Skip to main content

Showing 51–100 of 153 results for author: Shafique, M

.
  1. arXiv:2304.02510  [pdf, other

    cs.CR

    FPGA-Patch: Mitigating Remote Side-Channel Attacks on FPGAs using Dynamic Patch Generation

    Authors: Mahya Morid Ahmadi, Lilas Alrahis, Ozgur Sinanoglu, Muhammad Shafique

    Abstract: We propose FPGA-Patch, the first-of-its-kind defense that leverages automated program repair concepts to thwart power side-channel attacks on cloud FPGAs. FPGA-Patch generates isofunctional variants of the target hardware by injecting faults and finding transformations that eliminate failure. The obtained variants display different hardware characteristics, ensuring a maximal diversity in power tr… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

    Comments: 6 pages

  2. arXiv:2303.16589  [pdf, other

    cs.LG

    Poster: Link between Bias, Node Sensitivity and Long-Tail Distribution in trained DNNs

    Authors: Mahum Naseer, Muhammad Shafique

    Abstract: Owing to their remarkable learning (and relearning) capabilities, deep neural networks (DNNs) find use in numerous real-world applications. However, the learning of these data-driven machine learning models is generally as good as the data available to them for training. Hence, training datasets with long-tail distribution pose a challenge for DNNs, since the DNNs trained on them may provide a var… ▽ More

    Submitted 3 April, 2023; v1 submitted 29 March, 2023; originally announced March 2023.

    Comments: To appear at the 16th IEEE International Conference on Software Testing, Verification and Validation (ICST 2023), Dublin, Ireland

  3. arXiv:2303.14009  [pdf, other

    cs.CR

    PoisonedGNN: Backdoor Attack on Graph Neural Networks-based Hardware Security Systems

    Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Abdullah Hanif, Muhammad Shafique, Ozgur Sinanoglu

    Abstract: Graph neural networks (GNNs) have shown great success in detecting intellectual property (IP) piracy and hardware Trojans (HTs). However, the machine learning community has demonstrated that GNNs are susceptible to data poisoning attacks, which result in GNNs performing abnormally on graphs with pre-defined backdoor triggers (realized using crafted subgraphs). Thus, it is imperative to ensure that… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: This manuscript is currently under review at IEEE Transactions on Computers

  4. arXiv:2303.13992  [pdf, other

    cs.CR cs.AI

    Physical Backdoor Trigger Activation of Autonomous Vehicle using Reachability Analysis

    Authors: Wenqing Li, Yue Wang, Muhammad Shafique, Saif Eddin Jabari

    Abstract: Recent studies reveal that Autonomous Vehicles (AVs) can be manipulated by hidden backdoors, causing them to perform harmful actions when activated by physical triggers. However, it is still unclear how these triggers can be activated while adhering to traffic principles. Understanding this vulnerability in a dynamic traffic environment is crucial. This work addresses this gap by presenting physic… ▽ More

    Submitted 27 March, 2023; v1 submitted 24 March, 2023; originally announced March 2023.

  5. arXiv:2303.08035  [pdf, other

    cs.LG cs.AI cs.CV

    ISimDL: Importance Sampling-Driven Acceleration of Fault Injection Simulations for Evaluating the Robustness of Deep Learning

    Authors: Alessio Colucci, Andreas Steininger, Muhammad Shafique

    Abstract: Deep Learning (DL) systems have proliferated in many applications, requiring specialized hardware accelerators and chips. In the nano-era, devices have become increasingly more susceptible to permanent and transient faults. Therefore, we need an efficient methodology for analyzing the resilience of advanced DL systems against such faults, and understand how the faults in neural accelerator chips m… ▽ More

    Submitted 25 May, 2023; v1 submitted 14 March, 2023; originally announced March 2023.

    Comments: Submission under review

  6. arXiv:2303.07898  [pdf, other

    cs.CV

    ISLE: A Framework for Image Level Semantic Segmentation Ensemble

    Authors: Erik Ostrowski, Muhammad Shafique

    Abstract: One key bottleneck of employing state-of-the-art semantic segmentation networks in the real world is the availability of training labels. Conventional semantic segmentation networks require massive pixel-wise annotated labels to reach state-of-the-art prediction quality. Hence, several works focus on semantic segmentation networks trained with only image-level annotations. However, when scrutinizi… ▽ More

    Submitted 20 September, 2023; v1 submitted 14 March, 2023; originally announced March 2023.

