


default search action
IEEE Transactions on Emerging Topics in Computing, Volume 12
Volume 12, Number 1, January - March 2024
- Alberto Bosio
, Ronald F. DeMara, Deliang Fan, Nima TaheriNejad
:
Guest Editorial IEEE Transactions on Emerging Topics in Special Section on Emerging In-Memory Computing Architectures and Applications. 4-6 - Ben Perach
, Ronny Ronen
, Benny Kimelfeld
, Shahar Kvatinsky
:
Understanding Bulk-Bitwise Processing In-Memory Through Database Analytics. 7-22 - Yandong Luo
, Johan Vanderhaegen, Oleg Rybakov
, Martin Kraemer
, Niel Warren
, Shimeng Yu
:
A FeFET-Based ADC Offset Robust Compute-In-Memory Architecture for Streaming Keyword Spotting (KWS). 23-34 - Marco Paul E. Apolinario
, Adarsh Kumar Kosta
, Utkarsh Saxena
, Kaushik Roy
:
Hardware/Software Co-Design With ADC-Less In-Memory Computing Hardware for Spiking Neural Networks. 35-47 - Khakim Akhunov
, Kasim Sinan Yildirim
:
CRAM-Based Acceleration for Intermittent Computing of Parallelizable Tasks. 48-59 - Purab Ranjan Sutradhar
, Sathwika Bavikadi
, Sai Manoj Pudukotai Dinakarrao
, Mark A. Indovina
, Amlan Ganguly
:
3DL-PIM: A Look-Up Table Oriented Programmable Processing in Memory Architecture Based on the 3-D Stacked Memory for Data-Intensive Applications. 60-72 - Shaahin Angizi
, Mehrdad Morsali
, Sepehr Tabrizchi
, Arman Roohi
:
A Near-Sensor Processing Accelerator for Approximate Local Binary Pattern Networks. 73-83 - Yiming Chen, Mingyen Lee, Guohao Dai, Mufeng Zhou, Nagadastagiri Challapalle, Tianyi Wang, Yao Yu, Yongpan Liu, Yu Wang, Huazhong Yang, Vijaykrishnan Narayanan, Xueqing Li:
GRAPHIC: Gather and Process Harmoniously in the Cache With High Parallelism and Flexibility. 84-96 - Jia-Le Cui
, Yanan Guo
, Juntong Chen
, Bo Liu
, Hao Cai
:
Sparsity-Oriented MRAM-Centric Computing for Efficient Neural Network Inference. 97-108 - Ziyu Wang
, Fan-Hsuan Meng, Yongmo Park
, Jason K. Eshraghian
, Wei D. Lu
:
Side-Channel Attack Analysis on In-Memory Computing Architectures. 109-121 - Alessandro D'Amelio
, Jianyi Lin, Jean-Yves Ramel, Raffaella Lanzarotti:
Guest Editorial Emerging Trends and Advances in Graph-Based Methods and Applications. 122-125 - Meixia He, Jianrui Chen
, Maoguo Gong
, Zhongshi Shao:
HDGCN: Dual-Channel Graph Convolutional Network With Higher-Order Information for Robust Feature Learning. 126-138 - Xiaolin Li
, Qikui Xu, Zhenyu Xu, Hongyan Zhang, Li Xu
:
Graph Reconfigurable Pooling for Graph Representation Learning. 139-149 - Yong-Min Shin
, Cong Tran
, Won-Yong Shin
, Xin Cao
:
Edgeless-GNN: Unsupervised Representation Learning for Edgeless Nodes. 150-162 - Bo-Wei Zhao
, Lei Wang
, Pengwei Hu
, Leon Wong, Xiao-Rui Su
, Bao-Quan Wang, Zhu-Hong You
, Lun Hu
:
Fusing Higher and Lower-Order Biological Information for Drug Repositioning via Graph Representation Learning. 163-176 - Davide Bacciu
, Federico Errica
, Alessio Gravina
, Lorenzo Madeddu
, Marco Podda
, Giovanni Stilo
:
Deep Graph Networks for Drug Repurposing With Multi-Protein Targets. 177-189 - Binon Teji
, Swarup Roy
, Devendra Singh Dhami
, Dinabandhu Bhandari
, Pietro Hiram Guzzi
:
Graph Embedding Techniques for Predicting Missing Links in Biological Networks: An Empirical Evaluation. 190-201 - Benjamin Filtjens
, Bart Vanrumste
