-
A Dataset for Large Language Model-Driven AI Accelerator Generation
Authors:
Mahmoud Nazzal,
Deepak Vungarala,
Mehrdad Morsali,
Chao Zhang,
Arnob Ghosh,
Abdallah Khreishah,
Shaahin Angizi
Abstract:
In the ever-evolving landscape of Deep Neural Networks (DNN) hardware acceleration, unlocking the true potential of systolic array accelerators has long been hindered by the daunting challenges of expertise and time investment. Large Language Models (LLMs) offer a promising solution for automating code generation which is key to unlocking unprecedented efficiency and performance in various domains…
▽ More
In the ever-evolving landscape of Deep Neural Networks (DNN) hardware acceleration, unlocking the true potential of systolic array accelerators has long been hindered by the daunting challenges of expertise and time investment. Large Language Models (LLMs) offer a promising solution for automating code generation which is key to unlocking unprecedented efficiency and performance in various domains, including hardware descriptive code. However, the successful application of LLMs to hardware accelerator design is contingent upon the availability of specialized datasets tailored for this purpose. To bridge this gap, we introduce the Systolic Array-based Accelerator DataSet (SA-DS). SA-DS comprises of a diverse collection of spatial arrays following the standardized Berkeley's Gemmini accelerator generator template, enabling design reuse, adaptation, and customization. SA-DS is intended to spark LLM-centred research on DNN hardware accelerator architecture. We envision that SA-DS provides a framework which will shape the course of DNN hardware acceleration research for generations to come. SA-DS is open-sourced under the permissive MIT license at this https://github.com/ACADLab/SA-DS.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification
Authors:
Mahmoud Nazzal,
Nura Aljaafari,
Ahmed Sawalmeh,
Abdallah Khreishah,
Muhammad Anan,
Abdulelah Algosaibi,
Mohammed Alnaeem,
Adel Aldalbahi,
Abdulaziz Alhumam,
Conrado P. Vizcarra,
Shadan Alhamed
Abstract:
Federated learning enables multiple clients to collaboratively contribute to the learning of a global model orchestrated by a central server. This learning scheme promotes clients' data privacy and requires reduced communication overheads. In an application like network traffic classification, this helps hide the network vulnerabilities and weakness points. However, federated learning is susceptib…
▽ More
Federated learning enables multiple clients to collaboratively contribute to the learning of a global model orchestrated by a central server. This learning scheme promotes clients' data privacy and requires reduced communication overheads. In an application like network traffic classification, this helps hide the network vulnerabilities and weakness points. However, federated learning is susceptible to backdoor attacks, in which adversaries inject manipulated model updates into the global model. These updates inject a salient functionality in the global model that can be launched with specific input patterns. Nonetheless, the vulnerability of network traffic classification models based on federated learning to these attacks remains unexplored. In this paper, we propose GABAttack, a novel genetic algorithm-based backdoor attack against federated learning for network traffic classification. GABAttack utilizes a genetic algorithm to optimize the values and locations of backdoor trigger patterns, ensuring a better fit with the input and the model. This input-tailored dynamic attack is promising for improved attack evasiveness while being effective. Extensive experiments conducted over real-world network datasets validate the success of the proposed GABAttack in various situations while maintaining almost invisible activity. This research serves as an alarming call for network security experts and practitioners to develop robust defense measures against such attacks.
△ Less
Submitted 27 September, 2023;
originally announced October 2023.
