{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:38:17Z","timestamp":1775745497304,"version":"3.50.1"},"reference-count":346,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Ph.D. College Resilient Embedded Systems"},{"name":"U Wien\u2019s Faculty of Informatics and FH-Technikum Wien"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3039858","type":"journal-article","created":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T01:50:16Z","timestamp":1606269016000},"page":"225134-225180","source":"Crossref","is-referenced-by-count":195,"title":["Hardware and Software Optimizations for Accelerating Deep Neural Networks: Survey of Current Trends, Challenges, and the Road Ahead"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2500-2283","authenticated-orcid":false,"given":"Maurizio","family":"Capra","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2608-820X","authenticated-orcid":false,"given":"Beatrice","family":"Bussolino","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0689-4776","authenticated-orcid":false,"given":"Alberto","family":"Marchisio","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2238-9443","authenticated-orcid":false,"given":"Guido","family":"Masera","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3069-0319","authenticated-orcid":false,"given":"Maurizio","family":"Martina","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2607-8135","authenticated-orcid":false,"given":"Muhammad","family":"Shafique","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134077"},{"key":"ref277","first-page":"1","article-title":"Towards imperceptible and robust adversarial example attacks against neural networks","author":"luo","year":"2018","journal-title":"Proc AAAI"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2018.00064"},{"key":"ref270","first-page":"1","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"Proc ICLR"},{"key":"ref273","first-page":"601","article-title":"Stealing machine learning models via prediction apis","author":"tram\u00e8r","year":"2016","journal-title":"Proc 25th USENIX Conf Secur Symp"},{"key":"ref170","first-page":"1","article-title":"Improving the speed of neural networks on CPUs","author":"vanhoucke","year":"2011","journal-title":"Proc Deep Learn Unsupervised Feature Learn Workshop NIPS"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3323472"},{"key":"ref172","article-title":"A survey on methods and theories of quantized neural networks","volume":"abs 1808 4752","author":"guo","year":"2018","journal-title":"CoRR"},{"key":"ref171","first-page":"1","article-title":"Quantized neural networks: Training neural networks with low precision weights and activations","volume":"18","author":"hubara","year":"2018","journal-title":"J Mach Learn Res"},{"key":"ref174","article-title":"Squeezenet: Alexnet-level accuracy with 50&#x00D7; fewer parameters and <1MB model size","author":"iandola","year":"2016","journal-title":"CoRR"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2808319"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218746"},{"key":"ref175","first-page":"1","article-title":"Per-tensor fixed-point quantization of the back-propagation algorithm","author":"sakr","year":"2019","journal-title":"Proc ICLR"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2018.00059"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00881"},{"key":"ref168","article-title":"Ternary weight networks","volume":"abs 1605 4711","author":"li","year":"2016","journal-title":"CoRR"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00286"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref38","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref33","first-page":"543","article-title":"A method for unconstrained convex minimization problem with the rate of convergence o(1\/k&#x00B2;)","volume":"269","author":"nesterov","year":"1983","journal-title":"Doklady an USSR"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(98)00116-6"},{"key":"ref31","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","volume":"37","author":"ioffe","year":"2015","journal-title":"Proc 32nd Int Conf Mach Learn"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1113\/jphysiol.1959.sp006308"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"ref37","first-page":"78","article-title":"Feature selection, L? vs. L? regularization, and rotational invariance","author":"ng","year":"2004","journal-title":"Proc 21st Int Conf Mach Learn (ICML)"},{"key":"ref268","first-page":"1","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"Proc ICLR"},{"key":"ref36","first-page":"1","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2020.2971217"},{"key":"ref35","article-title":"ADADELTA: An adaptive learning rate method","volume":"abs 1212 5701","author":"zeiler","year":"2012","journal-title":"CoRR"},{"key":"ref34","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"duchi","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref287","first-page":"1","article-title":"Adversarial examples in the physical world","volume":"abs 1607 2533","author":"kurakin","year":"2016","journal-title":"CoRR"},{"key":"ref286","article-title":"Evasion attacks against machine learning at test time","author":"biggio","year":"2017","journal-title":"arXiv 1708 06131"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207351"},{"key":"ref284","first-page":"1","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","volume":"abs 1712 5526","author":"chen","year":"2017","journal-title":"CoRR"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465915"},{"key":"ref283","first-page":"6106","article-title":"Poison frogs! Targeted clean-label poisoning attacks on neural networks","author":"shafahi","year":"2018","journal-title":"Proc 32nd Int Conf Neural Inf Process Syst"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2018.2865489"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140451"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517321"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974525"},{"key":"ref185","first-page":"525","article-title":"XNOR-Net: ImageNet classification using binary convolutional neural networks","author":"rastegari","year":"2016","journal-title":"Computer Vision"},{"key":"ref184","year":"2018","journal-title":"NVIDIA Turing GPU Architecture Graphics reinvented"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317784"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00069"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2019.2905654"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2016.111"},{"key":"ref187","first-page":"4107","article-title":"Binarized neural networks","author":"hubara","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref186","article-title":"DoReFa-Net: Training low bitwidth convolutional neural networks with low bitwidth gradients","volume":"abs 1606 6160","author":"zhou","year":"2016","journal-title":"CoRR"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"ref27","article-title":"The perceptron: A perceiving and recognizing automaton (project PARA)","author":"rosenblatt","year":"1957"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2016.2597140"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICEI.2018.00-23"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2019.00105"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342120"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09825-6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541967"},{"key":"ref345","first-page":"589","article-title":"Deep neural networks on chip&#x2014;A survey","author":"yingge","year":"2020","journal-title":"Proc IEEE Int Conf Big Data Smart Comput"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/fi11040100"},{"key":"ref278","first-page":"1","article-title":"Capsattacks: Robust and imperceptible adversarial attacks on capsule networks","volume":"abs 1901 9878","author":"marchisio","year":"2019","journal-title":"CoRR"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/BF02478259"},{"key":"ref346","article-title":"A survey of convolutional neural networks: Analysis, applications, and prospects","volume":"abs 2004 2806","author":"li","year":"2020","journal-title":"CoRR"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207297"},{"key":"ref25","author":"freeman","year":"2005","journal-title":"Biological Science"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00506"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref292","first-page":"1","article-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","author":"brendel","year":"2018","journal-title":"6th Int Conf Learn Represent"},{"key":"ref51","first-page":"4278","article-title":"Inception-v4, inception-resnet and the impact of residual connections on learning","author":"szegedy","year":"2017","journal-title":"Proc 31st AAAI Conf Artif Intell"},{"key":"ref295","first-page":"1","article-title":"Red-attack: Resource efficient decision based attack for machine learning","volume":"abs 1901 10258","author":"khalid","year":"2019","journal-title":"CoRR"},{"key":"ref294","first-page":"7","article-title":"Boundary attack++: Query-efficient decision-based adversarial attack","volume":"abs 1904 2144","author":"chen","year":"2019","journal-title":"CoRR"},{"key":"ref297","first-page":"1","article-title":"Debugging machine learning tasks","volume":"abs 1603 7292","author":"chakarov","year":"2016","journal-title":"CoRR"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140450"},{"key":"ref154","article-title":"NASCaps: A framework for neural architecture search to optimize the accuracy and hardware efficiency of convolutional capsule networks","volume":"abs 2008 8476","author":"marchisio","year":"2020","journal-title":"CoRR"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC47756.2020.9045179"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022327"},{"key":"ref155","article-title":"On neural architecture search for resource-constrained hardware platforms","author":"lu","year":"2019","journal-title":"arXiv 1911 00105"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3012865"},{"key":"ref291","first-page":"39","article-title":"Towards evaluating the robustness of neural networks","author":"carlini","year":"2017","journal-title":"Proc IEEE Symp Secur Privacy (SP)"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00293"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2019.8854425"},{"key":"ref151","first-page":"1","article-title":"ProxylessNAS: Direct neural architecture search on target task and hardware","author":"cai","year":"2019","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2019.00040"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2019.00042"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942127"},{"key":"ref149","first-page":"34","article-title":"A