Skip to main content

Showing 1–21 of 21 results for author: Perez, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.07015  [pdf, other

    cs.LG

    Neural Relational Inference with Fast Modular Meta-learning

    Authors: Ferran Alet, Erica Weng, Tomás Lozano Pérez, Leslie Pack Kaelbling

    Abstract: \textit{Graph neural networks} (GNNs) are effective models for many dynamical systems consisting of entities and relations. Although most GNN applications assume a single type of entity and relation, many situations involve multiple types of interactions. \textit{Relational inference} is the problem of inferring these interactions and learning the dynamics from observational data. We frame relatio… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

    Comments: Published as a conference paper in NeurIPs 2019

  2. arXiv:2308.06730  [pdf, other

    cs.CR cs.AR

    Impact of Orientation on the Bias of SRAM-Based PUFs

    Authors: Zain Ul Abideen, Rui Wang, Tiago Diadami Perez, Geert-Jan Schrijen, Samuel Pagliarini

    Abstract: This paper investigates the impact of memory orientation on the bias pattern of SRAM-based PUFs. We designed and fabricated a 65nm CMOS chip that contains eleven SRAM macros that exercise different memory- and chip-level parameters. At the memory level, several parameters passed to the SRAM compiler are considered, including the number of addresses, the number of words, the aspect ratio, and the c… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

  3. arXiv:2308.06201  [pdf, other

    cs.CR cs.AR

    SALSy: Security-Aware Layout Synthesis

    Authors: Mohammad Eslami, Tiago Perez, Samuel Pagliarini

    Abstract: Integrated Circuits (ICs) are the target of diverse attacks during their lifetime. Fabrication-time attacks, such as the insertion of Hardware Trojans, can give an adversary access to privileged data and/or the means to corrupt the IC's internal computation. Post-fabrication attacks, where the end-user takes a malicious role, also attempt to obtain privileged information through means such as faul… ▽ More

    Submitted 21 August, 2023; v1 submitted 11 August, 2023; originally announced August 2023.

  4. A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts

    Authors: Alexander Hepp, Tiago Perez, Samuel Pagliarini, Georg Sigl

    Abstract: A potential vulnerability for integrated circuits (ICs) is the insertion of hardware trojans (HTs) during manufacturing. Understanding the practicability of such an attack can lead to appropriate measures for mitigating it. In this paper, we demonstrate a pragmatic framework for analyzing HT susceptibility of finalized layouts. Our framework is representative of a fabrication-time attack, where th… ▽ More

    Submitted 19 August, 2022; originally announced August 2022.

    Comments: 9 pages, 6 figures, 3 tables, to be published in ICCAD 2022

    ACM Class: B.7.2; J.6

  5. arXiv:2207.05413  [pdf, other

    cs.CR cs.AR cs.LO

    A Security-aware and LUT-based CAD Flow for the Physical Synthesis of eASICs

    Authors: Zain UlAbideen, Tiago Diadami Perez, Mayler Martins, Samuel Pagliarini

    Abstract: Numerous threats are associated with the globalized integrated circuit (IC) supply chain, such as piracy, reverse engineering, overproduction, and malicious logic insertion. Many obfuscation approaches have been proposed to mitigate these threats by preventing an adversary from fully understanding the IC (or parts of it). The use of reconfigurable elements inside an IC is a known obfuscation techn… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  6. arXiv:2112.02972  [pdf, other

    cs.CR

    Hardware Trojan Insertion in Finalized Layouts: From Methodology to a Silicon Demonstration

    Authors: Tiago Perez, Samuel Pagliarini

    Abstract: Owning a high-end semiconductor foundry is a luxury very few companies can afford. Thus, fabless design companies outsource integrated circuit fabrication to third parties. Within foundries, rogue elements may gain access to the customer's layout and perform malicious acts, including the insertion of a hardware trojan (HT). Many works focus on the structure/effects of a HT, while very few have dem… ▽ More

    Submitted 30 August, 2022; v1 submitted 6 December, 2021; originally announced December 2021.

    Comments: arXiv admin note: text overlap with arXiv:2102.00724

  7. arXiv:2111.06166  [pdf, other

    cs.AR

    G-GPU: A Fully-Automated Generator of GPU-like ASIC Accelerators

    Authors: Tiago Diadami Perez, Márcio M. Gonçalves, José Rodrigo Azambuja, Leonardo Gobatto, Marcelo Brandalero, Samuel Pagliarini

    Abstract: Modern Systems on Chip (SoC), almost as a rule, require accelerators for achieving energy efficiency and high performance for specific tasks that are not necessarily well suited for execution in standard processing units. Considering the broad range of applications and necessity for specialization, the design of SoCs has thus become expressively more challenging. In this paper, we put forward the… ▽ More

    Submitted 6 December, 2021; v1 submitted 11 November, 2021; originally announced November 2021.

