Skip to main content

Showing 1–10 of 10 results for author: Nazzal, M

.
  1. arXiv:2404.10875  [pdf, other

    cs.AR

    A Dataset for Large Language Model-Driven AI Accelerator Generation

    Authors: Mahmoud Nazzal, Deepak Vungarala, Mehrdad Morsali, Chao Zhang, Arnob Ghosh, Abdallah Khreishah, Shaahin Angizi

    Abstract: In the ever-evolving landscape of Deep Neural Networks (DNN) hardware acceleration, unlocking the true potential of systolic array accelerators has long been hindered by the daunting challenges of expertise and time investment. Large Language Models (LLMs) offer a promising solution for automating code generation which is key to unlocking unprecedented efficiency and performance in various domains… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: 4 pages, 4 Figures

  2. arXiv:2310.06855  [pdf, other

    cs.CR cs.AI cs.LG

    Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification

    Authors: Mahmoud Nazzal, Nura Aljaafari, Ahmed Sawalmeh, Abdallah Khreishah, Muhammad Anan, Abdulelah Algosaibi, Mohammed Alnaeem, Adel Aldalbahi, Abdulaziz Alhumam, Conrado P. Vizcarra, Shadan Alhamed

    Abstract: Federated learning enables multiple clients to collaboratively contribute to the learning of a global model orchestrated by a central server. This learning scheme promotes clients' data privacy and requires reduced communication overheads. In an application like network traffic classification, this helps hide the network vulnerabilities and weakness points. However, federated learning is susceptib… ▽ More

    Submitted 27 September, 2023; originally announced October 2023.

  3. arXiv:2308.11754  [pdf, other

    cs.CR cs.AI

    Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection

    Authors: Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma

    Abstract: Malicious domain detection (MDD) is an open security challenge that aims to detect if an Internet domain is associated with cyber-attacks. Among many approaches to this problem, graph neural networks (GNNs) are deemed highly effective. GNN-based MDD uses DNS logs to represent Internet domains as nodes in a maliciousness graph (DMG) and trains a GNN to infer their maliciousness by leveraging identi… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

    Comments: To Appear in the 45th IEEE Symposium on Security and Privacy (IEEE S\&P 2024), May 20-23, 2024

  4. arXiv:2303.14162  [pdf, other

    cs.AR

    IMA-GNN: In-Memory Acceleration of Centralized and Decentralized Graph Neural Networks at the Edge

    Authors: Mehrdad Morsali, Mahmoud Nazzal, Abdallah Khreishah, Shaahin Angizi

    Abstract: In this paper, we propose IMA-GNN as an In-Memory Accelerator for centralized and decentralized Graph Neural Network inference, explore its potential in both settings and provide a guideline for the community targeting flexible and efficient edge computation. Leveraging IMA-GNN, we first model the computation and communication latencies of edge devices. We then present practical case studies on GN… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: 6 pages, 8 Figures, 2 Tables

  5. arXiv:2303.00524  [pdf, other

    cs.LG cs.AI

    Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach

    Authors: Mahmoud Nazzal, Abdallah Khreishah, Joyoung Lee, Shaahin Angizi, Ala Al-Fuqaha, Mohsen Guizani

    Abstract: Prediction of taxi service demand and supply is essential for improving customer's experience and provider's profit. Recently, graph neural networks (GNNs) have been shown promising for this application. This approach models city regions as nodes in a transportation graph and their relations as edges. GNNs utilize local node features and the graph structure in the prediction. However, more efficie… ▽ More

    Submitted 6 April, 2023; v1 submitted 27 February, 2023; originally announced March 2023.

    Comments: 13 pages, 10 figures, LaTeX; typos corrected, references added, mathematical analysis added

  6. arXiv:2110.13980  [pdf, other

    cs.CL

    Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions

    Authors: Izzat Alsmadi, Kashif Ahmad, Mahmoud Nazzal, Firoj Alam, Ala Al-Fuqaha, Abdallah Khreishah, Abdulelah Algosaibi

    Abstract: The growing use of social media has led to the development of several Machine Learning (ML) and Natural Language Processing(NLP) tools to process the unprecedented amount of social media content to make actionable decisions. However, these MLand NLP algorithms have been widely shown to be vulnerable to adversarial attacks. These vulnerabilities allow adversaries to launch a diversified set of adve… ▽ More

    Submitted 26 October, 2021; originally announced October 2021.

    Comments: 21 pages, 6 figures, 10 tables

  7. arXiv:2012.10082  [pdf, other

    eess.SP

    Estimating Sparsity Level for Enabling Compressive Sensing of Wireless Channels and Spectra in 5G and Beyond

    Authors: Mahmoud Nazzal, Mehmet Ali Aygul, Huseyin Arslan

    Abstract: Applying compressive sensing (CS) allows for sub-Nyquist sampling in several application areas in 5G and beyond. This reduces the associated training, feedback, and computation overheads in many applications. However, the applicability of CS relies on the validity of a signal sparsity assumption and knowing the exact sparsity level. It is customary to assume a foreknown sparsity level. Still, this… ▽ More

    Submitted 18 December, 2020; originally announced December 2020.

  8. arXiv:2010.10087  [pdf, other

    eess.SP

    Deep Learning-Based Optimal RIS Interaction Exploiting Previously Sampled Channel Correlations

    Authors: Mehmet Ali Aygul, Mahmoud Nazzal, Huseyin Arslan

    Abstract: The reconfigurable intelligent surface (RIS) technology has attracted interest due to its promising coverage and spectral efficiency features. However, some challenges need to be addressed to realize this technology in practice. One of the main challenges is the configuration of reflecting coefficients without the need for beam training overhead or massive channel estimation. Earlier works used es… ▽ More

    Submitted 20 October, 2020; originally announced October 2020.

  9. arXiv:2007.12680  [pdf, other

    eess.SP

    Sparsifying Dictionary Learning for Beamspace Channel Representation and Estimation in Millimeter-Wave Massive MIMO

    Authors: Mehmet Ali Aygul, Mahmoud Nazzal, Huseyin Arslan

    Abstract: Millimeter-wave (mmWave) massive multiple-input-multiple-output (mMIMO) is reported as a key enabler in the fifth-generation communication and beyond. It is customary to use a lens antenna array to transform a mmWave mMIMO channel into a beamspace where the channel exhibits sparsity. This beamspace transformation is equivalent to performing a Fourier transformation of the channel. Still, a Fourier… ▽ More

    Submitted 28 April, 2022; v1 submitted 24 July, 2020; originally announced July 2020.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  10. Primary User Emulation and Jamming Attack Detection in Cognitive Radio via Sparse Coding

    Authors: H. M. Furqan, M. A. Aygul, M. Nazzal, H. Arslan

    Abstract: Cognitive radio is an intelligent and adaptive radio that improves the utilization of the spectrum by its opportunistic sharing. However, it is inherently vulnerable to primary user emulation and jamming attacks that degrade the spectrum utilization. In this paper, an algorithm for the detection of primary user emulation and jamming attacks in cognitive radio is proposed. The proposed algorithm is… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

    Comments: Accepted for publication in EURASIP Journal on Wireless Communications and Networking, TO BE APPEAR: Journal on Wireless Communications and Networking, 2020

    Report number: JWCN-D-19-00704

    Journal ref: J Wireless Com Network 2020, 141 (2020)