135: 102810 (2023) - Ingo Hoyer, Alexander Utz, André Lüdecke, Holger Kappert, Maurice Rohr, Christoph Hoog Antink, Karsten Seidl:
Design of Hardware Accelerators for Optimized and Quantized Neural Networks to Detect Atrial Fibrillation in Patch ECG Device with RISC-V. Sensors 23(5): 2703 (2023) - Juan José López, Paula Lamo:
Rapid IoT Prototyping: A Visual Programming Tool and Hardware Solutions for LoRa-Based Devices. Sensors 23(17): 7511 (2023)
skipping 496 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 06:15 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint