-
Influence of mid-infrared Galactic bubble on surroundings: A case study on IRAS 16489-4431
Authors:
Ariful Hoque,
Tapas Baug,
Lokesh Dewangan,
Ke Wang,
Tie Liu,
Soumen Mondal
Abstract:
We studied the influence of a massive star on a mid-infrared bubble and its surrounding gas in the IRAS\,16489-4431 star-forming region using multi-wavelength data. The {\it Spitzer} mid-infrared band images revealed the shocked nature of the bubble. Analyses showed that the bubble is developed by a massive star owing to its strong radiation pressure. Evidence of collected material along the edge…
▽ More
We studied the influence of a massive star on a mid-infrared bubble and its surrounding gas in the IRAS\,16489-4431 star-forming region using multi-wavelength data. The {\it Spitzer} mid-infrared band images revealed the shocked nature of the bubble. Analyses showed that the bubble is developed by a massive star owing to its strong radiation pressure. Evidence of collected material along the edge of the bubble was noted by the cold gas tracer line observed using Atacama Millimeter/submillimeter Array (ALMA). The presence of dense dust cores with bi-polar outflows and young stellar objects toward the collected material is suggestive of active star formation possibly influenced by the expansion of the radiation driven bubble.
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
Formal Verification for Blockchain-based Insurance Claims Processing
Authors:
Roshan Lal Neupane,
Ernest Bonnah,
Bishnu Bhusal,
Kiran Neupane,
Khaza Anuarul Hoque,
Prasad Calyam
Abstract:
Insurance claims processing involves multi-domain entities and multi-source data, along with a number of human-agent interactions. Use of Blockchain technology-based platform can significantly improve scalability and response time for processing of claims which are otherwise manually-intensive and time-consuming. However, the chaincodes involved within the processes that issue claims, approve or d…
▽ More
Insurance claims processing involves multi-domain entities and multi-source data, along with a number of human-agent interactions. Use of Blockchain technology-based platform can significantly improve scalability and response time for processing of claims which are otherwise manually-intensive and time-consuming. However, the chaincodes involved within the processes that issue claims, approve or deny them as required, need to be formally verified to ensure secure and reliable processing of transactions in Blockchain. In this paper, we use a formal modeling approach to verify various processes and their underlying chaincodes relating to different stages in insurance claims processing viz., issuance, approval, denial, and flagging for fraud investigation by using linear temporal logic (LTL). We simulate the formalism on the chaincodes and analyze the breach of chaincodes via model checking.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
TP-Aware Dequantization
Authors:
Adnan Hoque,
Mudhakar Srivatsa,
Chih-Chieh Yang,
Raghu Ganti
Abstract:
In this paper, we present a novel method that reduces model inference latency during distributed deployment of Large Language Models (LLMs). Our contribution is an optimized inference deployment scheme that address the current limitations of state-of-the-art quantization kernels when used in conjunction with Tensor Parallel (TP). Our method preserves data locality in GPU memory access patterns and…
▽ More
In this paper, we present a novel method that reduces model inference latency during distributed deployment of Large Language Models (LLMs). Our contribution is an optimized inference deployment scheme that address the current limitations of state-of-the-art quantization kernels when used in conjunction with Tensor Parallel (TP). Our method preserves data locality in GPU memory access patterns and exploits a priori knowledge of TP to reduce global communication. We demonstrate an up to 1.81x speedup over existing methods for Llama-70B and up to 1.78x speedup for IBM WatsonX's Granite-20B MLP layer problem sizes on A100 and H100 NVIDIA DGX Systems for a variety of TP settings.
△ Less
Submitted 15 January, 2024;
originally announced February 2024.
-
Accelerating a Triton Fused Kernel for W4A16 Quantized Inference with SplitK work decomposition
Authors:
Adnan Hoque,
Less Wright,
Chih-Chieh Yang,
Mudhakar Srivatsa,
Raghu Ganti
Abstract:
We propose an implementation of an efficient fused matrix multiplication kernel for W4A16 quantized inference, where we perform dequantization and GEMM in a fused kernel using a SplitK work decomposition. Our implementation shows improvement for the type of skinny matrix-matrix multiplications found in foundation model inference workloads. In particular, this paper surveys the type of matrix multi…
▽ More
We propose an implementation of an efficient fused matrix multiplication kernel for W4A16 quantized inference, where we perform dequantization and GEMM in a fused kernel using a SplitK work decomposition. Our implementation shows improvement for the type of skinny matrix-matrix multiplications found in foundation model inference workloads. In particular, this paper surveys the type of matrix multiplication between a skinny activation matrix and a square weight matrix. Our results show an average of 65% speed improvement on A100, and an average of 124% speed improvement on H100 (with a peak of 295%) for a range of matrix dimensions including those found in a llama-style model, where m < n = k.
△ Less
Submitted 22 February, 2024; v1 submitted 5 January, 2024;
originally announced February 2024.
-
Room temperature nonlocal detection of charge-spin interconversion in a topological insulator
Authors:
Anamul Md. Hoque,
Lars Sjöström,
Dmitrii Khokhriakov,
Bing Zhao,
Saroj P. Dash
Abstract:
Topological insulators (TIs) are emerging materials for next-generation low-power nanoelectronic and spintronic device applications. TIs possess non-trivial spin-momentum locking features in the topological surface states in addition to the spin-Hall effect (SHE), and Rashba states due to high spin-orbit coupling (SOC) properties. These phenomena are vital for observing the charge-spin conversion…
▽ More
Topological insulators (TIs) are emerging materials for next-generation low-power nanoelectronic and spintronic device applications. TIs possess non-trivial spin-momentum locking features in the topological surface states in addition to the spin-Hall effect (SHE), and Rashba states due to high spin-orbit coupling (SOC) properties. These phenomena are vital for observing the charge-spin conversion (CSC) processes for spin-based memory, logic and quantum technologies. Although CSC has been observed in TIs by potentiometric measurements, reliable nonlocal detection has so far been limited to cryogenic temperatures up to T = 15 K. Here, we report nonlocal detection of CSC and its inverse effect in the TI compound Bi1.5Sb0.5Te1.7Se1.3 at room temperature using a van der Waals heterostructure with a graphene spin-valve device. The lateral nonlocal device design with graphene allows observation of both spin-switch and Hanle spin precession signals for generation, injection and detection of spin currents by the TI. Detailed bias- and gate-dependent measurements in different geometries prove the robustness of the CSC effects in the TI. These findings demonstrate the possibility of using topological materials to make all-electrical room-temperature spintronic devices.
△ Less
Submitted 25 January, 2024;
originally announced January 2024.
-
Strong in-plane magnetic anisotropy (Co0.15Fe0.85)5GeTe2/graphene van der Waals heterostructure spin-valve at room temperature
Authors:
Roselle Ngaloy,
Bing Zhao,
Soheil Ershadrad,
Rahul Gupta,
Masoumeh Davoudiniya,
Lakhan Bainsla,
Lars Sjöström,
Anamul M. Hoque,
Alexei Kalaboukhov,
Peter Svedlindh,
Biplab Sanyal,
Saroj P. Dash
Abstract:
Van der Waals (vdW) magnets are promising owing to their tunable magnetic properties with do** or alloy composition, where the strength of magnetic interactions, their symmetry, and magnetic anisotropy can be tuned according to the desired application. However, most of the vdW magnet based spintronic devices are so far limited to cryogenic temperatures with magnetic anisotropies favouring out-of…
▽ More
Van der Waals (vdW) magnets are promising owing to their tunable magnetic properties with do** or alloy composition, where the strength of magnetic interactions, their symmetry, and magnetic anisotropy can be tuned according to the desired application. However, most of the vdW magnet based spintronic devices are so far limited to cryogenic temperatures with magnetic anisotropies favouring out-of-plane or canted orientation of the magnetization. Here, we report room-temperature lateral spin-valve devices with strong in-plane magnetic anisotropy of the vdW ferromagnet (Co0.15Fe0.85)5GeTe2 (CFGT) in heterostructures with graphene. Magnetization measurements reveal above room-temperature ferromagnetism in CFGT with a strong in-plane magnetic anisotropy. Density functional theory calculations show that the magnitude of the anisotropy depends on the Co concentration and is caused by the substitution of Co in the outermost Fe layer. Heterostructures consisting of CFGT nanolayers and graphene were used to experimentally realize basic building blocks for spin valve devices such as efficient spin injection and detection. The spin transport and Hanle spin precession measurements prove a strong in-plane and negative spin polarization at the interface with graphene, which is supported by the calculated spin-polarized density of states of CFGT. The in-plane magnetization of CFGT at room temperature proves its usefulness in graphene lateral spin-valve devices, thus opening further opportunities for spintronic technologies.
△ Less
Submitted 30 October, 2023;
originally announced October 2023.
-
On the plus parts of the class numbers of cyclotomic fields
Authors:
Kalyan Chakraborty,
Azizul Hoque
Abstract:
We exhibit some new families of cyclotomic fields which have non-trivial plus parts of their class numbers. We also prove the $3$ - divisibility of the plus part of the class number of another family consisting of infinitely many cyclotomic fields. At the end, we provide some numerical examples supporting our results.
