Skip to main content

Showing 1–50 of 142 results for author: Shafique, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.00641  [pdf, other

    cs.NE cs.AI cs.AR cs.LG

    HASNAS: A Hardware-Aware Spiking Neural Architecture Search Framework for Neuromorphic Compute-in-Memory Systems

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Shafique

    Abstract: Spiking Neural Networks (SNNs) have shown capabilities for solving diverse machine learning tasks with ultra-low-power/energy computation. To further improve the performance and efficiency of SNN inference, the Compute-in-Memory (CIM) paradigm with emerging device technologies such as resistive random access memory is employed. However, most of SNN architectures are developed without considering c… ▽ More

    Submitted 30 June, 2024; originally announced July 2024.

    Comments: 9 pages, 13 figures, 2 tables

  2. arXiv:2406.05590  [pdf, other

    cs.CR cs.AI cs.CY cs.LG

    NYU CTF Dataset: A Scalable Open-Source Benchmark Dataset for Evaluating LLMs in Offensive Security

    Authors: Minghao Shao, Sofija Jancheska, Meet Udeshi, Brendan Dolan-Gavitt, Haoran Xi, Kimberly Milner, Boyuan Chen, Max Yin, Siddharth Garg, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Muhammad Shafique

    Abstract: Large Language Models (LLMs) are being deployed across various domains today. However, their capacity to solve Capture the Flag (CTF) challenges in cybersecurity has not been thoroughly evaluated. To address this, we develop a novel method to assess LLMs in solving CTF challenges by creating a scalable, open-source benchmark database specifically designed for these applications. This database incl… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

  3. arXiv:2405.15842  [pdf, other

    cs.SE cs.LG

    Model Cascading for Code: Reducing Inference Costs with Model Cascading for LLM Based Code Generation

    Authors: Boyuan Chen, Mingzhi Zhu, Brendan Dolan-Gavitt, Muhammad Shafique, Siddharth Garg

    Abstract: The rapid development of large language models (LLMs) has led to significant advancements in code completion tasks. While larger models have higher accuracy, they also cost much more to run. Meanwhile, model cascading has been proven effective to conserve computational resources while enhancing accuracy in LLMs on natural language generation tasks. It generates output with the smallest model in a… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  4. arXiv:2405.06278  [pdf, other

    cs.CV cs.CR

    Exploring the Interplay of Interpretability and Robustness in Deep Neural Networks: A Saliency-guided Approach

    Authors: Amira Guesmi, Nishant Suresh Aswani, Muhammad Shafique

    Abstract: Adversarial attacks pose a significant challenge to deploying deep learning models in safety-critical applications. Maintaining model robustness while ensuring interpretability is vital for fostering trust and comprehension in these models. This study investigates the impact of Saliency-guided Training (SGT) on model robustness, a technique aimed at improving the clarity of saliency maps to deepen… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  5. arXiv:2405.03244  [pdf, other

    cs.LG

    Examining Changes in Internal Representations of Continual Learning Models Through Tensor Decomposition

    Authors: Nishant Suresh Aswani, Amira Guesmi, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Continual learning (CL) has spurred the development of several methods aimed at consolidating previous knowledge across sequential learning. Yet, the evaluations of these methods have primarily focused on the final output, such as changes in the accuracy of predicted classes, overlooking the issue of representational forgetting within the model. In this paper, we propose a novel representation-bas… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  6. arXiv:2404.09331  [pdf, other

    cs.RO cs.AI cs.LG cs.NE

    SNN4Agents: A Framework for Develo** Energy-Efficient Embodied Spiking Neural Networks for Autonomous Agents

    Authors: Rachmad Vidya Wicaksana Putra, Alberto Marchisio, Muhammad Shafique

    Abstract: Recent trends have shown that autonomous agents, such as Autonomous Ground Vehicles (AGVs), Unmanned Aerial Vehicles (UAVs), and mobile robots, effectively improve human productivity in solving diverse tasks. However, since these agents are typically powered by portable batteries, they require extremely low power/energy consumption to operate in a long lifespan. To solve this challenge, neuromorph… ▽ More

    Submitted 18 June, 2024; v1 submitted 14 April, 2024; originally announced April 2024.

