Skip to main content

Showing 51–92 of 92 results for author: Hanif, M

  1. arXiv:2012.05948  [pdf, other

    cs.CR

    GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking

    Authors: Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur Sinanoglu

    Abstract: In this paper, we propose GNNUnlock, the first-of-its-kind oracle-less machine learning-based attack on provably secure logic locking that can identify any desired protection logic without focusing on a specific syntactic topology. The key is to leverage a well-trained graph neural network (GNN) to identify all the gates in a given locked netlist that belong to the targeted protection logic, witho… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

    Comments: 6 pages, 4 figures, 6 tables, conference

  2. DESCNet: Developing Efficient Scratchpad Memories for Capsule Network Hardware

    Authors: Alberto Marchisio, Vojtech Mrazek, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Deep Neural Networks (DNNs) have been established as the state-of-the-art algorithm for advanced machine learning applications. Recently proposed by the Google Brain's team, the Capsule Networks (CapsNets) have improved the generalization ability, as compared to DNNs, due to their multi-dimensional capsules and preserving the spatial relationship between different objects. However, they pose signi… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

    Comments: Accepted for publication at the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

  3. arXiv:2008.01191  [pdf, other

    cs.IR cs.CV cs.LG

    Deep Learning Techniques for Future Intelligent Cross-Media Retrieval

    Authors: Sadaqat ur Rehman, Muhammad Waqas, Shanshan Tu, Anis Koubaa, Obaid ur Rehman, Jawad Ahmad, Muhammad Hanif, Zhu Han

    Abstract: With the advancement in technology and the expansion of broadcasting, cross-media retrieval has gained much attention. It plays a significant role in big data applications and consists in searching and finding data from different types of media. In this paper, we provide a novel taxonomy according to the challenges faced by multi-modal deep learning approaches in solving cross-media retrieval, nam… ▽ More

    Submitted 21 July, 2020; originally announced August 2020.

    Comments: arXiv admin note: text overlap with arXiv:1804.09539 by other authors

  4. DRMap: A Generic DRAM Data Mapping Policy for Energy-Efficient Processing of Convolutional Neural Networks

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Many convolutional neural network (CNN) accelerators face performance- and energy-efficiency challenges which are crucial for embedded implementations, due to high DRAM access latency and energy. Recently, some DRAM architectures have been proposed to exploit subarray-level parallelism for decreasing the access latency. Towards this, we present a design space exploration methodology to study the l… ▽ More

    Submitted 21 April, 2020; originally announced April 2020.

    Comments: To appear at the 57th Design Automation Conference (DAC), July 2020, San Francisco, CA, USA

  5. arXiv:1912.01978  [pdf, other

    cs.LG stat.ML

    FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks

    Authors: Mahum Naseer, Mishal Fatima Minhas, Faiq Khalid, Muhammad Abdullah Hanif, Osman Hasan, Muhammad Shafique

    Abstract: With a constant improvement in the network architectures and training methodologies, Neural Networks (NNs) are increasingly being deployed in real-world Machine Learning systems. However, despite their impressive performance on "known inputs", these NNs can fail absurdly on the "unseen inputs", especially if these real-time inputs deviate from the training dataset distributions, or contain certain… ▽ More

    Submitted 14 May, 2020; v1 submitted 3 December, 2019; originally announced December 2019.

    Comments: To appear at the 23rd Design, Automation and Test in Europe (DATE 2020). Grenoble, France

  6. arXiv:1912.00941  [pdf, other

    cs.LG stat.ML

    FT-ClipAct: Resilience Analysis of Deep Neural Networks and Improving their Fault Tolerance using Clipped Activation

    Authors: Le-Ha Hoang, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Deep Neural Networks (DNNs) are widely being adopted for safety-critical applications, e.g., healthcare and autonomous driving. Inherently, they are considered to be highly error-tolerant. However, recent studies have shown that hardware faults that impact the parameters of a DNN (e.g., weights) can have drastic impacts on its classification accuracy. In this paper, we perform a comprehensive erro… ▽ More

    Submitted 2 December, 2019; originally announced December 2019.

    Comments: The 23rd Design, Automation and Test in Europe (DATE 2020)

  7. ReD-CaNe: A Systematic Methodology for Resilience Analysis and Design of Capsule Networks under Approximations

    Authors: Alberto Marchisio, Vojtech Mrazek, Muhammad Abudllah Hanif, Muhammad Shafique

    Abstract: Recent advances in Capsule Networks (CapsNets) have shown their superior learning capability, compared to the traditional Convolutional Neural Networks (CNNs). However, the extremely high complexity of CapsNets limits their fast deployment in real-world applications. Moreover, while the resilience of CNNs have been extensively investigated to enable their energy-efficient implementations, the anal… ▽ More

    Submitted 2 December, 2019; originally announced December 2019.

    Comments: To appear at the 23rd Design, Automation and Test in Europe (DATE 2020). Grenoble, France

  8. ALWANN: Automatic Layer-Wise Approximation of Deep Neural Network Accelerators without Retraining

    Authors: Vojtech Mrazek, Zdenek Vasicek, Lukas Sekanina, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: The state-of-the-art approaches employ approximate computing to reduce the energy consumption of DNN hardware. Approximate DNNs then require extensive retraining afterwards to recover from the accuracy loss caused by the use of approximate operations. However, retraining of complex DNNs does not scale well. In this paper, we demonstrate that efficient approximations can be introduced into the comp… ▽ More

    Submitted 25 July, 2019; v1 submitted 11 June, 2019; originally announced July 2019.

    Comments: Accepted for 2019 IEEE/ACM International Conference On Computer-Aided Design (ICCAD'19)

  9. FasTrCaps: An Integrated Framework for Fast yet Accurate Training of Capsule Networks

    Authors: Alberto Marchisio, Beatrice Bussolino, Alessio Colucci, Muhammad Abdullah Hanif, Maurizio Martina, Guido Masera, Muhammad Shafique

    Abstract: Recently, Capsule Networks (CapsNets) have shown improved performance compared to the traditional Convolutional Neural Networks (CNNs), by encoding and preserving spatial relationships between the detected features in a better way. This is achieved through the so-called Capsules (i.e., groups of neurons) that encode both the instantiation probability and the spatial information. However, one of th… ▽ More

    Submitted 18 May, 2020; v1 submitted 24 May, 2019; originally announced May 2019.

    Comments: Accepted for publication at the 2020 International Joint Conference on Neural Networks (IJCNN)

  10. autoAx: An Automatic Design Space Exploration and Circuit Building Methodology utilizing Libraries of Approximate Components

    Authors: Vojtech Mrazek, Muhammad Abdullah Hanif, Zdenek Vasicek, Lukas Sekanina, Muhammad Shafique

    Abstract: Approximate computing is an emerging paradigm for developing highly energy-efficient computing systems such as various accelerators. In the literature, many libraries of elementary approximate circuits have already been proposed to simplify the design process of approximate accelerators. Because these libraries contain from tens to thousands of approximate implementations for a single arithmetic o… ▽ More

    Submitted 1 April, 2019; v1 submitted 22 February, 2019; originally announced February 2019.

    Comments: Accepted for publication at the Design Automation Conference 2019 (DAC'19), Las Vegas, Nevada, USA

  11. ROMANet: Fine-Grained Reuse-Driven Off-Chip Memory Access Management and Data Organization for Deep Neural Network Accelerators

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Enabling high energy efficiency is crucial for embedded implementations of deep learning. Several studies have shown that the DRAM-based off-chip memory accesses are one of the most energy-consuming operations in deep neural network (DNN) accelerators, and thereby limit the designs from achieving efficiency gains at the full potential. DRAM access energy varies depending upon the number of accesse… ▽ More

    Submitted 2 August, 2020; v1 submitted 4 February, 2019; originally announced February 2019.

