{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T10:53:27Z","timestamp":1775732007070,"version":"3.50.1"},"reference-count":194,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF2000480"],"award-info":[{"award-number":["CCF2000480"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF2028858"],"award-info":[{"award-number":["CCF2028858"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF2028894"],"award-info":[{"award-number":["CCF2028894"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF2028873"],"award-info":[{"award-number":["CCF2028873"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF2028876"],"award-info":[{"award-number":["CCF2028876"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF1909963"],"award-info":[{"award-number":["CCF1909963"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS1815908"],"award-info":[{"award-number":["CNS1815908"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS1717356"],"award-info":[{"award-number":["CNS1717356"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. IEEE"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/jproc.2022.3153408","type":"journal-article","created":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T20:25:45Z","timestamp":1647030345000},"page":"334-354","source":"Crossref","is-referenced-by-count":71,"title":["A Survey of Deep Learning on Mobile Devices: Applications, Optimizations, Challenges, and Research Opportunities"],"prefix":"10.1109","volume":"110","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1177-6897","authenticated-orcid":false,"given":"Tianming","family":"Zhao","sequence":"first","affiliation":[{"name":"Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5830-6625","authenticated-orcid":false,"given":"Yucheng","family":"Xie","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Indiana University&#x2013;Purdue University Indianapolis, Indianapolis, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3984-6973","authenticated-orcid":false,"given":"Yan","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA"}]},{"given":"Jerry","family":"Cheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science, New York Institute of Technology, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5001-5636","authenticated-orcid":false,"given":"Xiaonan","family":"Guo","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Technology, Indiana University&#x2013;Purdue University Indianapolis, Indianapolis, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8009-374X","authenticated-orcid":false,"given":"Bin","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Rutgers University, New Brunswick, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3994-766X","authenticated-orcid":false,"given":"Yingying","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Rutgers University, New Brunswick, NJ, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_48"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2936939"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11876"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2964284.2967243"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00293"},{"key":"ref6","first-page":"1963","article-title":"Pelee: A real-time object detection system on mobile devices","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Wang"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2019.8793673"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37352-8_37"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2013-189"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472820"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682336"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/s18072203"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941836"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s19153434"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3089801.3089805"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISCON47742.2019.9036216"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2712560"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081360"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460664"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727563"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s18072229"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2018.8524493"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622327"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7900181"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2017.7889290"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2014.6776135"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-017-0714-3"},{"issue":"12","key":"ref28","first-page":"10","article-title":"Image-based tomato leaves diseases detection using deep learning","volume":"2","author":"Ashqar","year":"2018","journal-title":"Int. J. Acad. Eng. Res."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2874665"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3004725.3004729"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3293475.3293493"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272767"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1111\/mice.12387"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ECTI-NCON.2018.8378293"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851803"},{"key":"ref36","article-title":"26ms inference time for ResNet-50: Towards real-time execution of all DNNs on smartphone","author":"Niu","year":"2019","journal-title":"arXiv:1905.00571"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8621899"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971731"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3131675"},{"key":"ref40","article-title":"Deep compression: Compressing deep neural networks with pruning, trained quantization and Huffman coding","author":"Han","year":"2015","journal-title":"arXiv:1510.00149"},{"key":"ref41","article-title":"ENet: A deep neural network architecture for real-time semantic segmentation","author":"Paszke","year":"2016","journal-title":"arXiv:1606.02147"},{"key":"ref42","article-title":"MobiFace: A lightweight deep learning face recognition on mobile devices","author":"Duong","year":"2018","journal-title":"arXiv:1811.11080"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2019.15.AVM-033"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00716"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00682"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2800728"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922370"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ISCSLP.2018.8706593"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804262"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2017.8122273"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66429-3_59"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462358"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472823"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472821"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854370"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2018.8431363"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2018.9010103"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8454327"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CogMI48466.2019.00029"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-018-09312-w"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2904897"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2921977"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2984887"},{"key":"ref64","article-title":"MobileNets: Efficient convolutional neural networks for mobile vision applications","author":"Howard","year":"2017","journal-title":"arXiv:1704.04861"},{"key":"ref65","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref66","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Krizhevsky"},{"key":"ref67","first-page":"902","article-title":"Plant disease prediction using deep learning and IoT","volume-title":"Proc. 6th Int. Conf. Comput. Sustain. Global Develop. (INDIACom)","author":"Gupta"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2902141"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"ref70","first-page":"15","article-title":"Noise-robust and resolution-invariant image classification with pixel-level regularization","volume-title":"Proc. Int. Conf. Acoust., Speech Signal Processing,(ICASSP)","author":"Na"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00018"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.01.019"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.3390\/app10030909"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2015.263"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.3390\/s18113726"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.029"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539419"},{"issue":"4","key":"ref78","first-page":"160","article-title":"An effective deep autoencoder approach for online smartphone-based human activity