We exhibit some new families of cyclotomic fields which have non-trivial plus parts of their class numbers. We also prove the $3$ - divisibility of the plus part of the class number of another family consisting of infinitely many cyclotomic fields. At the end, we provide some numerical examples supporting our results.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
Large out-of-plane spin-orbit torque in topological Weyl semimetal candidate TaIrTe4
Authors:
Lakhan Bainsla,
Bing Zhao,
Anamul Md. Hoque,
Lars Sjöström,
Nilamani Behera,
Mahmoud Abdel-Hafiez,
Johan Åkerman,
Saroj P. Dash
Abstract:
Topological quantum materials, with novel spin textures and broken crystal symmetries are suitable candidates for spintronic memory technologies. Their unique electronic properties, such as protected surface states and exotic quasiparticles, can provide an out-of-plane spin polarized current needed for external field free magnetization switching of magnets with perpendicular magnetic anisotropy. C…
▽ More
Topological quantum materials, with novel spin textures and broken crystal symmetries are suitable candidates for spintronic memory technologies. Their unique electronic properties, such as protected surface states and exotic quasiparticles, can provide an out-of-plane spin polarized current needed for external field free magnetization switching of magnets with perpendicular magnetic anisotropy. Conventional spin-orbit torque materials, such as heavy metals and topological insulators, provide only an in-plane spin polarized current, and recently explored materials with lower crystal symmetries provide very low out-of-plane spin polarized current components, which is not suitable for energy-efficient spin-orbit torque (SOT) applications. Here, we demonstrate a large out-of-plane dam**-like SOT at room temperature using a topological Weyl semimetal candidate TaIrTe4 with a lower crystal symmetry. We performed spin-orbit torque ferromagnetic resonance (STFMR) experiments in a TaIrTe4/Ni80Fe20 heterostructure and observed a large out-of-plane dam**-like SOT efficiency. The out-of-plane spin Hall conductivity is estimated to be an order of magnitude higher than the reported values in other materials. These findings of high spin Hall conductivity and large out-of-plane SOT efficiency are suitable for the development of energy efficient and external field-free spintronic devices.
△ Less
Submitted 10 October, 2023;
originally announced October 2023.
-
How Helpful do Novice Programmers Find the Feedback of an Automated Repair Tool?
Authors:
Oka Kurniawan,
Christopher M. Poskitt,
Ismam Al Hoque,
Norman Tiong Seng Lee,
Cyrille Jégourel,
Nachamma Sockalingam
Abstract:
Immediate feedback has been shown to improve student learning. In programming courses, immediate, automated feedback is typically provided in the form of pre-defined test cases run by a submission platform. While these are excellent for highlighting the presence of logical errors, they do not provide novice programmers enough scaffolding to help them identify where an error is or how to fix it. To…
▽ More
Immediate feedback has been shown to improve student learning. In programming courses, immediate, automated feedback is typically provided in the form of pre-defined test cases run by a submission platform. While these are excellent for highlighting the presence of logical errors, they do not provide novice programmers enough scaffolding to help them identify where an error is or how to fix it. To address this, several tools have been developed that provide richer feedback in the form of program repairs. Studies of such tools, however, tend to focus more on whether correct repairs can be generated, rather than how novices are using them. In this paper, we describe our experience of using CLARA, an automated repair tool, to provide feedback to novices. First, we extended CLARA to support a larger subset of the Python language, before integrating it with the Jupyter Notebooks used for our programming exercises. Second, we devised a preliminary study in which students tackled programming problems with and without support of the tool using the 'think aloud' protocol. We found that novices often struggled to understand the proposed repairs, echoing the well-known challenge to understand compiler/interpreter messages. Furthermore, we found that students valued being told where a fix was needed - without necessarily the fix itself - suggesting that 'less may be more' from a pedagogical perspective.
△ Less
Submitted 7 October, 2023; v1 submitted 2 October, 2023;
originally announced October 2023.
-
On the exponential Diophantine equation $x^2+p^mq^n=2y^p$
Authors:
Kalyan Chakraborty,
Azizul Hoque
Abstract:
We study the exponential Diophantine equation $x^2+p^mq^n=2y^p$ in positive integers $x,y,m,n$, and odd primes $p$ and $q$ using primitive divisors of Lehmer sequences in combination with elementary number theory. We discuss the solvability of this equation.
We study the exponential Diophantine equation $x^2+p^mq^n=2y^p$ in positive integers $x,y,m,n$, and odd primes $p$ and $q$ using primitive divisors of Lehmer sequences in combination with elementary number theory. We discuss the solvability of this equation.
△ Less
Submitted 24 August, 2023;
originally announced August 2023.
-
QTWTL: Quality Aware Time Window Temporal Logic for Performance Monitoring
Authors:
Ernest Bonnah,
Khaza Anuarul Hoque
Abstract:
In various service-oriented applications such as distributed autonomous delivery, healthcare, tourism, transportation, and many others, where service agents need to perform serial and time-bounded tasks to achieve their goals, quality of service must constantly be assured. In addition to safety requirements, such agents also need to fulfill performance requirements in order to satisfy their qualit…
▽ More
In various service-oriented applications such as distributed autonomous delivery, healthcare, tourism, transportation, and many others, where service agents need to perform serial and time-bounded tasks to achieve their goals, quality of service must constantly be assured. In addition to safety requirements, such agents also need to fulfill performance requirements in order to satisfy their quality of service. This paper proposes the novel quality-aware time window temporal logic (QTWTL) by extending the traditional time window temporal logic (TWTL) with two operators for counting and aggregation operations. We also propose offline runtime monitoring algorithms for the performance monitoring of QTWTL specifications. To analyze the feasibility and efficiency of our proposed approach, we generate a large number of traces using the New York City Taxi and Limousine Commission Trip Record data, formalize their performance requirements using QTWTL, and monitor them using the proposed algorithms. The obtained results show that the monitoring algorithm has a linear space and time complexity with respect to the number of traces monitored.
△ Less
Submitted 10 August, 2023;
originally announced August 2023.
-
Model Checking Time Window Temporal Logic for Hyperproperties
Authors:
Ernest Bonnah,
Luan Viet Nguyen,
Khaza Anuarul Hoque
Abstract:
Hyperproperties extend trace properties to express properties of sets of traces, and they are increasingly popular in specifying various security and performance-related properties in domains such as cyber-physical systems, smart grids, and automotive. This paper introduces a model checking algorithm for a new formalism, HyperTWTL, which extends Time Window Temporal Logic (TWTL) -- a domain-specif…
▽ More
Hyperproperties extend trace properties to express properties of sets of traces, and they are increasingly popular in specifying various security and performance-related properties in domains such as cyber-physical systems, smart grids, and automotive. This paper introduces a model checking algorithm for a new formalism, HyperTWTL, which extends Time Window Temporal Logic (TWTL) -- a domain-specific formal specification language for robotics, by allowing explicit and simultaneous quantification over multiple execution traces. We present HyperTWTL with both \emph{synchronous} and \emph{asynchronous} semantics, based on the alignment of the timestamps in the traces. Consequently, we demonstrate the application of HyperTWTL in formalizing important information-flow security policies and concurrency for robotics applications. Finally, we propose a model checking algorithm for verifying fragments of HyperTWTL by reducing the problem to a TWTL model checking problem.
△ Less
Submitted 10 August, 2023; v1 submitted 2 August, 2023;
originally announced August 2023.
-
Investigation on Machine Learning Based Approaches for Estimating the Critical Temperature of Superconductors
Authors:
Fatin Abrar Shams,
Rashed Hasan Ratul,
Ahnaf Islam Naf,
Syed Shaek Hossain Samir,
Mirza Muntasir Nishat,
Fahim Faisal,
Md. Ashraful Hoque
Abstract:
Superconductors have been among the most fascinating substances, as the fundamental concept of superconductivity as well as the correlation of critical temperature and superconductive materials have been the focus of extensive investigation since their discovery. However, superconductors at normal temperatures have yet to be identified. Additionally, there are still many unknown factors and gaps o…
▽ More
Superconductors have been among the most fascinating substances, as the fundamental concept of superconductivity as well as the correlation of critical temperature and superconductive materials have been the focus of extensive investigation since their discovery. However, superconductors at normal temperatures have yet to be identified. Additionally, there are still many unknown factors and gaps of understanding regarding this unique phenomenon, particularly the connection between superconductivity and the fundamental criteria to estimate the critical temperature. To bridge the gap, numerous machine learning techniques have been established to estimate critical temperatures as it is extremely challenging to determine. Furthermore, the need for a sophisticated and feasible method for determining the temperature range that goes beyond the scope of the standard empirical formula appears to be strongly emphasized by various machine-learning approaches. This paper uses a stacking machine learning approach to train itself on the complex characteristics of superconductive materials in order to accurately predict critical temperatures. In comparison to other previous accessible research investigations, this model demonstrated a promising performance with an RMSE of 9.68 and an R2 score of 0.922. The findings presented here could be a viable technique to shed new insight on the efficient implementation of the stacking ensemble method with hyperparameter optimization (HPO).
△ Less
Submitted 2 August, 2023;
originally announced August 2023.
-
Diophantine $D(n)$-quadruples in $\mathbb{Z}[\sqrt{4k + 2}]$
Authors:
Kalyan Chakraborty,
Shubham Gupta,
Azizul Hoque
Abstract:
Let $d$ be a square-free integer and $\mathbb{Z}[\sqrt{d}]$ a quadratic ring of integers. For a given $n\in\mathbb{Z}[\sqrt{d}]$, a set of $m$ non-zero distinct elements in $\mathbb{Z}[\sqrt{d}]$ is called a Diophantine $D(n)$-$m$-tuple (or simply $D(n)$-$m$-tuple) in $\mathbb{Z}[\sqrt{d}]$ if product of any two of them plus $n$ is a square in $\mathbb{Z}[\sqrt{d}]$. Assume that…
▽ More
Let $d$ be a square-free integer and $\mathbb{Z}[\sqrt{d}]$ a quadratic ring of integers. For a given $n\in\mathbb{Z}[\sqrt{d}]$, a set of $m$ non-zero distinct elements in $\mathbb{Z}[\sqrt{d}]$ is called a Diophantine $D(n)$-$m$-tuple (or simply $D(n)$-$m$-tuple) in $\mathbb{Z}[\sqrt{d}]$ if product of any two of them plus $n$ is a square in $\mathbb{Z}[\sqrt{d}]$. Assume that $d \equiv 2 \pmod 4$ is a positive integer such that $x^2 - dy^2 = -1$ and $x^2 - dy^2 = 6$ are solvable in integers. In this paper, we prove the existence of infinitely many $D(n)$-quadruples in $\mathbb{Z}[\sqrt{d}]$ for $n = 4m + 4k\sqrt{d}$ with $m, k \in \mathbb{Z}$ satisfying $m \not\equiv 5 \pmod{6}$ and $k \not\equiv 3 \pmod{6}$. Moreover, we prove the same for $n = (4m + 2) + 4k\sqrt{d}$ when either $m \not\equiv 9 \pmod{12}$ and $k \not\equiv 3 \pmod{6}$, or $m \not\equiv 0 \pmod{12}$ and $k \not\equiv 0 \pmod{6}$. At the end, some examples supporting the existence of quadruples in $\mathbb{Z}[\sqrt{d}]$ with the property $D(n)$ for the above exceptional $n$'s are provided for $d = 10$.
△ Less
Submitted 26 June, 2024; v1 submitted 8 February, 2023;
originally announced February 2023.
-
LiteVR: Interpretable and Lightweight Cybersickness Detection using Explainable AI
Authors:
Ripan Kumar Kundu,
Rifatul Islam,
John Quarles,
Khaza Anuarul Hoque
Abstract:
Cybersickness is a common ailment associated with virtual reality (VR) user experiences. Several automated methods exist based on machine learning (ML) and deep learning (DL) to detect cybersickness. However, most of these cybersickness detection methods are perceived as computationally intensive and black-box methods. Thus, those techniques are neither trustworthy nor practical for deploying on s…
▽ More
Cybersickness is a common ailment associated with virtual reality (VR) user experiences. Several automated methods exist based on machine learning (ML) and deep learning (DL) to detect cybersickness. However, most of these cybersickness detection methods are perceived as computationally intensive and black-box methods. Thus, those techniques are neither trustworthy nor practical for deploying on standalone energy-constrained VR head-mounted devices (HMDs). In this work, we present an explainable artificial intelligence (XAI)-based framework, LiteVR, for cybersickness detection, explaining the model's outcome and reducing the feature dimensions and overall computational costs. First, we develop three cybersickness DL models based on long-term short-term memory (LSTM), gated recurrent unit (GRU), and multilayer perceptron (MLP). Then, we employed a post-hoc explanation, such as SHapley Additive Explanations (SHAP), to explain the results and extract the most dominant features of cybersickness. Finally, we retrain the DL models with the reduced number of features. Our results show that eye-tracking features are the most dominant for cybersickness detection. Furthermore, based on the XAI-based feature ranking and dimensionality reduction, we significantly reduce the model's size by up to 4.3x, training time by up to 5.6x, and its inference time by up to 3.8x, with higher cybersickness detection accuracy and low regression error (i.e., on Fast Motion Scale (FMS)). Our proposed lite LSTM model obtained an accuracy of 94% in classifying cybersickness and regressing (i.e., FMS 1-10) with a Root Mean Square Error (RMSE) of 0.30, which outperforms the state-of-the-art. Our proposed LiteVR framework can help researchers and practitioners analyze, detect, and deploy their DL-based cybersickness detection models in standalone VR HMDs.
△ Less
Submitted 5 February, 2023;
originally announced February 2023.
-
VR-LENS: Super Learning-based Cybersickness Detection and Explainable AI-Guided Deployment in Virtual Reality
Authors:
Ripan Kumar Kundu,
Osama Yahia Elsaid,
Prasad Calyam,
Khaza Anuarul Hoque
Abstract:
A plethora of recent research has proposed several automated methods based on machine learning (ML) and deep learning (DL) to detect cybersickness in Virtual reality (VR). However, these detection methods are perceived as computationally intensive and black-box methods. Thus, those techniques are neither trustworthy nor practical for deploying on standalone VR head-mounted displays (HMDs). This wo…
▽ More
A plethora of recent research has proposed several automated methods based on machine learning (ML) and deep learning (DL) to detect cybersickness in Virtual reality (VR). However, these detection methods are perceived as computationally intensive and black-box methods. Thus, those techniques are neither trustworthy nor practical for deploying on standalone VR head-mounted displays (HMDs). This work presents an explainable artificial intelligence (XAI)-based framework VR-LENS for develo** cybersickness detection ML models, explaining them, reducing their size, and deploying them in a Qualcomm Snapdragon 750G processor-based Samsung A52 device. Specifically, we first develop a novel super learning-based ensemble ML model for cybersickness detection. Next, we employ a post-hoc explanation method, such as SHapley Additive exPlanations (SHAP), Morris Sensitivity Analysis (MSA), Local Interpretable Model-Agnostic Explanations (LIME), and Partial Dependence Plot (PDP) to explain the expected results and identify the most dominant features. The super learner cybersickness model is then retrained using the identified dominant features. Our proposed method identified eye tracking, player position, and galvanic skin/heart rate response as the most dominant features for the integrated sensor, gameplay, and bio-physiological datasets. We also show that the proposed XAI-guided feature reduction significantly reduces the model training and inference time by 1.91X and 2.15X while maintaining baseline accuracy. For instance, using the integrated sensor dataset, our reduced super learner model outperforms the state-of-the-art works by classifying cybersickness into 4 classes (none, low, medium, and high) with an accuracy of 96% and regressing (FMS 1-10) with a Root Mean Square Error (RMSE) of 0.03.
△ Less
Submitted 3 February, 2023;
originally announced February 2023.
-
RobustPdM: Designing Robust Predictive Maintenance against Adversarial Attacks
Authors:
Ayesha Siddique,
Ripan Kumar Kundu,
Gautam Raj Mode,
Khaza Anuarul Hoque
Abstract:
The state-of-the-art predictive maintenance (PdM) techniques have shown great success in reducing maintenance costs and downtime of complicated machines while increasing overall productivity through extensive utilization of Internet-of-Things (IoT) and Deep Learning (DL). Unfortunately, IoT sensors and DL algorithms are both prone to cyber-attacks. For instance, DL algorithms are known for their s…
▽ More
The state-of-the-art predictive maintenance (PdM) techniques have shown great success in reducing maintenance costs and downtime of complicated machines while increasing overall productivity through extensive utilization of Internet-of-Things (IoT) and Deep Learning (DL). Unfortunately, IoT sensors and DL algorithms are both prone to cyber-attacks. For instance, DL algorithms are known for their susceptibility to adversarial examples. Such adversarial attacks are vastly under-explored in the PdM domain. This is because the adversarial attacks in the computer vision domain for classification tasks cannot be directly applied to the PdM domain for multivariate time series (MTS) regression tasks. In this work, we propose an end-to-end methodology to design adversarially robust PdM systems by extensively analyzing the effect of different types of adversarial attacks and proposing a novel adversarial defense technique for DL-enabled PdM models. First, we propose novel MTS Projected Gradient Descent (PGD) and MTS PGD with random restarts (PGD_r) attacks. Then, we evaluate the impact of MTS PGD and PGD_r along with MTS Fast Gradient Sign Method (FGSM) and MTS Basic Iterative Method (BIM) on Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), Convolutional Neural Network (CNN), and Bi-directional LSTM based PdM system. Our results using NASA's turbofan engine dataset show that adversarial attacks can cause a severe defect (up to 11X) in the RUL prediction, outperforming the effectiveness of the state-of-the-art PdM attacks by 3X. Furthermore, we present a novel approximate adversarial training method to defend against adversarial attacks. We observe that approximate adversarial training can significantly improve the robustness of PdM models (up to 54X) and outperforms the state-of-the-art PdM defense methods by offering 3X more robustness.
△ Less
Submitted 10 August, 2023; v1 submitted 25 January, 2023;
originally announced January 2023.
-
Exposing Reliability Degradation and Mitigation in Approximate DNNs under Permanent Faults
Authors:
Ayesha Siddique,
Khaza Anuarul Hoque
Abstract:
Approximate computing is known for enhancing deep neural network accelerators' energy efficiency by introducing inexactness with a tolerable accuracy loss. However, small accuracy variations may increase the sensitivity of these accelerators towards undesired subtle disturbances, such as permanent faults. The impact of permanent faults in accurate deep neural network (AccDNN) accelerators has been…
▽ More
Approximate computing is known for enhancing deep neural network accelerators' energy efficiency by introducing inexactness with a tolerable accuracy loss. However, small accuracy variations may increase the sensitivity of these accelerators towards undesired subtle disturbances, such as permanent faults. The impact of permanent faults in accurate deep neural network (AccDNN) accelerators has been thoroughly investigated in the literature. Conversely, the impact of permanent faults and their mitigation in approximate DNN (AxDNN) accelerators is vastly under-explored. Towards this, we first present an extensive fault resilience analysis of approximate multi-layer perceptrons (MLPs) and convolutional neural networks (CNNs) using the state-of-the-art Evoapprox8b multipliers in GPU and TPU accelerators. Then, we propose a novel fault mitigation method, i.e., fault-aware retuning of weights (Fal-reTune). Fal-reTune retunes the weights using a weight map** function in the presence of faults for improved classification accuracy. To evaluate the fault resilience and the effectiveness of our proposed mitigation method, we used the most widely used MNIST, Fashion-MNIST, and CIFAR10 datasets. Our results demonstrate that the permanent faults exacerbate the accuracy loss in AxDNNs compared to the AccDNN accelerators. For instance, a permanent fault in AxDNNs can lead to 56\% accuracy loss, whereas the same faulty bit can lead to only 4\% accuracy loss in AccDNN accelerators. We empirically show that our proposed Fal-reTune mitigation method improves the performance of AxDNNs up to 98%, even with fault rates of up to 50%. Furthermore, we observe that the fault resilience in AxDNNs is orthogonal to their energy efficiency.
△ Less
Submitted 12 January, 2023;
originally announced January 2023.