    Comments: Accepted for publication at Frontiers in Robotics and AI (FROBT) - Section Robot Vision and Artificial Perception

  7. arXiv:2404.03493  [pdf, other

    cs.NE cs.AI cs.LG cs.RO

    A Methodology to Study the Impact of Spiking Neural Network Parameters considering Event-Based Automotive Data

    Authors: Iqra Bano, Rachmad Vidya Wicaksana Putra, Alberto Marchisio, Muhammad Shafique

    Abstract: Autonomous Driving (AD) systems are considered as the future of human mobility and transportation. Solving computer vision tasks such as image classification and object detection/segmentation, with high accuracy and low power/energy consumption, is highly needed to realize AD systems in real life. These requirements can potentially be satisfied by Spiking Neural Networks (SNNs). However, the state… ▽ More

    Submitted 5 April, 2024; v1 submitted 4 April, 2024; originally announced April 2024.

    Comments: 7 pages, 13 figures, 1 table

  8. arXiv:2404.03325  [pdf, other

    cs.RO cs.AI cs.LG cs.NE

    Embodied Neuromorphic Artificial Intelligence for Robotics: Perspectives, Challenges, and Research Development Stack

    Authors: Rachmad Vidya Wicaksana Putra, Alberto Marchisio, Fakhreddine Zayer, Jorge Dias, Muhammad Shafique

    Abstract: Robotic technologies have been an indispensable part for improving human productivity since they have been hel** humans in completing diverse, complex, and intensive tasks in a fast yet accurate and efficient way. Therefore, robotic technologies have been deployed in a wide range of applications, ranging from personal to industrial use-cases. However, current robotic technologies and their compu… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: 8 pages, 9 figures, 1 table

  9. arXiv:2404.02595  [pdf, other

    quant-ph cs.LG q-fin.RM

    QFNN-FFD: Quantum Federated Neural Network for Financial Fraud Detection

    Authors: Nouhaila Innan, Alberto Marchisio, Muhammad Shafique, Mohamed Bennai

    Abstract: This study introduces the Quantum Federated Neural Network for Financial Fraud Detection (QFNN-FFD), a cutting-edge framework merging Quantum Machine Learning (QML) and quantum computing with Federated Learning (FL) for financial fraud detection. Using quantum technologies' computational power and the robust data privacy protections offered by FL, QFNN-FFD emerges as a secure and efficient method… ▽ More

    Submitted 1 May, 2024; v1 submitted 3 April, 2024; originally announced April 2024.

  10. arXiv:2404.01685  [pdf, other

    cs.NE cs.AI cs.LG

    A Methodology for Improving Accuracy of Embedded Spiking Neural Networks through Kernel Size Scaling

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Shafique

    Abstract: Spiking Neural Networks (SNNs) can offer ultra low power/ energy consumption for machine learning-based applications due to their sparse spike-based operations. Currently, most of the SNN architectures need a significantly larger model size to achieve higher accuracy, which is not suitable for resource-constrained embedded applications. Therefore, develo** SNNs that can achieve high accuracy wit… ▽ More

    Submitted 3 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

    Comments: 3 pages, 3 figures

  11. arXiv:2403.19992  [pdf, other

    cs.AI cs.HC cs.RO

    MindArm: Mechanized Intelligent Non-Invasive Neuro-Driven Prosthetic Arm System

    Authors: Maha Nawaz, Abdul Basit, Muhammad Shafique

    Abstract: Currently, people with disability or difficulty to move their arms (referred to as "patients") have very limited technological solutions to efficiently address their physiological limitations. It is mainly due to two reasons: (1) the non-invasive solutions like mind-controlled prosthetic devices are typically very costly and require expensive maintenance; and (2) other solutions require costly inv… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

    Comments: 8 pages, 21 figures, paper submitted to IROS 24, authors affiliated to NYUAD

    ACM Class: I.2.9

  12. arXiv:2403.11515  [pdf, other

    cs.CV cs.RO

    SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Bassem Ouni, Muhammad Shafique

    Abstract: Monocular depth estimation (MDE) has advanced significantly, primarily through the integration of convolutional neural networks (CNNs) and more recently, Transformers. However, concerns about their susceptibility to adversarial attacks have emerged, especially in safety-critical domains like autonomous driving and robotic navigation. Existing approaches for assessing CNN-based depth prediction met… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  13. arXiv:2403.10861  [pdf, other

    quant-ph cs.ET cs.LG

    FedQNN: Federated Learning using Quantum Neural Networks

    Authors: Nouhaila Innan, Muhammad Al-Zafar Khan, Alberto Marchisio, Muhammad Shafique, Mohamed Bennai

