Picture for Yier Jin

Yier Jin

VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger

Add code
Feb 18, 2024
Figure 1 for VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Figure 2 for VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Figure 3 for VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Figure 4 for VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Viaarxiv icon

A Review and Comparison of AI Enhanced Side Channel Analysis

Add code
Feb 03, 2024
Viaarxiv icon

Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge

Add code
Jan 27, 2024
Figure 1 for Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge
Figure 2 for Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge
Figure 3 for Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge
Figure 4 for Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge
Viaarxiv icon

Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers

Add code
Sep 23, 2021
Figure 1 for Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers
Figure 2 for Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers
Figure 3 for Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers
Figure 4 for Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers
Viaarxiv icon

Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks

Add code
Mar 19, 2018
Figure 1 for Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks
Figure 2 for Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks
Figure 3 for Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks
Figure 4 for Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks
Viaarxiv icon

MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation

Add code
Mar 14, 2018
Figure 1 for MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation
Figure 2 for MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation
Figure 3 for MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation
Figure 4 for MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation
Viaarxiv icon

PT-Spike: A Precise-Time-Dependent Single Spike Neuromorphic Architecture with Efficient Supervised Learning

Add code
Mar 14, 2018
Figure 1 for PT-Spike: A Precise-Time-Dependent Single Spike Neuromorphic Architecture with Efficient Supervised Learning
Figure 2 for PT-Spike: A Precise-Time-Dependent Single Spike Neuromorphic Architecture with Efficient Supervised Learning
Figure 3 for PT-Spike: A Precise-Time-Dependent Single Spike Neuromorphic Architecture with Efficient Supervised Learning
Figure 4 for PT-Spike: A Precise-Time-Dependent Single Spike Neuromorphic Architecture with Efficient Supervised Learning
Viaarxiv icon

Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications

Add code
Dec 21, 2017
Figure 1 for Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications
Figure 2 for Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications
Figure 3 for Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications
Figure 4 for Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications
Viaarxiv icon