fast design space exploration framework for the deep learning accelerators: Work-in-progress","author":"colucci","year":"2020","journal-title":"Proc IEEE Int Conf Hardw -Softw Codesign Syst Synth (CODESISSS)"},{"key":"ref289","first-page":"1","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"Proc 6th Int Conf Learn Represent"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-57715-8"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(97)00011-7"},{"key":"ref57","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume":"97","author":"tan","year":"2019","journal-title":"Proc 36th Int Conf Mach Learn (ICML)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01246-5_2"},{"key":"ref55","first-page":"1","article-title":"Matrix capsules with EM routing","author":"hinton","year":"2018","journal-title":"Proc 6th Int Conf Learn Represent (ICLR)"},{"key":"ref54","first-page":"44","article-title":"Transforming auto-encoders","author":"hinton","year":"2011","journal-title":"Proc 21th Int Conf Artif Neural Netw (ICANN)"},{"key":"ref53","article-title":"TResNet: High performance GPU-dedicated architecture","volume":"abs 2003 13630","author":"ridnik","year":"2020","journal-title":"CoRR"},{"key":"ref52","article-title":"ResNeSt: Split-attention networks","volume":"abs 2004 8955","author":"zhang","year":"2020","journal-title":"CoRR"},{"key":"ref40","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","volume":"1","author":"krizhevsky","year":"2012","journal-title":"Proc 25th Int Conf Neural Inf Process Syst (NIPS)"},{"key":"ref167","first-page":"3123","article-title":"Binaryconnect: Training deep neural networks with binary weights during propagations","author":"courbariaux","year":"2015","journal-title":"Proc NIPS"},{"key":"ref166","first-page":"10","article-title":"1.1 Computing&#x2019;s energy problem (and what we can do about it)","author":"horowitz","year":"2014","journal-title":"Proc IEEE Int Solid-State Circuits Conf Dig Tech Papers (ISSCC)"},{"key":"ref165","first-page":"367","article-title":"Random search and reproducibility for neural architecture search","author":"li","year":"2019","journal-title":"Proc UAI"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00354"},{"key":"ref163","article-title":"Single path one-shot neural architecture search with uniform sampling","author":"guo","year":"2019","journal-title":"arXiv 1904 00420"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01099"},{"key":"ref161","first-page":"481","article-title":"Single-path NAS: Designing hardware-efficient ConvNets in less than 4 hours","author":"stamoulis","year":"2019","journal-title":"Proc ECML\/PKDD"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1163"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ITC-CSCC.2019.8793320"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CISP-BMEI.2018.8633218"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON.2019.8840035"},{"key":"ref5","article-title":"Image segmentation using deep learning: A survey","volume":"abs 2001 5566","author":"minaee","year":"2020","journal-title":"CoRR"},{"key":"ref159","first-page":"1","article-title":"Efficient neural architecture search via parameter sharing","author":"pham","year":"2018","journal-title":"Proc ICML"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP48234.2019.8959715"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00907"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/Deep-ML.2019.00009"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317757"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3012863"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258131"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.634"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref47","first-page":"3859","article-title":"Dynamic routing between capsules","author":"sabour","year":"2017","journal-title":"Proc 31st Int Conf Neural Inf Process Syst (NIPS)"},{"key":"ref42","first-page":"1","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"Proc 3rd Int Conf Learn Represent (ICLR)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref320","article-title":"Deep learning chip market by chip type (gpu, asic, fpga, cpu, and others), technology (system-on-chip, system-in-package, multi-chip module, and others), and industry vertical (media & advertising, bfsi, it & telecom, retail, healthcare, automotive & transportation, and others) - global opportunity analysis and industry forecast, pp. 2018&#x2013;2025","author":"jadhav","year":"2018"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIT.2018.8510687"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300014917"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3266229"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1523\/JNEUROSCI.18-24-10464.1998"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0032496"},{"key":"ref318","first-page":"9453","article-title":"Objectnet: A large-scale bias-controlled dataset for pushing the limits of object recognition models","author":"barbu","year":"2019","journal-title":"Proc NeurIPS"},{"key":"ref76","first-page":"17","article-title":"SpikeProp: Backpropagation for networks of spiking neurons","author":"boht\u00e9","year":"2000","journal-title":"Proc ESANN"},{"key":"ref317","first-page":"17","article-title":"Core50: A new dataset and benchmark for continuous