Cited By
View all- Samtani SRaff EAnderson H(2024)Applied Machine Learning for Information SecurityDigital Threats: Research and Practice10.1145/36520295:1(1-5)Online publication date: 5-Apr-2024
- Qu SZhao SLi BHe YCai XZhang LWang YTsafrir DMusuvathi MGupta RAbu-Ghazaleh N(2024)CIM-MLC: A Multi-level Compilation Stack for Computing-In-Memory AcceleratorsProceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 210.1145/3620665.3640359(185-200)Online publication date: 27-Apr-2024
- Sharma GMallik RPandey NSingh A(2024)Effect of Interfering Transmitter on the Secrecy of Diffusive Molecular Timing ChannelsIEEE Transactions on Communications10.1109/TCOMM.2024.336562972:6(3323-3337)Online publication date: Jun-2024
- Show More Cited By