Abstract: With the advent of the post-Moore era, Field Programmable Gate Array (FPGA) is widely used in various fields such as Internet of Things (IoTs), 5G communication, aerospace, weapons and equipment because of its flexible repetitive programmable charact...
Abstract: Logic synthesis is a critical step in the Electronic Design Automation(EDA). Traditional global heuristic-based logic synthesis has many challenges as computing power keeps increasing and new computing paradigms emerge. There is a problem with heuris...
Abstract: Multi-core chips can provide mighty computing capability for mobile intelligent terminals, but their performance is constraint by thermal and power issues. For this problem, this paper proposes a multi-core chip dynamic power management framework bas...
Abstract: With the increasing scarcity of medical resources and the aging of the population, cardiovascular disease has posed a great threat to human health. Portable devices with ElectroCardioGram (ECG) detection can effectively reduce the threat of cardiovas...
Abstract: The Physical Unclonable Function (PUF) can extract the process error of the integrated circuit during the processing and convert it into a key for security authentication. It is often used in occasions where resources and power consumption are limite...
Abstract: The electromagnetic side channel information has the characteristics of complexity, disorder and low signal-to-noise ratio, which has a great impact on the results of side channel analysis. Based on the characteristics of electromagnetic data, in thi...
Abstract: To solve the security problems of long chip production chain, poor security and low reliability, leading to prevent Hardware Trojan (HT) detection, an HT detection method based on bypass signal analysis is proposed, by means of Linear Discriminant An...
Abstract: SR Latches Physical Unclonable Functions (PUFs) are the most popular FPGA-based cryptographic applications and have a broad market in lightweight IoT devices. To realize a symmetric unbiased SR latch PUF, different implementation methods that increas...
Abstract: For stream cipher algorithms of different granularity, reconfigurable cryptographic processors have poor compatibility and low implementation performance. In this paper, the multi-level parallelism of stream cipher algorithms is analyzed and a pre-ex...
Abstract: Floating-point multipliers are the key operational units in High Dynamic Range(HDR) image processing and wireless communication systems. Compared to the fixed-point multipliers, floating-point multipliers have a higher dynamic range and also higher c...
Abstract: As the Integrated Circuit (IC) industry enters the post-Moore era, the cost of one-time chip design is getting higher and higher, and threats of reverse engineering to recover the original design increase continually. In order to resist the reverse a...
Abstract: Graph Convolutional Networks (GCNs) have superior performance in tasks such as social networking, ecommerce, molecular structure reasoning relative to traditional artificial intelligence algorithms, and have gained intensive attention in recent years...
Abstract: In this paper, an Integrate-and-Fire (IF) analog readout neuron circuit is proposed for Spiking Convolutional Neural Network (SCNN) based on flash array. The circuit realizes the following functions: bit line voltage clamping, current readout, curren...
Abstract: The improvement of application efficiency of heterogeneous computing systems is highly dependent on effective scheduling algorithms. A new list scheduling algorithm called Improved Predict Priority and Optimistic processor Selection Scheduling (IPPOS...
Abstract: With the progress of modern communication technology, especially the rapid development of 4G, 5G and other wireless mobile communications, modulation methods with high spectrum efficiency such as multi-Quadrature Amplitude Modulation (QAM) have been ...
Abstract: A Micro-Electro-Mechanical System (MEMS) electric field sensor with low driving voltage based on Lead Zirconate Titanate (PZT) is proposed. Based on the charge-induction principle, the sensitive units are composed of fixed electrodes and movable elec...
Abstract: In view of the problem that the change of the density of the label distribution will lead to the change of the impedance matching relationship between the antenna and the load, and then affect the system performance. Based on the theory of electromag...
Abstract: Gap Waveguide (GW) is a new kind of artificial ElectroMagnetic (EM) material based on contactless Electromagnetic Band Gap(EBG) structure. The unique contactless structure and wide EM forbidden band of GW show great advantages and flexibility in deve...
Abstract: The antenna array composed of UAVs (Unmanned Aerial Vehicle Swarm) often presents near-field and sparse characteristics, which can not be adapted by the classical beamforming theory. Therefore, the near-field uniform linear array signal model is firs...
Abstract: Focusing on the optimal tracking problem of multiple extended targets, a sensor control method is proposed, which can comprehensively optimize the tracking performance of multiple extended targets in the framework of FInite Set STatistics (FISST). Fi...