, Peter Slaets
:
Skeleton-Based Action Segmentation With Multi-Stage Spatial-Temporal Graph Convolutional Neural Networks. 202-212 - Federico Becattini
, Federico Maria Teotini, Alberto Del Bimbo
:
Transformer-Based Graph Neural Networks for Outfit Generation. 213-223 - Alejandro Álvarez-Ayllón
, Manuel Palomo-Duarte
, Juan Manuel Dodero
:
PresQ: Discovery of Multidimensional Equally-Distributed Dependencies via Quasi-Cliques on Hypergraphs. 224-239 - Feng Xia
, Xin Chen
, Shuo Yu
, Mingliang Hou
, Mujie Liu
, Linlin You
:
Coupled Attention Networks for Multivariate Time Series Anomaly Detection. 240-253 - Dongbo Zhou
, Hongwei Yu
, Jie Yu
, Shuai Zhao
, Wenhui Xu
, Qianqian Li
, Fengyin Cai
:
MFDS-STGCN: Predicting the Behaviors of College Students With Fine-Grained Spatial-Temporal Activities Data. 254-265 - Jinguang Han
, Patrick Schaumont
, Willy Susilo
:
Guest Editorial IEEE Transactions on Emerging Topics in Computing Special Section on Advances in Emerging Privacy-Preserving Computing. 266-268 - Aditya Pribadi Kalapaaking
, Ibrahim Khalil
, Xun Yi
:
Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems. 269-280 - Yaoqi Yang
, Bangning Zhang, Daoxing Guo
, Renhui Xu
, Chunhua Su
, Weizheng Wang
:
Age of Information Optimization for Privacy-Preserving Mobile Crowdsensing. 281-292 - Amir Fathalizadeh
, Vahideh Moghtadaiee
, Mina Alishahi:
Indoor Geo-Indistinguishability: Adopting Differential Privacy for Indoor Location Data Protection. 293-306 - Fangwei Wang
, Meiyun Xie, Zhiyuan Tan
, Qingru Li, Changguang Wang
:
Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation. 307-315 - Yue Zhang
, Youwen Zhu
, Yuqian Zhou, Jiabin Yuan:
Frequency Estimation Mechanisms Under ϵδ-Utility-Optimized Local Differential Privacy. 316-327 - Kyung Hyun Han
, Wai-Kong Lee
, Angshuman Karmakar
, Jose Maria Bermudo Mera
, Seong Oun Hwang
:
cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption. 328-343 - Supriya Adhikary
, Angshuman Karmakar
:
A Fast RLWE-Based IPFE Library and its Application to Privacy-Preserving Biometric Authentication. 344-356 - Irina Arévalo
, Jose L. Salmeron
:
A Chaotic Maps-Based Privacy-Preserving Distributed Deep Learning for Incomplete and Non-IID Datasets. 357-367 - Abdul Majeed
, Safiullah Khan
, Seong Oun Hwang
:
Towards Optimization of Privacy-Utility Trade-Off Using Similarity and Diversity Based Clustering. 368-385 - Mathias Brossard
, Guilhem Bryant
, Basma El Gaabouri, Xinxin Fan
, Alexandre Ferreira
, Edmund Grimley-Evans
, Christopher Haster
, Evan Johnson
, Derek Miller
, Fan Mo, Dominic P. Mulligan
, Nick Spinale
, Eric Van Hensbergen
, Hugo J. M. Vincent
, Shale Xiong
:
Private Delegated Computations Using Strong Isolation. 386-398
Volume 12, Number 2, April - June 2024
- Jia Wu, Jian Yang, Philip S. Yu, Carlo Condo:
Special Section on Community Detection in Time-Varying Information and Computing Networks: Theory, Models, and Applications. 402 - Yuyao Wang
, Jie Cao
, Zhan Bu, Mingming Leng
:
Temporal Dual-Attributed Network Generation Oriented Community Detection Model. 403-418 - Guan Wang
, Weihua Li
, Quan Bai
, Edmund M.-K. Lai
:
Maximizing Social Influence With Minimum Information Alteration. 419-431 - Jin Fan
, Zehao Wang
, Danfeng Sun
, Huifeng Wu
:
