List of Accepted Papers
ALL PAPERS (6+1 pages, last page only for references) WILL BE A PART OF THE IEEE PROCEEDINGS, PROVIDED THAT THE PAPER IS PRESENTED AT THE CONFERENCE (Lecture/Poster), AND THE CAMERA-READY VERSION IS SUBMITTED.
List of Papers Accepted for Lecture Presentations:
-
(Best Paper Candidate) 52: SRAS: A Lightweight Reinforcement Learning-based Document Selector for Edge-Native RAG Pipelines
-
75: Steganographic Blockchain for Covert Communication: Hashing Tactical Data in Noisy Channels with TinyML
-
89: ML Based Predictive Maintenance Of Electric Power Distribution Transformer
-
97: Optimizing IoT Task Scheduling in Fog-Cloud Architecture Using Squirrel Search Algorithm
-
(Best Paper Candidate) 102: Track Binary vs. Multi-bit Quantization Error Tolerance, an Input-Conditioned Perspective2
-
122: Practical Challenges in Applying QAT to RNN Models
-
(Best Paper Candidate) 126: Optimizing DNN Mapping on NoC-Based FPGA Accelerators Using Proximal Policy Optimization
-
133: A Multi-Model Approach for Burglary Detection at the Edge using Low Cost SBCs
-
134: Quantum-Inspired Neuromorphic Simulation of Action Potentials via Semiconductor-Ion Channel Interfaces at the Edge
-
144: Real-Time Non-Contact Soil Moisture Estimation Using Machine Learning at the Edge
-
(Best Paper Candidate) 156: Edge-Based Object Classification Using mmWave Radar on Qualcomm Innovators Development Kit
-
158: The Fact of the MATTER: Efficient Hardware Accelerators for Wide-Block Memory Encryption
-
(Best Paper Candidate) 160: SecureInfer: Heterogeneous TEE-GPU Architecture for Privacy-Critical Tensors for Large Language Model Deployment
-
161: Design of a Programmable Linear Frequency Modulator for Triangular Chirp Synthesis in Edge and AIoT Applications
-
163: PERCIF: A Power-Efficient Reverse Carry Propagate Adder for FPGA-based Image Filtering
- (Best Paper Candidate) 164: Design of Efficient and Configurable Accelerators for Cryptography with Montgomery Safe Curves
-
165: Trust-Aware Game-Theoretic Allocation for Secure and Efficient IoT-Edge Systems
-
177: A Dual-Approach Intrusion Detection System for IoT: Comparative Insights from XGBoost and K-Means Clustering
-
184: Design of a Blockchain-Driven Quantum Identity Model Using QHA-AC FQET and RL-QIDA Methods in Cloud Microservices
-
186: Quantum Roots of Trust: Hardware Anchors for Post-Quantum Security
-
198: PWLF: A Robust Weighted Late Multimodal Fusion Approac
List of Papers Accepted for Poster Presentations:
-
41: Hybrid Visual-Sensor Fusion for AI-Guided Urban Traffic Flow Adjustment
-
55: PROOF: Predetermined Signature-based On-chip Online Rowhammer Bit-Flip Detection
-
62: ChaosLock: Edge-Friendly Chaotic Encryption of Digital Images for IoT Systems
-
64: Empowering mobility: IoT Enabled Automated Healthcare System For Paralysis Patient
- 65: Performance Analysis of Schottky-CMOS Standard Cells
- 74: Web-Integrated Audio Communication Using HTTP, SMTP, And Ethernet Protocols With FPGA-Based Audio Receiver
-
83: Advancements in Non-Invasive Sleep Apnea Detection: A Comprehensive Survey of Machine Learning and Computing Approaches for OSAS Diagnosis
-
90: Smart Scale Food Analysis For Stage 1 Cancer Patients
-
92: ONNX-C Deployment of Neural Network Controller on Resource Constrained Microcontroller for Intermediate Bus Converter
-
106: Cloud-Based Adaptive Detection Framework for IIoT Networks using Machine Learning Techniques
-
109: DuDAB: A Dual-Staged, Lightweight Detection Methodology for Adversarial Attacks in a Black-Box Setting
-
127: FloPWD: A Novel UAV-Based Dataset and Lightweight Segmentation Model for Real-Time Edge Deployment
-
128: Detection of DNS over HTTPS Tunneling Attacks in Smart Home IoT Devices through Optimized Feature Analysis
- 135: Cost-Effective Biomimicking Quadruped Robot for STEM Education
- 141: Implementation of Bitwise Logic Operations using 8T SRAM Cells for In-Memory Computation
-
157: Embedded AI Platform for Respiratory Auscultation in Resource Constrained Clinical Environments
-
181: Integrated Resource Localization, Navigation & Visualization
-
194: ECOWAVE – An Autonomous and Sustainable System for Water Hyacinth Detection, Collection, and Biomass Utilization
List of Special Session Papers:
- 215: One Bit-flip Away from Collapse: Security and Safety in AI Models and Accelerators
- 232: Hyena and Kolmogorov–Arnold Networks on NPUs: Towards Efficient Acceleration
- 239: Lose All Weights: Defense against Bit Flip Attack on Weights using SAT-Based Neural Networks
- 242: From Devices to Edge Intelligence: Band-to-Band Tunneling-Based Energy and Area-Efficient Neuromorphic Hardware
- 243: Temperature-Robust Frequency-Encoded Spintronic Oscillatory Neural Networks for Energy-Efficient Edge AI
- 244: Devices, Synthesis, Circuits, and Verification for Resistive RAM-Based Digital Computing-in-Memory
- 246: Variation-Tolerant Hardware synthesis of Spiking neural networks
- 247: Edge-Private Spiking Graph Convolutional Learning: Membership Inference and Structural Differential Privacy
- 255: Scaling Equilibrium Propagation to Deeper Neural Network Architectures
- 259: Resource-Efficient Compressive Plane-Wave Ultrasound Imaging for Edge Devices
- 260: Low-Latency Neuromorphic Vision Systems: From Sparse SNNs to In-Sensor Computing & Agentic AI
- 261: Optimizing VGG16 Model via Quantization for Edge Computing Applications
- 262: ProbCIMs: Compute-in-Memory Paradigms for Robust and Efficient Probabilistic Computing & AI
- 263: Neuromorphic Computing using Nonvolatile Memory Devices: A Case Study
- 296: Cascading Bandits With Feedback
- 428: An Integrated, Multi-Modular Sensing Platform for Monitoring Human Performance in Industrial Environments: A Conceptual Framework