    Comments: Accepted for Publication at the International Symposium on Visual Computing (ISVC), October 2023, Lake Tahoe, NV, USA

  7. arXiv:2303.07896  [pdf, other

    cs.CV

    Exploring Weakly Supervised Semantic Segmentation Ensembles for Medical Imaging Systems

    Authors: Erik Ostrowski, Bharath Srinivas Prabakaran, Muhammad Shafique

    Abstract: Reliable classification and detection of certain medical conditions, in images, with state-of-the-art semantic segmentation networks, require vast amounts of pixel-wise annotation. However, the public availability of such datasets is minimal. Therefore, semantic segmentation with image-level labels presents a promising alternative to this problem. Nevertheless, very few works have focused on evalu… ▽ More

    Submitted 16 March, 2023; v1 submitted 14 March, 2023; originally announced March 2023.

  8. SILOP: An Automated Framework for Semantic Segmentation Using Image Labels Based on Object Perimeters

    Authors: Erik Ostrowski, Bharath Srinivas Prabakaran, Muhammad Shafique

    Abstract: Achieving high-quality semantic segmentation predictions using only image-level labels enables a new level of real-world applicability. Although state-of-the-art networks deliver reliable predictions, the amount of handcrafted pixel-wise annotations to enable these results are not feasible in many real-world applications. Hence, several works have already targeted this bottleneck, using classifier… ▽ More

    Submitted 8 May, 2023; v1 submitted 14 March, 2023; originally announced March 2023.

    Comments: Accepted for Publication at the International Joint Conference on Neural Networks (IJCNN), July 2023, Gold Coast, Queensland, Australia

  9. arXiv:2303.07853  [pdf, other

    cs.CV cs.LG

    ReFit: A Framework for Refinement of Weakly Supervised Semantic Segmentation using Object Border Fitting for Medical Images

    Authors: Bharath Srinivas Prabakaran, Erik Ostrowski, Muhammad Shafique

    Abstract: Weakly Supervised Semantic Segmentation (WSSS) relying only on image-level supervision is a promising approach to deal with the need for Segmentation networks, especially for generating a large number of pixel-wise masks in a given dataset. However, most state-of-the-art image-level WSSS techniques lack an understanding of the geometric features embedded in the images since the network cannot deri… ▽ More

    Submitted 20 September, 2023; v1 submitted 14 March, 2023; originally announced March 2023.

    Comments: Accepted for Publication at the International Symposium on Visual Computing (ISVC), October 2023, Lake Tahoe, NV, USA

  10. arXiv:2303.07852  [pdf, other

    eess.IV cs.CV cs.LG

    FPUS23: An Ultrasound Fetus Phantom Dataset with Deep Neural Network Evaluations for Fetus Orientations, Fetal Planes, and Anatomical Features

    Authors: Bharath Srinivas Prabakaran, Paul Hamelmann, Erik Ostrowski, Muhammad Shafique

    Abstract: Ultrasound imaging is one of the most prominent technologies to evaluate the growth, progression, and overall health of a fetus during its gestation. However, the interpretation of the data obtained from such studies is best left to expert physicians and technicians who are trained and well-versed in analyzing such images. To improve the clinical workflow and potentially develop an at-home ultraso… ▽ More

    Submitted 7 June, 2023; v1 submitted 14 March, 2023; originally announced March 2023.

    Comments: Accepted for Publication at IEEE Access

  11. arXiv:2303.06746  [pdf, other

    cs.CR

    DNN-Alias: Deep Neural Network Protection Against Side-Channel Attacks via Layer Balancing

    Authors: Mahya Morid Ahmadi, Lilas Alrahis, Ozgur Sinanoglu, Muhammad Shafique

    Abstract: Extracting the architecture of layers of a given deep neural network (DNN) through hardware-based side channels allows adversaries to steal its intellectual property and even launch powerful adversarial attacks on the target system. In this work, we propose DNN-Alias, an obfuscation method for DNNs that forces all the layers in a given network to have similar execution traces, preventing attack mo… ▽ More

    Submitted 12 March, 2023; originally announced March 2023.

    Comments: 10 pages

  12. arXiv:2303.06486  [pdf, other

    cs.CR

    SHIELD: An Adaptive and Lightweight Defense against the Remote Power Side-Channel Attacks on Multi-tenant FPGAs

    Authors: Mahya Morid Ahmadi, Faiq Khalid, Radha Vaidya, Florian Kriebel, Andreas Steininger, Muhammad Shafique

    Abstract: Dynamic partial reconfiguration enables multi-tenancy in cloud-based FPGAs, which presents security challenges for tenants, IPs, and data. Malicious users can exploit FPGAs for remote side-channel attacks (SCAs), and shared on-chip resources can be used for attacks. Logical separation can ensure design integrity, but on-chip resources can still be exploited. Conventional SCA mitigation can help, b… ▽ More

    Submitted 11 March, 2023; originally announced March 2023.

