-
BuDDIE: A Business Document Dataset for Multi-task Information Extraction
Authors:
Ran Zmigrod,
Dongsheng Wang,
Mathieu Sibue,
Yulong Pei,
Petr Babkin,
Ivan Brugere,
Xiaomo Liu,
Nacho Navarro,
Antony Papadimitriou,
William Watson,
Zhiqiang Ma,
Armineh Nourbakhsh,
Sameena Shah
Abstract:
The field of visually rich document understanding (VRDU) aims to solve a multitude of well-researched NLP tasks in a multi-modal domain. Several datasets exist for research on specific tasks of VRDU such as document classification (DC), key entity extraction (KEE), entity linking, visual question answering (VQA), inter alia. These datasets cover documents like invoices and receipts with sparse ann…
▽ More
The field of visually rich document understanding (VRDU) aims to solve a multitude of well-researched NLP tasks in a multi-modal domain. Several datasets exist for research on specific tasks of VRDU such as document classification (DC), key entity extraction (KEE), entity linking, visual question answering (VQA), inter alia. These datasets cover documents like invoices and receipts with sparse annotations such that they support one or two co-related tasks (e.g., entity extraction and entity linking). Unfortunately, only focusing on a single specific of documents or task is not representative of how documents often need to be processed in the wild - where variety in style and requirements is expected. In this paper, we introduce BuDDIE (Business Document Dataset for Information Extraction), the first multi-task dataset of 1,665 real-world business documents that contains rich and dense annotations for DC, KEE, and VQA. Our dataset consists of publicly available business entity documents from US state government websites. The documents are structured and vary in their style and layout across states and types (e.g., forms, certificates, reports, etc.). We provide data variety and quality metrics for BuDDIE as well as a series of baselines for each task. Our baselines cover traditional textual, multi-modal, and large language model approaches to VRDU.
△ Less
Submitted 5 April, 2024;
originally announced April 2024.
-
Analyzing the Single Event Upset Vulnerability of Binarized Neural Networks on SRAM FPGAs
Authors:
Ioanna Souvatzoglou,
Athanasios Papadimitriou,
Aitzan Sari,
Vasileios Vlagkoulis,
Mihalis Psarakis
Abstract:
Neural Networks (NNs) are increasingly used in the last decade in several demanding applications, such as object detection and classification, autonomous driving, etc. Among different computing platforms for implementing NNs, FPGAs have multiple advantages due to design flexibility and high performance-to-watt ratio. Moreover, approximation techniques, such as quantization, have been introduced, w…
▽ More
Neural Networks (NNs) are increasingly used in the last decade in several demanding applications, such as object detection and classification, autonomous driving, etc. Among different computing platforms for implementing NNs, FPGAs have multiple advantages due to design flexibility and high performance-to-watt ratio. Moreover, approximation techniques, such as quantization, have been introduced, which reduce the computational and storage requirements, thus enabling the integration of larger NNs into FPGA devices. On the other hand, FPGAs are sensitive to radiation-induced Single Event Upsets (SEUs). In this work, we perform an in-depth reliability analysis in an FPGA-based Binarized Fully Connected Neural Network (BNN) accelerator running a statistical fault injection campaign. The BNN benchmark has been produced by FINN, an open-source framework that provides an end-to-end flow from abstract level to design, making it easy to design customized FPGA NN accelerators, while it also supports various approximation techniques. The campaign includes the injection of faults in the configuration memory of a state-of-the-art Xilinx Ultrascale+ FPGA running the BNN, as well an exhaustive fault injection in the user flip flops. We have analyzed the fault injection results characterizing the SEU vulnerability of the circuit per network layer, per clock cycle, and register. In general, the results show that the BNNs are inherently resilient to soft errors, since a low portion of SEUs in the configuration memory and the flip flops, cause system crashes or misclassification errors.
△ Less
Submitted 2 April, 2024;
originally announced April 2024.
-
On the Prediction of Hardware Security Properties of HLS Designs Using Graph Neural Networks
Authors:
Amalia Artemis Koufopoulou,
Athanasios Papadimitriou,
Aggelos Pikrakis,
Mihalis Psarakis,
David Hely
Abstract:
High-level synthesis (HLS) tools have provided significant productivity enhancements to the design flow of digital systems in recent years, resulting in highly-optimized circuits, in terms of area and latency. Given the evolution of hardware attacks, which can render them vulnerable, it is essential to consider security as a significant aspect of the HLS design flow. Yet the need to evaluate a hug…
▽ More
High-level synthesis (HLS) tools have provided significant productivity enhancements to the design flow of digital systems in recent years, resulting in highly-optimized circuits, in terms of area and latency. Given the evolution of hardware attacks, which can render them vulnerable, it is essential to consider security as a significant aspect of the HLS design flow. Yet the need to evaluate a huge number of functionally equivalent de-signs of the HLS design space challenges hardware security evaluation methods (e.g., fault injection - FI campaigns). In this work, we propose an evaluation methodology of hardware security properties of HLS-produced designs using state-of-the-art Graph Neural Network (GNN) approaches that achieves significant speedup and better scalability than typical evaluation methods (such as FI). We demonstrate the proposed methodology on a Double Modular Redundancy (DMR) coun-termeasure applied on an AES SBox implementation, en-hanced by diversifying the redundant modules through HLS directives. The experimental results show that GNNs can be efficiently trained to predict important hardware security met-rics concerning fault attacks (e.g., critical and detection error rates), by using regression. The proposed method predicts the fault vulnerability metrics of the HLS-based designs with high R-squared scores and achieves huge speedup compared to fault injection once the training of the GNN is completed.
