Skip to main content

Showing 1–50 of 73 results for author: Hanif, M

  1. arXiv:2407.02581  [pdf, other

    cs.CV

    Robust ADAS: Enhancing Robustness of Machine Learning-based Advanced Driver Assistance Systems for Adverse Weather

    Authors: Muhammad Zaeem Shahzad, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: In the realm of deploying Machine Learning-based Advanced Driver Assistance Systems (ML-ADAS) into real-world scenarios, adverse weather conditions pose a significant challenge. Conventional ML models trained on clear weather data falter when faced with scenarios like extreme fog or heavy rain, potentially leading to accidents and safety hazards. This paper addresses this issue by proposing a nove… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

    Comments: 7 pages, 10 figures, 1 table

  2. arXiv:2405.03244  [pdf, other

    cs.LG

    Examining Changes in Internal Representations of Continual Learning Models Through Tensor Decomposition

    Authors: Nishant Suresh Aswani, Amira Guesmi, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Continual learning (CL) has spurred the development of several methods aimed at consolidating previous knowledge across sequential learning. Yet, the evaluations of these methods have primarily focused on the final output, such as changes in the accuracy of predicted classes, overlooking the issue of representational forgetting within the model. In this paper, we propose a novel representation-bas… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  3. arXiv:2404.13915  [pdf, other

    math.OC cs.RO

    Angle-Aware Coverage with Camera Rotational Motion Control

    Authors: Zhiyuan Lu, Muhammad Hanif, Takumi Shimizu, Takeshi Hatanaka

    Abstract: This paper presents a novel control strategy for drone networks to improve the quality of 3D structures reconstructed from aerial images by drones. Unlike the existing coverage control strategies for this purpose, our proposed approach simultaneously controls both the camera orientation and drone translational motion, enabling more comprehensive perspectives and enhancing the map's overall quality… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

    Comments: 17 pages, 8 figures, 2 tables

  4. arXiv:2403.11515  [pdf, other

    cs.CV cs.RO

    SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Bassem Ouni, Muhammad Shafique

    Abstract: Monocular depth estimation (MDE) has advanced significantly, primarily through the integration of convolutional neural networks (CNNs) and more recently, Transformers. However, concerns about their susceptibility to adversarial attacks have emerged, especially in safety-critical domains like autonomous driving and robotic navigation. Existing approaches for assessing CNN-based depth prediction met… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  5. arXiv:2403.00830  [pdf, other

    cs.AI cs.CL

    MedAide: Leveraging Large Language Models for On-Premise Medical Assistance on Edge Devices

    Authors: Abdul Basit, Khizar Hussain, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Large language models (LLMs) are revolutionizing various domains with their remarkable natural language processing (NLP) abilities. However, deploying LLMs in resource-constrained edge computing and embedded systems presents significant challenges. Another challenge lies in delivering medical assistance in remote areas with limited healthcare facilities and infrastructure. To address this, we intr… ▽ More

    Submitted 28 February, 2024; originally announced March 2024.

    Comments: 7 pages, 11 figures, ACM conference paper, 33 references

    ACM Class: I.2.7

  6. arXiv:2311.12211  [pdf, other

    cs.CR

    DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction

    Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique

    Abstract: Adversarial patch-based attacks have shown to be a major deterrent towards the reliable use of machine learning models. These attacks involve the strategic modification of localized patches or specific image areas to deceive trained machine learning models. In this paper, we propose \textit{DefensiveDR}, a practical mechanism using a dimensionality reduction technique to thwart such patch-based at… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  7. arXiv:2311.12084  [pdf, other

    cs.CR cs.CV

    ODDR: Outlier Detection & Dimension Reduction Based Defense Against Adversarial Patches

    Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique

    Abstract: Adversarial attacks are a major deterrent towards the reliable use of machine learning models. A powerful type of adversarial attacks is the patch-based attack, wherein the adversarial perturbations modify localized patches or specific areas within the images to deceive the trained machine learning model. In this paper, we introduce Outlier Detection and Dimension Reduction (ODDR), a holistic defe… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  8. arXiv:2310.10315  [pdf, other

    quant-ph cs.LG

    A Survey on Quantum Machine Learning: Current Trends, Challenges, Opportunities, and the Road Ahead

    Authors: Kamila Zaman, Alberto Marchisio, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Quantum Computing (QC) claims to improve the efficiency of solving complex problems, compared to classical computing. When QC is applied to Machine Learning (ML) applications, it forms a Quantum Machine Learning (QML) system. After discussing the basic concepts of QC and its advantages over classical computing, this paper reviews the key aspects of QML in a comprehensive manner. We discuss differe… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

  9. arXiv:2308.06173  [pdf, other

    cs.CR cs.AI cs.CV cs.LG cs.RO

    Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammed Shafique

    Abstract: In this paper, we present a comprehensive survey of the current trends focusing specifically on physical adversarial attacks. We aim to provide a thorough understanding of the concept of physical adversarial attacks, analyzing their key characteristics and distinguishing features. Furthermore, we explore the specific requirements and challenges associated with executing attacks in the physical wor… ▽ More

    Submitted 11 August, 2023; originally announced August 2023.

  10. arXiv:2308.03108  [pdf, other

    cs.CV cs.CR

    SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique

    Abstract: In this paper, we investigate the vulnerability of MDE to adversarial patches. We propose a novel \underline{S}tealthy \underline{A}dversarial \underline{A}ttacks on \underline{M}DE (SAAM) that compromises MDE by either corrupting the estimated distance or causing an object to seamlessly blend into its surroundings. Our experiments, demonstrate that the designed stealthy patch successfully causes… ▽ More

    Submitted 20 December, 2023; v1 submitted 6 August, 2023; originally announced August 2023.

