INEAD: Intermediate Node Evaluation-Based Attack Detection for Secure Approximate Computing Systems

P Yellu, N Chennagouni, Q Yu - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Approximate computing techniques that trade accuracy for better computing performance
and energy efficiency have been widely used in many computation-intensive applications …

[HTML][HTML] Performance optimized approximate multiplier architecture ST-AxM-based on statistical analysis and static compensation

S Balasubramani, U Jagadeeshan… - Microelectronics …, 2023 - Elsevier
In this study, our primary aim is to develop a highly efficient multiplier architecture tailored for
approximate computing, with a specific focus on optimizing power efficiency. Multiplication …

Leveraging intermediate node evaluation to secure approximate computing for AI applications

P Yellu, N Chennagouni, Q Yu - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Artificial Intelligence (AI) has been widely applied to homeland security to speed up target
recognition, threat analysis, and decision-making. The intensive computation required by AI …

Securing Approximate Computing Systems

P Yellu - 2023 - search.proquest.com
Approximate Computing (AC) techniques have been leveraged to improve computing
performance and energy efficiency with minor degradation in accuracy. Different than …