default search action
Sunny Raj
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Akash Chavan, Pranav Sinha, Sunny Raj:
In-memory Machine Learning using Adaptive Multivariate Decision Trees and Memristors. ISCAS 2024: 1-5 - 2023
- [c15]Akash Chavan, Pranav Sinha, Sunny Raj:
In-Memory Machine Learning Using Hybrid Decision Trees and Memristor Crossbars. iSES 2023: 248-253 - 2022
- [c14]Pranav Sinha, Sunny Raj:
Designing Energy-Efficient Decision Tree Memristor Crossbar Circuits Using Binary Classification Graphs. ICCAD 2022: 36:1-36:9 - 2020
- [j4]Sunny Raj, Jodh S. Pannu, Steven Lawrence Fernandes, Arvind Ramanathan, Laura L. Pullum, Sumit Kumar Jha:
Attacking NIST biometric image software using nonlinear optimization. Pattern Recognit. Lett. 131: 79-84 (2020) - [j3]Jodh S. Pannu, Sunny Raj, Steven Lawrence Fernandes, Dwaipayan Chakraborty, Sarah Rafiq, Nathaniel C. Cady, Sumit Kumar Jha:
Design and Fabrication of Flow-Based Edge Detection Memristor Crossbar Circuits1. IEEE Trans. Circuits Syst. II Express Briefs 67-II(5): 961-965 (2020) - [c13]Steven Lawrence Fernandes, Sunny Raj, Rickard Ewetz, Jodh Singh Pannu, Sumit Kumar Jha, Eddy Ortiz, Iustina Vintila, Margaret Salter:
Detecting Deepfake Videos using Attribution-Based Confidence Metric. CVPR Workshops 2020: 1250-1259 - [c12]Dwaipayan Chakraborty, Andy Michel, Jodh S. Pannu, Sunny Raj, Suresh Chandra Satapathy, Steven Lawrence Fernandes, Sumit Kumar Jha:
Automated Synthesis of Memristor Crossbars Using Deep Neural Networks. FICTA (2) 2020: 345-357 - [i2]Sumit Kumar Jha, Susmit Jha, Rickard Ewetz, Sunny Raj, Alvaro Velasquez, Laura L. Pullum, Ananthram Swami:
An Extension of Fano's Inequality for Characterizing Model Susceptibility to Membership Inference Attacks. CoRR abs/2009.08097 (2020)
2010 – 2019
- 2019
- [j2]Dwaipayan Chakraborty, Sunny Raj, Steven Lawrence Fernandes, Sumit Kumar Jha:
Input-Aware Flow-Based Computing on Memristor Crossbars With Applications to Edge Detection. IEEE J. Emerg. Sel. Topics Circuits Syst. 9(3): 580-591 (2019) - [c11]Steven Lawrence Fernandes, Sunny Raj, Eddy Ortiz, Iustina Vintila, Sumit Kumar Jha:
Directed Adversarial Attacks on Fingerprints using Attributions. ICB 2019: 1-8 - [c10]Steven Lawrence Fernandes, Sunny Raj, Eddy Ortiz, Iustina Vintila, Margaret Salter, Gordana Urosevic, Sumit Kumar Jha:
Predicting Heart Rate Variations of Deepfake Videos using Neural ODE. ICCV Workshops 2019: 1721-1729 - [c9]Mesut Ozdag, Sunny Raj, Steven Lawrence Fernandes, Alvaro Velasquez, Laura Pullum, Sumit Kumar Jha:
On the Susceptibility of Deep Neural Networks to Natural Perturbations. AISafety@IJCAI 2019 - [c8]Susmit Jha, Sunny Raj, Steven Lawrence Fernandes, Sumit Kumar Jha, Somesh Jha, Brian Jalaian, Gunjan Verma, Ananthram Swami:
Attribution-Based Confidence Metric For Deep Neural Networks. NeurIPS 2019: 11826-11837 - [i1]Susmit Jha, Sunny Raj, Steven Lawrence Fernandes, Sumit Kumar Jha, Somesh Jha, Gunjan Verma, Brian Jalaian, Ananthram Swami:
Attribution-driven Causal Analysis for Detection of Adversarial Examples. CoRR abs/1903.05821 (2019) - 2018
- [c7]Susmit Jha, Sunny Raj, Sumit Kumar Jha, Natarajan Shankar:
Duality-Based Nested Controller Synthesis from STL Specifications for Stochastic Linear Systems. FORMATS 2018: 235-251 - [c6]Sunny Raj, Sumit Kumar Jha:
Predicting Success in Undergraduate Parallel Programming via Probabilistic Causality Analysis. IPDPS Workshops 2018: 347-352 - 2017
- [j1]Sunny Raj, Faraz Hussain, Zubir Husein, Neslisah Torosdagli, Damla Turgut, Narsingh Deo, Sumanta N. Pattanaik, Chung-Che Jeff Chang, Sumit Kumar Jha:
A theorem proving approach for automatically synthesizing visualizations of flow cytometry data. BMC Bioinform. 18(8): 245:1-245:11 (2017) - [c5]Sunny Raj, Sumit Kumar Jha, Arvind Ramanathan, Laura L. Pullum:
Testing autonomous cyber-physical systems using fuzzing features from convolutional neural networks: work-in-progress. EMSOFT Companion 2017: 1:1-1:2 - [c4]Sunny Raj, Laura Pullum, Arvind Ramanathan, Sumit Kumar Jha:
SATYA : Defending Against Adversarial Attacks Using Statistical Hypothesis Testing. FPS 2017: 277-292 - [c3]Arvind Ramanathan, Laura L. Pullum, Zubir Husein, Sunny Raj, Neslisah Torosdagli, Sumanta N. Pattanaik, Sumit Kumar Jha:
Adversarial attacks on computer vision algorithms using natural perturbations. IC3 2017: 1-6 - [c2]Dwaipayan Chakraborty, Sunny Raj, Julio Cesar Gutierrez, Troyle Thomas, Sumit Kumar Jha:
In-Memory Execution of Compute Kernels Using Flow-Based Memristive Crossbar Computing. ICRC 2017: 1-6 - [c1]Dwaipayan Chakraborty, Sunny Raj, Sumit Kumar Jha:
A compact 8-bit adder design using in-memory memristive computing: Towards solving the Feynman Grand Prize challenge. NANOARCH 2017: 67-72
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint