Tao Su - IEEE Xplore Author Profile

Showing 1-25 of 38 results

Results

The purpose of weakly-supervised temporal action localization (WTAL) task is to simultaneously classify and localize action instances in untrimmed videos with only video-level labels. Previous works fail to extract multi-scale temporal features to identify action instances with different durations, and they do not fully use the temporal cues of action video to learn discriminative features. In add...Show More
A class of RF low-pass filters (LPFs) simultaneously featuring flat-in-band-group-delay and input-quasi-reflectionless characteristics is reported for the first time. By means of a multilayered complementary-diplexer-based topology, a single-ended input-quasi-reflectionless LPF with in-band quasi-flat group-delay response and multiple out-of-band transmission zeros (TZs) is first conceived. It con...Show More
In this paper, based on the gap waveguide technology, an X-band high-selectivity and low-loss over-moded filter with out-of-band transmission zero point is proposed. The filter has good electrical performance and manufacturing flexibility, which can reduce manufacturing costs. It consists of two cascade cavities designed using a grooved gap waveguide structure. It consists of two cascaded cavities...Show More
In a multitenant FPGA, the power noise induced by a victim circuit form a side channel for an attacker on the same FPGA chip to steal the information of the victim. Previous researches are performed on program-level to show how the algorithm type or the key data of a victim can be identified through a synthesized on-chip noise sensor. This paper is focused on the fine-grained waveform of the power...Show More
Number Theoretic Transform (NTT) and inverse NTT (INTT) are widely used to accelerate polynomial multi-plications in lattice-based cryptosystems. This paper proposes a low-complexity coefficient memory access pattern for an in-place NTT/INTT design. It simplifies the data path between the processing elements (PEs) and the memory banks. Moreover, to avoid read-after-write conflicts and achieve mini...Show More
To overcome electromagnetic interference (EMI) and thermal management issues in chip packages with metal lids or heat sinks, an innovative graphene-based absorptive gasket is proposed in this article. It comprises a dielectric layer and two identical lossy layers that are constituted of printed resistive graphene film with a specific pattern. The proposed gasket can be applied to the bottom of lid...Show More
In this paper, a novel type of balanced low-pass filter (LPF) combining for the first time differential-mode (DM) input-quasi-reflectionless behavior and flat group-delay response is proposed. Using a multilayer complementary-diplexer-based topology, a single-ended input-quasi-reflectionless LPF with flat group-delay characteristics and transmission zeros (TZs) is firstly determined through a comb...Show More
Lattice-Based Cryptography (LBC) emerges as a powerful cryptographic primitive, offering a solution for post-quantum security. Within LBC schemes, one of the most computationally intensive tasks is polynomial multiplication, which can be accelerated through the Number Theoretic Transform (NTT). This paper proposes SHP-FsNTT, a scalable, dynamically configurable and high-performance hardware accele...Show More
The Number Theoretic Transform (NTT) is a widely adopted method for accelerating polynomial multiplication in lattice-based cryptosystems. Consequently, numerous hardware accelerators have been developed to enhance the speed of the NTT algorithm. Area-Time Product (ATP) and configurability are critical metrics for evaluating these accelerators. ATP measures efficiency, while configurability ensure...Show More
Multi-label image classification is a fundamental yet challenging task, which aims to predict the labels associated with a given image. Most of previous methods directly exploit the high-level features from the last layer of convolutional neural network for classification. However, these methods cannot obtain global features due to the limited size of convolutional kernels, and they fail to extrac...Show More
The purpose of multi-label image classification is to assign multiple labels for multiple objects presented in one image. Recent research efforts exploit graph convolution network (GCN) to learn the label co-occurrence dependencies for enhancing the semantic representation. Although these methods have achieved promising results, they can not capture the intrinsic correlation between objects in ima...Show More
Previous researches have shown that a remote user can cause the circuit of another user in a cloud FPGA to fail by creating mutual interference inside the FPGA. However, the fundamental mechanism of mutual interference is still not clear. This paper conducts a series of tests to investigate the condition and the type of the function failure. Two critical parameters of the interference source, the ...Show More
