Skip to main content

Showing 1–28 of 28 results for author: Khalid, F

.
  1. arXiv:2406.17320  [pdf, other

    eess.SP

    Relaxed Multi-Tx DDM Online Calibration

    Authors: Mayeul Jeannin, Oliver Lang, Farhan Bin Khalid, Dian Tresna Nugraha, Mario Huemer

    Abstract: In multiple-input and multiple-output (MIMO) radar systems based on Doppler-division multiplexing (DDM), phase shifters are employed in the transmit paths and require calibration strategies to maintain optimal performance all along the radar system's life cycle. In this paper, we propose a novel family of DDM codes that enable an online calibration of the phase shifters that scale realistically to… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

    Comments: 5 pages, 6 figures, 2 tables, conference

  2. arXiv:2401.09354  [pdf

    eess.AS cs.AI cs.SD

    Transcending Controlled Environments Assessing the Transferability of ASRRobust NLU Models to Real-World Applications

    Authors: Hania Khan, Aleena Fatima Khalid, Zaryab Hassan

    Abstract: This research investigates the transferability of Automatic Speech Recognition (ASR)-robust Natural Language Understanding (NLU) models from controlled experimental conditions to practical, real-world applications. Focused on smart home automation commands in Urdu, the study assesses model performance under diverse noise profiles, linguistic variations, and ASR error scenarios. Leveraging the Urdu… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

  3. arXiv:2310.03994  [pdf, other

    cs.AR cs.CR eess.SY

    DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans

    Authors: Enahoro Oriero, Faiq Khalid, Syed Rafay Hasan

    Abstract: The global semiconductor supply chain involves design and fabrication at various locations, which leads to multiple security vulnerabilities, e.g., Hardware Trojan (HT) insertion. Although most HTs target digital circuits, HTs can be inserted in analog circuits. Therefore, several techniques have been developed for HT insertions in analog circuits. Capacitance-based Analog Hardware Trojan (AHT) is… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

    Comments: Accepted at ACM Hardware and Architectural Support for Security and Privacy (HASP) 2023

  4. arXiv:2303.06486  [pdf, other

    cs.CR

    SHIELD: An Adaptive and Lightweight Defense against the Remote Power Side-Channel Attacks on Multi-tenant FPGAs

    Authors: Mahya Morid Ahmadi, Faiq Khalid, Radha Vaidya, Florian Kriebel, Andreas Steininger, Muhammad Shafique

    Abstract: Dynamic partial reconfiguration enables multi-tenancy in cloud-based FPGAs, which presents security challenges for tenants, IPs, and data. Malicious users can exploit FPGAs for remote side-channel attacks (SCAs), and shared on-chip resources can be used for attacks. Logical separation can ensure design integrity, but on-chip resources can still be exploited. Conventional SCA mitigation can help, b… ▽ More

    Submitted 11 March, 2023; originally announced March 2023.

    Comments: 11 pages, under review by IEEE ACCESS

  5. arXiv:2109.11041  [pdf, other

    cs.LG cs.CR

    Security Analysis of Capsule Network Inference using Horizontal Collaboration

    Authors: Adewale Adeyemo, Faiq Khalid, Tolulope A. Odetola, Syed Rafay Hasan

    Abstract: The traditional convolution neural networks (CNN) have several drawbacks like the Picasso effect and the loss of information by the pooling layer. The Capsule network (CapsNet) was proposed to address these challenges because its architecture can encode and preserve the spatial orientation of input images. Similar to traditional CNNs, CapsNet is also vulnerable to several malicious attacks, as stu… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

  6. arXiv:2106.08877  [pdf, other

    cs.CR cs.AR

    Side-Channel Attacks on RISC-V Processors: Current Progress, Challenges, and Opportunities

    Authors: Mahya Morid Ahmadi, Faiq Khalid, Muhammad Shafique

    Abstract: Side-channel attacks on microprocessors, like the RISC-V, exhibit security vulnerabilities that lead to several design challenges. Hence, it is imperative to study and analyze these security vulnerabilities comprehensively. In this paper, we present a brief yet comprehensive study of the security vulnerabilities in modern microprocessors with respect to side-channel attacks and their respective mi… ▽ More

    Submitted 16 June, 2021; originally announced June 2021.