object recognition","volume":"78","author":"lomonaco","year":"2017","journal-title":"Proc 1st Annu Conf Robot Learn"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1038\/nn1643"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01316-z"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3013049"},{"key":"ref315","first-page":"740","article-title":"Microsoft COCO: Common objects in context","volume":"8693","author":"lin","year":"2014","journal-title":"Proc 13th Eur Conf"},{"key":"ref75","article-title":"Closing the accuracy gap in an event-based visual recognition task","volume":"abs 1906 8859","author":"r\u00fcckauer","year":"2019","journal-title":"CoRR"},{"key":"ref314","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009"},{"key":"ref313","author":"chollet","year":"2015","journal-title":"Keras"},{"key":"ref312","author":"bai","year":"2019","journal-title":"Onnx Open neural network exchange"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0040233"},{"key":"ref311","first-page":"105","article-title":"Paddlepaddle: An open-source deep learning platform from industrial practice","volume":"1","author":"ma","year":"2019","journal-title":"Frontiers Data Domputing"},{"key":"ref79","article-title":"Resume-new supervised learning method for spiking neural networks","author":"ponulak","year":"2005"},{"key":"ref319","article-title":"The ai index 2019 annual report","author":"perrault","year":"2019"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2945397"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1126\/science.1254642"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966125"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2304638"},{"key":"ref305","first-page":"1310","article-title":"Certified adversarial robustness via randomized smoothing","volume":"97","author":"cohen","year":"2019","journal-title":"Proc 36th Int Conf Mach Learn"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.112130359"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715141"},{"key":"ref64","year":"2020","journal-title":"Building a silicon brain"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378532"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2006.1696265"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"ref66","first-page":"1","article-title":"Hodgkin-huxley model","author":"beeman","year":"2013","journal-title":"Encyclopedia for Computational Neuroscience"},{"key":"ref301","first-page":"227","article-title":"You only propagate once: Accelerating adversarial training via maximal principle","author":"zhang","year":"2019","journal-title":"Proc NeurIPS"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2003.820440"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2019.8854377"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1142\/S0129065714400048"},{"key":"ref303","first-page":"1","article-title":"Fast is better than free: Revisiting adversarial training","author":"wong","year":"2020","journal-title":"Proc ICLR"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"409","DOI":"10.55782\/ane-2011-1862","article-title":"Introduction to spiking neural networks: Information processing, learning and applications","volume":"71","author":"ponulak","year":"2011","journal-title":"Acta Neurobiologiae Experimentalis"},{"key":"ref302","first-page":"3358","article-title":"Adversarial training for free","author":"shafahi","year":"2019","journal-title":"Proc NeurIPS"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330756"},{"key":"ref308","first-page":"1","article-title":"Mxnet: A flexible and efficient machine learning library for heterogeneous distributed systems","volume":"abs 1512 1274","author":"chen","year":"2015","journal-title":"CoRR"},{"key":"ref197","article-title":"Compressing deep convolutional networks using vector quantization","volume":"abs 1412 6115","author":"gong","year":"2014","journal-title":"CoRR"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765695"},{"key":"ref199","first-page":"598","article-title":"Optimal brain damage","author":"lecun","year":"1990","journal-title":"Advances in neural information processing systems"},{"key":"ref193","article-title":"Convolutional neural networks using logarithmic data representation","volume":"abs 1603 1025","author":"miyashita","year":"2016","journal-title":"CoRR"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953288"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/CANDARW.2018.00033"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240803"},{"key":"ref95","author":"gogar","year":"2017","journal-title":"BigDL&#x2014;Scale-Out Deep Learning on Apache Spark* Cluster"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2017.2778702"},{"key":"ref94","year":"2018","journal-title":"BFLOAT16&#x2014;Hardware Numerics Definition"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2857019"},{"key":"ref93","year":"2020","journal-title":"Intel AVX-512 Instructions"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/CoolChips.2018.8373076"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2761740"},{"key":"ref342","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2950779"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1080\/10637199708915593"},{"key":"ref343","article-title":"Survey on deep neural networks in speech and vision systems","volume":"abs 1908 