Alert button
Picture for Farhad Merchant

Farhad Merchant

Alert button

IMBUE: In-Memory Boolean-to-CUrrent Inference ArchitecturE for Tsetlin Machines

Add code
Bookmark button
Alert button
May 22, 2023
Omar Ghazal, Simranjeet Singh, Tousif Rahman, Shengqi Yu, Yujin Zheng, Domenico Balsamo, Sachin Patkar, Farhad Merchant, Fei Xia, Alex Yakovlev, Rishad Shafik

Figure 1 for IMBUE: In-Memory Boolean-to-CUrrent Inference ArchitecturE for Tsetlin Machines
Figure 2 for IMBUE: In-Memory Boolean-to-CUrrent Inference ArchitecturE for Tsetlin Machines
Figure 3 for IMBUE: In-Memory Boolean-to-CUrrent Inference ArchitecturE for Tsetlin Machines
Figure 4 for IMBUE: In-Memory Boolean-to-CUrrent Inference ArchitecturE for Tsetlin Machines
Viaarxiv icon

Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities

Add code
Bookmark button
Alert button
Jul 21, 2021
Dominik Sisejkovic, Lennart M. Reimann, Elmira Moussavi, Farhad Merchant, Rainer Leupers

Figure 1 for Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities
Figure 2 for Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities
Figure 3 for Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities
Figure 4 for Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities
Viaarxiv icon

Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks

Add code
Bookmark button
Alert button
Jul 19, 2021
Dominik Sisejkovic, Farhad Merchant, Lennart M. Reimann, Rainer Leupers

Figure 1 for Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks
Figure 2 for Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks
Figure 3 for Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks
Figure 4 for Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks
Viaarxiv icon

Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach

Add code
Bookmark button
Alert button
Nov 30, 2020
Dominik Sisejkovic, Farhad Merchant, Lennart M. Reimann, Harshit Srivastava, Ahmed Hallawa, Rainer Leupers

Figure 1 for Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach
Figure 2 for Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach
Figure 3 for Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach
Figure 4 for Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach
Viaarxiv icon

ExPAN(N)D: Exploring Posits for Efficient Artificial Neural Network Design in FPGA-based Systems

Add code
Bookmark button
Alert button
Oct 27, 2020
Suresh Nambi, Salim Ullah, Aditya Lohana, Siva Satyendra Sahoo, Farhad Merchant, Akash Kumar

Figure 1 for ExPAN(N)D: Exploring Posits for Efficient Artificial Neural Network Design in FPGA-based Systems
Figure 2 for ExPAN(N)D: Exploring Posits for Efficient Artificial Neural Network Design in FPGA-based Systems
Figure 3 for ExPAN(N)D: Exploring Posits for Efficient Artificial Neural Network Design in FPGA-based Systems
Figure 4 for ExPAN(N)D: Exploring Posits for Efficient Artificial Neural Network Design in FPGA-based Systems
Viaarxiv icon