期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Design and Optimization of Winograd Convolution on Array Accelerator 被引量:1
1
作者 Ji Lai Lixin Yang +4 位作者 Dejian Li Chongfei Shen Xi Feng Jizeng Wei Yu Liu 《Journal of Beijing Institute of Technology》 EI CAS 2023年第1期69-81,共13页
With the rapid development and popularization of artificial intelligence technology,convolutional neural network(CNN)is applied in many fields,and begins to replace most traditional algorithms and gradually deploys to... With the rapid development and popularization of artificial intelligence technology,convolutional neural network(CNN)is applied in many fields,and begins to replace most traditional algorithms and gradually deploys to terminal devices.However,the huge data movement and computational complexity of CNN bring huge power consumption and performance challenges to the hardware,which hinders the application of CNN in embedded devices such as smartphones and smart cars.This paper implements a convolutional neural network accelerator based on Winograd convolution algorithm on field-programmable gate array(FPGA).Firstly,a convolution kernel decomposition method for Winograd convolution is proposed.The convolution kernel larger than 3×3 is divided into multiple 3×3 convolution kernels for convolution operation,and the unsynchronized long convolution operation is processed.Then,we design Winograd convolution array and use configurable multiplier to flexibly realize multiplication for data with different accuracy.Experimental results on VGG16 and AlexNet network show that our accelerator has the most energy efficient and 101 times that of the CPU,5.8 times that of the GPU.At the same time,it has higher energy efficiency than other convolutional neural network accelerators. 展开更多
关键词 convolutional neural network Winograd convolution algorithm ACCELERATOR
下载PDF
Side-Channel Attacks in a Real Scenario
2
作者 Ming Tang Maixing Luo +4 位作者 Junfeng Zhou Zhen Yang Zhipeng Guo Fei Yan Liang Liu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第5期586-598,共13页
Existing Side-Channel Attacks (SCAs) have several limitations and, rather than to be real attack methods, can only be considered to be security evaluation methods. Their limitations are mainly related to the samplin... Existing Side-Channel Attacks (SCAs) have several limitations and, rather than to be real attack methods, can only be considered to be security evaluation methods. Their limitations are mainly related to the sampling conditions, such as the trigger signal embedded in the source code of the encryption device, and the acquisition device that serves as the encryption-device controller. Apart from it being very difficult for an attacker to add a trigger into the original design before making an attack or to control the encryption device, there is a big gap in the capacity of existing SCAs to pose real threats to cipher devices. In this paper, we propose a new method, the sliding window SCA (SW-SCA), which can be applied in scenarios in which the acquisition device is independent of the encryption device and for which the encryption source code requires no trigger signal or modification. First, we describe the main issues in existing SCAs, then we theoretically analyze the effectiveness and complexity of our proposed SW-SCA --a method that can incorporate a sliding-window mechanism into almost all of the existing non-profiled SCAs. The experimental results for both simulated and physical traces verify the effectiveness of the SW-SCA and the appropriateness of its theoretical complexity. 展开更多
关键词 side-channel attack sliding window trigger mechanism soft K-means
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部