Abstract: To overcome the beam split effect in ultra-bandwidth terahertz communications, the True Time Delay (TTD)-based large array antenna structures have been designed, while the power consumption and the hardware complexity both are high. To solve this pro...
Abstract: In recent years, deep learning has become one of the key technologies in the field of wireless communication. In a series of MIMO signal detection algorithms based on deep learning, most of them do not fully consider the interference cancellation pro...
Abstract: With the rise of Internet social platforms and the popularization of mobile smart terminal devices, people's demand for high-quality and real-time data has risen sharply, especially for video services such as short videos and live streams. At the sam...
Abstract: Considering the non-negligible communication cost problem caused by redundant gradient interactive communication between a large number of device nodes in the Federated Learning(FL) process in the Internet of Things (IoTs) scenario, gradient communic...
Abstract: In a cellular network scenario that supports direct Vehicle-to-Vehicle(V2V) communication, the resource allocation problem of the uplink of multiple Vehicle-to-Infrastructure (V2I) in a dense environment is used. Under the interference of V2V, the sl...
Abstract: To solve the problems of signal distortion at the transceivers, information leakage and transmission interruption of users in multi-cell multi-user heterogeneous networks, a robust secure resource allocation algorithm is proposed with distortion nois...
Abstract: Driven by the rapid development of the Internet of Things, mobile Ad Hoc cloud computing and Energy Harvesting (EH) technologies meet the needs of data processing by sharing the idle resources of adjacent devices, and realize green communication. How...
Abstract: For the problem of Service Function Chain (SFC) anomalies due to hardware and software anomalies in network slicing scenarios, a Distributed Generative Adversarial Network (GAN)-based Time Series anomaly detection model (DTSGAN) is proposed. First, t...
Abstract: To address the problem that in-vehicle cyber communication messages are easily captured, an Endogenous Security Mechanism for in-Vehicle Networks (ESM-VN) based on Dynamic Heterogeneous Redundancy (DHR) architecture is proposed. Firstly, the model of...
Abstract: The GEostationary Orbit(GEO) GF-4 satellite has the ability to observe continuously moving ships at sea. Ship targets are often weak in the optical remote sensing images of GF-4 satellite, making it difficult to detect directly. By analyzing the wake...
Abstract: Multi-exposure image fusion aims to fuse a series of images with different exposures for the same scene, and it is the main-stream method for high dynamic range imaging. To obtain more realistic results, a Multi-Exposure image Fusion Network(MEF-Net)...
Abstract: The video frame type decision is one of the key factors affecting the efficiency of video coding. This paper proposes an adaptive video frame type decision algorithm based on local luminance histogram to improve the x265 encoding performance. Firstly...
Abstract: Considering the problem of low recognition accuracy of Specific Emitter Identification (SEI) and high cost of single training, an SEI scheme based on incremental learning is proposed in this paper, multiple Continuous Incremental Deep Extreme Learnin...
Abstract: Gene expression data is usually characterized by high dimension, few samples and uneven classification distribution. How to extract the effective features of gene expression data is a critical problem of gene classification. With the help of correlat...
Abstract: Cross-modal person Re-IDentification (Re-ID) is a challenging problem for intelligent surveillance systems, and existing cross-modal research approaches are mainly based on global or local learning representation of differentiated modal shared featur...
Abstract: Occluded object segmentation is a difficult problem in instance segmentation, but it has great practical value in many industrial applications such as stacked parcel segmentation on logistics automatic sorting. In this paper, an occluded object segme...
Abstract: TweAES is one of the second-round candidates in the NIST Lightweight Cryptography Standardization competition. The related-tweak multiple impossible differentials attack of 8-round TweAES is presented. Firstly, two types of impossible differential di...
Abstract: Linear Complementary Dual (LCD) codes have important applications to resisting side-channel analysis and fault-injection attacks. A method is proposed to construct ternary LCD codes by using linear codes over ring \begin{document}$ {\mathbb{F}_3} + u...
Abstract: Among the Compressed Sensing(CS) reconstruction algorithms, greedy algorithm has been widely studied for its simple hardware implementation and excellent recovery accuracy. However, the diversity of algorithms also presents the problem of difficult a...
Abstract: In the cloud era, cloud Application Programming Interface (API) is the best carrier for service delivery, capability replication and data output. However, cloud API increases the exposure and attack surface of cloud application while opening up servi...