    Comments: Submitted to the IEEE-TVLSI journal, 14 pages, 26 figures

  12. arXiv:1902.01151  [pdf, other

    cs.LG cs.AR

    CapStore: Energy-Efficient Design and Management of the On-Chip Memory for CapsuleNet Inference Accelerators

    Authors: Alberto Marchisio, Muhammad Abdullah Hanif, Mohammad Taghi Teimoori, Muhammad Shafique

    Abstract: Deep Neural Networks (DNNs) have been established as the state-of-the-art algorithm for advanced machine learning applications. Recently, CapsuleNets have improved the generalization ability, as compared to DNNs, due to their multi-dimensional capsules. However, they pose high computational and memory requirements, which makes energy-efficient inference a challenging task. In this paper, we perfor… ▽ More

    Submitted 12 April, 2019; v1 submitted 4 February, 2019; originally announced February 2019.

  13. arXiv:1902.01147  [pdf, other

    cs.LG cs.CR eess.IV stat.ML

    Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks

    Authors: Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique

    Abstract: Spiking Neural Networks (SNNs) claim to present many advantages in terms of biological plausibility and energy efficiency compared to standard Deep Neural Networks (DNNs). Recent works have shown that DNNs are vulnerable to adversarial attacks, i.e., small perturbations added to the input data can lead to targeted or random misclassifications. In this paper, we aim at investigating the key researc… ▽ More

    Submitted 18 May, 2020; v1 submitted 4 February, 2019; originally announced February 2019.

    Comments: Accepted for publication at the 2020 International Joint Conference on Neural Networks (IJCNN)

  14. arXiv:1901.10258  [pdf, other

    cs.CR cs.LG

    RED-Attack: Resource Efficient Decision based Attack for Machine Learning

    Authors: Faiq Khalid, Hassan Ali, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

    Abstract: Due to data dependency and model leakage properties, Deep Neural Networks (DNNs) exhibit several security vulnerabilities. Several security attacks exploited them but most of them require the output probability vector. These attacks can be mitigated by concealing the output probability vector. To address this limitation, decision-based attacks have been proposed which can estimate the model but th… ▽ More

    Submitted 30 January, 2019; v1 submitted 29 January, 2019; originally announced January 2019.

  15. arXiv:1901.09878  [pdf, other

    cs.LG cs.CR cs.CV eess.IV stat.ML

    CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks

    Authors: Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique

    Abstract: Capsule Networks preserve the hierarchical spatial relationships between objects, and thereby bears a potential to surpass the performance of traditional Convolutional Neural Networks (CNNs) in performing tasks like image classification. A large body of work has explored adversarial examples for CNNs, but their effectiveness on Capsule Networks has not yet been well studied. In our work, we perfor… ▽ More

    Submitted 24 May, 2019; v1 submitted 28 January, 2019; originally announced January 2019.

  16. arXiv:1901.04986  [pdf

    cs.DC cs.LG eess.IV

    Systimator: A Design Space Exploration Methodology for Systolic Array based CNNs Acceleration on the FPGA-based Edge Nodes

    Authors: Hazoor Ahmad, Muhammad Tanvir, Muhammad Abdullah Hanif, Muhammad Usama Javed, Rehan Hafiz, Muhammad Shafique

    Abstract: The evolution of IoT based smart applications demand porting of artificial intelligence algorithms to the edge computing devices. CNNs form a large part of these AI algorithms. Systolic array based CNN acceleration is being widely advocated due its ability to allow scalable architectures. However, CNNs are inherently memory and compute intensive algorithms, and hence pose significant challenges to… ▽ More

    Submitted 8 February, 2019; v1 submitted 15 December, 2018; originally announced January 2019.