    Comments: CYBER 2020, The Fifth International Conference on Cyber-Technologies and Cyber-Systems

  7. FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack

    Authors: Tolulope Odetola, Faiq Khalid, Travis Sandefur, Hawzhin Mohammed, Syed Rafay Hasan

    Abstract: To reduce the time-to-market and access to state-of-the-art techniques, CNN hardware map** and deployment on embedded accelerators are often outsourced to untrusted third parties, which is going to be more prevalent in futuristic artificial intelligence of things (AIoT) systems. These AIoT systems anticipate horizontal collaboration among different resource-constrained AIoT node devices, where C… ▽ More

    Submitted 25 August, 2021; v1 submitted 12 June, 2021; originally announced June 2021.

    Comments: Accepted for publication in IEEE Access

    Journal ref: IEEE Access, vol. 9, pp. 115370-115387, 2021

  8. arXiv:2105.03251  [pdf, other

    cs.CR cs.LG

    Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks

    Authors: Faiq Khalid, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: From tiny pacemaker chips to aircraft collision avoidance systems, the state-of-the-art Cyber-Physical Systems (CPS) have increasingly started to rely on Deep Neural Networks (DNNs). However, as concluded in various studies, DNNs are highly susceptible to security threats, including adversarial attacks. In this paper, we first discuss different vulnerabilities that can be exploited for generating… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

    Comments: CYBER 2020, The Fifth International Conference on Cyber-Technologies and Cyber-Systems

  9. arXiv:2102.01495  [pdf, other

    cs.IT eess.SP

    Deep Learning based Joint Precoder Design and Antenna Selection for Partially Connected Hybrid Massive MIMO Systems

    Authors: Salman Khalid, Waqas bin Abbas, Farhan Khalid

    Abstract: Efficient resource allocation with hybrid precoder design is essential for massive MIMO systems operating in millimeter wave (mmW) domain. Owing to a higher energy efficiency and a lower complexity of a partially connected hybrid architecture, in this letter, we propose a joint deep convolutional neural network (CNN) based scheme for precoder design and antenna selection of a partially connected m… ▽ More

    Submitted 2 February, 2021; originally announced February 2021.

  10. PANDA Phase One

    Authors: G. Barucca, F. Davì, G. Lancioni, P. Mengucci, L. Montalto, P. P. Natali, N. Paone, D. Rinaldi, L. Scalise, B. Krusche, M. Steinacher, Z. Liu, C. Liu, B. Liu, X. Shen, S. Sun, G. Zhao, J. Zhao, M. Albrecht, W. Alkakhi, S. Bökelmann, S. Coen, F. Feldbauer, M. Fink, J. Frech , et al. (399 additional authors not shown)

    Abstract: The Facility for Antiproton and Ion Research (FAIR) in Darmstadt, Germany, provides unique possibilities for a new generation of hadron-, nuclear- and atomic physics experiments. The future antiProton ANnihilations at DArmstadt (PANDA or $\overline{\rm P}$ANDA) experiment at FAIR will offer a broad physics programme, covering different aspects of the strong interaction. Understanding the latter in… ▽ More

    Submitted 9 June, 2021; v1 submitted 28 January, 2021; originally announced January 2021.

