Skip to main content

Showing 1–31 of 31 results for author: Fouda, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.10689  [pdf, other

    cs.LG eess.SP

    Network architecture search of X-ray based scientific applications

    Authors: Adarsha Balaji, Ramyad Hadidi, Gregory Kollmer, Mohammed E. Fouda, Prasanna Balaprakash

    Abstract: X-ray and electron diffraction-based microscopy use bragg peak detection and ptychography to perform 3-D imaging at an atomic resolution. Typically, these techniques are implemented using computationally complex tasks such as a Psuedo-Voigt function or solving a complex inverse problem. Recently, the use of deep neural networks has improved the existing state-of-the-art approaches. However, the de… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

  2. arXiv:2309.11462  [pdf, other

    cs.CR cs.AI cs.LG eess.AS

    AudioFool: Fast, Universal and synchronization-free Cross-Domain Attack on Speech Recognition

    Authors: Mohamad Fakih, Rouwaida Kanj, Fadi Kurdahi, Mohammed E. Fouda

    Abstract: Automatic Speech Recognition systems have been shown to be vulnerable to adversarial attacks that manipulate the command executed on the device. Recent research has focused on exploring methods to create such attacks, however, some issues relating to Over-The-Air (OTA) attacks have not been properly addressed. In our work, we examine the needed properties of robust attacks compatible with the OTA… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

    Comments: 10 pages, 11 Figures

  3. A Survey on Multi-AP Coordination Approaches over Emerging WLANs: Future Directions and Open Challenges

    Authors: Shikhar Verma, Tiago Koketsu Rodrigues, Yuichi Kawamoto, Mostafa M. Fouda, Nei Kato

    Abstract: Recent advancements in wireless local area network (WLAN) technology include IEEE 802.11be and 802.11ay, often known as Wi-Fi 7 and WiGig, respectively. The goal of these developments is to provide Extremely High Throughput (EHT) and low latency to meet the demands of future applications like as 8K videos, augmented and virtual reality, the Internet of Things, telesurgery, and other develo** tec… ▽ More

    Submitted 19 December, 2023; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: The reason for the replacement of the previous version of the paper is due to a change in the author's list. As a result, a new version has been created, which serves as the final draft version before acceptance. This updated version contains all the latest changes and improvements made to the paper

  4. arXiv:2305.19295  [pdf, other

    cs.NE

    Low Precision Quantization-aware Training in Spiking Neural Networks with Differentiable Quantization Function

    Authors: Ayan Shymyrbay, Mohammed E. Fouda, Ahmed Eltawil

    Abstract: Deep neural networks have been proven to be highly effective tools in various domains, yet their computational and memory costs restrict them from being widely deployed on portable devices. The recent rapid increase of edge computing devices has led to an active search for techniques to address the above-mentioned limitations of machine learning frameworks. The quantization of artificial neural ne… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: 8 pages, 5 Figures, accepted at IJCNN'23

  5. arXiv:2303.15731  [pdf, other

    cs.NI

    Smart Handover with Predicted User Behavior using Convolutional Neural Networks for WiGig Systems

    Authors: Tiago Koketsu Rodrigues, Shikhar Verma, Yuichi Kawamoto, Nei Kato, Mostafa M. Fouda, Muhammad Ismail

    Abstract: WiGig networks and 60 GHz frequency communications have a lot of potential for commercial and personal use. They can offer extremely high transmission rates but at the cost of low range and penetration. Due to these issues, WiGig systems are unstable and need to rely on frequent handovers to maintain high-quality connections. However, this solution is problematic as it forces users into bad connec… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: Submitted to IEEE Network

  6. arXiv:2212.13707  [pdf, other

    cs.AR cs.LG

    Thermal Heating in ReRAM Crossbar Arrays: Challenges and Solutions

    Authors: Kamilya Smagulova, Mohammed E. Fouda, Ahmed Eltawil

    Abstract: The higher speed, scalability and parallelism offered by ReRAM crossbar arrays foster development of ReRAM-based next generation AI accelerators. At the same time, sensitivity of ReRAM to temperature variations decreases R_on/Roff ratio and negatively affects the achieved accuracy and reliability of the hardware. Various works on temperature-aware optimization and remap** in ReRAM crossbar array… ▽ More

    Submitted 31 January, 2023; v1 submitted 28 December, 2022; originally announced December 2022.

