Reliability of Computing-In-Memories: Threats, Detection Methods, and Mitigation Approaches.
Yu-Guang ChenYing-Jing TsaiPublished in: DFT (2023)
Keyphrases
- pros and cons
- methods require
- empirical studies
- methods can be applied
- significant improvement
- qualitative and quantitative
- benchmark datasets
- anomaly detection
- alternative methods
- heuristic methods
- detection accuracy
- automatic detection
- data sets
- computational cost
- preprocessing
- information systems
- genetic algorithm
- information retrieval
- machine learning