    Abstract: In this study, we explore the innovative domain of Quantum Federated Learning (QFL) as a framework for training Quantum Machine Learning (QML) models via distributed networks. Conventional machine learning models frequently grapple with issues about data privacy and the exposure of sensitive information. Our proposed Federated Quantum Neural Network (FedQNN) framework emerges as a cutting-edge sol… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

    Comments: Accepted for presentation at IJCNN 2024

  14. arXiv:2403.06134  [pdf

    cs.DC

    A Two-Level Thermal Cycling-aware Task Map** Technique for Reliability Management in Manycore Systems

    Authors: Fatemeh Hossein Khani, Omid Akbari, Muhammad Shafique

    Abstract: Reliability management is one of the primary concerns in manycore systems design. Different aging mechanisms such as Negative-Bias Temperature Instability (NBTI), Electromigration (EM), and thermal cycling can reduce the reliability of these systems. However, state-of-the-art works mainly focused on NBTI and EM, whereas a few works have considered the thermal cycling effect. The thermal cycling ef… ▽ More

    Submitted 10 March, 2024; originally announced March 2024.

  15. arXiv:2403.05340  [pdf, other

    eess.IV cs.CV cs.LG

    Embedded Deployment of Semantic Segmentation in Medicine through Low-Resolution Inputs

    Authors: Erik Ostrowski, Muhammad Shafique

    Abstract: When deploying neural networks in real-life situations, the size and computational effort are often the limiting factors. This is especially true in environments where big, expensive hardware is not affordable, like in embedded medical devices, where budgets are often tight. State-of-the-art proposed multiple different lightweight solutions for such use cases, mostly by changing the base model arc… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  16. arXiv:2403.00830  [pdf, other

    cs.AI cs.CL

    MedAide: Leveraging Large Language Models for On-Premise Medical Assistance on Edge Devices

    Authors: Abdul Basit, Khizar Hussain, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Large language models (LLMs) are revolutionizing various domains with their remarkable natural language processing (NLP) abilities. However, deploying LLMs in resource-constrained edge computing and embedded systems presents significant challenges. Another challenge lies in delivering medical assistance in remote areas with limited healthcare facilities and infrastructure. To address this, we intr… ▽ More

    Submitted 28 February, 2024; originally announced March 2024.

    Comments: 7 pages, 11 figures, ACM conference paper, 33 references

    ACM Class: I.2.7

  17. arXiv:2402.15490  [pdf, other

    cs.LG cs.NE

    A Comprehensive Survey of Convolutions in Deep Learning: Applications, Challenges, and Future Trends

    Authors: Abolfazl Younesi, Mohsen Ansari, MohammadAmin Fazli, Alireza Ejlali, Muhammad Shafique, Jörg Henkel

    Abstract: In today's digital age, Convolutional Neural Networks (CNNs), a subset of Deep Learning (DL), are widely used for various computer vision tasks such as image classification, object detection, and image segmentation. There are numerous types of CNNs designed to meet specific needs and requirements, including 1D, 2D, and 3D CNNs, as well as dilated, grouped, attention, depthwise convolutions, and NA… ▽ More

    Submitted 28 February, 2024; v1 submitted 23 February, 2024; originally announced February 2024.

  18. arXiv:2402.11814  [pdf, other

    cs.CR

    An Empirical Evaluation of LLMs for Solving Offensive Security Challenges

    Authors: Minghao Shao, Boyuan Chen, Sofija Jancheska, Brendan Dolan-Gavitt, Siddharth Garg, Ramesh Karri, Muhammad Shafique

    Abstract: Capture The Flag (CTF) challenges are puzzles related to computer security scenarios. With the advent of large language models (LLMs), more and more CTF participants are using LLMs to understand and solve the challenges. However, so far no work has evaluated the effectiveness of LLMs in solving CTF challenges with a fully automated workflow. We develop two CTF-solving workflows, human-in-the-loop… ▽ More

    Submitted 18 February, 2024; originally announced February 2024.

  19. arXiv:2402.11322  [pdf, other

    cs.NE cs.AI cs.LG

    SpikeNAS: A Fast Memory-Aware Neural Architecture Search Framework for Spiking Neural Network-based Autonomous Agents

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Shafique

    Abstract: Autonomous mobile agents (e.g., UAVs and UGVs) are typically expected to incur low power/energy consumption for solving machine learning tasks (such as object recognition), as these mobile agents are usually powered by portable batteries. These requirements can be fulfilled by Spiking Neural Networks (SNNs), since their bio-inspired spike-based operations offer high accuracy and ultra low-power/en… ▽ More

    Submitted 5 April, 2024; v1 submitted 17 February, 2024; originally announced February 2024.