    Comments: 35 pages, 15 figures

    Journal ref: European Physics Journal A57, 44 (2021)

  11. arXiv:2012.05948  [pdf, other

    cs.CR

    GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking

    Authors: Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur Sinanoglu

    Abstract: In this paper, we propose GNNUnlock, the first-of-its-kind oracle-less machine learning-based attack on provably secure logic locking that can identify any desired protection logic without focusing on a specific syntactic topology. The key is to leverage a well-trained graph neural network (GNN) to identify all the gates in a given locked netlist that belong to the targeted protection logic, witho… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

    Comments: 6 pages, 4 figures, 6 tables, conference

  12. MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices

    Authors: Faiq Khalid, Syed Rafay Hasan, Sara Zia, Osman Hasan, Falah Awwad, Muhammad Shafique

    Abstract: Traditional learning-based approaches for run-time Hardware Trojan detection require complex and expensive on-chip data acquisition frameworks and thus incur high area and power overhead. To address these challenges, we propose to leverage the power correlation between the executing instructions of a microprocessor to establish a machine learning-based run-time Hardware Trojan (HT) detection frame… ▽ More

    Submitted 20 November, 2020; originally announced November 2020.

    Journal ref: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ( Volume: 39, Issue: 11, Nov. 2020)

  13. arXiv:2006.16854  [pdf, ps, other

    eess.SP cs.IT

    User Selection in Millimeter Wave Massive MIMO System using Convolutional Neural Networks

    Authors: Salman Khalid, Waqas bin Abbas, Farhan Khalid, Michele Zorzi

    Abstract: A hybrid architecture for millimeter wave (mmW) massive MIMO systems is considered practically implementable due to low power consumption and high energy efficiency. However, due to the limited number of RF chains, user selection becomes necessary for such architecture. Traditional user selection algorithms suffer from high computational complexity and, therefore, may not be scalable in 5G and bey… ▽ More

    Submitted 30 June, 2020; originally announced June 2020.

    Comments: 4 pages, 5 Figures

  14. arXiv:1912.01978  [pdf, other

    cs.LG stat.ML

    FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks

    Authors: Mahum Naseer, Mishal Fatima Minhas, Faiq Khalid, Muhammad Abdullah Hanif, Osman Hasan, Muhammad Shafique

    Abstract: With a constant improvement in the network architectures and training methodologies, Neural Networks (NNs) are increasingly being deployed in real-world Machine Learning systems. However, despite their impressive performance on "known inputs", these NNs can fail absurdly on the "unseen inputs", especially if these real-time inputs deviate from the training dataset distributions, or contain certain… ▽ More

    Submitted 14 May, 2020; v1 submitted 3 December, 2019; originally announced December 2019.

    Comments: To appear at the 23rd Design, Automation and Test in Europe (DATE 2020). Grenoble, France

  15. arXiv:1912.00756  [pdf, other

    cs.CV cs.LG

    Learning scale-variant features for robust iris authentication with deep learning based ensemble framework

    Authors: Siming Zheng, Rahmita Wirza O. K. Rahmat, Fatimah Khalid, Nurul Amelina Nasharuddin

    Abstract: In recent years, mobile Internet has accelerated the proliferation of smart mobile development. The mobile payment, mobile security and privacy protection have become the focus of widespread attention. Iris recognition becomes a high-security authentication technology in these fields, it is widely used in distinct science fields in biometric authentication fields. The Convolutional Neural Network… ▽ More

    Submitted 13 June, 2020; v1 submitted 2 December, 2019; originally announced December 2019.

    Comments: This is the second revision for updating the formation, logical and image captions

  16. arXiv:1902.01147  [pdf, other

    cs.LG cs.CR eess.IV stat.ML

    Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks

    Authors: Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique

    Abstract: Spiking Neural Networks (SNNs) claim to present many advantages in terms of biological plausibility and energy efficiency compared to standard Deep Neural Networks (DNNs). Recent works have shown that DNNs are vulnerable to adversarial attacks, i.e., small perturbations added to the input data can lead to targeted or random misclassifications. In this paper, we aim at investigating the key researc… ▽ More

    Submitted 18 May, 2020; v1 submitted 4 February, 2019; originally announced February 2019.

    Comments: Accepted for publication at the 2020 International Joint Conference on Neural Networks (IJCNN)

  17. arXiv:1901.10258  [pdf, other

    cs.CR cs.LG

    RED-Attack: Resource Efficient Decision based Attack for Machine Learning

    Authors: Faiq Khalid, Hassan Ali, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

    Abstract: Due to data dependency and model leakage properties, Deep Neural Networks (DNNs) exhibit several security vulnerabilities. Several security attacks exploited them but most of them require the output probability vector. These attacks can be mitigated by concealing the output probability vector. To address this limitation, decision-based attacks have been proposed which can estimate the model but th… ▽ More

    Submitted 30 January, 2019; v1 submitted 29 January, 2019; originally announced January 2019.