    Comments: 11 pages, under review by IEEE ACCESS

  13. arXiv:2303.04734  [pdf, other

    cs.AR

    Xel-FPGAs: An End-to-End Automated Exploration Framework for Approximate Accelerators in FPGA-Based Systems

    Authors: Bharath Srinivas Prabakaran, Vojtech Mrazek, Zdenek Vasicek, Lukas Sekanina, Muhammad Shafique

    Abstract: Generation and exploration of approximate circuits and accelerators has been a prominent research domain to achieve energy-efficiency and/or performance improvements. This research has predominantly focused on ASICs, while not achieving similar gains when deployed for FPGA-based accelerator systems, due to the inherent architectural differences between the two. In this work, we propose a novel fra… ▽ More

    Submitted 8 August, 2023; v1 submitted 8 March, 2023; originally announced March 2023.

    Comments: Accepted for publication at the 42nd International Conference on Computer-Aided Design (ICCAD), November 2023, San Francisco, CA, USA

  14. arXiv:2303.03699  [pdf

    cs.DC

    An Edge-based WiFi Fingerprinting Indoor Localization Using Convolutional Neural Network and Convolutional Auto-Encoder

    Authors: Amin Kargar-Barzi, Ebrahim Farahmand, Nooshin Taheri Chatrudi, Ali Mahani, Muhammad Shafique

    Abstract: With the ongoing development of Indoor Location-Based Services, the location information of users in indoor environments has been a challenging issue in recent years. Due to the widespread use of WiFi networks, WiFi fingerprinting has become one of the most practical methods of locating mobile users. In addition to localization accuracy, some other critical factors such as latency, and users' priv… ▽ More

    Submitted 4 June, 2024; v1 submitted 7 March, 2023; originally announced March 2023.

  15. arXiv:2303.02495  [pdf, other

    cs.DC

    scaleTRIM: Scalable TRuncation-Based Integer Approximate Multiplier with Linearization and Compensation

    Authors: Ebrahim Farahmand, Ali Mahani, Behnam Ghavami, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Approximate computing (AC) has become a prominent solution to improve the performance, area, and power/energy efficiency of a digital design at the cost of output accuracy. We propose a novel scalable approximate multiplier that utilizes a lookup table-based compensation unit. To improve energy-efficiency, input operands are truncated to a reduced bitwidth representation (e.g., h bits) based on th… ▽ More

    Submitted 4 May, 2023; v1 submitted 4 March, 2023; originally announced March 2023.

  16. arXiv:2303.01826  [pdf, other

    cs.NE cs.AI cs.LG cs.RO

    TopSpark: A Timestep Optimization Methodology for Energy-Efficient Spiking Neural Networks on Autonomous Mobile Agents

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Shafique

    Abstract: Autonomous mobile agents require low-power/energy-efficient machine learning (ML) algorithms to complete their ML-based tasks while adapting to diverse environments, as mobile agents are usually powered by batteries. These requirements can be fulfilled by Spiking Neural Networks (SNNs) as they offer low power/energy processing due to their sparse computations and efficient online learning with bio… ▽ More

    Submitted 28 July, 2023; v1 submitted 3 March, 2023; originally announced March 2023.

    Comments: To appear at the IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), October 2023, Detroit, MI, USA

  17. arXiv:2303.01819  [pdf, other

    cs.LG cs.CR cs.CV

    Exploring Machine Learning Privacy/Utility trade-off from a hyperparameters Lens

    Authors: Ayoub Arous, Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: Machine Learning (ML) architectures have been applied to several applications that involve sensitive data, where a guarantee of users' data privacy is required. Differentially Private Stochastic Gradient Descent (DPSGD) is the state-of-the-art method to train privacy-preserving models. However, DPSGD comes at a considerable accuracy loss leading to sub-optimal privacy/utility trade-offs. Towards i… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  18. arXiv:2303.01734  [pdf, other

    cs.CV cs.CR

    AdvART: Adversarial Art for Camouflaged Object Detection Attacks

    Authors: Amira Guesmi, Ioan Marius Bilasco, Muhammad Shafique, Ihsen Alouani

    Abstract: Physical adversarial attacks pose a significant practical threat as it deceives deep learning systems operating in the real world by producing prominent and maliciously designed physical perturbations. Emphasizing the evaluation of naturalness is crucial in such attacks, as humans can readily detect and eliminate unnatural manipulations. To overcome this limitation, recent work has proposed levera… ▽ More

    Submitted 9 February, 2024; v1 submitted 3 March, 2023; originally announced March 2023.