    Comments: 5 Pages, 3 Figures, work in progress

  17. arXiv:1812.08034  [pdf, other

    physics.atm-clus

    Inelastic scattering of photoelectrons from He nanodroplets

    Authors: M. V. Shcherbinin, F. Vad Westergaard, M. Hanif, S. R. Krishnan, A. C. LaForge, R. Richter, T. Pfeifer, M. Mudrich

    Abstract: We present a detailed study of inelastic energy-loss collisions of photoelectrons emitted from He nanodroplets by tunable extreme ultraviolet (XUV) radiation. Using coincidence imaging detection of electrons and ions, we probe the lowest He droplet excited states up to the electron impact ionization threshold. We find significant signal contributions from photoelectrons emitted from free He atoms… ▽ More

    Submitted 19 December, 2018; originally announced December 2018.

  18. CapsAcc: An Efficient Hardware Accelerator for CapsuleNets with Data Reuse

    Authors: Alberto Marchisio, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Deep Neural Networks (DNNs) have been widely deployed for many Machine Learning applications. Recently, CapsuleNets have overtaken traditional DNNs, because of their improved generalization ability due to the multi-dimensional capsules, in contrast to the single-dimensional neurons. Consequently, CapsuleNets also require extremely intense matrix computations, making it a gigantic challenge to achi… ▽ More

    Submitted 2 November, 2018; originally announced November 2018.

    Comments: Accepted for publication at Design, Automation and Test in Europe (DATE 2019). Florence, Italy

  19. arXiv:1811.03980  [pdf, other

    cs.NE cs.LG stat.ML

    A Methodology for Automatic Selection of Activation Functions to Design Hybrid Deep Neural Networks

    Authors: Alberto Marchisio, Muhammad Abdullah Hanif, Semeen Rehman, Maurizio Martina, Muhammad Shafique

    Abstract: Activation functions influence behavior and performance of DNNs. Nonlinear activation functions, like Rectified Linear Units (ReLU), Exponential Linear Units (ELU) and Scaled Exponential Linear Units (SELU), outperform the linear counterparts. However, selecting an appropriate activation function is a challenging problem, as it affects the accuracy and the complexity of the given DNN. In this pape… ▽ More

    Submitted 27 October, 2018; originally announced November 2018.

  20. arXiv:1811.01463  [pdf

    cs.LG cs.CR stat.ML

    Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference

    Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique

    Abstract: The exponential increase in dependencies between the cyber and physical world leads to an enormous amount of data which must be efficiently processed and stored. Therefore, computing paradigms are evolving towards machine learning (ML)-based systems because of their ability to efficiently and accurately process the enormous amount of data. Although ML-based solutions address the efficient computin… ▽ More

    Submitted 4 November, 2018; originally announced November 2018.

    Report number: INSPEC Accession Number: 18398499

    Journal ref: International Conference on Frontiers of Information Technology (FIT) 2018

  21. arXiv:1811.01444  [pdf, other

    cs.LG cs.CR stat.ML

    FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning

    Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique

    Abstract: Deep neural networks (DNN)-based machine learning (ML) algorithms have recently emerged as the leading ML paradigm particularly for the task of classification due to their superior capability of learning efficiently from large datasets. The discovery of a number of well-known attacks such as dataset poisoning, adversarial examples, and network manipulation (through the addition of malicious nodes)… ▽ More

    Submitted 4 November, 2018; originally announced November 2018.

    Comments: Accepted in Design, Automation and Test in Europe 2019

  22. arXiv:1811.01443  [pdf, other

    cs.LG cs.CR stat.ML

    SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters

    Authors: Hassan Ali, Faiq Khalid, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

    Abstract: In this paper, we introduce a novel technique based on the Secure Selective Convolutional (SSC) techniques in the training loop that increases the robustness of a given DNN by allowing it to learn the data distribution based on the important edges in the input image. We validate our technique on Convolutional DNNs against the state-of-the-art attacks from the open-source Cleverhans library using t… ▽ More

    Submitted 14 May, 2020; v1 submitted 4 November, 2018; originally announced November 2018.