-
Improving Reliability of Spiking Neural Networks through Fault Aware Threshold Voltage Optimization
Authors:
Ayesha Siddique,
Khaza Anuarul Hoque
Abstract:
Spiking neural networks have made breakthroughs in computer vision by lending themselves to neuromorphic hardware. However, the neuromorphic hardware lacks parallelism and hence, limits the throughput and hardware acceleration of SNNs on edge devices. To address this problem, many systolic-array SNN accelerators (systolicSNNs) have been proposed recently, but their reliability is still a major con…
▽ More
Spiking neural networks have made breakthroughs in computer vision by lending themselves to neuromorphic hardware. However, the neuromorphic hardware lacks parallelism and hence, limits the throughput and hardware acceleration of SNNs on edge devices. To address this problem, many systolic-array SNN accelerators (systolicSNNs) have been proposed recently, but their reliability is still a major concern. In this paper, we first extensively analyze the impact of permanent faults on the SystolicSNNs. Then, we present a novel fault mitigation method, i.e., fault-aware threshold voltage optimization in retraining (FalVolt). FalVolt optimizes the threshold voltage for each layer in retraining to achieve the classification accuracy close to the baseline in the presence of faults. To demonstrate the effectiveness of our proposed mitigation, we classify both static (i.e., MNIST) and neuromorphic datasets (i.e., N-MNIST and DVS Gesture) on a 256x256 systolicSNN with stuck-at faults. We empirically show that the classification accuracy of a systolicSNN drops significantly even at extremely low fault rates (as low as 0.012\%). Our proposed FalVolt mitigation method improves the performance of systolicSNNs by enabling them to operate at fault rates of up to 60\%, with a negligible drop in classification accuracy (as low as 0.1\%). Our results show that FalVolt is 2x faster compared to other state-of-the-art techniques common in artificial neural networks (ANNs), such as fault-aware pruning and retraining without threshold voltage optimization.
△ Less
Submitted 12 January, 2023;
originally announced January 2023.
-
Security-Aware Approximate Spiking Neural Networks
Authors:
Syed Tihaam Ahmad,
Ayesha Siddique,
Khaza Anuarul Hoque
Abstract:
Deep Neural Networks (DNNs) and Spiking Neural Networks (SNNs) are both known for their susceptibility to adversarial attacks. Therefore, researchers in the recent past have extensively studied the robustness and defense of DNNs and SNNs under adversarial attacks. Compared to accurate SNNs (AccSNN), approximate SNNs (AxSNNs) are known to be up to 4X more energy-efficient for ultra-low power applic…
▽ More
Deep Neural Networks (DNNs) and Spiking Neural Networks (SNNs) are both known for their susceptibility to adversarial attacks. Therefore, researchers in the recent past have extensively studied the robustness and defense of DNNs and SNNs under adversarial attacks. Compared to accurate SNNs (AccSNN), approximate SNNs (AxSNNs) are known to be up to 4X more energy-efficient for ultra-low power applications. Unfortunately, the robustness of AxSNNs under adversarial attacks is yet unexplored. In this paper, we first extensively analyze the robustness of AxSNNs with different structural parameters and approximation levels under two gradient-based and two neuromorphic attacks. Then, we propose two novel defense methods, i.e., precision scaling and approximate quantization-aware filtering (AQF), for securing AxSNNs. We evaluated the effectiveness of these two defense methods using both static and neuromorphic datasets. Our results demonstrate that AxSNNs are more prone to adversarial attacks than AccSNNs, but precision scaling and AQF significantly improve the robustness of AxSNNs. For instance, a PGD attack on AxSNN results in a 72\% accuracy loss compared to AccSNN without any attack, whereas the same attack on the precision-scaled AxSNN leads to only a 17\% accuracy loss in the static MNIST dataset (4X robustness improvement). Similarly, a Sparse Attack on AxSNN leads to a 77\% accuracy loss when compared to AccSNN without any attack, whereas the same attack on an AxSNN with AQF leads to only a 2\% accuracy loss in the neuromorphic DVS128 Gesture dataset (38X robustness improvement).
△ Less
Submitted 12 January, 2023;
originally announced January 2023.
-
Thermal Dissipation Resulting from Everyday Interactions as a Sensing Modality -- The MIDAS Touch
Authors:
Farooq Dar,
Hilary Emenike,
Zhigang Yin,
Mohan Liyanage,
Rajesh Sharma,
Agustin Zuniga,
Mohammad A. Hoque,
Marko Radeta,
Petteri Nurmi,
Huber Flores
Abstract:
We contribute MIDAS as a novel sensing solution for characterizing everyday objects using thermal dissipation. MIDAS takes advantage of the fact that anytime a person touches an object it results in heat transfer. By capturing and modeling the dissipation of the transferred heat, e.g., through the decrease in the captured thermal radiation, MIDAS can characterize the object and determine its mater…
▽ More
We contribute MIDAS as a novel sensing solution for characterizing everyday objects using thermal dissipation. MIDAS takes advantage of the fact that anytime a person touches an object it results in heat transfer. By capturing and modeling the dissipation of the transferred heat, e.g., through the decrease in the captured thermal radiation, MIDAS can characterize the object and determine its material. We validate MIDAS through extensive empirical benchmarks and demonstrate that MIDAS offers an innovative sensing modality that can recognize a wide range of materials with up to 83% accuracy and generalize to variations in the people interacting with objects. We also demonstrate that MIDAS can detect thermal dissipation through objects, up to 2 mm thickness, and support analysis of multiple objects that are interacted with
△ Less
Submitted 6 December, 2022;
originally announced December 2022.
-
On a conjecture of Franu\v sić and Jadrijevi\' c: Counter-examples
Authors:
Kalyan Chakraborty,
Shubham Gupta,
Azizul Hoque
Abstract:
Let $d\equiv 2\pmod 4$ be a square-free integer such that $x^2 - dy^2 =- 1$ and $x^2 - dy^2 = 6$ are solvable in integers. We prove the existence of infinitely many quadruples in $\mathbb{Z}[\sqrt{d}]$ with the property $D(n)$ when $n \in \{(4m + 1) + 4k\sqrt{d}, (4m + 1) + (4k + 2)\sqrt{d}, (4m + 3) + 4k\sqrt{d}, (4m + 3) + (4k + 2)\sqrt{d}, (4m + 2) + (4k + 2)\sqrt{d}\}$ for…
▽ More
Let $d\equiv 2\pmod 4$ be a square-free integer such that $x^2 - dy^2 =- 1$ and $x^2 - dy^2 = 6$ are solvable in integers. We prove the existence of infinitely many quadruples in $\mathbb{Z}[\sqrt{d}]$ with the property $D(n)$ when $n \in \{(4m + 1) + 4k\sqrt{d}, (4m + 1) + (4k + 2)\sqrt{d}, (4m + 3) + 4k\sqrt{d}, (4m + 3) + (4k + 2)\sqrt{d}, (4m + 2) + (4k + 2)\sqrt{d}\}$ for $m, k \in \mathbb{Z}$. As a consequence, we provide few counter examples to a conjecture of Franu\v sić and Jadrijevi\' c (see Conjecture 1.1).
△ Less
Submitted 9 November, 2022;
originally announced November 2022.
-
Lehmer sequence approach to the divisibility of class numbers of imaginary quadratic fields
Authors:
Kalyan Chakraborty,
Azizul Hoque
Abstract:
Let $k\geq 3$ and $n\geq 3$ be odd integers, and let $m\geq 0$ be any integer. For a prime number $\ell$, we prove that the class number of the imaginary quadratic field $\mathbb{Q}(\sqrt{\ell^{2m}-2k^n})$ is either divisible by $n$ or by a specific divisor of $n$. Applying this result, we construct an infinite family of certain tuples of imaginary quadratic fields of the form…
▽ More
Let $k\geq 3$ and $n\geq 3$ be odd integers, and let $m\geq 0$ be any integer. For a prime number $\ell$, we prove that the class number of the imaginary quadratic field $\mathbb{Q}(\sqrt{\ell^{2m}-2k^n})$ is either divisible by $n$ or by a specific divisor of $n$. Applying this result, we construct an infinite family of certain tuples of imaginary quadratic fields of the form $$\left(\mathbb{Q}(\sqrt{d}), \mathbb{Q}(\sqrt{d+1}), \mathbb{Q}(\sqrt{4d+1}), \mathbb{Q}(\sqrt{2d+4}), \mathbb{Q}(\sqrt{2d+16}), \cdots, \mathbb{Q}(\sqrt{2d+4^t}) \right)$$ with $d\in \mathbb{Z}$ and $1\leq 4^t\leq 2|d|$ whose class numbers are all divisible by $n$. Our proofs use some deep results about primitive divisors of Lehmer sequences.
△ Less
Submitted 2 October, 2022;
originally announced October 2022.
-
TruVR: Trustworthy Cybersickness Detection using Explainable Machine Learning
Authors:
Ripan Kumar Kundu,
Rifatul Islam,
Prasad Calyam,
Khaza Anuarul Hoque
Abstract:
Cybersickness can be characterized by nausea, vertigo, headache, eye strain, and other discomforts when using virtual reality (VR) systems. The previously reported machine learning (ML) and deep learning (DL) algorithms for detecting (classification) and predicting (regression) VR cybersickness use black-box models; thus, they lack explainability. Moreover, VR sensors generate a massive amount of…
▽ More
Cybersickness can be characterized by nausea, vertigo, headache, eye strain, and other discomforts when using virtual reality (VR) systems. The previously reported machine learning (ML) and deep learning (DL) algorithms for detecting (classification) and predicting (regression) VR cybersickness use black-box models; thus, they lack explainability. Moreover, VR sensors generate a massive amount of data, resulting in complex and large models. Therefore, having inherent explainability in cybersickness detection models can significantly improve the model's trustworthiness and provide insight into why and how the ML/DL model arrived at a specific decision. To address this issue, we present three explainable machine learning (xML) models to detect and predict cybersickness: 1) explainable boosting machine (EBM), 2) decision tree (DT), and 3) logistic regression (LR). We evaluate xML-based models with publicly available physiological and gameplay datasets for cybersickness. The results show that the EBM can detect cybersickness with an accuracy of 99.75% and 94.10% for the physiological and gameplay datasets, respectively. On the other hand, while predicting the cybersickness, EBM resulted in a Root Mean Square Error (RMSE) of 0.071 for the physiological dataset and 0.27 for the gameplay dataset. Furthermore, the EBM-based global explanation reveals exposure length, rotation, and acceleration as key features causing cybersickness in the gameplay dataset. In contrast, galvanic skin responses and heart rate are most significant in the physiological dataset. Our results also suggest that EBM-based local explanation can identify cybersickness-causing factors for individual samples. We believe the proposed xML-based cybersickness detection method can help future researchers understand, analyze, and design simpler cybersickness detection and reduction models.