7656","author":"alam","year":"2019","journal-title":"CoRR"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2018.00774"},{"key":"ref340","first-page":"168","article-title":"Computational memory-based inference and training of deep neural networks","author":"sebastian","year":"2019","journal-title":"Proc Symp VLSI Technol"},{"key":"ref341","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2878699"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1109\/ETCT.2016.7882969"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2976475"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2020.01.007"},{"key":"ref333","first-page":"1","article-title":"A survey of neuromorphic computing and neural networks in hardware","volume":"abs 1705 6963","author":"schuman","year":"2017","journal-title":"CoRR"},{"key":"ref98","author":"abadi","year":"2015","journal-title":"TensorFlow Large-Scale Machine Learning on Heterogeneous Systems"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1109\/SACI.2018.8440953"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1109\/NEUREL.2018.8587006"},{"key":"ref96","year":"2017","journal-title":"Nvidia tesla v100 gpu architecture"},{"key":"ref337","doi-asserted-by":"publisher","DOI":"10.1109\/ASICON.2017.8252654"},{"key":"ref97","first-page":"1","article-title":"Automatic differentiation in PyTorch","author":"paszke","year":"2017","journal-title":"Proc NIPS Workshop Autodiff"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2016.00508"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-2312(01)00658-0"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2019.2931595"},{"key":"ref83","first-page":"1412","article-title":"Slayer: Spike layer error reassignment in time","author":"shrestha","year":"2018","journal-title":"Proc NIPS"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001139"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1145\/3218603.3218605"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1142\/S0129065712500128"},{"key":"ref332","first-page":"222","article-title":"An always-on 3.8?j\/86% cifar-10 mixed-signal binary cnn processor with all memory on chip in 28nm cmos","author":"bankman","year":"2018","journal-title":"IEEE Int Solid-State Circuits Conf (ISSCC) Dig Tech Papers"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2017.29"},{"key":"ref89","first-page":"1","article-title":"Enabling deep spiking neural networks with hybrid conversion and spike timing dependent backpropagation","author":"rathi","year":"2020","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref322","first-page":"1","article-title":"A ternary based bit scalable, 8.80 TOPS\/W CNN accelerator with many-core Processing-in-memory architecture with 896K synapses\/mm2","author":"okumura","year":"2019","journal-title":"Proc Symp VLSI Technol"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS46596.2019.8964852"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-16108-9"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.1109\/iNIS.2017.22"},{"key":"ref85","first-page":"1","article-title":"SpikeGrad: An ANN-equivalent computation model for implementing backpropagation with spikes","author":"thiele","year":"2020","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2937517"},{"key":"ref86","article-title":"Synaptic plasticity dynamics for deep continuous local learning","author":"kaiser","year":"2018","journal-title":"arXiv 1811 10766"},{"key":"ref329","article-title":"IEEE computer society&#x2019;s top 12 technology trends for 2020","author":"mutiara","year":"2019"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2017.00682"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.55"},{"key":"ref88","first-page":"1","article-title":"An efficient spiking neural network for recognizing gestures with a DVS camera on the loihi neuromorphic processor","author":"massa","year":"2020","journal-title":"Proc Int Joint Conf Neural Netw (IJCNN)"},{"key":"ref200","first-page":"1135","article-title":"Learning both weights and connections for efficient neural networks","volume":"1","author":"han","year":"2015","journal-title":"Proc 28th Int Conf Neural Inf Process Syst (NIPS)"},{"key":"ref101","year":"2020","journal-title":"NVIDIA CUDA X"},{"key":"ref100","article-title":"CuDNN: Efficient primitives for deep learning","volume":"abs 1410 759","author":"chetlur","year":"2014","journal-title":"CoRR"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2019.2953153"},{"key":"ref203","first-page":"1","article-title":"Deep compression: Compressing deep neural network with pruning, trained quantization and Huffman coding","author":"han","year":"2016","journal-title":"Proc 4th Int Conf Learn Represent (ICLR)"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489764"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.31"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.155"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00821"},{"key":"ref208","first-page":"815","article-title":"AMC: AutoML for model compression and acceleration on mobile devices","author":"he","year":"2018","journal-title":"Computer Vision"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.643"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01146"},{"key":"ref211","article-title":"MobileNets: Efficient convolutional neural networks for mobile vision applications","volume":"abs 1704 