  19. arXiv:2303.01351  [pdf, other

    cs.CV cs.RO

    APARATE: Adaptive Adversarial Patch for CNN-based Monocular Depth Estimation for Autonomous Navigation

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: In recent times, monocular depth estimation (MDE) has experienced significant advancements in performance, largely attributed to the integration of innovative architectures, i.e., convolutional neural networks (CNNs) and Transformers. Nevertheless, the susceptibility of these models to adversarial attacks has emerged as a noteworthy concern, especially in domains where safety and security are para… ▽ More

    Submitted 20 November, 2023; v1 submitted 2 March, 2023; originally announced March 2023.

  20. arXiv:2303.01338  [pdf, other

    cs.CV cs.CR

    AdvRain: Adversarial Raindrops to Attack Camera-based Smart Vision Systems

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Vision-based perception modules are increasingly deployed in many applications, especially autonomous vehicles and intelligent robots. These modules are being used to acquire information about the surroundings and identify obstacles. Hence, accurate detection and classification are essential to reach appropriate decisions and take appropriate and safe actions at all times. Current studies have dem… ▽ More

    Submitted 5 October, 2023; v1 submitted 2 March, 2023; originally announced March 2023.

  21. UnbiasedNets: A Dataset Diversification Framework for Robustness Bias Alleviation in Neural Networks

    Authors: Mahum Naseer, Bharath Srinivas Prabakaran, Osman Hasan, Muhammad Shafique

    Abstract: Performance of trained neural network (NN) models, in terms of testing accuracy, has improved remarkably over the past several years, especially with the advent of deep learning. However, even the most accurate NNs can be biased toward a specific output classification due to the inherent bias in the available training datasets, which may propagate to the real-world implementations. This paper deal… ▽ More

    Submitted 13 March, 2023; v1 submitted 24 February, 2023; originally announced February 2023.

    Comments: Springer Machine Learning 2023

    Journal ref: Machine Learning (2023) 1-28

  22. arXiv:2212.12620  [pdf, other

    cs.RO cs.AI cs.LG cs.NE

    Mantis: Enabling Energy-Efficient Autonomous Mobile Agents with Spiking Neural Networks

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Shafique

    Abstract: Autonomous mobile agents such as unmanned aerial vehicles (UAVs) and mobile robots have shown huge potential for improving human productivity. These mobile agents require low power/energy consumption to have a long lifespan since they are usually powered by batteries. These agents also need to adapt to changing/dynamic environments, especially when deployed in far or dangerous locations, thus requ… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

    Comments: To appear at the 2023 International Conference on Automation, Robotics and Applications (ICARA), February 2023, Abu Dhabi, UAE. arXiv admin note: text overlap with arXiv:2206.08656

  23. arXiv:2212.10289  [pdf, other

    cs.NI cs.CR

    ATLAS: An IoT Architecture and Secure Open-source Networking Stack for Anonymous Localization and Tracking Using Smartphones and Bluetooth Beacons

    Authors: Bharath Srinivas Prabakaran, Felix Fasching, Juri Schreib, Andreas Steininger, Muhammad Shafique

    Abstract: Bluetooth (BT) has revolutionized close-range communication enabling smart capabilities in everyday devices through wireless technology. One of the most important sub-domains of Internet-of-Things (IoT) specializes in the usage of BT technologies to develop smart homes and environments, which include hospitals, buildings, shop** facilities, etc. to offer a wide-range of features, like instantane… ▽ More

    Submitted 20 December, 2022; originally announced December 2022.

  24. arXiv:2211.16228  [pdf

    cs.CV cs.AI

    Building Resilience to Out-of-Distribution Visual Data via Input Optimization and Model Finetuning

    Authors: Christopher J. Holder, Majid Khonji, Jorge Dias, Muhammad Shafique

    Abstract: A major challenge in machine learning is resilience to out-of-distribution data, that is data that exists outside of the distribution of a model's training data. Training is often performed using limited, carefully curated datasets and so when a model is deployed there is often a significant distribution shift as edge cases and anomalies not included in the training data are encountered. To addres… ▽ More

    Submitted 29 November, 2022; originally announced November 2022.

  25. arXiv:2211.04718  [pdf

    cs.RO cs.AI cs.CV

    On the Application of Efficient Neural Map** to Real-Time Indoor Localisation for Unmanned Ground Vehicles

    Authors: Christopher J. Holder, Muhammad Shafique

    Abstract: Global localisation from visual data is a challenging problem applicable to many robotics domains. Prior works have shown that neural networks can be trained to map images of an environment to absolute camera pose within that environment, learning an implicit neural map** in the process. In this work we evaluate the applicability of such an approach to real-world robotics scenarios, demonstratin… ▽ More

    Submitted 2 January, 2024; v1 submitted 9 November, 2022; originally announced November 2022.