    Comments: 8 pages, 13 figures, 2 tables

  20. arXiv:2402.09780  [pdf, other

    cs.LG

    TinyCL: An Efficient Hardware Architecture for Continual Learning on Autonomous Systems

    Authors: Eugenio Ressa, Alberto Marchisio, Maurizio Martina, Guido Masera, Muhammad Shafique

    Abstract: The Continuous Learning (CL) paradigm consists of continuously evolving the parameters of the Deep Neural Network (DNN) model to progressively learn to perform new tasks without reducing the performance on previous tasks, i.e., avoiding the so-called catastrophic forgetting. However, the DNN parameter update in CL-based autonomous systems is extremely resource-hungry. The existing DNN accelerators… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

  21. arXiv:2402.09146  [pdf, other

    cs.LG quant-ph

    ResQuNNs:Towards Enabling Deep Learning in Quantum Convolution Neural Networks

    Authors: Muhammad Kashif, Muhammad Shafique

    Abstract: In this paper, we present a novel framework for enhancing the performance of Quanvolutional Neural Networks (QuNNs) by introducing trainable quanvolutional layers and addressing the critical challenges associated with them. Traditional quanvolutional layers, although beneficial for feature extraction, have largely been static, offering limited adaptability. Unlike state-of-the-art, our research ov… ▽ More

    Submitted 19 May, 2024; v1 submitted 14 February, 2024; originally announced February 2024.

  22. arXiv:2402.06249  [pdf, other

    cs.CV cs.CR

    Anomaly Unveiled: Securing Image Classification against Adversarial Patch Attacks

    Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Shafique

    Abstract: Adversarial patch attacks pose a significant threat to the practical deployment of deep learning systems. However, existing research primarily focuses on image pre-processing defenses, which often result in reduced classification accuracy for clean images and fail to effectively counter physically feasible attacks. In this paper, we investigate the behavior of adversarial patches as anomalies with… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

  23. arXiv:2311.12211  [pdf, other

    cs.CR

    DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction

    Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique

    Abstract: Adversarial patch-based attacks have shown to be a major deterrent towards the reliable use of machine learning models. These attacks involve the strategic modification of localized patches or specific image areas to deceive trained machine learning models. In this paper, we propose \textit{DefensiveDR}, a practical mechanism using a dimensionality reduction technique to thwart such patch-based at… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  24. arXiv:2311.12084  [pdf, other

    cs.CR cs.CV

    ODDR: Outlier Detection & Dimension Reduction Based Defense Against Adversarial Patches

    Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique

    Abstract: Adversarial attacks are a major deterrent towards the reliable use of machine learning models. A powerful type of adversarial attacks is the patch-based attack, wherein the adversarial perturbations modify localized patches or specific areas within the images to deceive the trained machine learning model. In this paper, we introduce Outlier Detection and Dimension Reduction (ODDR), a holistic defe… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  25. arXiv:2311.12082  [pdf, other

    eess.IV cs.LG

    Tiny-VBF: Resource-Efficient Vision Transformer based Lightweight Beamformer for Ultrasound Single-Angle Plane Wave Imaging

    Authors: Abdul Rahoof, Vivek Chaturvedi, Mahesh Raveendranatha Panicker, Muhammad Shafique

    Abstract: Accelerating compute intensive non-real-time beam-forming algorithms in ultrasound imaging using deep learning architectures has been gaining momentum in the recent past. Nonetheless, the complexity of the state-of-the-art deep learning techniques poses challenges for deployment on resource-constrained edge devices. In this work, we propose a novel vision transformer based tiny beamformer (Tiny-VB… ▽ More

    Submitted 16 January, 2024; v1 submitted 20 November, 2023; originally announced November 2023.

