1 code implementation • 13 Jun 2020 • Amira Guesmi, Ihsen Alouani, Khaled Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-Ghazaleh
We show that our approximate computing implementation achieves robustness across a wide range of attack scenarios.