-
Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Authors:
Mahmoud Nazzal,
Issa Khalil,
Abdallah Khreishah,
NhatHai Phan,
Yao Ma
Abstract:
Malicious domain detection (MDD) is an open security challenge that aims to detect if an Internet domain is associated with cyber-attacks. Among many approaches to this problem, graph neural networks (GNNs) are deemed highly effective. GNN-based MDD uses DNS logs to represent Internet domains as nodes in a maliciousness graph (DMG) and trains a GNN to infer their maliciousness by leveraging identi…
▽ More
Malicious domain detection (MDD) is an open security challenge that aims to detect if an Internet domain is associated with cyber-attacks. Among many approaches to this problem, graph neural networks (GNNs) are deemed highly effective. GNN-based MDD uses DNS logs to represent Internet domains as nodes in a maliciousness graph (DMG) and trains a GNN to infer their maliciousness by leveraging identified malicious domains. Since this method relies on accessible DNS logs to construct DMGs, it exposes a vulnerability for adversaries to manipulate their domain nodes' features and connections within DMGs. Existing research mainly concentrates on threat models that manipulate individual attacker nodes. However, adversaries commonly generate multiple domains to achieve their goals economically and avoid detection. Their objective is to evade discovery across as many domains as feasible. In this work, we call the attack that manipulates several nodes in the DMG concurrently a multi-instance evasion attack. We present theoretical and empirical evidence that the existing single-instance evasion techniques for are inadequate to launch multi-instance evasion attacks against GNN-based MDDs. Therefore, we introduce MintA, an inference-time multi-instance adversarial attack on GNN-based MDDs. MintA enhances node and neighborhood evasiveness through optimized perturbations and operates successfully with only black-box access to the target model, eliminating the need for knowledge about the model's specifics or non-adversary nodes. We formulate an optimization challenge for MintA, achieving an approximate solution. Evaluating MintA on a leading GNN-based MDD technique with real-world data showcases an attack success rate exceeding 80%. These findings act as a warning for security experts, underscoring GNN-based MDDs' susceptibility to practical attacks that can undermine their effectiveness and benefits.
△ Less
Submitted 22 August, 2023;
originally announced August 2023.
-
IMA-GNN: In-Memory Acceleration of Centralized and Decentralized Graph Neural Networks at the Edge
Authors:
Mehrdad Morsali,
Mahmoud Nazzal,
Abdallah Khreishah,
Shaahin Angizi
Abstract:
In this paper, we propose IMA-GNN as an In-Memory Accelerator for centralized and decentralized Graph Neural Network inference, explore its potential in both settings and provide a guideline for the community targeting flexible and efficient edge computation. Leveraging IMA-GNN, we first model the computation and communication latencies of edge devices. We then present practical case studies on GN…
▽ More
In this paper, we propose IMA-GNN as an In-Memory Accelerator for centralized and decentralized Graph Neural Network inference, explore its potential in both settings and provide a guideline for the community targeting flexible and efficient edge computation. Leveraging IMA-GNN, we first model the computation and communication latencies of edge devices. We then present practical case studies on GNN-based taxi demand and supply prediction and also adopt four large graph datasets to quantitatively compare and analyze centralized and decentralized settings. Our cross-layer simulation results demonstrate that on average, IMA-GNN in the centralized setting can obtain ~790x communication speed-up compared to the decentralized GNN setting. However, the decentralized setting performs computation ~1400x faster while reducing the power consumption per device. This further underlines the need for a hybrid semi-decentralized GNN approach.
△ Less
Submitted 24 March, 2023;
originally announced March 2023.
-
Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach
Authors:
Mahmoud Nazzal,
Abdallah Khreishah,
Joyoung Lee,
Shaahin Angizi,
Ala Al-Fuqaha,
Mohsen Guizani
Abstract:
Prediction of taxi service demand and supply is essential for improving customer's experience and provider's profit. Recently, graph neural networks (GNNs) have been shown promising for this application. This approach models city regions as nodes in a transportation graph and their relations as edges. GNNs utilize local node features and the graph structure in the prediction. However, more efficie…
▽ More
Prediction of taxi service demand and supply is essential for improving customer's experience and provider's profit. Recently, graph neural networks (GNNs) have been shown promising for this application. This approach models city regions as nodes in a transportation graph and their relations as edges. GNNs utilize local node features and the graph structure in the prediction. However, more efficient forecasting can still be achieved by following two main routes; enlarging the scale of the transportation graph, and simultaneously exploiting different types of nodes and edges in the graphs. However, both approaches are challenged by the scalability of GNNs. An immediate remedy to the scalability challenge is to decentralize the GNN operation. However, this creates excessive node-to-node communication. In this paper, we first characterize the excessive communication needs for the decentralized GNN approach. Then, we propose a semi-decentralized approach utilizing multiple cloudlets, moderately sized storage and computation devices, that can be integrated with the cellular base stations. This approach minimizes inter-cloudlet communication thereby alleviating the communication overhead of the decentralized approach while promoting scalability due to cloudlet-level decentralization. Also, we propose a heterogeneous GNN-LSTM algorithm for improved taxi-level demand and supply forecasting for handling dynamic taxi graphs where nodes are taxis. Extensive experiments over real data show the advantage of the semi-decentralized approach as tested over our heterogeneous GNN-LSTM algorithm. Also, the proposed semi-decentralized GNN approach is shown to reduce the overall inference time by about an order of magnitude compared to centralized and decentralized inference schemes.