    Journal ref: IEEE Design & Test, vol. 37, no. 2, pp. 58-65, April 2020

  23. arXiv:1811.01437  [pdf, other

    cs.LG cs.CR stat.ML

    QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks

    Authors: Faiq Khalid, Hassan Ali, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

    Abstract: Adversarial examples have emerged as a significant threat to machine learning algorithms, especially to the convolutional neural networks (CNNs). In this paper, we propose two quantization-based defense mechanisms, Constant Quantization (CQ) and Trainable Quantization (TQ), to increase the robustness of CNNs against adversarial examples. CQ quantizes input pixel intensities based on a "fixed" numb… ▽ More

    Submitted 14 May, 2020; v1 submitted 4 November, 2018; originally announced November 2018.

    Journal ref: 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), Rhodes, Greece, 2019, pp. 182-187

  24. arXiv:1811.01031  [pdf, other

    cs.LG cs.CR stat.ML

    TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks

    Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

    Abstract: Most of the data manipulation attacks on deep neural networks (DNNs) during the training stage introduce a perceptible noise that can be catered by preprocessing during inference or can be identified during the validation phase. Therefore, data poisoning attacks during inference (e.g., adversarial attacks) are becoming more popular. However, many of them do not consider the imperceptibility factor… ▽ More

    Submitted 14 May, 2020; v1 submitted 2 November, 2018; originally announced November 2018.

    Journal ref: 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), Rhodes, Greece, 2019, pp. 188-193

  25. arXiv:1810.12910  [pdf, other

    cs.DC cs.AR cs.LG

    MPNA: A Massively-Parallel Neural Array Accelerator with Dataflow Optimization for Convolutional Neural Networks

    Authors: Muhammad Abdullah Hanif, Rachmad Vidya Wicaksana Putra, Muhammad Tanvir, Rehan Hafiz, Semeen Rehman, Muhammad Shafique

    Abstract: The state-of-the-art accelerators for Convolutional Neural Networks (CNNs) typically focus on accelerating only the convolutional layers, but do not prioritize the fully-connected layers much. Hence, they lack a synergistic optimization of the hardware architecture and diverse dataflows for the complete CNN design, which can provide a higher potential for performance/energy efficiency. Towards thi… ▽ More

    Submitted 30 October, 2018; originally announced October 2018.

  26. Penning ionization of acene molecules by He nanodroplets

    Authors: Mykola Shcherbinin, Aaron C. LaForge, Muhammad Hanif, Robert Richter, Marcel Mudrich

    Abstract: Acene molecules (anthracene, tetracene, pentacene) and fullerene (C$_{60}$) are embedded in He nanodroplets (He$_N$) and probed by EUV synchrotron radiation. When resonantly exciting the He nanodroplets, the embedded molecules M are efficiently ionized by the Penning reaction $\mathrm{He}_N^*+\mathrm{M}\rightarrow\mathrm{He}_N + \mathrm{M}^+ + e^-$. However, the Penning electron spectra are broad… ▽ More

    Submitted 11 January, 2018; originally announced January 2018.

  27. arXiv:1704.00651  [pdf, other

    cs.IT

    Fast Encoding and Decoding of Flexible-Rate and Flexible-Length Polar Codes

    Authors: Muhammad Hanif, Masoud Ardakani

    Abstract: This work is on fast encoding and decoding of polar codes. We propose and detail 8-bit and 16-bit parallel decoders that can be used to reduce the decoding latency of the successive-cancellation decoder. These decoders are universal and can decode flexible-rate and flexible-length polar codes. We also present fast encoders that can be used to increase the throughput of serially-implemented polar e… ▽ More

    Submitted 3 April, 2017; originally announced April 2017.