  18. arXiv:1901.09878  [pdf, other

    cs.LG cs.CR cs.CV eess.IV stat.ML

    CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks

    Authors: Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique

    Abstract: Capsule Networks preserve the hierarchical spatial relationships between objects, and thereby bears a potential to surpass the performance of traditional Convolutional Neural Networks (CNNs) in performing tasks like image classification. A large body of work has explored adversarial examples for CNNs, but their effectiveness on Capsule Networks has not yet been well studied. In our work, we perfor… ▽ More

    Submitted 24 May, 2019; v1 submitted 28 January, 2019; originally announced January 2019.

  19. SIMCom: Statistical Sniffing of Inter-Module Communications for Run-time Hardware Trojan Detection

    Authors: Faiq Khalid, Syed Rafay Hasan, Osman Hasan, Muhammad Shafique

    Abstract: Timely detection of Hardware Trojans (HTs) has become a major challenge for secure integrated circuits. We present a run-time methodology for HT detection that employs a multi-parameter statistical traffic modeling of the communication channel in a given System-on-Chip (SoC), named as SIMCom. The main idea is to model the communication using multiple side-channel information like the Hurst exponen… ▽ More

    Submitted 23 May, 2020; v1 submitted 4 November, 2018; originally announced January 2019.

    Journal ref: Elsevier Microprocessors and Microsystems, 2020, pp. 103-122

  20. arXiv:1812.05446  [pdf, other

    cs.CR cs.AR

    ForASec: Formal Analysis of Security Vulnerabilities in Sequential Circuits

    Authors: Faiq Khalid, Imran Hafeez Abbassi, Semeen Rehman, Awais Mehmood Kamboh, Osman Hasan, Muhammad Shafique

    Abstract: Security vulnerability analysis of Integrated Circuits using conventional design-time validation and verification techniques (like simulations, emulations, etc.) is generally a computationally intensive task and incomplete by nature, especially under limited resources and time constraints. To overcome this limitation, we propose a novel methodology based on model checking to formally analyze secur… ▽ More

    Submitted 21 April, 2021; v1 submitted 4 November, 2018; originally announced December 2018.

    Comments: (Accepted in 2021)

    Journal ref: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2021

  21. arXiv:1812.02770  [pdf, other

    cs.CR cs.AR

    TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint

    Authors: Imran Hafeez Abbassi, Faiq Khalid, Semeen Rehman, Awais Mehmood Kamboh, Axel Jantsch, Siddharth Garg, Muhammad Shafique

    Abstract: Conventional Hardware Trojan (HT) detection techniques are based on the validation of integrated circuits to determine changes in their functionality, and on non-invasive side-channel analysis to identify the variations in their physical parameters. In particular, almost all the proposed side-channel power-based detection techniques presume that HTs are detectable because they only add gates to th… ▽ More

    Submitted 5 November, 2018; originally announced December 2018.

    Comments: Design, Automation and Test in Europe (DATE 2019)

  22. arXiv:1811.07330  [pdf, other

    eess.SP

    ApproxCS: Near-Sensor Approximate Compressed Sensing for IoT-Healthcare Systems

    Authors: Ayesha Siddique, Osman Hasan, Faiq Khalid, Muhammad Shafique

    Abstract: Internet of Things (IoTs) is an emerging trend that has enabled an upgrade in the design of wearable healthcare monitoring systems through the (integrated) edge, fog, and cloud computing paradigm. Energy efficiency is one of the most important design metrics in such IoT-healthcare systems especially, for the edge and fog nodes. Due to the sensing noise and inherent redundancy in the input data, ev… ▽ More

    Submitted 18 November, 2018; originally announced November 2018.