    Comments: \c{opyright} 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  26. AccelAT: A Framework for Accelerating the Adversarial Training of Deep Neural Networks through Accuracy Gradient

    Authors: Farzad Nikfam, Alberto Marchisio, Maurizio Martina, Muhammad Shafique

    Abstract: Adversarial training is exploited to develop a robust Deep Neural Network (DNN) model against the malicious altered data. These attacks may have catastrophic effects on DNN models but are indistinguishable for a human being. For example, an external attack can modify an image adding noises invisible for a human eye, but a DNN model misclassified the image. A key objective for develo** robust DNN… ▽ More

    Submitted 13 October, 2022; originally announced October 2022.

    Comments: 12 pages

  27. arXiv:2210.05276  [pdf, other

    cs.LG

    RoHNAS: A Neural Architecture Search Framework with Conjoint Optimization for Adversarial Robustness and Hardware Efficiency of Convolutional and Capsule Networks

    Authors: Alberto Marchisio, Vojtech Mrazek, Andrea Massa, Beatrice Bussolino, Maurizio Martina, Muhammad Shafique

    Abstract: Neural Architecture Search (NAS) algorithms aim at finding efficient Deep Neural Network (DNN) architectures for a given application under given system constraints. DNNs are computationally-complex as well as vulnerable to adversarial attacks. In order to address multiple design objectives, we propose RoHNAS, a novel NAS framework that jointly optimizes for adversarial-robustness and hardware-effi… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

    Comments: Accepted for publication at IEEE Access

  28. arXiv:2208.08554  [pdf, other

    cs.CR

    Embracing Graph Neural Networks for Hardware Security (Invited Paper)

    Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Shafique, Ozgur Sinanoglu

    Abstract: Graph neural networks (GNNs) have attracted increasing attention due to their superior performance in deep learning on graph-structured data. GNNs have succeeded across various domains such as social networks, chemistry, and electronic design automation (EDA). Electronic circuits have a long history of being represented as graphs, and to no surprise, GNNs have demonstrated state-of-the-art perform… ▽ More

    Submitted 17 August, 2022; originally announced August 2022.

    Comments: To appear at ICCAD 2022

  29. arXiv:2208.02253  [pdf, other

    cs.NE cs.LG

    LaneSNNs: Spiking Neural Networks for Lane Detection on the Loihi Neuromorphic Processor

    Authors: Alberto Viale, Alberto Marchisio, Maurizio Martina, Guido Masera, Muhammad Shafique

    Abstract: Autonomous Driving (AD) related features represent important elements for the next generation of mobile robots and autonomous vehicles focused on increasingly intelligent, autonomous, and interconnected systems. The applications involving the use of these features must provide, by definition, real-time decisions, and this property is key to avoid catastrophic accidents. Moreover, all the decision… ▽ More

    Submitted 3 August, 2022; originally announced August 2022.

    Comments: To appear at the 2022 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2022)

  30. arXiv:2208.00331  [pdf, other

    cs.AR cs.LG

    CoNLoCNN: Exploiting Correlation and Non-Uniform Quantization for Energy-Efficient Low-precision Deep Convolutional Neural Networks

    Authors: Muhammad Abdullah Hanif, Giuseppe Maria Sarda, Alberto Marchisio, Guido Masera, Maurizio Martina, Muhammad Shafique

    Abstract: In today's era of smart cyber-physical systems, Deep Neural Networks (DNNs) have become ubiquitous due to their state-of-the-art performance in complex real-world applications. The high computational complexity of these networks, which translates to increased energy consumption, is the foremost obstacle towards deploying large DNNs in resource-constrained systems. Fixed-Point (FP) implementations… ▽ More

    Submitted 30 July, 2022; originally announced August 2022.

    Comments: 8 pages, 15 figures, 2 tables

  31. enpheeph: A Fault Injection Framework for Spiking and Compressed Deep Neural Networks

    Authors: Alessio Colucci, Andreas Steininger, Muhammad Shafique

    Abstract: Research on Deep Neural Networks (DNNs) has focused on improving performance and accuracy for real-world deployments, leading to new models, such as Spiking Neural Networks (SNNs), and optimization techniques, e.g., quantization and pruning for compressed networks. However, the deployment of these innovative models and optimization techniques introduces possible reliability issues, which is a pill… ▽ More

    Submitted 30 July, 2022; originally announced August 2022.