    Comments: 6 pages, DATE 2024

  26. arXiv:2310.10315  [pdf, other

    quant-ph cs.LG

    A Survey on Quantum Machine Learning: Current Trends, Challenges, Opportunities, and the Road Ahead

    Authors: Kamila Zaman, Alberto Marchisio, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Quantum Computing (QC) claims to improve the efficiency of solving complex problems, compared to classical computing. When QC is applied to Machine Learning (ML) applications, it forms a Quantum Machine Learning (QML) system. After discussing the basic concepts of QC and its advantages over classical computing, this paper reviews the key aspects of QML in a comprehensive manner. We discuss differe… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

  27. arXiv:2308.06173  [pdf, other

    cs.CR cs.AI cs.CV cs.LG cs.RO

    Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammed Shafique

    Abstract: In this paper, we present a comprehensive survey of the current trends focusing specifically on physical adversarial attacks. We aim to provide a thorough understanding of the concept of physical adversarial attacks, analyzing their key characteristics and distinguishing features. Furthermore, we explore the specific requirements and challenges associated with executing attacks in the physical wor… ▽ More

    Submitted 11 August, 2023; originally announced August 2023.

  28. A Homomorphic Encryption Framework for Privacy-Preserving Spiking Neural Networks

    Authors: Farzad Nikfam, Raffaele Casaburi, Alberto Marchisio, Maurizio Martina, Muhammad Shafique

    Abstract: Machine learning (ML) is widely used today, especially through deep neural networks (DNNs), however, increasing computational load and resource requirements have led to cloud-based solutions. To address this problem, a new generation of networks called Spiking Neural Networks (SNN) has emerged, which mimic the behavior of the human brain to improve efficiency and reduce energy consumption. These n… ▽ More

    Submitted 12 October, 2023; v1 submitted 10 August, 2023; originally announced August 2023.

    Journal ref: Information 2023, 14, 537

  29. arXiv:2308.03108  [pdf, other

    cs.CV cs.CR

    SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique

    Abstract: In this paper, we investigate the vulnerability of MDE to adversarial patches. We propose a novel \underline{S}tealthy \underline{A}dversarial \underline{A}ttacks on \underline{M}DE (SAAM) that compromises MDE by either corrupting the estimated distance or causing an object to seamlessly blend into its surroundings. Our experiments, demonstrate that the designed stealthy patch successfully causes… ▽ More

    Submitted 20 December, 2023; v1 submitted 6 August, 2023; originally announced August 2023.

  30. arXiv:2307.11128  [pdf, other

    cs.AR cs.AI cs.ET cs.PL

    Approximate Computing Survey, Part II: Application-Specific & Architectural Approximation Techniques and Applications

    Authors: Vasileios Leon, Muhammad Abdullah Hanif, Giorgos Armeniakos, Xun Jiao, Muhammad Shafique, Kiamal Pekmestzi, Dimitrios Soudris

    Abstract: The challenging deployment of compute-intensive applications from domains such Artificial Intelligence (AI) and Digital Signal Processing (DSP), forces the community of computing systems to explore new design approaches. Approximate Computing appears as an emerging solution, allowing to tune the quality of results in the design of a system in order to improve the energy efficiency and/or performan… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

    Comments: Under Review at ACM Computing Surveys

  31. arXiv:2307.11124  [pdf, other

    cs.AR cs.ET cs.PL

    Approximate Computing Survey, Part I: Terminology and Software & Hardware Approximation Techniques

    Authors: Vasileios Leon, Muhammad Abdullah Hanif, Giorgos Armeniakos, Xun Jiao, Muhammad Shafique, Kiamal Pekmestzi, Dimitrios Soudris

    Abstract: The rapid growth of demanding applications in domains applying multimedia processing and machine learning has marked a new era for edge and cloud computing. These applications involve massive data and compute-intensive tasks, and thus, typical computing paradigms in embedded systems and data centers are stressed to meet the worldwide demand for high performance. Concurrently, the landscape of the… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

    Comments: Under Review at ACM Computing Surveys

  32. arXiv:2306.17323  [pdf, other

    cs.LG

    Scaling Model Checking for DNN Analysis via State-Space Reduction and Input Segmentation (Extended Version)

    Authors: Mahum Naseer, Osman Hasan, Muhammad Shafique

    Abstract: Owing to their remarkable learning capabilities and performance in real-world applications, the use of machine learning systems based on Neural Networks (NNs) has been continuously increasing. However, various case studies and empirical findings in the literature suggest that slight variations to NN inputs can lead to erroneous and undesirable NN behavior. This has led to considerable interest in… ▽ More

    Submitted 3 July, 2023; v1 submitted 29 June, 2023; originally announced June 2023.