  28. arXiv:1701.04733  [pdf

    cs.DC

    BTAS: A Library for Tropical Algebra

    Authors: Ahsan Humayun, Dr. Muhammad Asif, Dr. Muhammmad Kashif Hanif

    Abstract: GPUs are dedicated processors used for complex calculations and simulations and they can be effectively used for tropical algebra computations. Tropical algebra is based on max-plus algebra and min-plus algebra. In this paper we proposed and designed a library based on Tropical Algebra which is used to provide standard vector and matrix operations namely Basic Tropical Algebra Subroutines (BTAS).… ▽ More

    Submitted 17 January, 2017; originally announced January 2017.

    Journal ref: International Journal of Computer Science and Information Security 2016 Volume 14 No.12

  29. A Minorization-Maximization Method for Optimizing Sum Rate in Non-Orthogonal Multiple Access Systems

    Authors: Muhammad Fainan Hanif, Zhiguo Ding, Tharmalingam Ratnarajah, George K. Karagiannidis

    Abstract: Non-orthogonal multiple access (NOMA) systems have the potential to deliver higher system throughput, compared to contemporary orthogonal multiple access techniques. For a linearly precoded multiple-input multiple-output (MISO) system, we study the downlink sum rate maximization problem, when the NOMA principles are applied. Being a non-convex and intractable optimization problem,we resort to appr… ▽ More

    Submitted 21 May, 2015; originally announced May 2015.

    Comments: Submitted for journal publication

    Journal ref: IEEE Transactions on Signal Processing, vol.64, no.1, pp.76-88, Jan.1, 2016

  30. arXiv:1404.5083  [pdf, other

    cs.IT

    Transmit Antenna Selection in Underlay Cognitive Radio Environment

    Authors: Muhammad Hanif, Hong-Chuan Yang, Mohamed-Slim Alouini

    Abstract: Cognitive radio (CR) technology addresses the problem of spectrum under-utilization. In underlay CR mode, the secondary users are allowed to communicate provided that their transmission is not detrimental to primary user communication. Transmit antenna selection is one of the low-complexity methods to increase the capacity of wireless communication systems. In this article, we propose and analyze… ▽ More

    Submitted 30 July, 2014; v1 submitted 20 April, 2014; originally announced April 2014.

    Comments: 16 pages, 5 figures

  31. arXiv:1312.3145  [pdf

    physics.data-an

    Algorithm for spectral response analysis of superconducting microwave transmission-line resonator

    Authors: Muhammad Hanif

    Abstract: It has always been a challenge for researchers to efficiently and accurately post process experimental data which is distorted by the noise. Superconducting microwave devices e.g. resonators, directional filters, beam-splitters etc. operate at frequency of several GHz to THz and temperatures well below critical temperature (Tc) with few exceptions like transition edge sensors where devices are ope… ▽ More

    Submitted 11 December, 2013; originally announced December 2013.

    Comments: 5 pages,5 figures

    Journal ref: Sci. Int.(Lahore),25(4),813-817,2013

  32. Computationally Efficient Robust Beamforming for SINR Balancing in Multicell Downlink

    Authors: Muhammad Fainan Hanif, Le-Nam Tran, Antti Tölli, Markku Juntti

    Abstract: We address the problem of downlink beamformer design for signal-to-interference-plus-noise ratio (SINR) balancing in a multiuser multicell environment with imperfectly estimated channels at base stations (BSs). We first present a semidefinite program (SDP) based approximate solution to the problem. Then, as our main contribution, by exploiting some properties of the robust counterpart of the optim… ▽ More

    Submitted 15 April, 2013; originally announced April 2013.

    Comments: 26 pages, 5 figures. Submitted for possible publication

    Journal ref: IEEE Transactions on Communications, vol.62, no.6, pp.1908,1920, June 2014

  33. Efficient Solutions for Weighted Sum Rate Maximization in Multicellular Networks With Channel Uncertainties

    Authors: Muhammad Fainan Hanif, Le-Nam Tran, Antti Tölli, Markku Juntti, Savo Glisic

    Abstract: The important problem of weighted sum rate maximization (WSRM) in a multicellular environment is intrinsically sensitive to channel estimation errors. In this paper, we study ways to maximize the weighted sum rate in a linearly precoded multicellular downlink system where the receivers are equipped with a single antenna. With perfect channel information available at the base stations, we first pre… ▽ More

    Submitted 2 January, 2013; originally announced January 2013.