4861","author":"howard","year":"2017","journal-title":"CoRR"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00215"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref213","first-page":"1","article-title":"Speeding-up convolutional neural networks using fine-tuned CP-decomposition","author":"lebedev","year":"2015","journal-title":"Proc 3rd Int Conf Learn Represent (ICLR)"},{"key":"ref214","first-page":"1","article-title":"Compression of deep convolutional neural networks for fast and low power mobile applications","author":"kim","year":"2016","journal-title":"Proc 4th Int Conf Learn Represent (ICLR)"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150464"},{"key":"ref216","first-page":"2654","article-title":"Do deep nets really need to be deep?","volume":"3","author":"ba","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref217","article-title":"Distilling the knowledge in a neural network","volume":"abs 1503 2531","author":"hinton","year":"2015","journal-title":"CoRR"},{"key":"ref218","first-page":"1","article-title":"FitNets: Hints for thin deep nets","author":"romero","year":"2015","journal-title":"Proc 3rd Int Conf Learn Represent (ICLR)"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.754"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00454"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001138"},{"key":"ref221","article-title":"Automatic performance tuning of sparse matrix kernels","author":"vuduc","year":"2003"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2906199"},{"key":"ref228","article-title":"A low-power accelerator for deep neural networks with enlarged near-zero sparsity","volume":"abs 1705 8009","author":"huan","year":"2017","journal-title":"CoRR"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2741463"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2924215"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2852335"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001163"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080254"},{"key":"ref127","article-title":"CapStore: Energy-efficient design and management of the on-chip memory for capsulenet inference accelerators","volume":"abs 1902 1151","author":"marchisio","year":"2019","journal-title":"CoRR"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714922"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2018.00018"},{"key":"ref124","article-title":"MPNA: A massively-parallel neural array accelerator with dataflow optimization for convolutional neural networks","volume":"abs 1810 12910","author":"hanif","year":"2018","journal-title":"CoRR"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750389"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3030610"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2592330"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/2684746.2689060"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.58"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2013.6657019"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2016.2616357"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967021"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342139"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1145\/2893356"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1217-5_59"},{"key":"ref239","article-title":"Reduced-precision memory value approximation for deep learning","author":"deng","year":"2015"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008256"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317787"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116393"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942068"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1145\/3218603.3218643"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00012"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.23919\/VLSIC.2017.8008534"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00015"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173176"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/HOTCHIPS.2019.8875654"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/2435264.2435273"},{"key":"ref141","article-title":"A systematic approach to blocking convolutional neural networks","volume":"abs 1606 4209","author":"yang","year":"2016","journal-title":"CoRR"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342033"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1145\/3218603.3218647"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref144","article-title":"ROMANet: Fine-grained reuse-driven data organization and off-chip memory access management for deep neural network accelerators","volume":"abs 1902 10222","author":"putra","year":"2019","journal-title":"CoRR"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/AHS.2009.55"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358252"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342119"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1166\/jolpe.2018.1575"},{"key":"ref243","year":"2020","journal-title":"Alibaba cloud"},{"key":"ref244","year":"2020","journal-title":"Amazon"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358280"},{"key":"ref248","year":"2020","journal-title":"Microsoft Azure"},{"key":"ref247","year":"2020","journal-title":"Colab Research"},{"key":"ref246","year":"2020","journal-title":"Google