Cited By
View all- Samtani SRaff EAnderson H(2024)Applied Machine Learning for Information SecurityDigital Threats: Research and Practice10.1145/36520295:1(1-5)Online publication date: 5-Apr-2024
- Qu SZhao SLi BHe YCai XZhang LWang YTsafrir DMusuvathi MGupta RAbu-Ghazaleh N(2024)CIM-MLC: A Multi-level Compilation Stack for Computing-In-Memory AcceleratorsProceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 210.1145/3620665.3640359(185-200)Online publication date: 27-Apr-2024
- Li HLi XFan QHe QWang XLeung V(2024)Distributed DNN Inference With Fine-Grained Model Partitioning in Mobile Edge Computing NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2024.335787423:10(9060-9074)Online publication date: 1-Oct-2024
- Show More Cited By