Sepformer-Based Models: More Efficient Models for Long Sequence Time-Series Forecasting. 432-443 - Jianliang Gao
, Jiamin Chen
, Babatounde Moctard Oloulade
, Raeed Al-Sabri
, Tengfei Lyu
, Ji Zhang
, Zhao Li
:
CommGNAS: Unsupervised Graph Neural Architecture Search for Community Detection. 444-454 - Shengwei Ji
, Chenyang Bu
, Lei Li
, Xindong Wu
:
LocalTGEP: A Lightweight Edge Partitioner for Time-Varying Graph. 455-466 - Libing Wu
, Youhua Xia
, Shuwen Min
, Zhenchang Xia
:
Deep Attentive Interest Collaborative Filtering for Recommender Systems. 467-481 - Gang Qu, Debdeep Mukhopadhyay, Nele Mentens, Weiqiang Liu:
Special Section on Emerging Topics in Hardware Computing Systems Security. 482 - Thien Duc Nguyen
, Markus Miettinen
, Alexandra Dmitrienko
, Ahmad-Reza Sadeghi
, Ivan Visconti
:
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges. 483-495 - Pantea Kiaei
, Yuan Yao
, Zhenyuan Liu
, Nicole Fern, Cees-Bart Breunesse, Jasper Van Woudenberg, Kate Gillis, Alex Dich, Peter Grossmann, Patrick Schaumont
:
Gate-Level Side-Channel Leakage Ranking With Architecture Correlation Analysis. 496-507 - Nojan Sheybani
, Xinqiao Zhang
, Siam Umar Hussain, Farinaz Koushanfar:
SenseHash: Computing on Sensor Values Mystified at the Origin. 508-520 - Stefano Longari, Alessandro Pozone, Jessica Leoni
, Mario Polino, Michele Carminati
, Mara Tanelli
, Stefano Zanero:
CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment. 521-531 - Huifeng Zhu
, Xiaolong Guo, Yier Jin
, Xuan Zhang
:
PowerScout: Security-Oriented Power Delivery Network Modeling for Side-Channel Vulnerability Analysis. 532-545 - Lichao Wu
, Guilherme Perin, Stjepan Picek
:
I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis. 546-557 - Francesco Flammini, Cristina Alcaraz
:
Guest Editorial Navigating the Nexus of Cyber Security and Resilience. 558 - Joseph Callenes
, Majid Poshtan
:
Dynamic Reconfiguration for Resilient State Estimation Against Cyber Attacks. 559-571 - Nelson L. Santos
, Bogdan Ghita
, Giovanni Luca Masala
:
Medical Systems Data Security and Biometric Authentication in Public Cloud Servers. 572-582 - Eduardo Alvarenga, Jan R. Brands, Peter Doliwa, Jerry den Hartog, Erik Kraft, Marcel Medwed, Ventzislav Nikov, Joost Renes, Martin Rosso, Tobias Schneider
, Nikita Veshchikov:
Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack Classifications. 583-600 - Francesco Flammini
, Cristina Alcaraz
, Emanuele Bellini
, Stefano Marrone, Javier López
, Andrea Bondavalli
:
Towards Trustworthy Autonomous Systems: Taxonomies and Future Perspectives. 601-614 - Emrah Tomur
, Zeki Bilgin
, Utku Gülen
, Elif Ustundag Soykan
, Leyli Karaçay
, Ferhat Karakoç
:
Intent-Based Security for Functional Safety in Cyber-Physical Systems. 615-630 - Valentina Casola
, Alessandra De Benedictis
, Carlo Mazzocca
, Rebecca Montanari
:
Designing Secure and Resilient Cyber-Physical Systems: A Model-Based Moving Target Defense Approach. 631-642 - Panagiotis I. Radoglou-Grammatikis
, Panagiotis G. Sarigiannidis
, Panagiotis D. Diamantoulakis
, Thomas Lagkas
, Theocharis Saoulidis, Eleftherios Fountoukidis, George K. Karagiannidis
:
Strategic Honeypot Deployment in Ultra-Dense Beyond 5G Networks: A Reinforcement Learning Approach. 643-655 - Nicolas Brisebarre