    Comments: 31 pages, 8 figures. Submitted for possible publication

    Journal ref: IEEE Transactions on Signal Processing, vol.61, no.22, pp.5659--5674, Nov., 2013

  34. Fast Converging Algorithm for Weighted Sum Rate Maximization in Multicell MISO Downlink

    Authors: Le-Nam Tran, Muhammad Fainan Hanif, Antti Tölli, Markku Juntti

    Abstract: The problem of maximizing weighted sum rates in the downlink of a multicell environment is of considerable interest. Unfortunately, this problem is known to be NP-hard. For the case of multi-antenna base stations and single antenna mobile terminals, we devise a low complexity, fast and provably convergent algorithm that locally optimizes the weighted sum rate in the downlink of the system. In part… ▽ More

    Submitted 8 November, 2012; originally announced November 2012.

    Comments: 10 pages, 2 figures. The MATLAB code of the proposed algorithm can be downloaded from: https://sites.google.com/site/namletran/publication

    Journal ref: IEEE Signal Processing Letters, vol.19, no.12, pp.872-875, Dec. 2012. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6327333&isnumber=6323087

  35. arXiv:1209.5448  [pdf

    cs.IR

    A New Compression Based Index Structure for Efficient Information Retrieval

    Authors: Md. Abdullah al Mamun, Md. Hanif, Md. Rakib Uddin, Tanvir Ahmed, Md. Mofizul Islam

    Abstract: Finding desired information from large data set is a difficult problem. Information retrieval is concerned with the structure, analysis, organization, storage, searching, and retrieval of information. Index is the main constituent of an IR system. Now a day exponential growth of information makes the index structure large enough affecting the IR system's quality. So compressing the Index structure… ▽ More

    Submitted 24 September, 2012; originally announced September 2012.

    Comments: 5 pages

    Journal ref: International Journal of Science and Technology, Volume 2 No.1, pp. 10-14, January 2012

  36. On the Statistics of Cognitive Radio Capacity in Shadowing and Fast Fading Environments (Journal Version)

    Authors: Muhammad Fainan Hanif, Peter J. Smith

    Abstract: In this paper we consider the capacity of the cognitive radio channel in different fading environments under a low interference regime. First we derive the probability that the low interference regime holds under shadow fading as well as Rayleigh and Rician fast fading conditions. We demonstrate that this is the dominant case, especially in practical cognitive radio deployment scenarios. The cap… ▽ More

    Submitted 8 June, 2009; originally announced June 2009.

    Comments: Submitted to the IEEE Transactions on Wireless Commun. The conference version of this paper appears in Proc. IEEE CrownCom, 2009

    Journal ref: IEEE Transactions on Wireless Communications, vol.9, no.2, pp.844-852, 2010

  37. Level Crossing Rates of Interference in Cognitive Radio Networks

    Authors: Muhammad Fainan Hanif, Peter J. Smith

    Abstract: The future deployment of cognitive radios is critically dependent on the fact that the incumbent primary user system must remain as oblivious as possible to their presence. This in turn heavily relies on the fluctuations of the interfering cognitive radio signals. In this letter we compute the level crossing rates of the cumulative interference created by the cognitive radios. We derive analytic… ▽ More

    Submitted 22 May, 2009; originally announced May 2009.

