Skip to main content

Showing 1–3 of 3 results for author: D, S M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.06713  [pdf, other

    cs.NI

    Open RAN: Evolution of Architecture, Deployment Aspects, and Future Directions

    Authors: Prabhu Kaliyammal Thiruvasagam, Chandrasekar T, Vinay Venkataram, Vivek Raja Ilangovan, Maneesha Perapalla, Rajisha Payyanur, Senthilnathan M D, Vishal Kumar, Kokila J

    Abstract: The Open Radio Access Network (Open RAN) aims to enable disaggregated, virtualized, programmable, and data-driven intelligent network with open interfaces to support various real-time and non-real-time applications for different classes of users and multiple industry verticals in beyond 5G and 6G networks while providing interoperability among multi-vendor network functions and components. In this… ▽ More

    Submitted 17 January, 2023; originally announced January 2023.

  2. arXiv:2204.03694  [pdf, other

    cs.LG cs.CV

    Adaptive-Gravity: A Defense Against Adversarial Samples

    Authors: Ali Mirzaeian, Zhi Tian, Sai Manoj P D, Banafsheh S. Latibari, Ioannis Savidis, Houman Homayoun, Avesta Sasan

    Abstract: This paper presents a novel model training solution, denoted as Adaptive-Gravity, for enhancing the robustness of deep neural network classifiers against adversarial examples. We conceptualize the model parameters/features associated with each class as a mass characterized by its centroid location and the spread (standard deviation of the distance) of features around the centroid. We use the centr… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

  3. arXiv:1902.05357  [pdf, other

    cs.CR cs.AI cs.CG cs.LG

    Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning

    Authors: Zhiqian Chen, Gaurav Kolhe, Setareh Rafatirad, Sai Manoj P. D., Houman Homayoun, Liang Zhao, Chang-Tien Lu

    Abstract: Circuit obfuscation is a recently proposed defense mechanism to protect digital integrated circuits (ICs) from reverse engineering by using camouflaged gates i.e., logic gates whose functionality cannot be precisely determined by the attacker. There have been effective schemes such as satisfiability-checking (SAT)-based attacks that can potentially decrypt obfuscated circuits, called deobfuscation… ▽ More

    Submitted 21 March, 2020; v1 submitted 14 February, 2019; originally announced February 2019.

    Comments: Design, Automation and Test in Europe (DATE) 2020