Picture for Indranil Chakraborty

Indranil Chakraborty

Pruning for Improved ADC Efficiency in Crossbar-based Analog In-memory Accelerators

Add code
Mar 19, 2024
Viaarxiv icon

WWW: What, When, Where to Compute-in-Memory

Add code
Dec 26, 2023
Viaarxiv icon

On the Noise Stability and Robustness of Adversarially Trained Networks on NVM Crossbars

Add code
Sep 19, 2021
Figure 1 for On the Noise Stability and Robustness of Adversarially Trained Networks on NVM Crossbars
Figure 2 for On the Noise Stability and Robustness of Adversarially Trained Networks on NVM Crossbars
Figure 3 for On the Noise Stability and Robustness of Adversarially Trained Networks on NVM Crossbars
Figure 4 for On the Noise Stability and Robustness of Adversarially Trained Networks on NVM Crossbars
Viaarxiv icon

Complexity-aware Adaptive Training and Inference for Edge-Cloud Distributed AI Systems

Add code
Sep 14, 2021
Figure 1 for Complexity-aware Adaptive Training and Inference for Edge-Cloud Distributed AI Systems
Figure 2 for Complexity-aware Adaptive Training and Inference for Edge-Cloud Distributed AI Systems
Figure 3 for Complexity-aware Adaptive Training and Inference for Edge-Cloud Distributed AI Systems
Figure 4 for Complexity-aware Adaptive Training and Inference for Edge-Cloud Distributed AI Systems
Viaarxiv icon

NAX: Co-Designing Neural Network and Hardware Architecture for Memristive Xbar based Computing Systems

Add code
Jun 23, 2021
Figure 1 for NAX: Co-Designing Neural Network and Hardware Architecture for Memristive Xbar based Computing Systems
Figure 2 for NAX: Co-Designing Neural Network and Hardware Architecture for Memristive Xbar based Computing Systems
Figure 3 for NAX: Co-Designing Neural Network and Hardware Architecture for Memristive Xbar based Computing Systems
Figure 4 for NAX: Co-Designing Neural Network and Hardware Architecture for Memristive Xbar based Computing Systems
Viaarxiv icon

Robustness Hidden in Plain Sight: Can Analog Computing Defend Against Adversarial Attacks?

Add code
Aug 27, 2020
Figure 1 for Robustness Hidden in Plain Sight: Can Analog Computing Defend Against Adversarial Attacks?
Figure 2 for Robustness Hidden in Plain Sight: Can Analog Computing Defend Against Adversarial Attacks?
Figure 3 for Robustness Hidden in Plain Sight: Can Analog Computing Defend Against Adversarial Attacks?
Figure 4 for Robustness Hidden in Plain Sight: Can Analog Computing Defend Against Adversarial Attacks?
Viaarxiv icon

Conditionally Deep Hybrid Neural Networks Across Edge and Cloud

Add code
May 21, 2020
Figure 1 for Conditionally Deep Hybrid Neural Networks Across Edge and Cloud
Figure 2 for Conditionally Deep Hybrid Neural Networks Across Edge and Cloud
Figure 3 for Conditionally Deep Hybrid Neural Networks Across Edge and Cloud
Figure 4 for Conditionally Deep Hybrid Neural Networks Across Edge and Cloud
Viaarxiv icon

IMAC: In-memory multi-bit Multiplication andACcumulation in 6T SRAM Array

Add code
Mar 27, 2020
Figure 1 for IMAC: In-memory multi-bit Multiplication andACcumulation in 6T SRAM Array
Figure 2 for IMAC: In-memory multi-bit Multiplication andACcumulation in 6T SRAM Array
Figure 3 for IMAC: In-memory multi-bit Multiplication andACcumulation in 6T SRAM Array
Figure 4 for IMAC: In-memory multi-bit Multiplication andACcumulation in 6T SRAM Array
Viaarxiv icon

PCA-driven Hybrid network design for enabling Intelligence at the Edge

Add code
Jun 04, 2019
Figure 1 for PCA-driven Hybrid network design for enabling Intelligence at the Edge
Figure 2 for PCA-driven Hybrid network design for enabling Intelligence at the Edge
Figure 3 for PCA-driven Hybrid network design for enabling Intelligence at the Edge
Figure 4 for PCA-driven Hybrid network design for enabling Intelligence at the Edge
Viaarxiv icon

Discretization based Solutions for Secure Machine Learning against Adversarial Attacks

Add code
Feb 11, 2019
Figure 1 for Discretization based Solutions for Secure Machine Learning against Adversarial Attacks
Figure 2 for Discretization based Solutions for Secure Machine Learning against Adversarial Attacks
Figure 3 for Discretization based Solutions for Secure Machine Learning against Adversarial Attacks
Figure 4 for Discretization based Solutions for Secure Machine Learning against Adversarial Attacks
Viaarxiv icon