    Comments: Source code: https://github.com/Alexei95/enpheeph To appear at 2022 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), October, 2022

  32. arXiv:2206.10200  [pdf, other

    cs.LG

    Enabling Capsule Networks at the Edge through Approximate Softmax and Squash Operations

    Authors: Alberto Marchisio, Beatrice Bussolino, Edoardo Salvati, Maurizio Martina, Guido Masera, Muhammad Shafique

    Abstract: Complex Deep Neural Networks such as Capsule Networks (CapsNets) exhibit high learning capabilities at the cost of compute-intensive operations. To enable their deployment on edge devices, we propose to leverage approximate computing for designing approximate variants of the complex operations like softmax and squash. In our experiments, we evaluate tradeoffs between area, power consumption, and c… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

    Comments: To appear at the ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED), August 2022, Boston, MA, USA

  33. arXiv:2206.08656  [pdf, other

    cs.NE cs.AI cs.AR cs.LG

    tinySNN: Towards Memory- and Energy-Efficient Spiking Neural Networks

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Shafique

    Abstract: Larger Spiking Neural Network (SNN) models are typically favorable as they can offer higher accuracy. However, employing such models on the resource- and energy-constrained embedded platforms is inefficient. Towards this, we present a tinySNN framework that optimizes the memory and energy requirements of SNN processing in both the training and inference phases, while kee** the accuracy high. It… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

    Comments: 9 figures

  34. arXiv:2206.08605  [pdf

    cs.CV cs.LG

    On Efficient Real-Time Semantic Segmentation: A Survey

    Authors: Christopher J. Holder, Muhammad Shafique

    Abstract: Semantic segmentation is the problem of assigning a class label to every pixel in an image, and is an important component of an autonomous vehicle vision stack for facilitating scene understanding and object detection. However, many of the top performing semantic segmentation models are extremely complex and cumbersome, and as such are not suited to deployment onboard autonomous vehicle platforms… ▽ More

    Submitted 16 August, 2022; v1 submitted 17 June, 2022; originally announced June 2022.

    Comments: 19 pages, 13 figures, 4 tables This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  35. arXiv:2206.00402  [pdf, other

    cs.CR cs.LG

    NeuroUnlock: Unlocking the Architecture of Obfuscated Deep Neural Networks

    Authors: Mahya Morid Ahmadi, Lilas Alrahis, Alessio Colucci, Ozgur Sinanoglu, Muhammad Shafique

    Abstract: The advancements of deep neural networks (DNNs) have led to their deployment in diverse settings, including safety and security-critical applications. As a result, the characteristics of these models have become sensitive intellectual properties that require protection from malicious users. Extracting the architecture of a DNN through leaky side-channels (e.g., memory access) allows adversaries to… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

    Comments: The definitive Version of Record will be Published in the 2022 International Joint Conference on Neural Networks (IJCNN)

  36. arXiv:2205.13807  [pdf, other

    cs.LG cs.CR

    fakeWeather: Adversarial Attacks for Deep Neural Networks Emulating Weather Conditions on the Camera Lens of Autonomous Systems

    Authors: Alberto Marchisio, Giovanni Caramia, Maurizio Martina, Muhammad Shafique

    Abstract: Recently, Deep Neural Networks (DNNs) have achieved remarkable performances in many applications, while several studies have enhanced their vulnerabilities to malicious attacks. In this paper, we emulate the effects of natural weather conditions to introduce plausible perturbations that mislead the DNNs. By observing the effects of such atmospheric perturbations on the camera lenses, we model the… ▽ More

    Submitted 27 May, 2022; originally announced May 2022.

    Comments: To appear at the 2022 International Joint Conference on Neural Networks (IJCNN), at the 2022 IEEE World Congress on Computational Intelligence (WCCI), July 2022, Padua, Italy

  37. arXiv:2205.12295  [pdf, other

    cs.NE cs.AI cs.AR cs.LG

    lpSpikeCon: Enabling Low-Precision Spiking Neural Network Processing for Efficient Unsupervised Continual Learning on Autonomous Agents

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Shafique

    Abstract: Recent advances have shown that SNN-based systems can efficiently perform unsupervised continual learning due to their bio-plausible learning rule, e.g., Spike-Timing-Dependent Plasticity (STDP). Such learning capabilities are especially beneficial for use cases like autonomous agents (e.g., robots and UAVs) that need to continuously adapt to dynamically changing scenarios/environments, where new… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

    Comments: To appear at the 2022 International Joint Conference on Neural Networks (IJCNN), the 2022 IEEE World Congress on Computational Intelligence (WCCI), July 2022, Padova, Italy

  38. arXiv:2204.09514  [pdf, other

    cs.AR cs.CR cs.CV cs.DC cs.LG

    Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems

    Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique

    Abstract: The real-world use cases of Machine Learning (ML) have exploded over the past few years. However, the current computing infrastructure is insufficient to support all real-world applications and scenarios. Apart from high efficiency requirements, modern ML systems are expected to be highly reliable against hardware failures as well as secure against adversarial and IP stealing attacks. Privacy conc… ▽ More

    Submitted 18 April, 2022; originally announced April 2022.