, Jean-Michel Muller
, Joris Picot
:
Error in Ulps of the Multiplication or Division by a Correctly-Rounded Function or Constant in Binary Floating-Point Arithmetic. 656-666 - Vasilis Sakellariou
, Vassilis Paliouras
, Ioannis Kouretas
, Hani H. Saleh
, Thanos Stouraitis
:
A Multiplier-Free RNS-Based CNN Accelerator Exploiting Bit-Level Sparsity. 667-683
Volume 12, Number 3, July - September 2024
- Yuan-Hao Chang, Paloma Díaz, Yunpeng Xiao:
Special Section on Emerging Social Computing. 686-687 - Li Jia
, Tinghuai Ma
, Huan Rong
, Najla Al-Nabhan
:
Affective Region Recognition and Fusion Network for Target-Level Multimodal Sentiment Classification. 688-699 - Xiaojuan Yang, Jiaxing Shang
, Qinghong Hu, Dajiang Liu
:
ARIS: Efficient Admitted Influence Maximizing in Large-Scale Networks Based on Valid Path Reverse Influence Sampling. 700-714 - Fei Hao
, Jie Gao
, Yaguang Lin
, Yulei Wu
, Jiaxing Shang
:
Concept Stability Entropy: A Novel Group Cohesion Measure in Social Networks. 715-726 - Aditi Seetha
, Satyendra Singh Chouhan
, Emmanuel S. Pilli
, Vaskar Raychoudhury
:
D$i$E$v$D: Disruptive Event Detection From Dynamic Datastreams Using Continual Machine Learning: A Case Study With Twitter. 727-738 - Mónica Sánchez-Francisco
, Paloma Díaz
, Teresa Onorati
, Alvaro Montero Montes
, Ignacio Aedo
:
Designing Mobile Technologies to Encourage Civic Engagement: The Role of Situated Motivational Affordances. 739-751 - Mingliang Hou
, Tao Tang
, Feng Xia
, Ibrahim A. Sultan
, Roopdeep Kaur
, Xiangjie Kong
:
MissII: Missing Information Imputation for Traffic Data. 752-765 - Kumari Jyoti
, Mohit Kumar Gautam
, Sanjay Kumar
, Sai Sushma
, Ram Bilas Pachori
, Shaibal Mukherjee
:
Memristive Crossbar Array-Based Computing Framework via DWT for Biomedical Image Enhancement. 766-779 - Alessio Burrello
, Matteo Risso
, Beatrice Alessandra Motetti
, Enrico Macii
, Luca Benini
, Daniele Jahier Pagliari
:
Enhancing Neural Architecture Search With Multiple Hardware Constraints for Deep Learning Model Deployment on Tiny IoT Devices. 780-794 - Zhaoxuan Dong
, Aijiao Cui
, Hao Lu
:
Non-Invasive Reverse Engineering of One-Hot Finite State Machines Using Scan Dump Data. 795-809 - Fumio Machida
:
Using Diversities to Model the Reliability of Two-Version Machine Learning Systems. 810-825 - Guangchao Zhao
, Zhiwei Zeng, Xingli Wang
, Abdelrahman G. Qoutb
, Philippe Coquet, Eby G. Friedman
, Beng Kang Tay
, Mingqiang Huang
:
Efficient Ternary Logic Circuits Optimized by Ternary Arithmetic Algorithms. 826-839 - Daniele Pretolesi
, Davide Garbarino
, Daniele Giampaoli
, Andrea Vian
, Annalisa Barla
:
Geometric Deep Learning Strategies for the Characterization of Academic Collaboration Networks. 840-851 - Boris Sedlak
, Ilir Murturi
, Praveen Kumar Donta
, Schahram Dustdar
:
A Privacy Enforcing Framework for Data Streams on the Edge. 852-863 - Bijay Raj Paudel
, Spyros Tragoudas:
Memristive Crossbar Array-Based Adversarial Defense Using Compression. 864-877 - Chuan-Chi Lai
, Hsuan-Yu Lin
, Chuan-Ming Liu
:
Distributed Indexing Schemes for K-Dominant Skyline Analytics on Uncertain Edge-IoT Data. 878-890 - Yu-Pang Wang
, Weichen Wang
, Yuan-Hao Chang
, Chieh-Lin Tsai
, Tei-Wei Kuo
, Chun-Feng Wu
, Chien-Chung Ho
, Han-Wen Hu
:
TCAM-GNN: A TCAM-Based Data Processing Strategy for GNN Over Sparse Graphs. 891-904 - Shekoofeh Moghimi
, Mohammad Reza Reshadinezhad
, Antonio Rubio
:
Toward Designing High-Speed Cost-Efficient Quantum Reversible Carry Select Adders. 905-917 - Xuan-Qui Pham
, Thien Huynh-The
, Dong-Seong Kim
:
Joint Partial Offloading and Resource Allocation for Parked Vehicle-Assisted Multi-Access Edge Computing. 918-923 - Zongjin Li
, Jie Zhang
, Jian Zhang
, Ya Zheng
, Xunjie Zong
:
Integrated Edge Computing and Blockchain: A General Medical Data Sharing Framework. 924-937 - Jeongmin Lim
, Young Geun Kim
, Sung Woo Chung
, Farinaz Koushanfar
, Joonho Kong
:
Near-Memory Computing With Compressed Embedding Table for Personalized Recommendation. 938-951
Volume 12, Number 4, October - December 2024
- Ke Chen
, Shanshan Liu
, Weiqiang Liu
, Fabrizio Lombardi
, Nader Bagherzadeh
:
Guest Editorial: Special Section on "Approximate Data Processing: Computing, Storage and Applications". 954-955 - Olivia Chen
, Renyuan Zhang
, Wenhui Luo
, Yanzhi Wang
, Nobuyuki Yoshikawa
:
Extremely Energy-Efficient Non-Linear Function Approximation Framework Using Stochastic Superconductor Devices. 956-967 - Gennaro Di Meo
, Gerardo Saggese
, Antonio G. M. Strollo
, Davide De Caro
:
Approximate MAC Unit Using Static Segmentation. 968-979 - Huiyi Gu
, Xiaotao Jia
, Yuhao Liu
, Jianlei Yang
, Xueyan Wang
, Youguang Zhang
, Sorin Dan Cotofana
, Weisheng Zhao
:
CiM-BNN:Computing-in-MRAM Architecture for Stochastic Computing Based Bayesian Neural Network. 980-990 - Tingting Zhang
, Zijing Niu
, Jie Han
:
A Design Framework for Hardware-Efficient Logarithmic Floating-Point Multipliers. 991-1001 - Zhen Gao
, Jinhua Zhu
, Pedro Reviriego
:
Reliability Evaluation and Fault Tolerant Design for KLL Sketches. 1002-1013 - Van-Tuan Tran
, Huy Hieu Pham, Kok-Seng Wong
:
Personalized Privacy-Preserving Framework for Cross-Silo Federated Learning. 1014-1024 - Kai Di
, Fulin Chen
, Yuanshuang Jiang
, Pan Li
, Tianyi Liu
, Yichuan Jiang
:
Adaptive Task Migration in Multiplex Networked Industrial Chains. 1025-1039 - Luca Bertaccini, Gianna Paulin, Matheus A. Cavalcante, Tim Fischer, Stefan Mach, Luca Benini:
MiniFloats on RISC-V Cores: ISA Extensions With Mixed-Precision Short Dot Products. 1040-1055 - Alfonso Sánchez-Macián
, Jorge Martínez
, Pedro Reviriego
, Shanshan Liu
, Fabrizio Lombardi
:
On the Privacy of the Count-Min Sketch: Extracting the Top-K Elements. 1056-1065 - Francesco Buccafurri
, Gianluca Lax
, Denis Migdal
, Lorenzo Musarella
, Christophe Rosenberger
:
Combining Trust Graphs and Keystroke Dynamics to Counter Fake Identities in Social Networks. 1066-1078 - Konstantinos Balaskas
, Andreas Karatzas
, Christos Sad
, Kostas Siozios
, Iraklis Anagnostopoulos
, Georgios Zervakis
, Jörg Henkel
:
Hardware-Aware DNN Compression via Diverse Pruning and Mixed-Precision Quantization. 1079-1092 - Nathaniel Hobbs
, Periklis A. Papakonstantinou
, Jaideep Vaidya
:
Engravings, Secrets, and Interpretability of Neural Networks. 1093-1104 - Huimin Zeng
, Zhenrui Yue
, Lanyu Shang
, Yang Zhang
, Dong Wang
:
Unsupervised Domain Adaptation via Contrastive Adversarial Domain Mixup: A Case Study on COVID-19. 1105-1116

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.