    Comments: 18 pages

  7. arXiv:2210.11469  [pdf, other

    cs.CV

    G2NetPL: Generic Game-Theoretic Network for Partial-Label Image Classification

    Authors: Rabab Abdelfattah, Xin Zhang, Mostafa M. Fouda, Xiaofeng Wang, Song Wang

    Abstract: Multi-label image classification aims to predict all possible labels in an image. It is usually formulated as a partial-label learning problem, since it could be expensive in practice to annotate all the labels in every training image. Existing works on partial-label learning focus on the case where each training image is labeled with only a subset of its positive/negative labels. To effectively a… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

    Comments: Accepted by BMVC2022

  8. arXiv:2208.06064  [pdf, other

    cs.LG cs.AI

    Mixed-Precision Neural Networks: A Survey

    Authors: Mariam Rakka, Mohammed E. Fouda, Pramod Khargonekar, Fadi Kurdahi

    Abstract: Mixed-precision Deep Neural Networks achieve the energy efficiency and throughput needed for hardware deployment, particularly when the resources are limited, without sacrificing accuracy. However, the optimal per-layer bit precision that preserves accuracy is not easily found, especially with the abundance of models, datasets, and quantization techniques that creates an enormous search space. In… ▽ More

    Submitted 11 August, 2022; originally announced August 2022.

  9. arXiv:2205.15505  [pdf, other

    cs.AR cs.ET q-bio.GN

    DNA Pattern Matching Acceleration with Analog Resistive CAM

    Authors: **ane Bazzi, Jana Sweidan, Mohammed E. Fouda, Rouwaida Kanj, Ahmed M. Eltawil

    Abstract: DNA pattern matching is essential for many widely used bioinformatics applications. Disease diagnosis is one of these applications, since analyzing changes in DNA sequences can increase our understanding of possible genetic diseases. The remarkable growth in the size of DNA datasets has resulted in challenges in discovering DNA patterns efficiently in terms of run time and power consumption. In th… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

  10. arXiv:2205.07141  [pdf, other

    cs.LG cs.AI

    BackLink: Supervised Local Training with Backward Links

    Authors: Wenzhe Guo, Mohammed E Fouda, Ahmed M. Eltawil, Khaled N. Salama

    Abstract: Empowered by the backpropagation (BP) algorithm, deep neural networks have dominated the race in solving various cognitive tasks. The restricted training pattern in the standard BP requires end-to-end error propagation, causing large memory cost and prohibiting model parallelization. Existing local training methods aim to resolve the training obstacle by completely cutting off the backward path be… ▽ More

    Submitted 14 May, 2022; originally announced May 2022.

  11. arXiv:2204.06114  [pdf, other

    cs.AR cs.LG

    DT2CAM: A Decision Tree to Content Addressable Memory Framework

    Authors: Mariam Rakka, Mohammed E. Fouda, Rouwaida Kanj, Fadi Kurdahi

    Abstract: Decision trees are considered one of the most powerful tools for data classification. Accelerating the decision tree search is crucial for on-the-edge applications that have limited power and latency budget. In this paper, we propose a Content Addressable Memory (CAM) Compiler for Decision Tree (DT) inference acceleration. We propose a novel "adaptive-precision" scheme that results in a compact im… ▽ More

    Submitted 12 April, 2022; originally announced April 2022.

  12. arXiv:2203.02500  [pdf, other

    cs.AR cs.ET

    Efficient Analog CAM Design

    Authors: **ane Bazzi, Jana Sweidan, Mohammed E. Fouda, Rouwaida Kanj, Ahmed M. Eltawil

    Abstract: Content Addressable Memories (CAMs) are considered a key-enabler for in-memory computing (IMC). IMC shows order of magnitude improvement in energy efficiency and throughput compared to traditional computing techniques. Recently, analog CAMs (aCAMs) were proposed as a means to improve storage density and energy efficiency. In this work, we propose two new aCAM cells to improve data encoding and rob… ▽ More

    Submitted 4 March, 2022; originally announced March 2022.

