Picture for Priyadarshini Panda

Priyadarshini Panda

PrivateSNN: Fully Privacy-Preserving Spiking Neural Networks

Add code
Apr 07, 2021
Figure 1 for PrivateSNN: Fully Privacy-Preserving Spiking Neural Networks
Figure 2 for PrivateSNN: Fully Privacy-Preserving Spiking Neural Networks
Figure 3 for PrivateSNN: Fully Privacy-Preserving Spiking Neural Networks
Figure 4 for PrivateSNN: Fully Privacy-Preserving Spiking Neural Networks
Viaarxiv icon

Visual Explanations from Spiking Neural Networks using Interspike Intervals

Add code
Mar 26, 2021
Figure 1 for Visual Explanations from Spiking Neural Networks using Interspike Intervals
Figure 2 for Visual Explanations from Spiking Neural Networks using Interspike Intervals
Figure 3 for Visual Explanations from Spiking Neural Networks using Interspike Intervals
Figure 4 for Visual Explanations from Spiking Neural Networks using Interspike Intervals
Viaarxiv icon

Activation Density based Mixed-Precision Quantization for Energy Efficient Neural Networks

Add code
Jan 12, 2021
Figure 1 for Activation Density based Mixed-Precision Quantization for Energy Efficient Neural Networks
Figure 2 for Activation Density based Mixed-Precision Quantization for Energy Efficient Neural Networks
Figure 3 for Activation Density based Mixed-Precision Quantization for Energy Efficient Neural Networks
Figure 4 for Activation Density based Mixed-Precision Quantization for Energy Efficient Neural Networks
Viaarxiv icon

Noise Sensitivity-Based Energy Efficient and Robust Adversary Detection in Neural Networks

Add code
Jan 05, 2021
Figure 1 for Noise Sensitivity-Based Energy Efficient and Robust Adversary Detection in Neural Networks
Figure 2 for Noise Sensitivity-Based Energy Efficient and Robust Adversary Detection in Neural Networks
Figure 3 for Noise Sensitivity-Based Energy Efficient and Robust Adversary Detection in Neural Networks
Figure 4 for Noise Sensitivity-Based Energy Efficient and Robust Adversary Detection in Neural Networks
Viaarxiv icon

Exposing the Robustness and Vulnerability of Hybrid 8T-6T SRAM Memory Architectures to Adversarial Attacks in Deep Neural Networks

Add code
Nov 26, 2020
Figure 1 for Exposing the Robustness and Vulnerability of Hybrid 8T-6T SRAM Memory Architectures to Adversarial Attacks in Deep Neural Networks
Figure 2 for Exposing the Robustness and Vulnerability of Hybrid 8T-6T SRAM Memory Architectures to Adversarial Attacks in Deep Neural Networks
Figure 3 for Exposing the Robustness and Vulnerability of Hybrid 8T-6T SRAM Memory Architectures to Adversarial Attacks in Deep Neural Networks
Figure 4 for Exposing the Robustness and Vulnerability of Hybrid 8T-6T SRAM Memory Architectures to Adversarial Attacks in Deep Neural Networks
Viaarxiv icon

Revisiting Batch Normalization for Training Low-latency Deep Spiking Neural Networks from Scratch

Add code
Oct 27, 2020
Figure 1 for Revisiting Batch Normalization for Training Low-latency Deep Spiking Neural Networks from Scratch
Figure 2 for Revisiting Batch Normalization for Training Low-latency Deep Spiking Neural Networks from Scratch
Figure 3 for Revisiting Batch Normalization for Training Low-latency Deep Spiking Neural Networks from Scratch
Figure 4 for Revisiting Batch Normalization for Training Low-latency Deep Spiking Neural Networks from Scratch
Viaarxiv icon

Compression-aware Continual Learning using Singular Value Decomposition

Add code
Sep 14, 2020
Figure 1 for Compression-aware Continual Learning using Singular Value Decomposition
Figure 2 for Compression-aware Continual Learning using Singular Value Decomposition
Figure 3 for Compression-aware Continual Learning using Singular Value Decomposition
Figure 4 for Compression-aware Continual Learning using Singular Value Decomposition
Viaarxiv icon

Rethinking Non-idealities in Memristive Crossbars for Adversarial Robustness in Neural Networks

Add code
Aug 25, 2020
Figure 1 for Rethinking Non-idealities in Memristive Crossbars for Adversarial Robustness in Neural Networks
Figure 2 for Rethinking Non-idealities in Memristive Crossbars for Adversarial Robustness in Neural Networks
Figure 3 for Rethinking Non-idealities in Memristive Crossbars for Adversarial Robustness in Neural Networks
Figure 4 for Rethinking Non-idealities in Memristive Crossbars for Adversarial Robustness in Neural Networks
Viaarxiv icon

Domain Adaptation without Source Data

Add code
Jul 11, 2020
Figure 1 for Domain Adaptation without Source Data
Figure 2 for Domain Adaptation without Source Data
Figure 3 for Domain Adaptation without Source Data
Figure 4 for Domain Adaptation without Source Data
Viaarxiv icon

Enabling Deep Spiking Neural Networks with Hybrid Conversion and Spike Timing Dependent Backpropagation

Add code
May 04, 2020
Figure 1 for Enabling Deep Spiking Neural Networks with Hybrid Conversion and Spike Timing Dependent Backpropagation
Figure 2 for Enabling Deep Spiking Neural Networks with Hybrid Conversion and Spike Timing Dependent Backpropagation
Figure 3 for Enabling Deep Spiking Neural Networks with Hybrid Conversion and Spike Timing Dependent Backpropagation
Figure 4 for Enabling Deep Spiking Neural Networks with Hybrid Conversion and Spike Timing Dependent Backpropagation
Viaarxiv icon