Searched for: subject%3A%22Neural%255C%2Barchitecture%255C%2Bsearch%22
(1 - 8 of 8)
- document
-
Klazinga, Rembrandt (author)Autoencoders seek to encode their input into a bottleneck of latent neurons, and then decode it to reconstruct the input. However, if the input data has an intrinsic dimension (ID) smaller than the number of latent neurons in the bottleneck, this encoding becomes redundant. <br/>In this paper, we study using the Early-Bird (EB) technique, a...master thesis 2022
- document
-
Zhou, H. (author)Applying deep neural networks (DNNs) for system identification (SYSID) has attracted more andmore attention in recent years. The DNNs, which have universal approximation capabilities for any measurable function, have been successfully implemented in SYSID tasks with typical network structures, e.g., feed-forward neural networks and recurrent...doctoral thesis 2022
- document
-
Schijlen, Fiske (author)Side-channel attacks (SCA) can obtain secret information related to the private key used during encryption executed on some device by exploiting leakage in power traces produced by the device. In recent years, researchers found that a neural network (NN) can be employed to execute a powerful profiled SCA, even on targets protected with...master thesis 2022
- document
-
Chebykin, Alexander (author), Alderliesten, T. (author), Bosman, P.A.N. (author)To achieve excellent performance with modern neural networks, having the right network architecture is important. Neural Architecture Search (NAS) concerns the automatic discovery of task-specific network architectures. Modern NAS approaches leverage super-networks whose subnetworks encode candidate neural network architectures. These...conference paper 2022
- document
-
Dushatskiy, A. (author), Alderliesten, T. (author), Bosman, P.A.N. (author)Neural Architecture Search (NAS) has recently become a topic of great interest. However, there is a potentially impactful issue within NAS that remains largely unrecognized: noise. Due to stochastic factors in neural network initialization, training, and the chosen train/validation dataset split, the performance evaluation of a neural network...conference paper 2022
- document
-
Rijsdijk, Jorai (author)Side-channel attacks (SCA), which use unintended leakage to retrieve a secret cryptographic key, have become more sophisticated over time. With the recent successes of machine learning (ML) and especially deep learning (DL) techniques against cryptographic implementations even in the presence of dedicated countermeasures, various methods have...master thesis 2020
- document
-
den Ottelander, Tom (author)Computer vision tasks, like supervised image classification, are effectively tackled by convolutional neural networks, provided that the architecture, which defines the structure of the network, is set correctly. Neural Architecture Search (NAS) is a relatively young and increasingly popular field that is concerned with automatically optimizing...master thesis 2020
- document
-
Zhu, B. (author), Al-Ars, Z. (author), Hofstee, H.P. (author)Binary Convolutional Neural Networks (CNNs) have significantly reduced the number of arithmetic operations and the size of memory storage needed for CNNs, which makes their deployment on mobile and embedded systems more feasible. However, after binarization, the CNN architecture has to be redesigned and refined significantly due to two reasons:...conference paper 2020
Searched for: subject%3A%22Neural%255C%2Barchitecture%255C%2Bsearch%22
(1 - 8 of 8)