  8. arXiv:2110.05335  [pdf, other

    cs.CR cs.AR

    From FPGAs to Obfuscated eASICs: Design and Security Trade-offs

    Authors: Zain Ul Abideen, Tiago Diadami Perez, Samuel Pagliarini

    Abstract: Threats associated with the untrusted fabrication of integrated circuits (ICs) are numerous: piracy, overproduction, reverse engineering, hardware trojans, etc. The use of reconfigurable elements (i.e., look-up tables as in FPGAs) is a known obfuscation technique. In the extreme case, when the circuit is entirely implemented as an FPGA, no information is revealed to the adversary but at a high cos… ▽ More

    Submitted 13 October, 2021; v1 submitted 11 October, 2021; originally announced October 2021.

    Comments: The results for the paper are given on the following link: https://github.com/Centre-for-Hardware-Security/eASIC

  9. arXiv:2102.00724  [pdf, other

    cs.CR

    Side-Channel Trojan Insertion -- a Practical Foundry-Side Attack via ECO

    Authors: Tiago Perez, Malik Imran, Pablo Vaz, Samuel Pagliarini

    Abstract: Design companies often outsource their integrated circuit (IC) fabrication to third parties where ICs are susceptible to malicious acts such as the insertion of a side-channel hardware trojan horse (SCT). In this paper, we present a framework for designing and inserting an SCT based on an engineering change order (ECO) flow, which makes it the first to disclose how effortlessly a trojan can be ins… ▽ More

    Submitted 29 March, 2021; v1 submitted 1 February, 2021; originally announced February 2021.

  10. arXiv:2010.06871  [pdf, other

    cs.RO

    A Heteroscedastic Likelihood Model for Two-frame Optical Flow

    Authors: Timothy Farnworth, Christopher Renton, Reuben Strydom, Adrian Wills, Tristan Perez

    Abstract: Machine vision is an important sensing technology used in mobile robotic systems. Advancing the autonomy of such systems requires accurate characterisation of sensor uncertainty. Vision includes intrinsic uncertainty due to the camera sensor and extrinsic uncertainty due to environmental lighting and texture, which propagate through the image processing algorithms used to produce visual measuremen… ▽ More

    Submitted 31 December, 2020; v1 submitted 14 October, 2020; originally announced October 2020.

  11. A Survey on Split Manufacturing: Attacks, Defenses, and Challenges

    Authors: Tiago D. Perez, Samuel Pagliarini

    Abstract: In today's integrated circuit (IC) ecosystem, owning a foundry is not economically viable, and therefore most IC design houses are now working under a fabless business model. In order to overcome security concerns associated with the outsorcing of IC fabrication, the Split Manufacturing technique was proposed. In Split Manufacturing, the Front End of Line (FEOL) layers (transistors and lower metal… ▽ More

    Submitted 12 October, 2020; v1 submitted 8 June, 2020; originally announced June 2020.

  12. arXiv:1810.11920  [pdf, other

    cs.RO

    A Sweet Pepper Harvesting Robot for Protected Crop** Environments

    Authors: Chris Lehnert, Chris McCool, Inkyu Sa, Tristan Perez

    Abstract: Using robots to harvest sweet peppers in protected crop** environments has remained unsolved despite considerable effort by the research community over several decades. In this paper, we present the robotic harvester, Harvey, designed for sweet peppers in protected crop** environments that achieved a 76.5% success rate (within a modified scenario) which improves upon our prior work which achie… ▽ More

    Submitted 28 October, 2018; originally announced October 2018.

  13. A Rapidly Deployable Classification System using Visual Data for the Application of Precision Weed Management

    Authors: David Hall, Feras Dayoub, Tristan Perez, Chris McCool

    Abstract: In this work we demonstrate a rapidly deployable weed classification system that uses visual data to enable autonomous precision weeding without making prior assumptions about which weed species are present in a given field. Previous work in this area relies on having prior knowledge of the weed species present in the field. This assumption cannot always hold true for every field, and thus limits… ▽ More

    Submitted 26 April, 2018; v1 submitted 25 January, 2018; originally announced January 2018.

    Comments: 36 pages, 14 figures, published Computers and Electronics in Agriculture Vol. 148

    Journal ref: D. Hall, F. Dayoub, T. Perez, and C. McCool, "A Rapidly Deployable Classification System using Visual Data for the Application of Precision Weed Management," Computers and Electronics in Agriculture, Vol. 148, pp. 107-120, May 2018

  14. arXiv:1801.05560  [pdf, other

    cs.CV

    Fruit Quantity and Quality Estimation using a Robotic Vision System

    Authors: M. Halstead, C. McCool, S. Denman, T. Perez, C. Fookes

    Abstract: Accurate localisation of crop remains highly challenging in unstructured environments such as farms. Many of the developed systems still rely on the use of hand selected features for crop identification and often neglect the estimation of crop quantity and quality, which is key to assigning labor during farming processes. To alleviate these limitations we present a robotic vision system that can a… ▽ More

    Submitted 17 January, 2018; originally announced January 2018.

