- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Machine Learning (ML) algorithms have shown a high level of accuracy, and applications are widely used in many systems and platforms. However, developing efficient ML-based systems requires addressing three problems: energy-efficiency, robustness, and techniques that typically focus on optimizing for a single objective/have a limited set of goals.
This book tackles these challenges by exploiting the unique features of advanced ML models and investigates cross-layer concepts and techniques to engage both hardware and software-level methods to build robust and energy-efficient architectures for these advanced ML networks. More specifically, this book improves the energy efficiency of complex models like CapsNets, through a specialized flow of hardware-level designs and software-level optimizations exploiting the application-driven knowledge of these systems and the error tolerance through approximations and quantization. This book also improves the robustness of ML models, in particular for SNNs executed on neuromorphic hardware, due to their inherent cost-effective features. This book integrates multiple optimization objectives into specialized frameworks for jointly optimizing the robustness and energy efficiency of these systems.
This is an important resource for students and researchers of computer and electrical engineering who are interested in developing energy efficient and robust ML.
The Open Access version of this book, available at http://www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND) 4.0 license.
Contents
Chapter 01 Introduction Chapter 02 Background and Related Work Chapter 03 Hardware and Software Optimizations for Capsule Networks Chapter 04 Adversarial Security Threats for DNNs and CapsNets Chapter 05 Integration of Multiple Design Objectives into NAS Frameworks for CapsNets and DNNs Chapter 06 Efficient Optimizations for Spiking Neural Networks on Neuromorphic Hardware Chapter 07 Security Threats for SNNs on Discrete and Event-Based Data Chapter 08 Conclusion and Outlook Bibliography