△ Less
Submitted 12 September, 2022;
originally announced September 2022.
-
Weighted Scaling Approach for Metabolomics Data Analysis
Authors:
Biplab Biswas,
Nishith Kumar,
Md Aminul Hoque,
Md Ashad Alam
Abstract:
Systematic variation is a common issue in metabolomics data analysis. Therefore, different scaling and normalization techniques are used to preprocess the data for metabolomics data analysis. Although several scaling methods are available in the literature, however, choice of scaling, transformation and/or normalization technique influence the further statistical analysis. It is challenging to cho…
▽ More
Systematic variation is a common issue in metabolomics data analysis. Therefore, different scaling and normalization techniques are used to preprocess the data for metabolomics data analysis. Although several scaling methods are available in the literature, however, choice of scaling, transformation and/or normalization technique influence the further statistical analysis. It is challenging to choose the appropriate scaling technique for downstream analysis to get accurate results or to make a proper decision. Moreover, the existing scaling techniques are sensitive to outliers or extreme values. To fill the gap, our objective is to introduce a robust scaling approach that is not influenced by outliers as well as provides more accurate results for downstream analysis. Here, we introduced a new weighted scaling approach that is robust against outliers however, where no additional outlier detection/treatment step is needed in data preprocessing and also compared it with the conventional scaling and normalization techniques through artificial and real metabolomics datasets. We evaluated the performance of the proposed method in comparison to the other existing conventional scaling techniques using metabolomics data analysis in both the absence and presence of different percentages of outliers. Results show that in most cases, the proposed scaling technique performs better than the traditional scaling methods in both the absence and presence of outliers. The proposed method improves the further downstream metabolomics analysis. The R function of the proposed robust scaling method is available at https://github.com/nishithkumarpaul/robustScaling/blob/main/wscaling.R
△ Less
Submitted 1 August, 2022;
originally announced August 2022.
-
Geometrical magnetoresistance effect and mobility in graphene field-effect transistors
Authors:
Isabel Harrysson Rodrigues,
Andrey Generalov,
Anamul Md Hoque,
Miika Soikkeli,
Anton Murros,
Sanna Arpiainen,
Andrei Vorobiev
Abstract:
Further development of the graphene field-effect transistors (GFETs) for high-frequency electronics requires accurate evaluation and study of the mobility of charge carriers in a specific device. Here, we demonstrate that the mobility in the GFETs can be directly characterized and studied using the geometrical magnetoresistance (gMR) effect. The method is free from the limitations of other approac…
▽ More
Further development of the graphene field-effect transistors (GFETs) for high-frequency electronics requires accurate evaluation and study of the mobility of charge carriers in a specific device. Here, we demonstrate that the mobility in the GFETs can be directly characterized and studied using the geometrical magnetoresistance (gMR) effect. The method is free from the limitations of other approaches since it does not require an assumption of the constant mobility and the knowledge of the gate capacitance. Studies of a few sets of GFETs in the wide range of transverse magnetic fields indicate that the gMR effect dominates up to approximately 0.55 T. In higher fields, the physical magnetoresistance effect starts to contribute. The advantages of the gMR approach allowed us to interpret the measured dependencies of mobility on the gate voltage, i.e., carrier concentration, and identify the corresponding scattering mechanisms. In particular, the range of the fairly constant mobility is associated with the dominating Coulomb scattering. The decrease in mobility at higher carrier concentrations is associated with the contribution of the phonon scattering. Analysis shows that the gMR mobility is typically 2-3 times higher than that found via the commonly used drain resistance model. The latter underestimates the mobility since it does not take the interfacial capacitance into account.
△ Less
Submitted 6 June, 2022; v1 submitted 30 May, 2022;
originally announced May 2022.
-
Charge to Spin Conversion in van der Waals Metal NbSe2
Authors:
Anamul Md. Hoque,
Bing Zhao,
Dmitrii Khokhriakov,
Prasanta Muduli,
Saroj P. Dash1
Abstract:
Quantum materials with a large charge current-induced spin polarization are promising for next-generation all-electrical spintronic science and technology. Van der Waals metals with high spin-orbit coupling and novel spin textures have attracted significant attention for an efficient charge to spin conversion process. Here, we demonstrate the electrical generation of spin polarization in NbSe2 up…
▽ More
Quantum materials with a large charge current-induced spin polarization are promising for next-generation all-electrical spintronic science and technology. Van der Waals metals with high spin-orbit coupling and novel spin textures have attracted significant attention for an efficient charge to spin conversion process. Here, we demonstrate the electrical generation of spin polarization in NbSe2 up to room temperature. To probe the current-induced spin polarization in NbSe2, we used a graphene-based non-local spin-valve device, where the spin-polarization in NbSe2 is efficiently injected and detected using non-local spin-switch and Hanle spin precession measurements. A significantly higher charge-spin conversion in NbSe2 is observed at a lower temperature, below the superconducting transition temperature Tc ~ 7 K of NbSe2. However, the charge-spin conversion signal could only be observed with a higher bias current above the superconducting critical current, limiting the observation of the signal only to the non-superconducting state of NbSe2. Systematic measurements provide the possible origins of the spin polarization to be predominantly due to the spin Hall effect or Rashba-Edelstein effect in NbSe2, considering different symmetry allowed charge-spin conversion processes.
△ Less
Submitted 17 May, 2022;
originally announced May 2022.
-
Generalized Mersenne Numbers of the form $cx^2$
Authors:
Azizul Hoque
Abstract:
Generalized Mersenne numbers are defined as $M_{p,n} = p^n - p + 1$, where $p$ is any prime and $n$ is any positive integer. Here, we prove that for each pair $(c, p)$ with $c\geq 1$ an integer, there is at most one $M_{p, n}$ of the form $cx^2$ with a few exceptions.
Generalized Mersenne numbers are defined as $M_{p,n} = p^n - p + 1$, where $p$ is any prime and $n$ is any positive integer. Here, we prove that for each pair $(c, p)$ with $c\geq 1$ an integer, there is at most one $M_{p, n}$ of the form $cx^2$ with a few exceptions.
△ Less
Submitted 12 May, 2022;
originally announced May 2022.
-
Structural, Dielectric, and Electrical Transport Properties of Al3+ Substituted Nanocrystalline Ni-Cu Spinel Ferrites Prepared Through the Sol-Gel Route
Authors:
M. M. Rahman,
N. Hasan,
M. A. Hoque,
M. B. Hossen,
M. Arifuzzaman
Abstract:
In this study, a series of nanocrystalline ferrites of Ni0.7Cu0.30AlxFe2-xO4 (x=0.00 to 0.10 with a step of 0.02) has been synthesized through the sol-gel auto combustion technique. The structural, morphological, dielectric, and electrical properties of the Ni-Cu spinel ferrite nanoparticles are analyzed due to the substitution of Al3+ content. The crystalline and structural characteristics of the…
▽ More
In this study, a series of nanocrystalline ferrites of Ni0.7Cu0.30AlxFe2-xO4 (x=0.00 to 0.10 with a step of 0.02) has been synthesized through the sol-gel auto combustion technique. The structural, morphological, dielectric, and electrical properties of the Ni-Cu spinel ferrite nanoparticles are analyzed due to the substitution of Al3+ content. The crystalline and structural characteristics of the prepared nanoparticles (NPs) have been studied employing the x-ray diffraction (XRD) spectra and FTIR analysis. The extracted XRD patterns assure the single-phase cubic spinel structure of all samples with homogeneity and no impurity, which indicates the yielding of high crystalline NPs. A slight decrease of average grain size with increment of Al3+ content is observed in the surface morphological study carried out by the field emission scanning electron microscopy (FESEM). The studied materials are found in semi-spherical shapes, showing the multi-domain grains separated by grain boundaries with some agglomerations. The chemical composition study for the synthesized NI-Cu spinel ferrites using energy dispersive x-ray (EDX) ensures the presence of each component in appropriate proportions in each sample.
△ Less
Submitted 12 May, 2022;
originally announced May 2022.
-
Diophantine triples with the property $D(n)$ for distinct $n$
Authors:
Kalyan Chakraborty,
Shubham Gupta,
Azizul Hoque
Abstract:
We prove that for every integer $n$, there exist infinitely many $D(n)$-triples which are also $D(t)$-triples for $t\in\mathbb{Z}$ with $n\ne t$. We also prove that there are infinitely many triples with the property $D(-1)$ in $\mathbb{Z}[i]$ which are also $D(n)$-triple in $\mathbb{Z}[i]$ for two distinct $n$'s other than $n = -1$ and these triples are not equivalent to any triple with the prope…
▽ More
We prove that for every integer $n$, there exist infinitely many $D(n)$-triples which are also $D(t)$-triples for $t\in\mathbb{Z}$ with $n\ne t$. We also prove that there are infinitely many triples with the property $D(-1)$ in $\mathbb{Z}[i]$ which are also $D(n)$-triple in $\mathbb{Z}[i]$ for two distinct $n$'s other than $n = -1$ and these triples are not equivalent to any triple with the property $D(1)$.
△ Less
Submitted 29 April, 2022;
originally announced April 2022.