  33. X-Rel: Energy-Efficient and Low-Overhead Approximate Reliability Framework for Error-Tolerant Applications Deployed in Critical Systems

    Authors: Jafar Vafaei, Omid Akbari, Muhammad Shafique, Christian Hochberger

    Abstract: Triple Modular Redundancy (TMR) is one of the most common techniques in fault-tolerant systems, in which the output is determined by a majority voter. However, the design diversity of replicated modules and/or soft errors that are more likely to happen in the nanoscale era may affect the majority voting scheme. Besides, the significant overheads of the TMR scheme may limit its usage in energy cons… ▽ More

    Submitted 4 July, 2023; v1 submitted 15 June, 2023; originally announced June 2023.

    Comments: This paper has been published in IEEE Transactions on Very Large Scale Integration (VLSI) Systems

    Journal ref: IEEE Transactions on Very Large Scale Integration (VLSI) Systems, May 2023

  34. An Energy-Efficient Generic Accuracy Configurable Multiplier Based on Block-Level Voltage Overscaling

    Authors: Ali Akbar Bahoo, Omid Akbari, Muhammad Shafique

    Abstract: Voltage Overscaling (VOS) is one of the well-known techniques to increase the energy efficiency of arithmetic units. Also, it can provide significant lifetime improvements, while still meeting the accuracy requirements of inherently error-resilient applications. This paper proposes a generic accuracy-configurable multiplier that employs the VOS at a coarse-grained level (block-level) to reduce the… ▽ More

    Submitted 4 July, 2023; v1 submitted 15 June, 2023; originally announced June 2023.

    Comments: This paper has been published in IEEE Transactions on Emerging Topics in Computing

    Journal ref: IEEE Transactions on Emerging Topics in Computing, May 2023

  35. arXiv:2305.12595  [pdf, other

    cs.AR

    Reduce: A Framework for Reducing the Overheads of Fault-Aware Retraining

    Authors: Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Fault-aware retraining has emerged as a prominent technique for mitigating permanent faults in Deep Neural Network (DNN) hardware accelerators. However, retraining leads to huge overheads, specifically when used for fine-tuning large DNNs designed for solving complex problems. Moreover, as each fabricated chip can have a distinct fault pattern, fault-aware retraining is required to be performed fo… ▽ More

    Submitted 21 May, 2023; originally announced May 2023.

    Comments: 2 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:2304.12949

  36. arXiv:2305.12590  [pdf, other

    cs.AR cs.LG

    FAQ: Mitigating the Impact of Faults in the Weight Memory of DNN Accelerators through Fault-Aware Quantization

    Authors: Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Permanent faults induced due to imperfections in the manufacturing process of Deep Neural Network (DNN) accelerators are a major concern, as they negatively impact the manufacturing yield of the chip fabrication process. Fault-aware training is the state-of-the-art approach for mitigating such faults. However, it incurs huge retraining overheads, specifically when used for large DNNs trained on co… ▽ More

    Submitted 21 May, 2023; originally announced May 2023.

    Comments: 8 pages, 15 figures

  37. arXiv:2305.11618  [pdf, other

    cs.CR cs.CV

    DAP: A Dynamic Adversarial Patch for Evading Person Detectors

    Authors: Amira Guesmi, Ruitian Ding, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: Patch-based adversarial attacks were proven to compromise the robustness and reliability of computer vision systems. However, their conspicuous and easily detectable nature challenge their practicality in real-world setting. To address this, recent work has proposed using Generative Adversarial Networks (GANs) to generate naturalistic patches that may not attract human attention. However, such app… ▽ More

    Submitted 20 November, 2023; v1 submitted 19 May, 2023; originally announced May 2023.

  38. arXiv:2304.12949  [pdf, other

    cs.AR cs.LG

    eFAT: Improving the Effectiveness of Fault-Aware Training for Mitigating Permanent Faults in DNN Hardware Accelerators

    Authors: Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Fault-Aware Training (FAT) has emerged as a highly effective technique for addressing permanent faults in DNN accelerators, as it offers fault mitigation without significant performance or accuracy loss, specifically at low and moderate fault rates. However, it leads to very high retraining overheads, especially when used for large DNNs designed for complex AI applications. Moreover, as each fabri… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

    Comments: 8 pages, 13 figures

  39. arXiv:2304.04041  [pdf, other

    cs.NE cs.AI cs.AR cs.LG

    RescueSNN: Enabling Reliable Executions on Spiking Neural Network Accelerators under Permanent Faults

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: To maximize the performance and energy efficiency of Spiking Neural Network (SNN) processing on resource-constrained embedded systems, specialized hardware accelerators/chips are employed. However, these SNN chips may suffer from permanent faults which can affect the functionality of weight memory and neuron behavior, thereby causing potentially significant accuracy degradation and system malfunct… ▽ More

    Submitted 8 April, 2023; originally announced April 2023.