△ Less
Submitted 6 April, 2023; v1 submitted 27 February, 2023;
originally announced March 2023.
-
Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Authors:
Izzat Alsmadi,
Kashif Ahmad,
Mahmoud Nazzal,
Firoj Alam,
Ala Al-Fuqaha,
Abdallah Khreishah,
Abdulelah Algosaibi
Abstract:
The growing use of social media has led to the development of several Machine Learning (ML) and Natural Language Processing(NLP) tools to process the unprecedented amount of social media content to make actionable decisions. However, these MLand NLP algorithms have been widely shown to be vulnerable to adversarial attacks. These vulnerabilities allow adversaries to launch a diversified set of adve…
▽ More
The growing use of social media has led to the development of several Machine Learning (ML) and Natural Language Processing(NLP) tools to process the unprecedented amount of social media content to make actionable decisions. However, these MLand NLP algorithms have been widely shown to be vulnerable to adversarial attacks. These vulnerabilities allow adversaries to launch a diversified set of adversarial attacks on these algorithms in different applications of social media text processing. In this paper, we provide a comprehensive review of the main approaches for adversarial attacks and defenses in the context of social media applications with a particular focus on key challenges and future research directions. In detail, we cover literature on six key applications, namely (i) rumors detection, (ii) satires detection, (iii) clickbait & spams identification, (iv) hate speech detection, (v)misinformation detection, and (vi) sentiment analysis. We then highlight the concurrent and anticipated future research questions and provide recommendations and directions for future work.
△ Less
Submitted 26 October, 2021;
originally announced October 2021.
-
Estimating Sparsity Level for Enabling Compressive Sensing of Wireless Channels and Spectra in 5G and Beyond
Authors:
Mahmoud Nazzal,
Mehmet Ali Aygul,
Huseyin Arslan
Abstract:
Applying compressive sensing (CS) allows for sub-Nyquist sampling in several application areas in 5G and beyond. This reduces the associated training, feedback, and computation overheads in many applications. However, the applicability of CS relies on the validity of a signal sparsity assumption and knowing the exact sparsity level. It is customary to assume a foreknown sparsity level. Still, this…
▽ More
Applying compressive sensing (CS) allows for sub-Nyquist sampling in several application areas in 5G and beyond. This reduces the associated training, feedback, and computation overheads in many applications. However, the applicability of CS relies on the validity of a signal sparsity assumption and knowing the exact sparsity level. It is customary to assume a foreknown sparsity level. Still, this assumption is not valid in practice, especially when applying learned dictionaries as sparsifying transforms. The problem is more strongly pronounced with multidimensional sparsity. In this paper, we propose an algorithm for estimating the composite sparsity lying in multiple domains defined by learned dictionaries. The proposed algorithm estimates the sparsity level over a dictionary by inferring it from its counterpart with respect to a compact discrete Fourier basis. This inference is achieved by a machine learning prediction. This setting learns the intrinsic relationship between the columns of a dictionary and those of such a fixed basis. The proposed algorithm is applied to estimating sparsity levels in wireless channels, and in cognitive radio spectra. Extensive simulations validate a high quality of sparsity estimation leading to performances very close to the impractical case of assuming known sparsity.
△ Less
Submitted 18 December, 2020;
originally announced December 2020.