In the electromagnetic interference (EMI) test, the disturbance amplitude is a key parameter to be measured. It is difficult to measure the peak voltage of the disturbance on the integrated circuit (IC) because the chip is encapsulated inside a package. Existing peak detection circuits have relative long response time and thereby cannot detect high-frequency disturbance. To solve that problem, thi...Show More
Keyword-spotting (KWS) plays a crucial role in human machine interactions involving smart devices. And in most of the KWS systems, Mel Frequency Cepstral Coefficients (MFCC) acts as the feature extractor and consumes an unneglectable amount of computational load and resource. In this paper, to reach a trade-off between accuracy and power consumption, we proposed a modified MFCC algorithm, the comp...Show More
A new design for dual-wideband microstrip patch antenna is proposed in this letter. A dual-band characteristic is obtained with the help of four loaded shorting vias. To widen both lower and upper impedance bandwidth, parasitic annular sectors are employed to introduce two additional resonant modes. For further demonstration, a prototype is manufactured and tested. The measured results which are c...Show More
In this paper, we propose a Diverse Feature Learning Network with Attention Suppression and Part Level Background Suppression (DFLN) for person re-identification (ReID). DFLN includes two key components: attention suppression mechanism (ASM) and part level background suppression mechanism (PLBSM). Firstly, despite attention mechanism has made great progress in current state-of-the-art ReID methods...Show More
Deep learning has been widely applied in the image processing. However, few works have been done on the layout check of integrated circuits. This paper tests the capability of Yolo v3 in identifying the rule violation of the IC layout. The test case is the VDD and VSS pad arrangement of a 44-pin die. The result is quite positive. All error spots in the test set have been identified. Even the layou...Show More
In this paper, a hybrid simulation algorithm called FDTD-LUT, which bases on the finite difference time-domain (FDTD) algorithm and Look-up table (LUT) method, is proposed for analyzing the electromagnetic field of digital integrated circuits. Moreover, an electromagnetic field simulator Hybrid Electromagnetic Simulator for Integrated Circuit (HESIC) is developed by using this algorithm, which can...Show More
MobileNet is a kind of Convolutional neural networks (CNNs), but the existing MobileNet accelerators on Field Programmable Gate Array (FPGA) show low processing element (PE) efficiency. One of the reasons is that the structure of MobileNet makes the accelerators fall into memory bandwidth bottleneck. For this reason, this work proposed a network mapping strategy to improve the computational effici...Show More
FPGAs have been widely used in multiple parallel computing of convolutional neural networks and realizing the parallel acceleration of multiplication, benefitting from its tremendous scalability and flexibility. So far, most of the researches is based on the design and optimization of FPGA-based convolutional neural network accelerators, which lacks researches on the electromagnetic immunity of co...Show More
Field Programming Gate Array (FPGA) has become a popular choice for neural network inference for its great potential of parallel computing and abundant on-chip buffer resource. Both software and hardware researchers are trying to explore the design space to obtain the best network model and the best accelerator design. Different from the existing sequential exploration method, we propose a CNN/FPG...Show More
The past few years in the fields of Person Re-Identification (RE-ID) have seen attention mechanism receives enormous interest as it has superior performance in obtaining discriminative feature representations. However, a wide range of state-of-the-art RE-ID attention models only focus on one-dimensional attention design method, e.g. spatial attention and channels attention, hence the produced atte...Show More
This paper covers our observations of the failure behavior of a clocked digital circuit with sinusoidal interference acting on its supply. Conventionally, it has been thought that interference causes mainly logic-level errors in digital circuits, with the average value of the interference determining the circuit delay. As the interference cycle time is much shorter than both the data path delay an...Show More
In this work, we propose a Three-Dimensional Transmissible Attention Network (3DTANet) for Person Re-Identification, which can transmit the attention information from layer to layer and attend to the person image from a three-dimensional perspective. Main contributions of the 3DTANet are: (i) A novel Transmissible Attention (TA) mechanism is introduced, which can transfer attention information bet...Show More
Person Re-identification (ReID) aims to match people across non-overlapping camera views in a public space, which is usually regarded as an image retrieval problem to match query images with pedestrian images in the gallery. It is challenging since many difficulties exist such as pose misalignments, occlusions, similar appearance when detecting people. Existing researches on ReID mainly focus on t...Show More