  23. arXiv:1811.01463  [pdf

    cs.LG cs.CR stat.ML

    Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference

    Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique

    Abstract: The exponential increase in dependencies between the cyber and physical world leads to an enormous amount of data which must be efficiently processed and stored. Therefore, computing paradigms are evolving towards machine learning (ML)-based systems because of their ability to efficiently and accurately process the enormous amount of data. Although ML-based solutions address the efficient computin… ▽ More

    Submitted 4 November, 2018; originally announced November 2018.

    Report number: INSPEC Accession Number: 18398499

    Journal ref: International Conference on Frontiers of Information Technology (FIT) 2018

  24. arXiv:1811.01444  [pdf, other

    cs.LG cs.CR stat.ML

    FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning

    Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique

    Abstract: Deep neural networks (DNN)-based machine learning (ML) algorithms have recently emerged as the leading ML paradigm particularly for the task of classification due to their superior capability of learning efficiently from large datasets. The discovery of a number of well-known attacks such as dataset poisoning, adversarial examples, and network manipulation (through the addition of malicious nodes)… ▽ More

    Submitted 4 November, 2018; originally announced November 2018.

    Comments: Accepted in Design, Automation and Test in Europe 2019

  25. arXiv:1811.01443  [pdf, other

    cs.LG cs.CR stat.ML

    SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters

    Authors: Hassan Ali, Faiq Khalid, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

    Abstract: In this paper, we introduce a novel technique based on the Secure Selective Convolutional (SSC) techniques in the training loop that increases the robustness of a given DNN by allowing it to learn the data distribution based on the important edges in the input image. We validate our technique on Convolutional DNNs against the state-of-the-art attacks from the open-source Cleverhans library using t… ▽ More

    Submitted 14 May, 2020; v1 submitted 4 November, 2018; originally announced November 2018.

    Journal ref: IEEE Design & Test, vol. 37, no. 2, pp. 58-65, April 2020

  26. arXiv:1811.01437  [pdf, other

    cs.LG cs.CR stat.ML

    QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks

    Authors: Faiq Khalid, Hassan Ali, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

    Abstract: Adversarial examples have emerged as a significant threat to machine learning algorithms, especially to the convolutional neural networks (CNNs). In this paper, we propose two quantization-based defense mechanisms, Constant Quantization (CQ) and Trainable Quantization (TQ), to increase the robustness of CNNs against adversarial examples. CQ quantizes input pixel intensities based on a "fixed" numb… ▽ More

    Submitted 14 May, 2020; v1 submitted 4 November, 2018; originally announced November 2018.

    Journal ref: 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), Rhodes, Greece, 2019, pp. 182-187

  27. arXiv:1811.01031  [pdf, other

    cs.LG cs.CR stat.ML

    TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks

    Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

    Abstract: Most of the data manipulation attacks on deep neural networks (DNNs) during the training stage introduce a perceptible noise that can be catered by preprocessing during inference or can be identified during the validation phase. Therefore, data poisoning attacks during inference (e.g., adversarial attacks) are becoming more popular. However, many of them do not consider the imperceptibility factor… ▽ More

    Submitted 14 May, 2020; v1 submitted 2 November, 2018; originally announced November 2018.

    Journal ref: 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), Rhodes, Greece, 2019, pp. 188-193

  28. A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems

    Authors: Denise Ratasich, Faiq Khalid, Florian Geissler, Radu Grosu, Muhammad Shafique, Ezio Bartocci

    Abstract: The Internet of Things (IoT) is a ubiquitous system connecting many different devices - the things - which can be accessed from the distance. The cyber-physical systems (CPS) monitor and control the things from the distance. As a result, the concepts of dependability and security get deeply intertwined. The increasing level of dynamicity, heterogeneity, and complexity adds to the system's vulnerab… ▽ More

    Submitted 6 November, 2018; v1 submitted 16 October, 2018; originally announced October 2018.

    Comments: preprint (2018-10-29)

    Journal ref: IEEE Access 7 (2019) 13260 - 13283