Follow
Meng Li
Meng Li
Peking University; Ex-Facebook
Verified email at pku.edu.cn - Homepage
Title
Cited by
Cited by
Year
Federated learning with non-iid data
Y Zhao, M Li, L Lai, N Suda, D Civin, V Chandra
arXiv preprint arXiv:1806.00582, 2018
25632018
AppSAT: Approximately deobfuscating integrated circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
3492017
Recnmp: Accelerating personalized recommendation with near-memory processing
L Ke, U Gupta, BY Cho, D Brooks, V Chandra, U Diril, A Firoozshahian, ...
2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture …, 2020
1932020
Provably secure camouflaging strategy for IC protection
M Li, K Shamsi, T Meade, Z Zhao, B Yu, Y Jin, DZ Pan
IEEE transactions on computer-aided design of integrated circuits and …, 2017
1902017
Cyclic obfuscation for creating SAT-unresolvable circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
Proceedings of the on Great Lakes Symposium on VLSI 2017, 173-178, 2017
1842017
Multi-scale high-resolution vision transformer for semantic segmentation
J Gu, H Kwon, D Wang, W Ye, M Li, YH Chen, L Lai, V Chandra, DZ Pan
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
1732022
Federated learning with non-iid data. arXiv
Y Zhao, M Li, L Lai, N Suda, D Civin, V Chandra
arXiv preprint arXiv:1806.00582 10, 2018
1402018
Keepaugment: A simple information-preserving data augmentation approach
C Gong, D Wang, M Li, V Chandra, Q Liu
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
1272021
Co-exploration of neural architectures and heterogeneous asic accelerator designs targeting multiple tasks
L Yang, Z Yan, M Li, H Kwon, L Lai, T Krishna, V Chandra, W Jiang, Y Shi
2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020
1252020
Attentivenas: Improving neural architecture search via attentive sampling
D Wang, M Li, C Gong, V Chandra
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
1122021
IP protection and supply chain security through logic obfuscation: A systematic overview
K Shamsi, M Li, K Plaks, S Fazzari, DZ Pan, Y Jin
ACM Transactions on Design Automation of Electronic Systems (TODAES) 24 (6 …, 2019
962019
KC2: Key-condition crunching for fast sequential circuit deobfuscation
K Shamsi, M Li, DZ Pan, Y Jin
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 534-539, 2019
902019
Federated learning with non-iid data. arXiv 2018
Y Zhao, M Li, L Lai, N Suda, D Civin, V Chandra
arXiv preprint arXiv:1806.00582, 2018
852018
On the approximation resiliency of logic locking and IC camouflaging schemes
K Shamsi, T Meade, M Li, DZ Pan, Y Jin
IEEE Transactions on Information Forensics and Security 14 (2), 347-359, 2018
792018
Alphanet: Improved training of supernets with alpha-divergence
D Wang, C Gong, M Li, Q Liu, V Chandra
International Conference on Machine Learning, 10760-10771, 2021
682021
Cross-lock: Dense layout-level interconnect locking using cross-bar architectures
K Shamsi, M Li, DZ Pan, Y Jin
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 147-152, 2018
682018
Nasvit: Neural architecture search for efficient vision transformers with gradient conflict-aware supernet training
C Gong, D Wang
ICLR Proceedings 2022, 2022
662022
Vision transformers with patch diversification
C Gong, D Wang, M Li, V Chandra, Q Liu
arXiv preprint arXiv:2104.12753, 2021
562021
Data efficient lithography modeling with transfer learning and active data selection
Y Lin, M Li, Y Watanabe, T Kimura, T Matsunawa, S Nojima, DZ Pan
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018
532018
PrivyNet: A Flexible Framework for Privacy-Preserving Deep Neural Network Training with A Fine-Grained Privacy Control
M Li, L Lai, N Suda, V Chandra, DZ Pan
https://arxiv.org/abs/1709.06161, 2017
48*2017
The system can't perform the operation now. Try again later.
Articles 1–20