-
XDWM: A 2D Domain Wall Memory
Authors:
Arifa Hoque,
Alex K. Jones,
Sanjukta Bhanja
Abstract:
Domain-Wall Memory (DWM) structures typically bundle nanowires shifted together for parallel access. Ironically, this organization does not allow the natural shifting of DWM to realize \textit{logical shifting} within data elements. We describe a novel 2-D DWM cross-point (X-Cell) that allows two individual nanowires placed orthogonally to share the X-Cell. Each nanowire can operate independently…
▽ More
Domain-Wall Memory (DWM) structures typically bundle nanowires shifted together for parallel access. Ironically, this organization does not allow the natural shifting of DWM to realize \textit{logical shifting} within data elements. We describe a novel 2-D DWM cross-point (X-Cell) that allows two individual nanowires placed orthogonally to share the X-Cell. Each nanowire can operate independently while sharing the value at the X-Cell. Using X-Cells, we propose an orthogonal nanowire in the Y dimension overlaid on a bundle of X dimension nanowires for a cross-DWM or XDWM. We demonstrate that the bundle shifts correctly in the X-Direction, and that data can be logically shifted in the Y-direction providing novel data movement and supporting processing-in-memory. We conducted studies on the requirements for physical cell dimensions and shift currents for XDWM. Due to the non-standard domain, our micro-magnetic studies demonstrate that XDWM introduces a shift current penalty of 6.25% while shifting happens in one nanowire compared to a standard nanowire. We also demonstrate correct shifting using nanowire bundles in both the X- and Y- dimensions. Using magnetic simulation to derive the values for SPICE simulation we show the maximum leakage current between nanowires when shifting the bundle together is $\le3$% indicating that sneak paths are not problematic for XDWM.
△ Less
Submitted 23 December, 2021;
originally announced December 2021.
-
Is Approximation Universally Defensive Against Adversarial Attacks in Deep Neural Networks?
Authors:
Ayesha Siddique,
Khaza Anuarul Hoque
Abstract:
Approximate computing is known for its effectiveness in improvising the energy efficiency of deep neural network (DNN) accelerators at the cost of slight accuracy loss. Very recently, the inexact nature of approximate components, such as approximate multipliers have also been reported successful in defending adversarial attacks on DNNs models. Since the approximation errors traverse through the DN…
▽ More
Approximate computing is known for its effectiveness in improvising the energy efficiency of deep neural network (DNN) accelerators at the cost of slight accuracy loss. Very recently, the inexact nature of approximate components, such as approximate multipliers have also been reported successful in defending adversarial attacks on DNNs models. Since the approximation errors traverse through the DNN layers as masked or unmasked, this raises a key research question-can approximate computing always offer a defense against adversarial attacks in DNNs, i.e., are they universally defensive? Towards this, we present an extensive adversarial robustness analysis of different approximate DNN accelerators (AxDNNs) using the state-of-the-art approximate multipliers. In particular, we evaluate the impact of ten adversarial attacks on different AxDNNs using the MNIST and CIFAR-10 datasets. Our results demonstrate that adversarial attacks on AxDNNs can cause 53% accuracy loss whereas the same attack may lead to almost no accuracy loss (as low as 0.06%) in the accurate DNN. Thus, approximate computing cannot be referred to as a universal defense strategy against adversarial attacks.
△ Less
Submitted 2 December, 2021;
originally announced December 2021.
-
Large HI optical depth and Redshifted 21-cm signal from cosmic dawn
Authors:
Kanan K. Datta,
Raghunath Ghara,
Ariful Hoque,
Suman Majumdar
Abstract:
The HI 21-cm optical depth ($τ_b$) can be considerably large as the kinetic and spin temperature of the inter-galactic medium (IGM) is expected to be very low during cosmic dawn. It will be particularly higher at regions with HI over-density. We revisit the validity of the widely used linearized equation for estimating the HI 21-cm differential brightness temperature ($T_b$) which assumes…
▽ More
The HI 21-cm optical depth ($τ_b$) can be considerably large as the kinetic and spin temperature of the inter-galactic medium (IGM) is expected to be very low during cosmic dawn. It will be particularly higher at regions with HI over-density. We revisit the validity of the widely used linearized equation for estimating the HI 21-cm differential brightness temperature ($T_b$) which assumes $τ_b << 1$ and approximates $[1-\exp({-τ_b})]$ as $τ_b$. We consider two scenarios, one without any additional cooling mechanism or radio background (referred as the standard scenario) and the other (referred as the excess-cooling} scenario) assumes the EDGES-like absorption profile and an excess cooling mechanism. We find that given a measured global absorption signal, consistent with the standard (excess-cooling) scenario, the linearized equation overestimates the spin temperature by $\sim 5\%(10\%)$. Further, using numerical simulations, we study the impact that the large optical depth has on various signal statistics. We observe that the variance, skewness and kurtosis, calculated at simulation resolution ($\sim 0.5 h^{-1} \, {\rm Mpc}$), are over-predicted up to $\sim 30\%$, $30\%$ and $15\%$ respectively for the standard and up to $\sim 90\%$, $50\%$ and $50\%$ respectively for the excess-cooling scenario. Moreover, we find that the probability distribution function of $T_b$ is squeezed and becomes more Gaussian in shape if no approximation is made. The spherically averaged HI power spectrum is overpredicted by up to $\sim 25 \%$ and $80\%$ at all scales for the standard and excess-cooling scenarios respectively.
△ Less
Submitted 13 October, 2021;
originally announced October 2021.
-
Design, Simulation and Feasibility Analysis of Bifacial Solar PV System in Marine Drive Road, Cox's Bazar
Authors:
Abdullah Al Mehadi,
Mirza Muntasir Nishat,
Fahim Faisal,
Ahmed Raza Hasan Bhuiyan,
Mohyeu Hussain,
Md Ashraful Hoque
Abstract:
This paper proposes a design and simulation based investigative analysis of a vertically mounted bifacial solar photovoltaic model in Marine Drive Road, Cox's Bazar. Cox's bazar is a famous tourist destination which seems to be a flexible site for implementing such energy harvesting system without affecting the nearby eco-system and solves the existing land shortage problem. Moreover, the infrastr…
▽ More
This paper proposes a design and simulation based investigative analysis of a vertically mounted bifacial solar photovoltaic model in Marine Drive Road, Cox's Bazar. Cox's bazar is a famous tourist destination which seems to be a flexible site for implementing such energy harvesting system without affecting the nearby eco-system and solves the existing land shortage problem. Moreover, the infrastructure will provide insulation to noise related problem faced by nearby residents, arising from traffic noises. A model road of 200 meters is reconnoitered for energy harvesting by solar power using three prominent software namely PVSOL, PVsyst, and SAM where a promising mean annual yield of 70492.9 kWh is obtained, and the bifacial gain is calculated to be 12.26%. In addition, a deviation analysis is performed among each of the software and it is found that PVSOL and PVsyst have shown less deviation. Furthermore, a comprehensive financial analysis shows total installation cost to be 84759.74$.
△ Less
Submitted 20 September, 2021;
originally announced September 2021.
-
Rule-based Adaptations to Control Cybersickness in Social Virtual Reality Learning Environments
Authors:
Samaikya Valluripally,
Vaibhav Akashe,
Michael Fisher,
David Falana,
Khaza Anuarul Hoque,
Prasad Calyam
Abstract:
Social virtual reality learning environments (VRLEs) provide immersive experience to users with increased accessibility to remote learning. Lack of maintaining high-performance and secured data delivery in critical VRLE application domains (e.g., military training, manufacturing) can disrupt application functionality and induce cybersickness. In this paper, we present a novel rule-based 3QS-adapta…
▽ More
Social virtual reality learning environments (VRLEs) provide immersive experience to users with increased accessibility to remote learning. Lack of maintaining high-performance and secured data delivery in critical VRLE application domains (e.g., military training, manufacturing) can disrupt application functionality and induce cybersickness. In this paper, we present a novel rule-based 3QS-adaptation framework that performs risk and cost aware trade-off analysis to control cybersickness due to performance/security anomaly events during a VRLE session. Our framework implementation in a social VRLE viz., vSocial monitors performance/security anomaly events in network/session data. In the event of an anomaly, the framework features rule-based adaptations that are triggered by using various decision metrics. Based on our experimental results, we demonstrate the effectiveness of our rule-based 3QS-adaptation framework in reducing cybersickness levels, while maintaining application functionality. Using our key findings, we enlist suitable practices for addressing performance and security issues towards a more high-performing and robust social VRLE.
△ Less
Submitted 27 August, 2021;
originally announced August 2021.
-
Multifunctional Spin Logic Gates In Graphene Spin Circuits
Authors:
Dmitrii Khokhriakov,
Shehrin Sayed,
Anamul Md. Hoque,
Bogdan Karpiak,
Bing Zhao,
Supriyo Datta,
Saroj P. Dash
Abstract:
All-spin-based computing combining logic and nonvolatile magnetic memory is promising for emerging information technologies. However, the realization of a universal spin logic operation representing a reconfigurable building block with all-electrical spin current communication has so far remained challenging. Here, we experimentally demonstrate a reprogrammable all-electrical multifunctional spin…
▽ More
All-spin-based computing combining logic and nonvolatile magnetic memory is promising for emerging information technologies. However, the realization of a universal spin logic operation representing a reconfigurable building block with all-electrical spin current communication has so far remained challenging. Here, we experimentally demonstrate a reprogrammable all-electrical multifunctional spin logic gate in a nanoelectronic device architecture utilizing graphene buses for spin communication and multiplexing and nanomagnets for writing and reading information at room temperature. This gate realizes a multistate majority spin logic operation (sMAJ), which is reconfigured to achieve XNOR, (N)AND, and (N)OR Boolean operations depending on the magnetization of inputs. Physics-based spin circuit model is developed to understand the underlying mechanisms of the multifunctional spin logic gate and its operations. These demonstrations provide a platform for scalable all-electric spin logic and neuromorphic computing in the all-spin domain logic-in-memory architecture.
△ Less
Submitted 27 August, 2021;
originally announced August 2021.