    Comments: Accepted for publication at Frontiers in Neuroscience - Section Neuromorphic Engineering

  40. arXiv:2304.04039  [pdf, other

    cs.NE cs.AI cs.AR cs.LG

    EnforceSNN: Enabling Resilient and Energy-Efficient Spiking Neural Network Inference considering Approximate DRAMs for Embedded Systems

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Spiking Neural Networks (SNNs) have shown capabilities of achieving high accuracy under unsupervised settings and low operational power/energy due to their bio-plausible computations. Previous studies identified that DRAM-based off-chip memory accesses dominate the energy consumption of SNN processing. However, state-of-the-art works do not optimize the DRAM energy-per-access, thereby hindering th… ▽ More

    Submitted 8 April, 2023; originally announced April 2023.

    Comments: Accepted for publication at Frontiers in Neuroscience - Section Neuromorphic Engineering

  41. arXiv:2304.03986  [pdf, other

    cs.LG

    SwiftTron: An Efficient Hardware Accelerator for Quantized Transformers

    Authors: Alberto Marchisio, Davide Dura, Maurizio Capra, Maurizio Martina, Guido Masera, Muhammad Shafique

    Abstract: Transformers' compute-intensive operations pose enormous challenges for their deployment in resource-constrained EdgeAI / tinyML devices. As an established neural network compression technique, quantization reduces the hardware computational and memory resources. In particular, fixed-point quantization is desirable to ease the computations using lightweight blocks, like adders and multipliers, of… ▽ More

    Submitted 25 April, 2023; v1 submitted 8 April, 2023; originally announced April 2023.

    Comments: To appear at the 2023 International Joint Conference on Neural Networks (IJCNN), Queensland, Australia, June 2023

  42. arXiv:2304.03973  [pdf, other

    cs.LG

    RobCaps: Evaluating the Robustness of Capsule Networks against Affine Transformations and Adversarial Attacks

    Authors: Alberto Marchisio, Antonio De Marco, Alessio Colucci, Maurizio Martina, Muhammad Shafique

    Abstract: Capsule Networks (CapsNets) are able to hierarchically preserve the pose relationships between multiple objects for image classification tasks. Other than achieving high accuracy, another relevant factor in deploying CapsNets in safety-critical applications is the robustness against input transformations and malicious adversarial attacks. In this paper, we systematically analyze and evaluate dif… ▽ More

    Submitted 25 April, 2023; v1 submitted 8 April, 2023; originally announced April 2023.

    Comments: To appear at the 2023 International Joint Conference on Neural Networks (IJCNN), Queensland, Australia, June 2023

  43. arXiv:2304.02510  [pdf, other

    cs.CR

    FPGA-Patch: Mitigating Remote Side-Channel Attacks on FPGAs using Dynamic Patch Generation

    Authors: Mahya Morid Ahmadi, Lilas Alrahis, Ozgur Sinanoglu, Muhammad Shafique

    Abstract: We propose FPGA-Patch, the first-of-its-kind defense that leverages automated program repair concepts to thwart power side-channel attacks on cloud FPGAs. FPGA-Patch generates isofunctional variants of the target hardware by injecting faults and finding transformations that eliminate failure. The obtained variants display different hardware characteristics, ensuring a maximal diversity in power tr… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

    Comments: 6 pages

  44. arXiv:2303.16589  [pdf, other

    cs.LG

    Poster: Link between Bias, Node Sensitivity and Long-Tail Distribution in trained DNNs

    Authors: Mahum Naseer, Muhammad Shafique

    Abstract: Owing to their remarkable learning (and relearning) capabilities, deep neural networks (DNNs) find use in numerous real-world applications. However, the learning of these data-driven machine learning models is generally as good as the data available to them for training. Hence, training datasets with long-tail distribution pose a challenge for DNNs, since the DNNs trained on them may provide a var… ▽ More

    Submitted 3 April, 2023; v1 submitted 29 March, 2023; originally announced March 2023.

