Alert button
Picture for Yier Jin

Yier Jin

Alert button

VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger

Add code
Bookmark button
Alert button
Feb 18, 2024
Zihao Zhan, Yirui Yang, Haoqi Shan, Hanqiu Wang, Yier Jin, Shuo Wang

Viaarxiv icon

A Review and Comparison of AI Enhanced Side Channel Analysis

Add code
Bookmark button
Alert button
Feb 03, 2024
Max Panoff, Honggang Yu, Haoqi Shan, Yier Jin

Viaarxiv icon

Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge

Add code
Bookmark button
Alert button
Jan 27, 2024
Weimin Fu, Shijie Li, Yifang Zhao, Haocheng Ma, Raj Dutta, Xuan Zhang, Kaichen Yang, Yier Jin, Xiaolong Guo

Viaarxiv icon

Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers

Add code
Bookmark button
Alert button
Sep 23, 2021
Honggang Yu, Shihfeng Zeng, Teng Zhang, Ing-Chao Lin, Yier Jin

Figure 1 for Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers
Figure 2 for Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers
Figure 3 for Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers
Figure 4 for Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers
Viaarxiv icon

Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks

Add code
Bookmark button
Alert button
Mar 19, 2018
Qi Liu, Tao Liu, Zihao Liu, Yanzhi Wang, Yier Jin, Wujie Wen

Figure 1 for Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks
Figure 2 for Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks
Figure 3 for Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks
Figure 4 for Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks
Viaarxiv icon

MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation

Add code
Bookmark button
Alert button
Mar 14, 2018
Tao Liu, Zihao Liu, Fuhong Lin, Yier Jin, Gang Quan, Wujie Wen

Figure 1 for MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation
Figure 2 for MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation
Figure 3 for MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation
Figure 4 for MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation
Viaarxiv icon

PT-Spike: A Precise-Time-Dependent Single Spike Neuromorphic Architecture with Efficient Supervised Learning

Add code
Bookmark button
Alert button
Mar 14, 2018
Tao Liu, Lei Jiang, Yier Jin, Gang Quan, Wujie Wen

Figure 1 for PT-Spike: A Precise-Time-Dependent Single Spike Neuromorphic Architecture with Efficient Supervised Learning
Figure 2 for PT-Spike: A Precise-Time-Dependent Single Spike Neuromorphic Architecture with Efficient Supervised Learning
Figure 3 for PT-Spike: A Precise-Time-Dependent Single Spike Neuromorphic Architecture with Efficient Supervised Learning
Figure 4 for PT-Spike: A Precise-Time-Dependent Single Spike Neuromorphic Architecture with Efficient Supervised Learning
Viaarxiv icon

Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications

Add code
Bookmark button
Alert button
Dec 21, 2017
Qixue Xiao, Kang Li, Deyue Zhang, Yier Jin

Figure 1 for Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications
Figure 2 for Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications
Figure 3 for Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications
Figure 4 for Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications
Viaarxiv icon