-
Van der Waals Magnet based Spin-Valve Devices at Room Temperature
Authors:
Bing Zhao,
Roselle Ngaloy,
Anamul Md. Hoque,
Bogdan Karpiak,
Dmitrii Khokhriakov,
Saroj P. Dash
Abstract:
The discovery of van der Waals (vdW) magnets opened up a new paradigm for condensed matter physics and spintronic technologies. However, the operations of active spintronic devices with vdW magnets are so far limited to cryogenic temperatures, inhibiting its broader practical applications. Here, for the first time, we demonstrate room temperature spin-valve devices using vdW itinerant ferromagnet…
▽ More
The discovery of van der Waals (vdW) magnets opened up a new paradigm for condensed matter physics and spintronic technologies. However, the operations of active spintronic devices with vdW magnets are so far limited to cryogenic temperatures, inhibiting its broader practical applications. Here, for the first time, we demonstrate room temperature spin-valve devices using vdW itinerant ferromagnet Fe5GeTe2 in heterostructures with graphene. The tunnel spin polarization of the Fe5GeTe2/graphene vdW interface is detected to be significantly large ~ 45 % and negative at room temperature. Lateral spin-valve device design enables electrical control of spin signal and realization of basic building blocks for device application such as efficient spin injection, transport, precession, and detection functionalities. Furthermore, measurements with different magnetic orientations provide unique insights into the magnetic anisotropy of Fe5GeTe2 and its relation with spin polarization and dynamics in the heterostructure. These findings open opportunities for the applications of vdW magnet-based all-2D spintronic devices and integrated spin circuits at ambient temperatures.
△ Less
Submitted 1 July, 2021;
originally announced July 2021.
-
On the Diophantine equation $dx^2+p^{2a}q^{2b}=4y^p$
Authors:
Kalyan Chakraborty,
Azizul Hoque
Abstract:
We investigate the solvability of the Diophantine equation in the title, where $d>1$ is a square-free integer, $p, q$ are distinct odd primes and $x,y,a,b$ are unknown positive integers with $\gcd(x,y)=1$. We describe all the integer solutions of this equation, and then use the main finding to deduce some results concerning the integers solutions of some of its variants. The methods adopted here a…
▽ More
We investigate the solvability of the Diophantine equation in the title, where $d>1$ is a square-free integer, $p, q$ are distinct odd primes and $x,y,a,b$ are unknown positive integers with $\gcd(x,y)=1$. We describe all the integer solutions of this equation, and then use the main finding to deduce some results concerning the integers solutions of some of its variants. The methods adopted here are elementary in nature and are primarily based on the existence of the primitive divisors of certain Lehmer numbers.
△ Less
Submitted 10 November, 2021; v1 submitted 3 June, 2021;
originally announced June 2021.
-
On a conjecture of Iizuka
Authors:
Azizul Hoque
Abstract:
For a given odd positive integer $n$ and an odd prime $p$, we construct an infinite family of quadruples of imaginary quadratic fields $\mathbb{Q}(\sqrt{d})$, $\mathbb{Q}(\sqrt{d+1})$, $\mathbb{Q}(\sqrt{d+4})$ and $\mathbb{Q}(\sqrt{d+4p^2})$ with $d\in \mathbb{Z}$ such that the class number of each of them is divisible by $n$. Subsequently, we show that there is an infinite family of quintuples of…
▽ More
For a given odd positive integer $n$ and an odd prime $p$, we construct an infinite family of quadruples of imaginary quadratic fields $\mathbb{Q}(\sqrt{d})$, $\mathbb{Q}(\sqrt{d+1})$, $\mathbb{Q}(\sqrt{d+4})$ and $\mathbb{Q}(\sqrt{d+4p^2})$ with $d\in \mathbb{Z}$ such that the class number of each of them is divisible by $n$. Subsequently, we show that there is an infinite family of quintuples of imaginary quadratic fields $\mathbb{Q}(\sqrt{d})$, $\mathbb{Q}(\sqrt{d+1})$, $\mathbb{Q}(\sqrt{d+4})$, $\mathbb{Q}(\sqrt{d+36})$ and $\mathbb{Q}(\sqrt{d+100})$ with $d\in \mathbb{Z}$ whose class numbers are all divisible by $n$. Our results provide a complete proof of Iizuka's conjecture (in fact a generalization of it) for the case $m=1$. Our results also affirmatively answer a weaker version of (a generalization of) Iizuka's conjecture for $m\geq 4$.
△ Less
Submitted 17 August, 2021; v1 submitted 1 June, 2021;
originally announced June 2021.
-
On the Lebesgue-Ramanujan-Nagell type equation $x^2+17^k41^\ell 59^m =2^δy^n$
Authors:
Azizul Hoque
Abstract:
We consider the Diophantine equation $x^2+17^k41^\ell 59^m =2^δy^n$ in unknown integer $x\geq 1, y>1, k, \ell, m, δ\geq 0$ and $n\geq 3$ with $\gcd(x,y)=1$, and we find all its solutions. We use the prominent result of Bilu, Hanrot and Voutier on existence of primitive divisors in Lehmer sequences in combination with elementary number theoretic argument and computer search.
We consider the Diophantine equation $x^2+17^k41^\ell 59^m =2^δy^n$ in unknown integer $x\geq 1, y>1, k, \ell, m, δ\geq 0$ and $n\geq 3$ with $\gcd(x,y)=1$, and we find all its solutions. We use the prominent result of Bilu, Hanrot and Voutier on existence of primitive divisors in Lehmer sequences in combination with elementary number theoretic argument and computer search.
△ Less
Submitted 6 May, 2021;
originally announced May 2021.
-
Complete solutions of a Lebesgue-Ramanujan-Nagell type equation
Authors:
Priyanka Baruah,
Anup Das,
Azizul Hoque
Abstract:
We consider the Lebesgue-Ramanujan-Nagell type equation $x^2+5^a13^b17^c=2^m y^n$, where $a,b,c, m\geq 0, n \geq 3$ and $x, y\geq 1$ are unknown integers with $\gcd(x,y)=1$. We determine all integer solutions to the above equation. The proof depends on the classical results of Bilu, Hanrot and Voutier on primitive divisors in Lehmer sequences, and finding all $S$-integral points on a class of elli…
▽ More
We consider the Lebesgue-Ramanujan-Nagell type equation $x^2+5^a13^b17^c=2^m y^n$, where $a,b,c, m\geq 0, n \geq 3$ and $x, y\geq 1$ are unknown integers with $\gcd(x,y)=1$. We determine all integer solutions to the above equation. The proof depends on the classical results of Bilu, Hanrot and Voutier on primitive divisors in Lehmer sequences, and finding all $S$-integral points on a class of elliptic curves.
△ Less
Submitted 25 February, 2024; v1 submitted 26 April, 2021;
originally announced April 2021.
-
On the Diophantine equation $cx^2+p^{2m}=4y^n$
Authors:
Kalyan Chakraborty,
Azizul Hoque,
Kotyada Srinivas
Abstract:
Let $c$ be a square-free positive integer and $p$ a prime satisfying $p\nmid c$. Let $h(-c)$ denote the class number of the imaginary quadratic field $\mathbb{Q}(\sqrt{-c})$. In this paper, we consider the Diophantine equation $$cx^2+p^{2m}=4y^n,~~x,y\geq 1, m\geq 0, n\geq 3, \gcd(x,y)=1, \gcd(n,2h(-c))=1,$$ and we describe all its integer solutions. Our main tool here is the prominent result of B…
▽ More
Let $c$ be a square-free positive integer and $p$ a prime satisfying $p\nmid c$. Let $h(-c)$ denote the class number of the imaginary quadratic field $\mathbb{Q}(\sqrt{-c})$. In this paper, we consider the Diophantine equation $$cx^2+p^{2m}=4y^n,~~x,y\geq 1, m\geq 0, n\geq 3, \gcd(x,y)=1, \gcd(n,2h(-c))=1,$$ and we describe all its integer solutions. Our main tool here is the prominent result of Bilu, Hanrot and Voutier on existence of primitive divisors in Lehmer sequences.
△ Less
Submitted 16 February, 2021;
originally announced February 2021.
-
Exploring Fault-Energy Trade-offs in Approximate DNN Hardware Accelerators
Authors:
Ayesha Siddique,
Kanad Basu,
Khaza Anuarul Hoque
Abstract:
Systolic array-based deep neural network (DNN) accelerators have recently gained prominence for their low computational cost. However, their high energy consumption poses a bottleneck to their deployment in energy-constrained devices. To address this problem, approximate computing can be employed at the cost of some tolerable accuracy loss. However, such small accuracy variations may increase the…
▽ More
Systolic array-based deep neural network (DNN) accelerators have recently gained prominence for their low computational cost. However, their high energy consumption poses a bottleneck to their deployment in energy-constrained devices. To address this problem, approximate computing can be employed at the cost of some tolerable accuracy loss. However, such small accuracy variations may increase the sensitivity of DNNs towards undesired subtle disturbances, such as permanent faults. The impact of permanent faults in accurate DNNs has been thoroughly investigated in the literature. Conversely, the impact of permanent faults in approximate DNN accelerators (AxDNNs) is yet under-explored. The impact of such faults may vary with the fault bit positions, activation functions and approximation errors in AxDNN layers. Such dynamacity poses a considerable challenge to exploring the trade-off between their energy efficiency and fault resilience in AxDNNs. Towards this, we present an extensive layer-wise and bit-wise fault resilience and energy analysis of different AxDNNs, using the state-of-the-art Evoapprox8b signed multipliers. In particular, we vary the stuck-at-0, stuck-at-1 fault-bit positions, and activation functions to study their impact using the most widely used MNIST and Fashion-MNIST datasets. Our quantitative analysis shows that the permanent faults exacerbate the accuracy loss in AxDNNs when compared to the accurate DNN accelerators. For instance, a permanent fault in AxDNNs can lead up to 66\% accuracy loss, whereas the same faulty bit can lead to only 9\% accuracy loss in an accurate DNN accelerator. Our results demonstrate that the fault resilience in AxDNNs is orthogonal to the energy efficiency.
△ Less
Submitted 8 January, 2021;
originally announced January 2021.