  15. arXiv:1709.10275  [pdf, other

    cs.RO

    In-Field Peduncle Detection of Sweet Peppers for Robotic Harvesting: a comparative study

    Authors: Chris Lehnert, Chris McCool, Tristan Perez

    Abstract: Robotic harvesting of crops has the potential to disrupt current agricultural practices. A key element to enabling robotic harvesting is to safely remove the crop from the plant which often involves locating and cutting the peduncle, the part of the crop that attaches it to the main stem of the plant. In this paper we present a comparative study of two methods for performing peduncle detection.… ▽ More

    Submitted 29 September, 2017; originally announced September 2017.

    Comments: Submitted to International Conference on Robotics and Automation 2018, under review

  16. arXiv:1706.06203  [pdf

    cs.RO

    Lessons Learnt from Field Trials of a Robotic Sweet Pepper Harvester

    Authors: Christopher Lehnert, Christopher McCool, Tristan Perez

    Abstract: In this paper, we present the lessons learnt during the development of a new robotic harvester (Harvey) that can autonomously harvest sweet pepper (capsicum) in protected crop** environments. Robotic harvesting offers an attractive potential solution to reducing labour costs while enabling more regular and selective harvesting, optimising crop quality, scheduling and therefore profit. Our approa… ▽ More

    Submitted 19 June, 2017; originally announced June 2017.

    Comments: Preprint for Asian-Australasian Conference on Precision Agriculture

  17. Autonomous Sweet Pepper Harvesting for Protected Crop** Systems

    Authors: Chris Lehnert, Andrew English, Chris McCool, Adam Tow, Tristan Perez

    Abstract: In this letter, we present a new robotic harvester (Harvey) that can autonomously harvest sweet pepper in protected crop** environments. Our approach combines effective vision algorithms with a novel end-effector design to enable successful harvesting of sweet peppers. Initial field trials in protected crop** environments, with two cultivar, demonstrate the efficacy of this approach achieving… ▽ More

    Submitted 6 June, 2017; originally announced June 2017.

    Journal ref: IEEE Robotics and Automation Letters, vol. 2, no. 2, pp. 872-879, April 2017. doi: 10.1109/LRA.2017.2655622

  18. Peduncle Detection of Sweet Pepper for Autonomous Crop Harvesting - Combined Colour and 3D Information

    Authors: Inkyu Sa, Chris Lehnert, Andrew English, Chris McCool, Feras Dayoub, Ben Upcroft, Tristan Perez

    Abstract: This paper presents a 3D visual detection method for the challenging task of detecting peduncles of sweet peppers (Capsicum annuum) in the field. Cutting the peduncle cleanly is one of the most difficult stages of the harvesting process, where the peduncle is the part of the crop that attaches it to the main stem of the plant. Accurate peduncle detection in 3D space is therefore a vital step in re… ▽ More

    Submitted 30 January, 2017; originally announced January 2017.

    Comments: 8 pages, 14 figures, Robotics and Automation Letters

  19. arXiv:1604.01795  [pdf, other

    physics.soc-ph cs.SI

    Collective intelligence: aggregation of information from neighbors in a guessing game

    Authors: Toni Pérez, Jordi Zamora, Víctor M. Eguíluz

    Abstract: Complex systems show the capacity to aggregate information and to display coordinated activity. In the case of social systems the interaction of different individuals leads to the emergence of norms, trends in political positions, opinions, cultural traits, and even scientific progress. Examples of collective behavior can be observed in activities like the Wikipedia and Linux, where individuals ag… ▽ More

    Submitted 29 March, 2016; originally announced April 2016.

    Comments: 9 pages, 9 figures

    Journal ref: PLoS ONE 11(4): e0153586 (2016)

  20. arXiv:1503.06692  [pdf, ps, other

    physics.soc-ph cs.SI

    Persistence in voting behavior: stronghold dynamics in elections

    Authors: Toni Pérez, Juan Fernández-Gracia, Jose J. Ramasco, Víctor M. Eguíluz

    Abstract: Influence among individuals is at the core of collective social phenomena such as the dissemination of ideas, beliefs or behaviors, social learning and the diffusion of innovations. Different mechanisms have been proposed to implement inter-agent influence in social models from the voter model, to majority rules, to the Granoveter model. Here we advance in this direction by confronting the recentl… ▽ More

    Submitted 23 March, 2015; originally announced March 2015.

    Comments: Lecture Notes in Computer Science: Social Computing, Behavioral-Cultural Modeling, and Prediction (2015)

  21. arXiv:1102.1379  [pdf, ps, other

    cond-mat.dis-nn cs.SI physics.soc-ph

    Structural and functional networks in complex systems with delay

    Authors: Víctor M. Eguíluz, Toni Pérez, Javier Borge-Holtoefer, Alex Arenas

    Abstract: Functional networks of complex systems are obtained from the analysis of the temporal activity of their components, and are often used to infer their unknown underlying connectivity. We obtain the equations relating topology and function in a system of diffusively delay-coupled elements in complex networks. We solve exactly the resulting equations in motifs (directed structures of three nodes), an… ▽ More

    Submitted 23 May, 2011; v1 submitted 7 February, 2011; originally announced February 2011.

    Comments: 5 pages, 3 figures

    Journal ref: Physical Review E 83, 056113 (2011)