    Comments: This is a revised manuscript that is under consideration for publication at IEEE TCAS-I

  13. arXiv:2203.00662  [pdf, other

    cs.ET cs.AR

    In-memory Associative Processors: Tutorial, Potential, and Challenges

    Authors: Mohammed E. Fouda, Hasan Erdem Yantir, Ahmed M. Eltawil, Fadi Kurdahi

    Abstract: In-memory computing is an emerging computing paradigm that overcomes the limitations of exiting Von-Neumann computing architectures such as the memory-wall bottleneck. In such paradigm, the computations are performed directly on the data stored in the memory, which highly reduces the memory-processor communications during computation. Hence, significant speedup and energy savings could be achieved… ▽ More

    Submitted 12 April, 2022; v1 submitted 1 March, 2022; originally announced March 2022.

    Comments: 7 pages

  14. arXiv:2201.07210  [pdf

    cs.NE cs.LG eess.SP

    Efficient Training of Spiking Neural Networks with Temporally-Truncated Local Backpropagation through Time

    Authors: Wenzhe Guo, Mohammed E. Fouda, Ahmed M. Eltawil, Khaled Nabil Salama

    Abstract: Directly training spiking neural networks (SNNs) has remained challenging due to complex neural dynamics and intrinsic non-differentiability in firing functions. The well-known backpropagation through time (BPTT) algorithm proposed to train SNNs suffers from large memory footprint and prohibits backward and update unlocking, making it impossible to exploit the potential of locally-supervised train… ▽ More

    Submitted 13 December, 2021; originally announced January 2022.

    Comments: 16

  15. arXiv:2110.11459  [pdf, other

    cs.CR

    CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering

    Authors: Amir Hosein Afandizadeh Zargari, Marzieh AshrafiAmiri, Minjun Seo, Sai Manoj Pudukotai Dinakarrao, Mohammed E. Fouda, Fadi Kurdahi

    Abstract: Reverse engineering (RE) in Integrated Circuits (IC) is a process in which one will attempt to extract the internals of an IC, extract the circuit structure, and determine the gate-level information of an IC. In general, RE process can be done for validation as well as intellectual property (IP) stealing intentions. In addition, RE also facilitates different illicit activities such as insertion of… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

  16. arXiv:2110.09643  [pdf, other

    cs.AR

    In-memory Multi-valued Associative Processor

    Authors: Mira Hout, Mohammed E. Fouda, Rouwaida Kanj, Ahmed M. Eltawil

    Abstract: In-memory associative processor architectures are offered as a great candidate to overcome memory-wall bottleneck and to enable vector/parallel arithmetic operations. In this paper, we extend the functionality of the associative processor to multi-valued arithmetic. To allow for in-memory compute implementation of arithmetic or logic functions, we propose a structured methodology enabling the auto… ▽ More

    Submitted 18 October, 2021; originally announced October 2021.

  17. arXiv:2109.05136  [pdf, other

    quant-ph cs.IT eess.SP

    Efficient Noise Mitigation Technique for Quantum Computing

    Authors: Ali Shaib, Mohamad H. Naim, Mohammed E. Fouda, Rouwaida Kanj, Fadi Kurdahi

    Abstract: Quantum computers have enabled solving problems beyond the current computers' capabilities. However, this requires handling noise arising from unwanted interactions in these systems. Several protocols have been proposed to address efficient and accurate quantum noise profiling and mitigation. In this work, we propose a novel protocol that efficiently estimates the average output of a noisy quantum… ▽ More

    Submitted 10 September, 2021; originally announced September 2021.

  18. arXiv:2109.03934  [pdf, other

    cs.AR cs.NE

    Resistive Neural Hardware Accelerators

    Authors: Kamilya Smagulova, Mohammed E. Fouda, Fadi Kurdahi, Khaled Salama, Ahmed Eltawil

    Abstract: Deep Neural Networks (DNNs), as a subset of Machine Learning (ML) techniques, entail that real-world data can be learned and that decisions can be made in real-time. However, their wide adoption is hindered by a number of software and hardware limitations. The existing general-purpose hardware platforms used to accelerate DNNs are facing new challenges associated with the growing amount of data an… ▽ More

    Submitted 8 September, 2021; originally announced September 2021.

