Follow
Meng Li
Meng Li
Peking University; Ex-Facebook
Verified email at pku.edu.cn - Homepage
Title
Cited by
Cited by
Year
Federated learning with non-iid data
Y Zhao, M Li, L Lai, N Suda, D Civin, V Chandra
arXiv preprint arXiv:1806.00582, 2018
30472018
AppSAT: Approximately deobfuscating integrated circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
3662017
Recnmp: Accelerating personalized recommendation with near-memory processing
L Ke, U Gupta, BY Cho, D Brooks, V Chandra, U Diril, A Firoozshahian, ...
2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture …, 2020
2422020
Multi-scale high-resolution vision transformer for semantic segmentation
J Gu, H Kwon, D Wang, W Ye, M Li, YH Chen, L Lai, V Chandra, DZ Pan
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2022
2302022
Provably secure camouflaging strategy for IC protection
M Li, K Shamsi, T Meade, Z Zhao, B Yu, Y Jin, DZ Pan
IEEE transactions on computer-aided design of integrated circuits and …, 2017
2032017
Cyclic obfuscation for creating SAT-unresolvable circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
Proceedings of the Great Lakes Symposium on VLSI 2017, 173-178, 2017
1932017
Keepaugment: A simple information-preserving data augmentation approach
C Gong, D Wang, M Li, V Chandra, Q Liu
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
1532021
Co-exploration of neural architectures and heterogeneous asic accelerator designs targeting multiple tasks
L Yang, Z Yan, M Li, H Kwon, L Lai, T Krishna, V Chandra, W Jiang, Y Shi
2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020
1412020
Attentivenas: Improving neural architecture search via attentive sampling
D Wang, M Li, C Gong, V Chandra
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
1242021
IP protection and supply chain security through logic obfuscation: A systematic overview
K Shamsi, M Li, K Plaks, S Fazzari, DZ Pan, Y Jin
ACM Transactions on Design Automation of Electronic Systems (TODAES) 24 (6 …, 2019
1072019
KC2: Key-condition crunching for fast sequential circuit deobfuscation
K Shamsi, M Li, DZ Pan, Y Jin
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 534-539, 2019
972019
Federated learning with non-iid data. arXiv 2018
Y Zhao, M Li, L Lai, N Suda, D Civin, V Chandra
arXiv preprint arXiv:1806.00582, 2018
952018
On the approximation resiliency of logic locking and IC camouflaging schemes
K Shamsi, T Meade, M Li, DZ Pan, Y Jin
IEEE Transactions on Information Forensics and Security 14 (2), 347-359, 2018
822018
Federated learning with non-iid data (2018)
Y Zhao, M Li, L Lai, N Suda, D Civin, V Chandra
arXiv preprint arXiv:1806.00582, 2018
812018
Nasvit: Neural architecture search for efficient vision transformers with gradient conflict-aware supernet training
C Gong, D Wang
ICLR Proceedings 2022, 2022
802022
Federated learning with non-iid data. arXiv
Y Zhao, M Li, L Lai, N Suda, D Civin, V Chandra
arXiv preprint arXiv:1806.00582 10, 2018
802018
Alphanet: Improved training of supernets with alpha-divergence
D Wang, C Gong, M Li, Q Liu, V Chandra
International Conference on Machine Learning, 10760-10771, 2021
752021
Cross-lock: Dense layout-level interconnect locking using cross-bar architectures
K Shamsi, M Li, DZ Pan, Y Jin
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 147-152, 2018
752018
Vision transformers with patch diversification
C Gong, D Wang, M Li, V Chandra, Q Liu
arXiv preprint arXiv:2104.12753, 2021
632021
Data efficient lithography modeling with transfer learning and active data selection
Y Lin, M Li, Y Watanabe, T Kimura, T Matsunawa, S Nojima, DZ Pan
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018
622018
The system can't perform the operation now. Try again later.
Articles 1–20