recognition","volume":"17","author":"Almaslukh","year":"2017","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2017.7993888"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2985628"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP.2018.8516710"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2016.7516235"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851382"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2017.7917848"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647857"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422308"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3328667"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2806333"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.04.032"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/UPINLBS.2018.8559719"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/2968219.2971461"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2015.7299406"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3212725.3212728"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890675"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700389"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2017.81"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2951165"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2797943"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2737825"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4967261"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2958382"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.007"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029823"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2019.00014"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64701-2_14"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-32-9515-5_27"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3005724"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2899085"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/3356250.3361962"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2858384"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2019.8702290"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2872430"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700417"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1700244"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3234200.3234238"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11021-5_19"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00447"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2019.00040"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2021.3095215"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378534"},{"key":"ref122","article-title":"HAFLO: GPU-based acceleration for federated logistic regression","author":"Cheng","year":"2021","journal-title":"arXiv:2107.13797"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/2847263.2847265"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/2684746.2689060"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2474396"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2018.00098"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001163"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/2654822.2541967"},{"key":"ref129","article-title":"SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <0.5MB model size","author":"Iandola","year":"2016","journal-title":"arXiv:1602.07360"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"ref131","volume-title":"Object Detection","year":"2020"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.690"},{"key":"ref135","first-page":"3","article-title":"A public domain dataset for human activity recognition using smartphones","volume":"3","author":"Anguita","year":"2013","journal-title":"Esann"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/1964897.1964918"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref138","first-page":"361","article-title":"Flow-based benchmark data sets for intrusion detection","volume-title":"Proc. 16th Eur. Conf. Cyber Warfare Secur.","author":"Ring"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.4108\/eai.30-11-2016.2267463"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00139"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2944889"},{"key":"ref142","article-title":"Compression of acoustic event detection models with low-rank matrix factorization and quantization training","author":"Shi","year":"2019","journal-title":"arXiv:1905.00855"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00821"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1503.02531"},{"key":"ref145","first-page":"742","article-title":"Learning efficient object detection models with knowledge distillation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Chen"},{"key":"ref146","article-title":"N2N learning: Network to network compression via policy gradient reinforcement learning","author":"Ashok","year":"2017","journal-title":"arXiv:1709.06030"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2016.7477614"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00881"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2227-2"},{"key":"ref150","article-title":"Decomposable-Net: Scalable low-rank compression for neural networks","author":"Yaguchi","year":"2019","journal-title":"arXiv:1910.13141"},{"key":"ref151","article-title":"Improving device-edge cooperative inference of deep learning via 2-step pruning","author":"Shi","year":"2019","journal-title":"arXiv:1903.03472"},{"key":"ref152","article-title":"Binarized neural networks","volume-title":"Advances in Neural Information Processing Systems","volume":"29","author":"Hubara","year":"2016"},{"key":"ref153","article-title":"Towards accurate binary convolutional neural network","author":"Lin","year":"2017","journal-title":"arXiv:1711.11294"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01167"},{"key":"ref155","first-page":"265","article-title":"On optimization methods for deep learning","volume-title":"Proc. ICML","author":"Le"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1145\/2834892.2834896"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/2964284.2973801"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303949"},{"key":"ref159","first-page":"786","article-title":"DeftNN: Addressing bottlenecks for DNN execution on GPUs via synapse vector elimination and near-compute data fission","volume-title":"Proc. 50th Annu. IEEE\/ACM Int. Symp. Microarchitecture","author":"Hill"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2574353"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2016.2616357"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1145\/3020078.3021736"},{"key":"ref163","volume-title":"Tensorflow Hub","year":"2020"},{"key":"ref164","volume-title":"Keras Applications","year":"2020"},{"key":"ref165","volume-title":"Caffe2 Model Zoo","year":"2020"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47439-3_7"},{"key":"ref167","volume-title":"Post-Training Quantization","year":"2020"},{"key":"ref168","volume-title":"Trim Insignificant Weights","year":"2020"},{"key":"ref169","volume-title":"Quantization","year":"2019"},{"key":"ref170","volume-title":"Using Distiller to Prune a Pytorch Language Model","author":"Lab","year":"2020"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.4324\/9780429297144-5"},{"key":"ref172","volume-title":"Mmdnn","year":"2020"},{"key":"ref173","volume-title":"Onnx","author":"Microsoft","year":"2021"},{"key":"ref174","article-title":"Helios: Heterogeneity-aware federated learning with dynamically balanced collaboration","author":"Xu","year":"2019","journal-title":"arXiv:1912.01684"},{"key":"ref175","first-page":"1","article-title":"Bird call recognition using deep convolutional neural network, ResNet-50","volume-title":"Proc. Acoust.","volume":"7","author":"Sankupellay"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.3389\/frcmn.2021.657653"},{"key":"ref177","article-title":"Federated learning for mobile keyboard prediction","author":"Hard","year":"2018","journal-title":"arXiv:1811.03604"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2020.2993259"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3166101"},{"key":"ref180","first-page":"1","article-title":"Training and inference with integers in deep neural networks","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Wu"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/3417313.3429381"},{"key":"ref182","article-title":"Dynamic channel pruning: Feature boosting and suppression","author":"Gao","year":"2018","journal-title":"arXiv:1810.05331"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_25"},{"key":"ref184","article-title":"FPGA-based hardware accelerator of homomorphic encryption for efficient federated learning","author":"Yang","year":"2020","journal-title":"arXiv:2007.10560"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927211"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2856261"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3042320"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2018.8615294"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.09.116"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2761740"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2017.2940968"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00037"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3243479"}],"container-title":["Proceedings of the IEEE"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/5\/9733001\/9733049-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5\/9733001\/09733049.pdf?arnumber=9733049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:04:46Z","timestamp":1705532686000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9733049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":194,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jproc.2022.3153408","relation":{},"ISSN":["0018-9219","1558-2256"],"issn-type":[{"value":"0018-9219","type":"print"},{"value":"1558-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}