△ Less
Submitted 11 December, 2023;
originally announced December 2023.
-
Security and Reliability Evaluation of Countermeasures implemented using High-Level Synthesis
Authors:
Amalia Artemis Koufopoulou,
Kalliopi Xevgeni,
Athanasios Papadimitriou,
Mihalis Psarakis,
David Hely
Abstract:
As the complexity of digital circuits increases, High-Level Synthesis (HLS) is becoming a valuable tool to increase productivity and design reuse by utilizing relevant Electronic Design Automation (EDA) flows, either for Application-Specific Integrated Circuits (ASIC) or for Field Programmable Gate Arrays (FPGA). Side Channel Analysis (SCA) and Fault Injection (FI) attacks are powerful hardware at…
▽ More
As the complexity of digital circuits increases, High-Level Synthesis (HLS) is becoming a valuable tool to increase productivity and design reuse by utilizing relevant Electronic Design Automation (EDA) flows, either for Application-Specific Integrated Circuits (ASIC) or for Field Programmable Gate Arrays (FPGA). Side Channel Analysis (SCA) and Fault Injection (FI) attacks are powerful hardware attacks, capable of greatly weakening the theoretical security levels of secure implementations. Furthermore, critical applications demand high levels of reliability including fault tolerance. The lack of security and reliability driven optimizations in HLS tools makes it necessary for the HLS-based designs to validate that the properties of the algorithm and the countermeasures have not been compromised due to the HLS flow. In this work, we provide results on the resilience evaluation of HLS-based FPGA implementations for the aforementioned threats. As a test case, we use multiple versions of an on-the-fly SBOX algorithm integrating different countermeasures (hiding and masking), written in C and implemented using Vivado HLS. We perform extensive evaluations for all the designs and their optimization scenarios. The results provide evidence of issues arising due to HLS optimizations on the security and the reliability of cryptographic implementations. Furthermore, the results put HLS algorithms to the test of designing secure accelerators and can lead to improving them towards the goal of increasing productivity in the domain of secure and reliable cryptographic implementations.
△ Less
Submitted 11 December, 2023;
originally announced December 2023.
-
Can GPT models be Financial Analysts? An Evaluation of ChatGPT and GPT-4 on mock CFA Exams
Authors:
Ethan Callanan,
Amarachi Mbakwe,
Antony Papadimitriou,
Yulong Pei,
Mathieu Sibue,
Xiaodan Zhu,
Zhiqiang Ma,
Xiaomo Liu,
Sameena Shah
Abstract:
Large Language Models (LLMs) have demonstrated remarkable performance on a wide range of Natural Language Processing (NLP) tasks, often matching or even beating state-of-the-art task-specific models. This study aims at assessing the financial reasoning capabilities of LLMs. We leverage mock exam questions of the Chartered Financial Analyst (CFA) Program to conduct a comprehensive evaluation of Cha…
▽ More
Large Language Models (LLMs) have demonstrated remarkable performance on a wide range of Natural Language Processing (NLP) tasks, often matching or even beating state-of-the-art task-specific models. This study aims at assessing the financial reasoning capabilities of LLMs. We leverage mock exam questions of the Chartered Financial Analyst (CFA) Program to conduct a comprehensive evaluation of ChatGPT and GPT-4 in financial analysis, considering Zero-Shot (ZS), Chain-of-Thought (CoT), and Few-Shot (FS) scenarios. We present an in-depth analysis of the models' performance and limitations, and estimate whether they would have a chance at passing the CFA exams. Finally, we outline insights into potential strategies and improvements to enhance the applicability of LLMs in finance. In this perspective, we hope this work paves the way for future studies to continue enhancing LLMs for financial reasoning through rigorous evaluation.
△ Less
Submitted 12 October, 2023;
originally announced October 2023.
