Skip to main content

Showing 1–15 of 15 results for author: Islam, S A

.
  1. arXiv:2204.12425  [pdf, other

    cs.HC cs.GR

    Bioblox 2.5D -- Develo** an Educational Game Based on Protein Docking

    Authors: Frederic Fol Leymarie, William Latham, Guido Salimbeni, Suhail A. Islam, Christopher Reynolds, Charlie Cook, Luis Armas Suarez, Richard Leinfellner, Michael J. E. Sternberg

    Abstract: We present the development process of Bioblox2-5D, an educational biology game aimed at teenagers. The game content refers to protein docking and aims to improve learning about molecular shape complexity, the roles of charges in molecular docking and the scoring function to calculate binding affinity. We developed the game as part of a collaboration between the Computing Department at Goldsmiths,… ▽ More

    Submitted 3 May, 2022; v1 submitted 26 April, 2022; originally announced April 2022.

    Comments: 9 pages

    ACM Class: J.3; K.3; I.3.8

  2. arXiv:2112.07061  [pdf, other

    cs.CR

    Differentially Private Data Publication with Multi-level Data Utility

    Authors: Honglu Jiang, S M Sarwar, Haotian Yu, Sheikh Ariful Islam

    Abstract: Conventional private data publication mechanisms aim to retain as much data utility as possible while ensuring sufficient privacy protection on sensitive data. Such data publication schemes implicitly assume that all data analysts and users have the same data access privilege levels. However, it is not applicable for the scenario that data users often have different levels of access to the same da… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

  3. arXiv:2109.12732  [pdf, ps, other

    eess.SY

    Self-Excited Dynamics of Discrete-Time Lur'e Systems

    Authors: Juan A. Paredes, Syed Aseem Ul Islam, Omran Kouba, Dennis S. Bernstein

    Abstract: Self-excited systems arise in numerous applications, such as biochemical systems, fluid-structure interaction, and combustion. This paper analyzes a discrete-time Lur'e system with a piecewise-linear saturation feedback nonlinearity. The main result provides sufficient conditions under which the Lur'e system is self-excited in the sense that its response is bounded and nonconvergent.

    Submitted 26 September, 2021; originally announced September 2021.

    Comments: Submitted to Systems & Control Letters, 12 pages, 7 figures

  4. Regularization-Induced Bias and Consistency in Recursive Least Squares

    Authors: Brian Lai, Syed Aseem Ul Islam, Dennis S. Bernstein

    Abstract: Within the context of recursive least squares (RLS) parameter estimation, the goal of the present paper is to study the effect of regularization-induced bias on the transient and asymptotic accuracy of the parameter estimates. We consider this question in three stages. First, we consider regression with random data, in which case persistency is guaranteed. Next, we apply RLS to finite-impulse-resp… ▽ More

    Submitted 10 August, 2021; v1 submitted 16 June, 2021; originally announced June 2021.

    Journal ref: 2021 American Control Conference (ACC), 2021, pp. 3987-3992

  5. arXiv:2102.07191  [pdf, ps, other

    eess.SY

    Data-Driven Retrospective Cost Adaptive Control for Flight Control Application

    Authors: Syed Aseem Ul Islam, Tam W. Nguyen, Ilya V. Kolmanovsky, Dennis S. Bernstein

    Abstract: Unlike fixed-gain robust control, which trades off performance with modeling uncertainty, direct adaptive control uses partial modeling information for online tuning. The present paper combines retrospective cost adaptive control (RCAC), a direct adaptive control technique for sampled-data systems, with online system identification based on recursive least squares (RLS) with variable-rate forgetti… ▽ More

    Submitted 8 April, 2021; v1 submitted 14 February, 2021; originally announced February 2021.