    Comments: To appear at the 16th IEEE International Conference on Software Testing, Verification and Validation (ICST 2023), Dublin, Ireland

  45. arXiv:2303.14009  [pdf, other

    cs.CR

    PoisonedGNN: Backdoor Attack on Graph Neural Networks-based Hardware Security Systems

    Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Abdullah Hanif, Muhammad Shafique, Ozgur Sinanoglu

    Abstract: Graph neural networks (GNNs) have shown great success in detecting intellectual property (IP) piracy and hardware Trojans (HTs). However, the machine learning community has demonstrated that GNNs are susceptible to data poisoning attacks, which result in GNNs performing abnormally on graphs with pre-defined backdoor triggers (realized using crafted subgraphs). Thus, it is imperative to ensure that… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: This manuscript is currently under review at IEEE Transactions on Computers

  46. arXiv:2303.13992  [pdf, other

    cs.CR cs.AI

    Physical Backdoor Trigger Activation of Autonomous Vehicle using Reachability Analysis

    Authors: Wenqing Li, Yue Wang, Muhammad Shafique, Saif Eddin Jabari

    Abstract: Recent studies reveal that Autonomous Vehicles (AVs) can be manipulated by hidden backdoors, causing them to perform harmful actions when activated by physical triggers. However, it is still unclear how these triggers can be activated while adhering to traffic principles. Understanding this vulnerability in a dynamic traffic environment is crucial. This work addresses this gap by presenting physic… ▽ More

    Submitted 27 March, 2023; v1 submitted 24 March, 2023; originally announced March 2023.

  47. arXiv:2303.08035  [pdf, other

    cs.LG cs.AI cs.CV

    ISimDL: Importance Sampling-Driven Acceleration of Fault Injection Simulations for Evaluating the Robustness of Deep Learning

    Authors: Alessio Colucci, Andreas Steininger, Muhammad Shafique

    Abstract: Deep Learning (DL) systems have proliferated in many applications, requiring specialized hardware accelerators and chips. In the nano-era, devices have become increasingly more susceptible to permanent and transient faults. Therefore, we need an efficient methodology for analyzing the resilience of advanced DL systems against such faults, and understand how the faults in neural accelerator chips m… ▽ More

    Submitted 25 May, 2023; v1 submitted 14 March, 2023; originally announced March 2023.

    Comments: Submission under review

  48. arXiv:2303.07898  [pdf, other

    cs.CV

    ISLE: A Framework for Image Level Semantic Segmentation Ensemble

    Authors: Erik Ostrowski, Muhammad Shafique

    Abstract: One key bottleneck of employing state-of-the-art semantic segmentation networks in the real world is the availability of training labels. Conventional semantic segmentation networks require massive pixel-wise annotated labels to reach state-of-the-art prediction quality. Hence, several works focus on semantic segmentation networks trained with only image-level annotations. However, when scrutinizi… ▽ More

    Submitted 20 September, 2023; v1 submitted 14 March, 2023; originally announced March 2023.

    Comments: Accepted for Publication at the International Symposium on Visual Computing (ISVC), October 2023, Lake Tahoe, NV, USA

  49. arXiv:2303.07896  [pdf, other

    cs.CV

    Exploring Weakly Supervised Semantic Segmentation Ensembles for Medical Imaging Systems

    Authors: Erik Ostrowski, Bharath Srinivas Prabakaran, Muhammad Shafique

    Abstract: Reliable classification and detection of certain medical conditions, in images, with state-of-the-art semantic segmentation networks, require vast amounts of pixel-wise annotation. However, the public availability of such datasets is minimal. Therefore, semantic segmentation with image-level labels presents a promising alternative to this problem. Nevertheless, very few works have focused on evalu… ▽ More

    Submitted 16 March, 2023; v1 submitted 14 March, 2023; originally announced March 2023.

  50. SILOP: An Automated Framework for Semantic Segmentation Using Image Labels Based on Object Perimeters

    Authors: Erik Ostrowski, Bharath Srinivas Prabakaran, Muhammad Shafique

    Abstract: Achieving high-quality semantic segmentation predictions using only image-level labels enables a new level of real-world applicability. Although state-of-the-art networks deliver reliable predictions, the amount of handcrafted pixel-wise annotations to enable these results are not feasible in many real-world applications. Hence, several works have already targeted this bottleneck, using classifier… ▽ More

    Submitted 8 May, 2023; v1 submitted 14 March, 2023; originally announced March 2023.

    Comments: Accepted for Publication at the International Joint Conference on Neural Networks (IJCNN), July 2023, Gold Coast, Queensland, Australia