    Comments: submitted to the IEEE Transactions on Wireless Communications

    Journal ref: IEEE Transactions on Wireless Communications, vol.9, no.4, pp.1283-1287, 2010

  38. arXiv:0905.3201  [pdf, ps, other

    cs.IT

    On the Statistics of Cognitive Radio Capacity in Shadowing and Fast Fading Environments

    Authors: Muhammad Fainan Hanif, Peter J. Smith, Mansoor Shafi

    Abstract: In this paper we consider the capacity of the cognitive radio channel in a fading environment under a "low interference regime". This capacity depends critically on a power loss parameter, $α$, which governs how much transmit power the cognitive radio dedicates to relaying the primary message. We derive a simple, accurate approximation to $α$ which gives considerable insight into system capacity… ▽ More

    Submitted 20 May, 2009; originally announced May 2009.

    Comments: to appear in IEEE CrownCom 2009 Proc

  39. Performance of Cognitive Radio Systems with Imperfect Radio Environment Map Information

    Authors: Muhammad Fainan Hanif, Peter J. Smith, Mansoor Shafi

    Abstract: In this paper we describe the effect of imperfections in the radio environment map (REM) information on the performance of cognitive radio (CR) systems. Via simulations we explore the relationship between the required precision of the REM and various channel/system properties. For example, the degree of spatial correlation in the shadow fading is a key factor as is the interference constraint em… ▽ More

    Submitted 20 May, 2009; v1 submitted 19 May, 2009; originally announced May 2009.

    Comments: presented at IEEE AusCTW 2009. Journal versions are under preparation. This posting is the same as the original one. Only author's list is updated that was unfortunately not correctly mentioned in the first version

  40. Interference and Deployment Issues for Cognitive Radio Systems in Shadowing Environments

    Authors: Muhammad Fainan Hanif, Mansoor Shafi, Peter J. Smith, Pawel A. Dmochowski

    Abstract: In this paper we describe a model for calculating the aggregate interference encountered by primary receivers in the presence of randomly placed cognitive radios (CRs). We show that incorporating the impact of distance attenuation and lognormal fading on each constituent interferer in the aggregate, leads to a composite interference that cannot be satisfactorily modeled by a lognormal. Using the… ▽ More

    Submitted 20 May, 2009; v1 submitted 19 May, 2009; originally announced May 2009.

    Comments: to be presented at IEEE ICC 2009. This posting is the same as the original one. Only author's list is updated that was unfortunately not correctly mentioned in first version

  41. Radiative Corrections in Vector-Tensor Models

    Authors: A. Buchel, F. A. Chishtie, M. T. Hanif, S. Homayouni, J. Jia, D. G. C. McKeon

    Abstract: We consider a two-form antisymmetric tensor field φminimally coupled to a non-abelian vector field with a field strength F. Canonical analysis suggests that a pseudoscalar mass term \frac{μ^2}{2} \tr (φ\wedge φ) for the tensor field eliminates degrees of freedom associated with this field. Explicit one loop calculations show that an additional coupling m\tr(φ\wedge F) (which can be eliminated cl… ▽ More

    Submitted 5 May, 2009; originally announced May 2009.

    Comments: 8 pages

    Journal ref: Int.J.Mod.Phys.A25:163-169,2010

  42. arXiv:0901.2039  [pdf

    physics.bio-ph

    ATR-FTIR spectroscopy detects alterations induced by organotin(IV) carboxylates in MCF-7 cells at sub-cytotoxic/-genotoxic concentrations

    Authors: Muhammad S Ahmad, Bushra Mirza, Mukhtiar Hussain, Muhammad Hanif, Saqib Ali, Michael J Walsh, Francis L Martin

    Abstract: The environmental impact of metal complexes such as organotin(IV) compounds is of increasing concern. Genotoxic effects of organotin(IV) compounds (0.01 microg/ml, 0.1 microg/ml or 1.0 microg/ml) were measured using the alkaline single-cell gel electrophoresis (comet) assay to measure DNA single-strand breaks (SSBs) and the cytokinesis-block micronucleus (CBMN) assay to determine micronucleus fo… ▽ More

    Submitted 14 January, 2009; originally announced January 2009.

    Comments: 19 pages, 7 figures

    Journal ref: PMC Biophysics 2008, 1:3