    Comments: 60 pages, 28 figures, accepted by AIAA Journal of Guidance, Control, and Dynamics

  6. arXiv:2012.02896  [pdf, other

    eess.SY

    Experimental Implementation of an Adaptive Digital Autopilot

    Authors: Ankit Goel, Juan Augusto Paredes, Harshil Dadhaniya, Syed Aseem Ul Islam, Abdulazeez Mohammed Salim, Sai Ravela, Dennis Bernstein

    Abstract: This paper develops an adaptive digital autopilot for quadcopters and presents experimental results. The adaptive digital autopilot is constructed by augmenting the PX4 autopilot control system architecture with adaptive digital control laws based on retrospective cost adaptive control (RCAC). In order to investigate the performance of the adaptive digital autopilot, the default gains of the fixed… ▽ More

    Submitted 4 December, 2020; originally announced December 2020.

    Comments: Submitted to ACC 2021

  7. arXiv:2009.10631  [pdf, other

    eess.SY

    Output-Feedback Model Predictive Control with Online Identification

    Authors: Tam W. Nguyen, Syed Aseem Ul Islam, Dennis S. Bernstein, Ilya V. Kolmanovsky

    Abstract: Model predictive control (MPC) is a widely used modern control technique with numerous successful application in diverse areas. Much of this success is due to the ability of MPC to enforce state and control constraints, which are crucial in many applications of control. In order to avoid the need for an observer, output-feedback model predictive control with online identification (OFMPCOI) uses th… ▽ More

    Submitted 22 September, 2020; originally announced September 2020.

    Comments: 61 pages, 27 figures, "T. W. Nguyen, S. A. Ul Islam, A. L. Bruce, A. Goel, D. S. Bernstein and I. V. Kolmanovsky, "Output-Feedback RLS-Based Model Predictive Control*," 2020 American Control Conference (ACC), Denver, CO, USA, 2020, pp. 2395-2400, doi: 10.23919/ACC45564.2020.9148011."

  8. arXiv:2003.13164  [pdf, other

    cs.CR

    Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL Designs

    Authors: Sheikh Ariful Islam, Love Kumar Sah, Srinivas Katkoori

    Abstract: Offshoring the proprietary Intellectual property (IP) has recently increased the threat of malicious logic insertion in the form of Hardware Trojan (HT). A potential and stealthy HT is triggered with nets that switch rarely during regular circuit operation. Detection of HT in the host design requires exhaustive simulation to activate the HT during pre- and postsilicon. Although the nets with varia… ▽ More

    Submitted 29 March, 2020; originally announced March 2020.

    Comments: Accepted to be Published in: Proceedings of the 21st International Symposium on Quality Electronic Design (ISQED 2020), Mar. 25-26, 2020, Santa Clara, CA

  9. arXiv:2003.03420  [pdf, other

    nlin.AO eess.SY math.DS math.OC

    A Discrete-Time, Time-Delayed Lur'e Model with Biased Self-Excited Oscillations

    Authors: Juan Paredes, Syed Aseem Ul Islam, Omran Kouba, Dennis S. Bernstein

    Abstract: Self-excited systems arise in many applications, such as biochemical systems, mechanical systems with fluid-structure interaction, and fuel-driven systems with combustion dynamics. This paper presents a Lur'e model that exhibits biased self-excited oscillations under constant inputs. The model involves asymptotically stable linear dynamics, time delay, a washout filter, and a saturation nonlineari… ▽ More

    Submitted 6 March, 2020; originally announced March 2020.

    Comments: Submitted to IEEE Transactions on Automatic Control, 13 pages, 20 figures

  10. arXiv:2001.01071  [pdf, ps, other

    cs.CR

    DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs

    Authors: Sheikh Ariful Islam, Love Kumar Sah, Srinivas Katkoori

    Abstract: Intellectual Property (IP) infringement including piracy and over production have emerged as significant threats in the semiconductor supply chain. Key based obfuscation techniques (i.e., logic locking) are widely applied to secure legacy IP from such attacks. However, the fundamental question remains open whether an attacker is allowed an exponential amount of time to seek correct key or could it… ▽ More

    Submitted 4 January, 2020; originally announced January 2020.