  19. arXiv:2012.01983  [pdf, other

    cs.CR cs.LG

    Detection of False-Reading Attacks in the AMI Net-Metering System

    Authors: Mahmoud M. Badr, Mohamed I. Ibrahem, Mohamed Mahmoud, Mostafa M. Fouda, Waleed Alasmary

    Abstract: In smart grid, malicious customers may compromise their smart meters (SMs) to report false readings to achieve financial gains illegally. Reporting false readings not only causes hefty financial losses to the utility but may also degrade the grid performance because the reported readings are used for energy management. This paper is the first work that investigates this problem in the net-metering… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

  20. arXiv:2011.10852  [pdf, other

    cs.NE cs.ET

    On-Chip Error-triggered Learning of Multi-layer Memristive Spiking Neural Networks

    Authors: Melika Payvand, Mohammed E. Fouda, Fadi Kurdahi, Ahmed M. Eltawil, Emre O. Neftci

    Abstract: Recent breakthroughs in neuromorphic computing show that local forms of gradient descent learning are compatible with Spiking Neural Networks (SNNs) and synaptic plasticity. Although SNNs can be scalably implemented using neuromorphic VLSI, an architecture that can learn using gradient-descent in situ is still missing. In this paper, we propose a local, gradient-based, error-triggered learning alg… ▽ More

    Submitted 21 November, 2020; originally announced November 2020.

    Comments: 15 pages, 11 figures, Journal of Emerging Technology in Circuits and Systems (JETCAS)

  21. arXiv:2011.03814  [pdf, other

    cs.CR

    Privacy-Preserving and Efficient Data Collection Scheme for AMI Networks Using Deep Learning

    Authors: Mohamed I. Ibrahem, Mohamed Mahmoud, Mostafa M. Fouda, Fawaz Alsolami, Waleed Alasmary, Xuemin, Shen

    Abstract: In advanced metering infrastructure (AMI), smart meters (SMs), which are installed at the consumer side, send fine-grained power consumption readings periodically to the electricity utility for load monitoring and energy management. Change and transmit (CAT) is an efficient approach to collect these readings, where the readings are not transmitted when there is no enough change in consumption. How… ▽ More

    Submitted 7 November, 2020; originally announced November 2020.

    Comments: 16 pages, 11 figures

  22. arXiv:2005.13813  [pdf, other

    cs.CR eess.SP

    Detection of Lying Electrical Vehicles in Charging Coordination Application Using Deep Learning

    Authors: Ahmed Shafee, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Abdulah J. Aljohani, Fathi Amsaad

    Abstract: The simultaneous charging of many electric vehicles (EVs) stresses the distribution system and may cause grid instability in severe cases. The best way to avoid this problem is by charging coordination. The idea is that the EVs should report data (such as state-of-charge (SoC) of the battery) to run a mechanism to prioritize the charging requests and select the EVs that should charge during this t… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

  23. arXiv:2005.13793  [pdf, other

    cs.CR

    Efficient Privacy-Preserving Electricity Theft Detection with Dynamic Billing and Load Monitoring for AMI Networks

    Authors: Mohamed I. Ibrahem, Mahmoud Nabil, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Fawaz Alsolami

    Abstract: In advanced metering infrastructure (AMI), smart meters (SMs) are installed at the consumer side to send fine-grained power consumption readings periodically to the system operator (SO) for load monitoring, energy management, billing, etc. However, fraudulent consumers launch electricity theft cyber-attacks by reporting false readings to reduce their bills illegally. These attacks do not only caus… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

    Comments: 14 pages, 6 figures

  24. arXiv:2001.00962  [pdf, other

    eess.SP cs.IT

    Application of ICA on Self-Interference Cancellation of In-band Full Duplex Systems

    Authors: Mohammed E. Fouda, Sergey Shaboyan, Ayman Elezabi, Ahmed Eltawil

    Abstract: In this letter, we propose a modified version of Fast Independent Component Analysis (FICA) algorithm to solve the self-interference cancellation (SIC) problem in In-band Full Duplex (IBFD) communication systems. The complex mixing problem is mathematically formulated to suit the real-valued blind source separation (BSS) algorithms. In addition, we propose a method to estimate the ambiguity factor… ▽ More

    Submitted 3 January, 2020; originally announced January 2020.