Cloud"},{"key":"ref245","year":"2020","journal-title":"IBM"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2019.2933719"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.435"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970364"},{"key":"ref107","first-page":"1","article-title":"Fast training of convolutional networks through FFTs","author":"mathieu","year":"2014","journal-title":"Proc 2nd Int Conf Learn Represent (ICLR)"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11179-7_36"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/BF02165411"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2017.7995254"},{"key":"ref103","first-page":"1","article-title":"High Performance Convolutional Neural Networks for Document Processing","author":"chellapilla","year":"2006","journal-title":"Proc Int'l Workshop Frontiers in Handwriting Recognition"},{"key":"ref102","year":"2020","journal-title":"NVIDIA A100 Tensor Core GPU Architecture"},{"key":"ref111","author":"rodriguez","year":"2018","journal-title":"Lower numerical precision Deep Learning inference and training"},{"key":"ref112","author":"horowitz","year":"2020","journal-title":"Energy Table for 45 nm Process"},{"key":"ref110","first-page":"1025","article-title":"Optimizing CNN model inference on CPUs","author":"liu","year":"2019","journal-title":"Proc USENIX Conf USENIX Annu Tech Conf (USENIX ATC)"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2018.00840"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218672"},{"key":"ref254","article-title":"Augment your batch: Better training with larger batches","volume":"abs 1901 9335","author":"hoffer","year":"2019","journal-title":"CoRR"},{"key":"ref255","first-page":"1025","article-title":"Optimizing CNN model inference on cpus","author":"liu","year":"2019","journal-title":"Proc Annu Tech Conf"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1815968"},{"key":"ref253","article-title":"Once-for-all: Train one network and specialize it for efficient deployment","author":"cai","year":"2020","journal-title":"Proc 8th Int Conf Learn Represent (ICLR)"},{"key":"ref257","article-title":"PULP-NN: Accelerating quantized neural networks on parallel ultra-low-power RISC-V processors","volume":"378","author":"garofalo","year":"2019","journal-title":"Philos Trans Roy Soc A Math Phys Eng Sci"},{"key":"ref256","first-page":"1","article-title":"CMSIS-NN: Efficient neural network kernels for arm cortex-m cpus","volume":"abs 1801 6601","author":"lai","year":"2018","journal-title":"CoRR"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2018.00023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2019.8701943"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783721"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IDAP.2019.8875896"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.fcij.2017.12.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISBI.2019.8759561"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21918"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953282"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IROS40897.2019.8967863"},{"key":"ref118","article-title":"DNN dataflow choice is overrated","volume":"abs 1809 4070","author":"yang","year":"2018","journal-title":"CoRR"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2992701"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2009.25"},{"key":"ref18","article-title":"Ultra low power deep-learning-powered autonomous nano drones","volume":"abs 1805 1831","author":"palossi","year":"2018","journal-title":"CoRR"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICE.2019.8792636"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1815993"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2017.54"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783723"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2010.5681487"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2014.106"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2015.7062935"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/2847263.2847265"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/3140659.3080246"},{"key":"ref123","article-title":"Scale-sim: Systolic CNN accelerator simulator","volume":"abs 1811 2883","author":"samajdar","year":"2019","journal-title":"CoRR"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2009.5272559"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317875"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7471828"},{"key":"ref263","first-page":"496","article-title":"A 65nm 4kb algorithm-dependent computing-in-memory sram unit-macro with 2.3ns and 55.8tops\/w fully parallel product-sum operation for binary dnn edge processors","author":"khwa","year":"2018","journal-title":"IEEE Int Solid-State Circuits Conf (ISSCC) Dig Tech Papers"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/ISLPED.2019.8824826"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2019.00044"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2940649"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09269334.pdf?arnumber=9269334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,18]],"date-time":"2024-08-18T00:06:54Z","timestamp":1723939614000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9269334\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":346,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3039858","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}