December 18-20, 2025
IISc Bangalore

List of Accepted Papers

ALL PAPERS (6+1 pages, last page only for references) WILL BE A PART OF THE IEEE PROCEEDINGS, PROVIDED THAT THE PAPER IS PRESENTED AT THE CONFERENCE (Lecture/Poster), AND THE CAMERA-READY VERSION IS SUBMITTED.

List of Papers Accepted for Lecture Presentations:

  • (Best Paper Candidate) 52: SRAS: A Lightweight Reinforcement Learning-based Document Selector for Edge-Native RAG Pipelines

  • 75: Steganographic Blockchain for Covert Communication: Hashing Tactical Data in Noisy Channels with TinyML

  • 89: ML Based Predictive Maintenance Of Electric Power Distribution Transformer

  • 97: Optimizing IoT Task Scheduling in Fog-Cloud Architecture Using Squirrel Search Algorithm

  • (Best Paper Candidate) 102: Track Binary vs. Multi-bit Quantization Error Tolerance, an Input-Conditioned Perspective2

  • 122: Practical Challenges in Applying QAT to RNN Models

  • (Best Paper Candidate) 126: Optimizing DNN Mapping on NoC-Based FPGA Accelerators Using Proximal Policy Optimization

  • 133: A Multi-Model Approach for Burglary Detection at the Edge using Low Cost SBCs

  • 134: Quantum-Inspired Neuromorphic Simulation of Action Potentials via Semiconductor-Ion Channel Interfaces at the Edge

  • 144: Real-Time Non-Contact Soil Moisture Estimation Using Machine Learning at the Edge

  • (Best Paper Candidate) 156: Edge-Based Object Classification Using mmWave Radar on Qualcomm Innovators Development Kit

  • 158: The Fact of the MATTER: Efficient Hardware Accelerators for Wide-Block Memory Encryption

  • (Best Paper Candidate) 160: SecureInfer: Heterogeneous TEE-GPU Architecture for Privacy-Critical Tensors for Large Language Model Deployment

  • 161: Design of a Programmable Linear Frequency Modulator for Triangular Chirp Synthesis in Edge and AIoT Applications

  • 163: PERCIF: A Power-Efficient Reverse Carry Propagate Adder for FPGA-based Image Filtering

  • (Best Paper Candidate) 164: Design of Efficient and Configurable Accelerators for Cryptography with Montgomery Safe Curves
  • 165: Trust-Aware Game-Theoretic Allocation for Secure and Efficient IoT-Edge Systems

  • 177: A Dual-Approach Intrusion Detection System for IoT: Comparative Insights from XGBoost and K-Means Clustering

  • 184: Design of a Blockchain-Driven Quantum Identity Model Using QHA-AC FQET and RL-QIDA Methods in Cloud Microservices

  • 186: Quantum Roots of Trust: Hardware Anchors for  Post-Quantum Security

  • 198: PWLF: A Robust Weighted Late Multimodal Fusion Approac

List of Papers Accepted for Poster Presentations:

  • 41: Hybrid Visual-Sensor Fusion for AI-Guided Urban Traffic Flow Adjustment

  • 55: PROOF: Predetermined Signature-based On-chip Online Rowhammer Bit-Flip Detection

  • 62: ChaosLock: Edge-Friendly Chaotic Encryption of Digital Images for IoT Systems

  • 64: Empowering mobility: IoT Enabled Automated Healthcare System For Paralysis Patient

  • 65: Performance Analysis of Schottky-CMOS Standard Cells
  • 74: Web-Integrated Audio Communication Using HTTP, SMTP, And Ethernet Protocols With FPGA-Based Audio Receiver
  • 83: Advancements in Non-Invasive Sleep Apnea Detection: A Comprehensive Survey of Machine Learning and Computing Approaches for OSAS Diagnosis

  • 90: Smart Scale Food Analysis For Stage 1 Cancer Patients

  • 92: ONNX-C Deployment of Neural Network Controller on Resource Constrained Microcontroller for Intermediate Bus Converter

  • 106: Cloud-Based Adaptive Detection Framework for  IIoT Networks using Machine Learning Techniques

  • 109: DuDAB: A Dual-Staged, Lightweight Detection Methodology for Adversarial Attacks in a Black-Box Setting

  • 127: FloPWD: A Novel UAV-Based Dataset and Lightweight Segmentation Model for Real-Time Edge Deployment

  • 128: Detection of DNS over HTTPS Tunneling Attacks in Smart Home IoT Devices through Optimized Feature Analysis

  • 135: Cost-Effective Biomimicking Quadruped Robot for STEM Education
  • 141: Implementation of Bitwise Logic Operations using 8T SRAM Cells for In-Memory Computation
  • 157: Embedded AI Platform for Respiratory Auscultation in Resource Constrained Clinical Environments

  • 181: Integrated Resource Localization, Navigation & Visualization

  • 194: ECOWAVE – An Autonomous and Sustainable System for Water Hyacinth Detection, Collection, and Biomass Utilization

List of Special Session Papers:

  • 215: One Bit-flip Away from Collapse: Security and Safety in AI Models and Accelerators
  • 232: Hyena and Kolmogorov–Arnold Networks on NPUs: Towards Efficient Acceleration
  • 239: Lose All Weights: Defense against Bit Flip Attack on Weights using SAT-Based Neural Networks
  • 242: From Devices to Edge Intelligence: Band-to-Band Tunneling-Based Energy and Area-Efficient Neuromorphic Hardware
  • 243: Temperature-Robust Frequency-Encoded Spintronic Oscillatory Neural Networks for Energy-Efficient Edge AI
  • 244: Devices, Synthesis, Circuits, and Verification for Resistive RAM-Based Digital Computing-in-Memory
  • 246: Variation-Tolerant Hardware synthesis of Spiking neural networks
  • 247: Edge-Private Spiking Graph Convolutional Learning: Membership Inference and Structural Differential Privacy
  • 255: Scaling Equilibrium Propagation to Deeper Neural Network Architectures
  • 259: Resource-Efficient Compressive Plane-Wave Ultrasound Imaging for Edge Devices
  • 260: Low-Latency Neuromorphic Vision Systems: From Sparse SNNs to In-Sensor Computing & Agentic AI
  • 261: Optimizing VGG16 Model via Quantization for Edge Computing Applications
  • 262: ProbCIMs: Compute-in-Memory Paradigms for Robust and Efficient Probabilistic Computing & AI
  • 263: Neuromorphic Computing using Nonvolatile Memory Devices: A Case Study
  • 296: Cascading Bandits With Feedback
  • 428: An Integrated, Multi-Modular Sensing Platform for Monitoring Human Performance in Industrial Environments: A Conceptual Framework