  25. arXiv:1911.03127  [pdf, ps, other

    eess.SP cs.LG physics.app-ph

    AI Aided Noise Processing of Spintronic Based IoT Sensor for Magnetocardiography Application

    Authors: Attayeb Mohsen, Muftah Al-Mahdawi, Mostafa M. Fouda, Mikihiko Oogane, Yasuo Ando, Zubair Md Fadlullah

    Abstract: As we are about to embark upon the highly hyped "Society 5.0", powered by the Internet of Things (IoT), traditional ways to monitor human heart signals for tracking cardio-vascular conditions are challenging, particularly in remote healthcare settings. On the merits of low power consumption, portability, and non-intrusiveness, there are no suitable IoT solutions that can provide information compar… ▽ More

    Submitted 10 June, 2020; v1 submitted 8 November, 2019; originally announced November 2019.

    Comments: Presented at IEEE International Conference on Communications 2020

  26. arXiv:1910.06152  [pdf, other

    cs.ET

    Error-triggered Three-Factor Learning Dynamics for Crossbar Arrays

    Authors: Melika Payvand, Mohammed Fouda, Fadi Kurdahi, Ahmed Eltawil, Emre O. Neftci

    Abstract: Recent breakthroughs suggest that local, approximate gradient descent learning is compatible with Spiking Neural Networks (SNNs). Although SNNs can be scalably implemented using neuromorphic VLSI, an architecture that can learn in-situ as accurately as conventional processors is still missing. Here, we propose a subthreshold circuit architecture designed through insights obtained from machine lear… ▽ More

    Submitted 14 October, 2019; originally announced October 2019.

  27. arXiv:1909.01771  [pdf, other

    cs.ET

    Spiking Neural Networks for Inference and Learning: A Memristor-based Design Perspective

    Authors: M. E. Fouda, F. Kurdahi, A. Eltawil, E. Neftci

    Abstract: On metrics of density and power efficiency, neuromorphic technologies have the potential to surpass mainstream computing technologies in tasks where real-time functionality, adaptability, and autonomy are essential. While algorithmic advances in neuromorphic computing are proceeding successfully, the potential of memristors to improve neuromorphic computing have not yet born fruit, primarily becau… ▽ More

    Submitted 8 October, 2019; v1 submitted 4 September, 2019; originally announced September 2019.

  28. arXiv:1905.00919  [pdf, other

    cs.CR cs.LG stat.ML

    Mimic Learning to Generate a Shareable Network Intrusion Detection Model

    Authors: Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud

    Abstract: Purveyors of malicious network attacks continue to increase the complexity and the sophistication of their techniques, and their ability to evade detection continues to improve as well. Hence, intrusion detection systems must also evolve to meet these increasingly challenging threats. Machine learning is often used to support this needed improvement. However, training a good prediction model can r… ▽ More

    Submitted 18 February, 2020; v1 submitted 2 May, 2019; originally announced May 2019.

  29. arXiv:1904.08966  [pdf, other

    cs.IT

    Non-Stationary Polar Codes for Resistive Memories

    Authors: Marwen Zorgui, Mohammed E. Fouda, Zhiying Wang, Ahmed M. Eltawil, Fadi Kurdahi

    Abstract: Resistive memories are considered a promising memory technology enabling high storage densities with in-memory computing capabilities. However, the readout reliability of resistive memories is impaired due to the inevitable existence of wire resistance, resulting in the sneak path problem. Motivated by this problem, we study polar coding over channels with different reliability levels, termed non-… ▽ More

    Submitted 18 April, 2019; originally announced April 2019.

  30. arXiv:1903.01512  [pdf, other

    cs.ET cs.AR

    On Resistive Memories: One Step Row Readout Technique and Sensing Circuitry

    Authors: Mohammed E Fouda, Ahmed M. Eltawil, Fadi Kurdahi

    Abstract: Transistor-based memories are rapidly approaching their maximum density per unit area. Resistive crossbar arrays enable denser memory due to the small size of switching devices. However, due to the resistive nature of these memories, they suffer from current sneak paths complicating the readout procedure. In this paper, we propose a row readout technique with circuitry that can be used to read {se… ▽ More

    Submitted 4 March, 2019; originally announced March 2019.

  31. arXiv:1409.3024  [pdf

    cs.CV

    One-Dimensional Vector based Pattern Matching

    Authors: Y. M. Fouda

    Abstract: Template matching is a basic method in image analysis to extract useful information from images. In this paper, we suggest a new method for pattern matching. Our method transform the template image from two dimensional image into one dimensional vector. Also all sub-windows (same size of template) in the reference image will transform into one dimensional vectors. The three similarity measures SAD… ▽ More

    Submitted 10 September, 2014; originally announced September 2014.