    Comments: Accepted to be Published in: Proceedings of the 2019 5th IEEE International Symposium on Smart Electronic Systems (IEEE-iSES), Dec. 16-18, 2019, Rourkela, India

  11. arXiv:1912.10312  [pdf, other

    cs.CR

    Socio-network Analysis of RTL Designs for Hardware Trojan Localization

    Authors: Sheikh Ariful Islam, Farha Islam Mime, S M Asaduzzaman, Farzana Islam

    Abstract: The recent surge in hardware security is significant due to offshoring the proprietary Intellectual property (IP). One distinct dimension of the disruptive threat is malicious logic insertion, also known as Hardware Trojan (HT). HT subverts the normal operations of a device stealthily. The diversity in HTs activation mechanisms and their location in design brings no catch-all detection techniques.… ▽ More

    Submitted 21 December, 2019; originally announced December 2019.

    Comments: Accepted to be Published in: Proceedings of the 2019 22nd International Conference on Computer and Information Technology (ICCIT), 18-20 December 2019, Dhaka, Bangladesh

  12. arXiv:1912.01209  [pdf, other

    cs.CR

    On the (In)security of Approximate Computing Synthesis

    Authors: Sheikh Ariful Islam

    Abstract: The broad landscape of new applications requires minimal hardware resources without any sacrifice in Quality-of-Results. Approximate Computing (AC) has emerged to meet the demands of data-rich applications. Although AC applies techniques to improve the energy efficiency of error-tolerant applications at the cost of computational accuracy, new challenges in security threats of AC should be simultan… ▽ More

    Submitted 3 December, 2019; originally announced December 2019.

  13. arXiv:1909.07891  [pdf, other

    cs.CR

    Machine Learning based IoT Edge Node Security Attack and Countermeasures

    Authors: Vishalini R. Laguduva, Sheikh Ariful Islam, Sathyanarayanan Aakur, Srinivas Katkoori, Robert Karam

    Abstract: Advances in technology have enabled tremendous progress in the development of a highly connected ecosystem of ubiquitous computing devices collectively called the Internet of Things (IoT). Ensuring the security of IoT devices is a high priority due to the sensitive nature of the collected data. Physically Unclonable Functions (PUFs) have emerged as critical hardware primitive for ensuring the secu… ▽ More

    Submitted 17 September, 2019; originally announced September 2019.

    Comments: Accepted in ISVLSI 2019

  14. arXiv:1909.07821  [pdf, other

    cs.CR

    Variable Record Table: A Run-time Solution for Mitigating Buffer Overflow Attack

    Authors: Love Kumar Sah, Sheikh Ariful Islam, Srinivas Katkoori

    Abstract: We present a novel approach to mitigate buffer overflow attack using Variable Record Table (VRT). Dedicated memory space is used to automatically record base and bound information of variables extracted during runtime. We instrument frame pointer and function(s) related registers to decode variable memory space in stack and heap. We have modified Simplescalar/PISA simulator to extract variables sp… ▽ More

    Submitted 17 September, 2019; originally announced September 2019.

    Comments: Accepted for publication in MWSCAS2019

  15. arXiv:1909.06357  [pdf, ps, other

    cs.CR

    An SR Flip-Flop based Physical Unclonable Functions for Hardware Security

    Authors: Rohith Prasad Challa, Sheikh Ariful Islam, Srinivas Katkoori

    Abstract: Physical Unclonable Functions (PUFs) have emerged as a promising solution to identify and authenticate Integrated Circuits (ICs). In this paper, we propose a novel NAND-based Set-Reset (SR) Flip-flop (FF) PUF design for security enclosures of the area- and power-constrained Internet-of-Things (IoT) edge node. Such SR-FF based PUF is constructed during a unique race condition that is (normally) avo… ▽ More

    Submitted 11 September, 2019; originally announced September 2019.

    Comments: Accepted to MWSCAS 2019