-
Deep Learning-Based Optimal RIS Interaction Exploiting Previously Sampled Channel Correlations
Authors:
Mehmet Ali Aygul,
Mahmoud Nazzal,
Huseyin Arslan
Abstract:
The reconfigurable intelligent surface (RIS) technology has attracted interest due to its promising coverage and spectral efficiency features. However, some challenges need to be addressed to realize this technology in practice. One of the main challenges is the configuration of reflecting coefficients without the need for beam training overhead or massive channel estimation. Earlier works used es…
▽ More
The reconfigurable intelligent surface (RIS) technology has attracted interest due to its promising coverage and spectral efficiency features. However, some challenges need to be addressed to realize this technology in practice. One of the main challenges is the configuration of reflecting coefficients without the need for beam training overhead or massive channel estimation. Earlier works used estimated channel information with deep learning algorithms to design RIS reflection matrices. Although these works can reduce the beam training overhead, still they overlook existing correlations in the previously sampled channels. In this paper, different from existing works, we propose to exploit the correlation in the previously sampled channels to estimate RIS interaction more reliably. We use a deep multi-layer perceptron for this purpose. Simulation results reveal performance improvements achieved by the proposed algorithm.
△ Less
Submitted 20 October, 2020;
originally announced October 2020.
-
Sparsifying Dictionary Learning for Beamspace Channel Representation and Estimation in Millimeter-Wave Massive MIMO
Authors:
Mehmet Ali Aygul,
Mahmoud Nazzal,
Huseyin Arslan
Abstract:
Millimeter-wave (mmWave) massive multiple-input-multiple-output (mMIMO) is reported as a key enabler in the fifth-generation communication and beyond. It is customary to use a lens antenna array to transform a mmWave mMIMO channel into a beamspace where the channel exhibits sparsity. This beamspace transformation is equivalent to performing a Fourier transformation of the channel. Still, a Fourier…
▽ More
Millimeter-wave (mmWave) massive multiple-input-multiple-output (mMIMO) is reported as a key enabler in the fifth-generation communication and beyond. It is customary to use a lens antenna array to transform a mmWave mMIMO channel into a beamspace where the channel exhibits sparsity. This beamspace transformation is equivalent to performing a Fourier transformation of the channel. Still, a Fourier transformation is not necessarily the optimal one, due to many reasons. Accordingly, this paper proposes using a learned sparsifying dictionary as the transformation operator leading to another beamspace. Since the dictionary is obtained by training over actual channel measurements, this transformation is shown to yield two immediate advantages. First is enhancing channel sparsity, thereby leading to more efficient pilot reduction. Second is improving the channel representation quality, and thus reducing the underlying power leakage phenomenon. Consequently, this allows for both improved channel estimation and facilitated beam selection in mmWave mMIMO. Besides, a learned dictionary is also used as the precoding operator for the same reasons. Extensive simulations under various operating scenarios and environments validate the added benefits of using learned dictionaries in improving the channel estimation quality and the beam selectivity, thereby improving the spectral efficiency.
△ Less
Submitted 28 April, 2022; v1 submitted 24 July, 2020;
originally announced July 2020.
-
Primary User Emulation and Jamming Attack Detection in Cognitive Radio via Sparse Coding
Authors:
H. M. Furqan,
M. A. Aygul,
M. Nazzal,
H. Arslan
Abstract:
Cognitive radio is an intelligent and adaptive radio that improves the utilization of the spectrum by its opportunistic sharing. However, it is inherently vulnerable to primary user emulation and jamming attacks that degrade the spectrum utilization. In this paper, an algorithm for the detection of primary user emulation and jamming attacks in cognitive radio is proposed. The proposed algorithm is…
▽ More
Cognitive radio is an intelligent and adaptive radio that improves the utilization of the spectrum by its opportunistic sharing. However, it is inherently vulnerable to primary user emulation and jamming attacks that degrade the spectrum utilization. In this paper, an algorithm for the detection of primary user emulation and jamming attacks in cognitive radio is proposed. The proposed algorithm is based on the sparse coding of the compressed received signal over a channel-dependent dictionary. More specifically, the convergence patterns in sparse coding according to such a dictionary are used to distinguish between a spectrum hole, a legitimate primary user, and an emulator or a jammer. The process of decision-making is carried out as a machine learning-based classification operation. Extensive numerical experiments show the effectiveness of the proposed algorithm in detecting the aforementioned attacks with high success rates. This is validated in terms of the confusion matrix quality metric. Besides, the proposed algorithm is shown to be superior to energy detection-based machine learning techniques in terms of receiver operating characteristics curves and the areas under these curves
△ Less
Submitted 16 June, 2020;
originally announced June 2020.