Alert button
Picture for Priyadarshini Panda

Priyadarshini Panda

Alert button

Visual Explanations from Spiking Neural Networks using Interspike Intervals

Add code
Bookmark button
Alert button
Mar 26, 2021
Youngeun Kim, Priyadarshini Panda

Figure 1 for Visual Explanations from Spiking Neural Networks using Interspike Intervals
Figure 2 for Visual Explanations from Spiking Neural Networks using Interspike Intervals
Figure 3 for Visual Explanations from Spiking Neural Networks using Interspike Intervals
Figure 4 for Visual Explanations from Spiking Neural Networks using Interspike Intervals
Viaarxiv icon

Activation Density based Mixed-Precision Quantization for Energy Efficient Neural Networks

Add code
Bookmark button
Alert button
Jan 12, 2021
Karina Vasquez, Yeshwanth Venkatesha, Abhiroop Bhattacharjee, Abhishek Moitra, Priyadarshini Panda

Figure 1 for Activation Density based Mixed-Precision Quantization for Energy Efficient Neural Networks
Figure 2 for Activation Density based Mixed-Precision Quantization for Energy Efficient Neural Networks
Figure 3 for Activation Density based Mixed-Precision Quantization for Energy Efficient Neural Networks
Figure 4 for Activation Density based Mixed-Precision Quantization for Energy Efficient Neural Networks
Viaarxiv icon

Noise Sensitivity-Based Energy Efficient and Robust Adversary Detection in Neural Networks

Add code
Bookmark button
Alert button
Jan 05, 2021
Rachel Sterneck, Abhishek Moitra, Priyadarshini Panda

Figure 1 for Noise Sensitivity-Based Energy Efficient and Robust Adversary Detection in Neural Networks
Figure 2 for Noise Sensitivity-Based Energy Efficient and Robust Adversary Detection in Neural Networks
Figure 3 for Noise Sensitivity-Based Energy Efficient and Robust Adversary Detection in Neural Networks
Figure 4 for Noise Sensitivity-Based Energy Efficient and Robust Adversary Detection in Neural Networks
Viaarxiv icon

Exposing the Robustness and Vulnerability of Hybrid 8T-6T SRAM Memory Architectures to Adversarial Attacks in Deep Neural Networks

Add code
Bookmark button
Alert button
Nov 26, 2020
Abhishek Moitra, Priyadarshini Panda

Figure 1 for Exposing the Robustness and Vulnerability of Hybrid 8T-6T SRAM Memory Architectures to Adversarial Attacks in Deep Neural Networks
Figure 2 for Exposing the Robustness and Vulnerability of Hybrid 8T-6T SRAM Memory Architectures to Adversarial Attacks in Deep Neural Networks
Figure 3 for Exposing the Robustness and Vulnerability of Hybrid 8T-6T SRAM Memory Architectures to Adversarial Attacks in Deep Neural Networks
Figure 4 for Exposing the Robustness and Vulnerability of Hybrid 8T-6T SRAM Memory Architectures to Adversarial Attacks in Deep Neural Networks
Viaarxiv icon

Revisiting Batch Normalization for Training Low-latency Deep Spiking Neural Networks from Scratch

Add code
Bookmark button
Alert button
Oct 27, 2020
Youngeun Kim, Priyadarshini Panda

Figure 1 for Revisiting Batch Normalization for Training Low-latency Deep Spiking Neural Networks from Scratch
Figure 2 for Revisiting Batch Normalization for Training Low-latency Deep Spiking Neural Networks from Scratch
Figure 3 for Revisiting Batch Normalization for Training Low-latency Deep Spiking Neural Networks from Scratch
Figure 4 for Revisiting Batch Normalization for Training Low-latency Deep Spiking Neural Networks from Scratch
Viaarxiv icon

Compression-aware Continual Learning using Singular Value Decomposition

Add code
Bookmark button
Alert button
Sep 14, 2020
Varigonda Pavan Teja, Priyadarshini Panda

Figure 1 for Compression-aware Continual Learning using Singular Value Decomposition
Figure 2 for Compression-aware Continual Learning using Singular Value Decomposition
Figure 3 for Compression-aware Continual Learning using Singular Value Decomposition
Figure 4 for Compression-aware Continual Learning using Singular Value Decomposition
Viaarxiv icon

Rethinking Non-idealities in Memristive Crossbars for Adversarial Robustness in Neural Networks

Add code
Bookmark button
Alert button
Aug 25, 2020
Abhiroop Bhattacharjee, Priyadarshini Panda

Figure 1 for Rethinking Non-idealities in Memristive Crossbars for Adversarial Robustness in Neural Networks
Figure 2 for Rethinking Non-idealities in Memristive Crossbars for Adversarial Robustness in Neural Networks
Figure 3 for Rethinking Non-idealities in Memristive Crossbars for Adversarial Robustness in Neural Networks
Figure 4 for Rethinking Non-idealities in Memristive Crossbars for Adversarial Robustness in Neural Networks
Viaarxiv icon

Domain Adaptation without Source Data

Add code
Bookmark button
Alert button
Jul 11, 2020
Youngeun Kim, Sungeun Hong, Donghyeon Cho, Hyoungseob Park, Priyadarshini Panda

Figure 1 for Domain Adaptation without Source Data
Figure 2 for Domain Adaptation without Source Data
Figure 3 for Domain Adaptation without Source Data
Figure 4 for Domain Adaptation without Source Data
Viaarxiv icon