    Comments: Appears at 40th IEEE VLSI Test Symposium (VTS 2022), 14 pages

  39. arXiv:2203.09289  [pdf, other

    cs.LG cs.CR

    PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks

    Authors: Yue Wang, Wenqing Li, Esha Sarkar, Muhammad Shafique, Michail Maniatakos, Saif Eddin Jabari

    Abstract: Backdoor attacks impose a new threat in Deep Neural Networks (DNNs), where a backdoor is inserted into the neural network by poisoning the training dataset, misclassifying inputs that contain the adversary trigger. The major challenge for defending against these attacks is that only the attacker knows the secret trigger and the target class. The problem is further exacerbated by the recent introdu… ▽ More

    Submitted 26 March, 2022; v1 submitted 17 March, 2022; originally announced March 2022.

  40. arXiv:2203.05523  [pdf, other

    cs.AR cs.LG cs.NE

    SoftSNN: Low-Cost Fault Tolerance for Spiking Neural Network Accelerators under Soft Errors

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Specialized hardware accelerators have been designed and employed to maximize the performance efficiency of Spiking Neural Networks (SNNs). However, such accelerators are vulnerable to transient faults (i.e., soft errors), which occur due to high-energy particle strikes, and manifest as bit flips at the hardware layer. These errors can change the weight values and neuron operations in the compute… ▽ More

    Submitted 11 March, 2022; v1 submitted 10 March, 2022; originally announced March 2022.

    Comments: To appear at the 59th IEEE/ACM Design Automation Conference (DAC), July 2022, San Francisco, CA, USA

  41. arXiv:2112.07178  [pdf, other

    cs.CR

    MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction

    Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Shafique, Ozgur Sinanoglu

    Abstract: Logic locking has received considerable interest as a prominent technique for protecting the design intellectual property from untrusted entities, especially the foundry. Recently, machine learning (ML)-based attacks have questioned the security guarantees of logic locking, and have demonstrated considerable success in deciphering the secret key without relying on an oracle, hence, proving to be v… ▽ More

    Submitted 14 December, 2021; originally announced December 2021.

    Comments: Will be published in Proc. Design, Automation and Test in Europe (DATE) 2022

  42. arXiv:2111.07062  [pdf, other

    cs.CR

    UNTANGLE: Unlocking Routing and Logic Obfuscation Using Graph Neural Networks-based Link Prediction

    Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Abdullah Hanif, Muhammad Shafique, Ozgur Sinanoglu

    Abstract: Logic locking aims to prevent intellectual property (IP) piracy and unauthorized overproduction of integrated circuits (ICs). However, initial logic locking techniques were vulnerable to the Boolean satisfiability (SAT)-based attacks. In response, researchers proposed various SAT-resistant locking techniques such as point function-based locking and symmetric interconnection (SAT-hard) obfuscation.… ▽ More

    Submitted 13 November, 2021; originally announced November 2021.

    Comments: Published in 2021 International Conference On Computer-Aided Design (ICCAD)

  43. arXiv:2109.09829  [pdf, other

    cs.CR cs.AI cs.AR cs.LG cs.NE

    Towards Energy-Efficient and Secure Edge AI: A Cross-Layer Framework

    Authors: Muhammad Shafique, Alberto Marchisio, Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif

    Abstract: The security and privacy concerns along with the amount of data that is required to be processed on regular basis has pushed processing to the edge of the computing systems. Deploying advanced Neural Networks (NN), such as deep neural networks (DNNs) and spiking neural networks (SNNs), that offer state-of-the-art results on resource-constrained edge devices is challenging due to the stringent memo… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

    Comments: To appear at the 40th IEEE/ACM International Conference on Computer-Aided Design (ICCAD), November 2021, Virtual Event

  44. BioNetExplorer: Architecture-Space Exploration of Bio-Signal Processing Deep Neural Networks for Wearables

    Authors: Bharath Srinivas Prabakaran, Asima Akhtar, Semeen Rehman, Osman Hasan, Muhammad Shafique

    Abstract: In this work, we propose the BioNetExplorer framework to systematically generate and explore multiple DNN architectures for bio-signal processing in wearables. Our framework adapts key neural architecture parameters to search for an embedded DNN with a low hardware overhead, which can be deployed in wearable edge devices to analyse the bio-signal data and to extract the relevant information, such… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Journal ref: IEEE Internet of Things Journal (Volume: 8, Issue: 17, Sept.1, 1 2021)