-
Robust Spin Interconnect with Isotropic Spin Dynamics in Chemical Vapour Deposited Graphene Layers and Boundaries
Authors:
Dmitrii Khokhriakov,
Bogdan Karpiak,
Anamul Md. Hoque,
Bing Zhao,
Subir Parui,
Saroj P. Dash
Abstract:
The utilization of large-area graphene grown by chemical vapour deposition (CVD) is crucial for the development of scalable spin interconnects in all-spin-based memory and logic circuits. However, the fundamental influence of the presence of multilayer graphene patches and their boundaries on spin dynamics has not been addressed yet, which is necessary for basic understanding and application of ro…
▽ More
The utilization of large-area graphene grown by chemical vapour deposition (CVD) is crucial for the development of scalable spin interconnects in all-spin-based memory and logic circuits. However, the fundamental influence of the presence of multilayer graphene patches and their boundaries on spin dynamics has not been addressed yet, which is necessary for basic understanding and application of robust spin interconnects. Here, we report universal spin transport and dynamic properties in specially devised single layer, bi-layer, and tri-layer graphene channels and their layer boundaries and folds that are usually present in CVD graphene samples. We observe uniform spin lifetime with isotropic spin relaxation for spins with different orientations in graphene layers and their boundaries at room temperature. In all the inhomogeneous graphene channels, the spin lifetime anisotropy ratios for spins polarized out-of-plane and in-plane are measured to be close to unity. Our analysis shows the importance of both Elliott-Yafet and Dyakonov-Perel mechanisms, with an increasing role of the latter mechanism in multilayer channels. These results of universal and isotropic spin transport on large-area inhomogeneous CVD graphene with multilayer patches and their boundaries and folds at room temperature prove its outstanding spin interconnect functionality, beneficial for the development of scalable spintronic circuits.
△ Less
Submitted 4 December, 2020;
originally announced December 2020.
-
Charge-spin conversion signal in WTe2 van der Waals hybrid devices with a geometrical design
Authors:
Bing Zhao,
Anamul Md. Hoque,
Dmitrii Khokhriakov,
Bogdan Karpiak,
Saroj P. Dash
Abstract:
The efficient generation and control of spin polarization via charge-spin conversion in topological semimetals are desirable for future spintronic and quantum technologies. Here, we report the charge-spin conversion (CSC) signals measured in a Weyl semimetal candidate WTe2 based hybrid graphene device with a geometrical design. Notably, the geometrical angle of WTe2 on the graphene spin-valve chan…
▽ More
The efficient generation and control of spin polarization via charge-spin conversion in topological semimetals are desirable for future spintronic and quantum technologies. Here, we report the charge-spin conversion (CSC) signals measured in a Weyl semimetal candidate WTe2 based hybrid graphene device with a geometrical design. Notably, the geometrical angle of WTe2 on the graphene spin-valve channel yields contributions to symmetric and anti-symmetric CSC signal components. The spin precession measurements of CSC signal at different gate voltages and ferromagnet magnetization shows the robustness of the CSC in WTe2 at room temperature. These results can be useful for the design of heterostructure devices and in the architectures of two-dimensional spintronic circuits.
△ Less
Submitted 21 November, 2020;
originally announced November 2020.
-
BONIK: A Blockchain Empowered Chatbot for Financial Transactions
Authors:
Md. Saiful Islam Bhuiyan,
Abdur Razzak,
Md Sadek Ferdous,
Mohammad Jabed M. Chowdhury,
Mohammad A. Hoque,
Sasu Tarkoma
Abstract:
A Chatbot is a popular platform to enable users to interact with a software or website to gather information or execute actions in an automated fashion. In recent years, chatbots are being used for executing financial transactions, however, there are a number of security issues, such as secure authentication, data integrity, system availability and transparency, that must be carefully handled for…
▽ More
A Chatbot is a popular platform to enable users to interact with a software or website to gather information or execute actions in an automated fashion. In recent years, chatbots are being used for executing financial transactions, however, there are a number of security issues, such as secure authentication, data integrity, system availability and transparency, that must be carefully handled for their wide-scale adoption. Recently, the blockchain technology, with a number of security advantages, has emerged as one of the foundational technologies with the potential to disrupt a number of application domains, particularly in the financial sector. In this paper, we forward the idea of integrating a chatbot with blockchain technology in the view to improve the security issues in financial chatbots. More specifically, we present BONIK, a blockchain empowered chatbot for financial transactions, and discuss its architecture and design choices. Furthermore, we explore the developed Proof-of-Concept (PoC), evaluate its performance, analyse how different security and privacy issues are mitigated using BONIK.
△ Less
Submitted 17 November, 2020;
originally announced November 2020.
-
On the solutions of certain Lebesgue-Ramanujan-Nagell equations
Authors:
Kalyan Chakraborty,
Azizul Hoque,
Richa Sharma
Abstract:
We completely solve the Diophantine equation $x^2+2^k11^\ell19^m=y^n$ in integers $x,y\geq 1;~ k,\ell, m\geq 0~$ and $n\geq 3$ with $\gcd(x,y)=1$, except the case $2\mid k, 2\nmid \ell m$ and $5\mid n$. We use this result to recover some earlier results in the same direction.
We completely solve the Diophantine equation $x^2+2^k11^\ell19^m=y^n$ in integers $x,y\geq 1;~ k,\ell, m\geq 0~$ and $n\geq 3$ with $\gcd(x,y)=1$, except the case $2\mid k, 2\nmid \ell m$ and $5\mid n$. We use this result to recover some earlier results in the same direction.
△ Less
Submitted 1 June, 2021; v1 submitted 2 November, 2020;
originally announced November 2020.
-
Adversarial Examples in Deep Learning for Multivariate Time Series Regression
Authors:
Gautam Raj Mode,
Khaza Anuarul Hoque
Abstract:
Multivariate time series (MTS) regression tasks are common in many real-world data mining applications including finance, cybersecurity, energy, healthcare, prognostics, and many others. Due to the tremendous success of deep learning (DL) algorithms in various domains including image recognition and computer vision, researchers started adopting these techniques for solving MTS data mining problems…
▽ More
Multivariate time series (MTS) regression tasks are common in many real-world data mining applications including finance, cybersecurity, energy, healthcare, prognostics, and many others. Due to the tremendous success of deep learning (DL) algorithms in various domains including image recognition and computer vision, researchers started adopting these techniques for solving MTS data mining problems, many of which are targeted for safety-critical and cost-critical applications. Unfortunately, DL algorithms are known for their susceptibility to adversarial examples which also makes the DL regression models for MTS forecasting also vulnerable to those attacks. To the best of our knowledge, no previous work has explored the vulnerability of DL MTS regression models to adversarial time series examples, which is an important step, specifically when the forecasting from such models is used in safety-critical and cost-critical applications. In this work, we leverage existing adversarial attack generation techniques from the image classification domain and craft adversarial multivariate time series examples for three state-of-the-art deep learning regression models, specifically Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), and Gated Recurrent Unit (GRU). We evaluate our study using Google stock and household power consumption dataset. The obtained results show that all the evaluated DL regression models are vulnerable to adversarial attacks, transferable, and thus can lead to catastrophic consequences in safety-critical and cost-critical domains, such as energy and finance.
△ Less
Submitted 24 September, 2020;
originally announced September 2020.
-
Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version)
Authors:
Gautam Raj Mode,
Khaza Anuarul Hoque
Abstract:
In manufacturing, unexpected failures are considered a primary operational risk, as they can hinder productivity and can incur huge losses. State-of-the-art Prognostics and Health Management (PHM) systems incorporate Deep Learning (DL) algorithms and Internet of Things (IoT) devices to ascertain the health status of equipment, and thus reduce the downtime, maintenance cost and increase the product…
▽ More
In manufacturing, unexpected failures are considered a primary operational risk, as they can hinder productivity and can incur huge losses. State-of-the-art Prognostics and Health Management (PHM) systems incorporate Deep Learning (DL) algorithms and Internet of Things (IoT) devices to ascertain the health status of equipment, and thus reduce the downtime, maintenance cost and increase the productivity. Unfortunately, IoT sensors and DL algorithms, both are vulnerable to cyber attacks, and hence pose a significant threat to PHM systems. In this paper, we adopt the adversarial example crafting techniques from the computer vision domain and apply them to the PHM domain. Specifically, we craft adversarial examples using the Fast Gradient Sign Method (FGSM) and Basic Iterative Method (BIM) and apply them on the Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), and Convolutional Neural Network (CNN) based PHM models. We evaluate the impact of adversarial attacks using NASA's turbofan engine dataset. The obtained results show that all the evaluated PHM models are vulnerable to adversarial attacks and can cause a serious defect in the remaining useful life estimation. The obtained results also show that the crafted adversarial examples are highly transferable and may cause significant damages to PHM systems.
△ Less
Submitted 28 September, 2020; v1 submitted 21 September, 2020;
originally announced September 2020.
-
Electrically Controlled Spin Injection from Giant Rashba Spin-Orbit Conductor BiTeBr
Authors:
Zoltán Kovács-Krausz,
Anamul Md Hoque,
Péter Makk,
Bálint Szentpéteri,
Mátyás Kocsis,
Bálint Fülöp,
Michael Vasilievich Yakushev,
Tatyana Vladimirovna Kuznetsova,
Oleg Evgenevich Tereshchenko,
Konstantin Aleksandrovich Kokh,
István Endre Lukács,
Takashi Taniguchi,
Kenji Watanabe,
Saroj Prasad Dash,
Szabolcs Csonka
Abstract:
Ferromagnetic materials are the widely used source of spin-polarized electrons in spintronic devices, which are controlled by external magnetic fields or spin-transfer torque methods. However, with increasing demand for smaller and faster spintronic components, utilization of spin-orbit phenomena provides promising alternatives. New materials with unique spin textures are highly desirable since al…
▽ More
Ferromagnetic materials are the widely used source of spin-polarized electrons in spintronic devices, which are controlled by external magnetic fields or spin-transfer torque methods. However, with increasing demand for smaller and faster spintronic components, utilization of spin-orbit phenomena provides promising alternatives. New materials with unique spin textures are highly desirable since all-electric creation and control of spin polarization is expected, where the strength, as well as an arbitrary orientation of the polarization, can be defined without the use of a magnetic field. In this work, we use a novel spin-orbit crystal BiTeBr for this purpose. Owning to its giant Rashba spin splitting, bulk spin polarization is created at room temperature by an electric current. Integrating BiTeBr crystal into graphene-based spin valve devices, we demonstrate for the first time that it acts as a current-controlled spin injector, opening new avenues for future spintronic applications in integrated circuits.
△ Less
Submitted 31 August, 2020;
originally announced August 2020.