-
Multi-Stage NMPC for a MAV based Collision Free Navigation under Varying Communication Delays
Authors:
Andreas Papadimitriou,
Hedyeh Jafari,
Sina Sharif Mansouri,
George Nikolakopoulos
Abstract:
Time delays in communication networks are one of the main concerns in deploying robots with computation boards on the edge. This article proposes a multi-stage Nonlinear Model Predictive Control (NMPC) that is capable of handling varying network-induced time delays for establishing a control framework being able to guarantee collision-free Micro Aerial Vehicles (MAVs) navigation. This study introd…
▽ More
Time delays in communication networks are one of the main concerns in deploying robots with computation boards on the edge. This article proposes a multi-stage Nonlinear Model Predictive Control (NMPC) that is capable of handling varying network-induced time delays for establishing a control framework being able to guarantee collision-free Micro Aerial Vehicles (MAVs) navigation. This study introduces a novel approach that considers different sampling times by a tree of discretization scenarios contrary to the existing typical multi-stage NMPC where system uncertainties are modeled by a tree of scenarios. Additionally, the proposed method considers adaptive weights for the multi-stage NMPC scenarios based on the probability of time delays in the communication link. As a result of the multi-stage NMPC, the obtained optimal control action is valid for multiple sampling times. Finally, the overall effectiveness of the proposed novel control framework is demonstrated in various tests and different simulation environments.
△ Less
Submitted 7 August, 2022;
originally announced August 2022.
-
Geometry Aware NMPC Scheme for Morphing Quadrotor Navigation in Restricted Entrances
Authors:
Andreas Papadimitriou,
Sina Sharif Mansouri,
Christoforos Kanellakis,
George Nikolakopoulos
Abstract:
Geometry-morphing Micro Aerial Vehicles (MAVs) are gaining more and more attention lately, since their ability to modify their geometric morphology in-flight increases their versatility, while expanding their application range. In this novel research field, most of the works focus on the platform design and on the low-level control part for maintaining stability after the deformation. Nevertheless…
▽ More
Geometry-morphing Micro Aerial Vehicles (MAVs) are gaining more and more attention lately, since their ability to modify their geometric morphology in-flight increases their versatility, while expanding their application range. In this novel research field, most of the works focus on the platform design and on the low-level control part for maintaining stability after the deformation. Nevertheless, another aspect of geometry morphing MAVs is the association of the deformation with respect to the shape and structure of the environment. In this article, we propose a novel Nonlinear Model Predictive Control (NMPC) structure that modifies the morphology of a quadrotor based on the environmental entrances geometrical shape. The proposed method considers restricted entrances as a constraint in the NMPC and modifies the arm configuration of the MAV to provide a collision free path from the initial position to the desired goal, while passing through the entrance. To the authors' best knowledge, this work is the first to connect the in-flight morphology with the characteristics of environmental shapes. Multiple simulation results depict the performance and efficiency of the proposed scheme in scenarios where the quadrotor is commanded to pass through restricted areas.
△ Less
Submitted 8 January, 2021;
originally announced January 2021.
-
Switching Model Predictive Control for Online Structural Reformations of a Foldable Quadrotor
Authors:
Andreas Papadimitriou,
George Nikolakopoulos
Abstract:
The aim of this article is the formulation of a switching model predictive control framework for the case of a foldable quadrotor with the ability to retain the overall control quality during online structural reformations. The majority of the related scientific publications consider fixed morphology of the aerial vehicles. Recent advances in mechatronics have brought novel considerations for gene…
▽ More
The aim of this article is the formulation of a switching model predictive control framework for the case of a foldable quadrotor with the ability to retain the overall control quality during online structural reformations. The majority of the related scientific publications consider fixed morphology of the aerial vehicles. Recent advances in mechatronics have brought novel considerations for generalized aerial robotic designs with the ability to alter their morphology in order to adapt to their environment, thus enhancing their capabilities. Simulation results are provided to prove the efficacy of the selected control scheme.
△ Less
Submitted 20 August, 2020;
originally announced August 2020.
-
Decoding Generic Visual Representations From Human Brain Activity using Machine Learning
Authors:
Angeliki Papadimitriou,
Nikolaos Passalis,
Anastasios Tefas
Abstract:
Among the most impressive recent applications of neural decoding is the visual representation decoding, where the category of an object that a subject either sees or imagines is inferred by observing his/her brain activity. Even though there is an increasing interest in the aforementioned visual representation decoding task, there is no extensive study of the effect of using different machine lear…
▽ More
Among the most impressive recent applications of neural decoding is the visual representation decoding, where the category of an object that a subject either sees or imagines is inferred by observing his/her brain activity. Even though there is an increasing interest in the aforementioned visual representation decoding task, there is no extensive study of the effect of using different machine learning models on the decoding accuracy. In this paper we provide an extensive evaluation of several machine learning models, along with different similarity metrics, for the aforementioned task, drawing many interesting conclusions. That way, this paper a) paves the way for develo** more advanced and accurate methods and b) provides an extensive and easily reproducible baseline for the aforementioned decoding task.
△ Less
Submitted 5 November, 2018;
originally announced November 2018.