  45. arXiv:2109.00533  [pdf, other

    cs.LG cs.CR cs.NE

    R-SNN: An Analysis and Design Methodology for Robustifying Spiking Neural Networks against Adversarial Attacks through Noise Filters for Dynamic Vision Sensors

    Authors: Alberto Marchisio, Giacomo Pira, Maurizio Martina, Guido Masera, Muhammad Shafique

    Abstract: Spiking Neural Networks (SNNs) aim at providing energy-efficient learning capabilities when implemented on neuromorphic chips with event-based Dynamic Vision Sensors (DVS). This paper studies the robustness of SNNs against adversarial attacks on such DVS-based systems, and proposes R-SNN, a novel methodology for robustifying SNNs through efficient DVS-noise filtering. We are the first to generate… ▽ More

    Submitted 1 September, 2021; originally announced September 2021.

    Comments: To appear at the 2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2021). arXiv admin note: text overlap with arXiv:2107.00415

  46. ReSpawn: Energy-Efficient Fault-Tolerance for Spiking Neural Networks considering Unreliable Memories

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Spiking neural networks (SNNs) have shown a potential for having low energy with unsupervised learning capabilities due to their biologically-inspired computation. However, they may suffer from accuracy degradation if their processing is performed under the presence of hardware-induced faults in memories, which can come from manufacturing defects or voltage-induced approximation errors. Since rece… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

    Comments: To appear at the 40th IEEE/ACM International Conference on Computer-Aided Design (ICCAD), November 2021, Virtual Event

  47. Q-SpiNN: A Framework for Quantizing Spiking Neural Networks

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Shafique

    Abstract: A prominent technique for reducing the memory footprint of Spiking Neural Networks (SNNs) without decreasing the accuracy significantly is quantization. However, the state-of-the-art only focus on employing the weight quantization directly from a specific quantization scheme, i.e., either the post-training quantization (PTQ) or the in-training quantization (ITQ), and do not consider (1) quantizing… ▽ More

    Submitted 5 July, 2021; originally announced July 2021.

    Comments: Accepted for publication at the 2021 International Joint Conference on Neural Networks (IJCNN), July 2021, Virtual Event

  48. arXiv:2107.00415  [pdf, other

    cs.CV cs.LG

    DVS-Attacks: Adversarial Attacks on Dynamic Vision Sensors for Spiking Neural Networks

    Authors: Alberto Marchisio, Giacomo Pira, Maurizio Martina, Guido Masera, Muhammad Shafique

    Abstract: Spiking Neural Networks (SNNs), despite being energy-efficient when implemented on neuromorphic hardware and coupled with event-based Dynamic Vision Sensors (DVS), are vulnerable to security threats, such as adversarial attacks, i.e., small perturbations added to the input for inducing a misclassification. Toward this, we propose DVS-Attacks, a set of stealthy yet efficient adversarial attack meth… ▽ More

    Submitted 1 July, 2021; originally announced July 2021.

    Comments: Accepted for publication at IJCNN 2021

  49. arXiv:2107.00401  [pdf, other

    cs.NE cs.LG

    CarSNN: An Efficient Spiking Neural Network for Event-Based Autonomous Cars on the Loihi Neuromorphic Research Processor

    Authors: Alberto Viale, Alberto Marchisio, Maurizio Martina, Guido Masera, Muhammad Shafique

    Abstract: Autonomous Driving (AD) related features provide new forms of mobility that are also beneficial for other kind of intelligent and autonomous systems like robots, smart transportation, and smart industries. For these applications, the decisions need to be made fast and in real-time. Moreover, in the quest for electric mobility, this task must follow low power policy, without affecting much the auto… ▽ More

    Submitted 1 July, 2021; originally announced July 2021.

    Comments: Accepted for publication at IJCNN 2021

  50. arXiv:2106.08877  [pdf, other

    cs.CR cs.AR

    Side-Channel Attacks on RISC-V Processors: Current Progress, Challenges, and Opportunities

    Authors: Mahya Morid Ahmadi, Faiq Khalid, Muhammad Shafique

    Abstract: Side-channel attacks on microprocessors, like the RISC-V, exhibit security vulnerabilities that lead to several design challenges. Hence, it is imperative to study and analyze these security vulnerabilities comprehensively. In this paper, we present a brief yet comprehensive study of the security vulnerabilities in modern microprocessors with respect to side-channel attacks and their respective mi… ▽ More

    Submitted 16 June, 2021; originally announced June 2021.

    Comments: CYBER 2020, The Fifth International Conference on Cyber-Technologies and Cyber-Systems