  11. arXiv:2307.11128  [pdf, other

    cs.AR cs.AI cs.ET cs.PL

    Approximate Computing Survey, Part II: Application-Specific & Architectural Approximation Techniques and Applications

    Authors: Vasileios Leon, Muhammad Abdullah Hanif, Giorgos Armeniakos, Xun Jiao, Muhammad Shafique, Kiamal Pekmestzi, Dimitrios Soudris

    Abstract: The challenging deployment of compute-intensive applications from domains such Artificial Intelligence (AI) and Digital Signal Processing (DSP), forces the community of computing systems to explore new design approaches. Approximate Computing appears as an emerging solution, allowing to tune the quality of results in the design of a system in order to improve the energy efficiency and/or performan… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

    Comments: Under Review at ACM Computing Surveys

  12. arXiv:2307.11124  [pdf, other

    cs.AR cs.ET cs.PL

    Approximate Computing Survey, Part I: Terminology and Software & Hardware Approximation Techniques

    Authors: Vasileios Leon, Muhammad Abdullah Hanif, Giorgos Armeniakos, Xun Jiao, Muhammad Shafique, Kiamal Pekmestzi, Dimitrios Soudris

    Abstract: The rapid growth of demanding applications in domains applying multimedia processing and machine learning has marked a new era for edge and cloud computing. These applications involve massive data and compute-intensive tasks, and thus, typical computing paradigms in embedded systems and data centers are stressed to meet the worldwide demand for high performance. Concurrently, the landscape of the… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

    Comments: Under Review at ACM Computing Surveys

  13. arXiv:2305.12595  [pdf, other

    cs.AR

    Reduce: A Framework for Reducing the Overheads of Fault-Aware Retraining

    Authors: Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Fault-aware retraining has emerged as a prominent technique for mitigating permanent faults in Deep Neural Network (DNN) hardware accelerators. However, retraining leads to huge overheads, specifically when used for fine-tuning large DNNs designed for solving complex problems. Moreover, as each fabricated chip can have a distinct fault pattern, fault-aware retraining is required to be performed fo… ▽ More

    Submitted 21 May, 2023; originally announced May 2023.

    Comments: 2 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:2304.12949

  14. arXiv:2305.12590  [pdf, other

    cs.AR cs.LG

    FAQ: Mitigating the Impact of Faults in the Weight Memory of DNN Accelerators through Fault-Aware Quantization

    Authors: Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Permanent faults induced due to imperfections in the manufacturing process of Deep Neural Network (DNN) accelerators are a major concern, as they negatively impact the manufacturing yield of the chip fabrication process. Fault-aware training is the state-of-the-art approach for mitigating such faults. However, it incurs huge retraining overheads, specifically when used for large DNNs trained on co… ▽ More

    Submitted 21 May, 2023; originally announced May 2023.

    Comments: 8 pages, 15 figures

  15. arXiv:2305.11618  [pdf, other

    cs.CR cs.CV

    DAP: A Dynamic Adversarial Patch for Evading Person Detectors

    Authors: Amira Guesmi, Ruitian Ding, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: Patch-based adversarial attacks were proven to compromise the robustness and reliability of computer vision systems. However, their conspicuous and easily detectable nature challenge their practicality in real-world setting. To address this, recent work has proposed using Generative Adversarial Networks (GANs) to generate naturalistic patches that may not attract human attention. However, such app… ▽ More

    Submitted 20 November, 2023; v1 submitted 19 May, 2023; originally announced May 2023.

  16. arXiv:2304.12949  [pdf, other

    cs.AR cs.LG

    eFAT: Improving the Effectiveness of Fault-Aware Training for Mitigating Permanent Faults in DNN Hardware Accelerators

    Authors: Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Fault-Aware Training (FAT) has emerged as a highly effective technique for addressing permanent faults in DNN accelerators, as it offers fault mitigation without significant performance or accuracy loss, specifically at low and moderate fault rates. However, it leads to very high retraining overheads, especially when used for large DNNs designed for complex AI applications. Moreover, as each fabri… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

    Comments: 8 pages, 13 figures

  17. arXiv:2304.04041  [pdf, other

    cs.NE cs.AI cs.AR cs.LG

    RescueSNN: Enabling Reliable Executions on Spiking Neural Network Accelerators under Permanent Faults

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: To maximize the performance and energy efficiency of Spiking Neural Network (SNN) processing on resource-constrained embedded systems, specialized hardware accelerators/chips are employed. However, these SNN chips may suffer from permanent faults which can affect the functionality of weight memory and neuron behavior, thereby causing potentially significant accuracy degradation and system malfunct… ▽ More

    Submitted 8 April, 2023; originally announced April 2023.

    Comments: Accepted for publication at Frontiers in Neuroscience - Section Neuromorphic Engineering

  18. arXiv:2304.04039  [pdf, other

    cs.NE cs.AI cs.AR cs.LG

    EnforceSNN: Enabling Resilient and Energy-Efficient Spiking Neural Network Inference considering Approximate DRAMs for Embedded Systems

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Spiking Neural Networks (SNNs) have shown capabilities of achieving high accuracy under unsupervised settings and low operational power/energy due to their bio-plausible computations. Previous studies identified that DRAM-based off-chip memory accesses dominate the energy consumption of SNN processing. However, state-of-the-art works do not optimize the DRAM energy-per-access, thereby hindering th… ▽ More

    Submitted 8 April, 2023; originally announced April 2023.

    Comments: Accepted for publication at Frontiers in Neuroscience - Section Neuromorphic Engineering

  19. arXiv:2303.14009  [pdf, other

    cs.CR

    PoisonedGNN: Backdoor Attack on Graph Neural Networks-based Hardware Security Systems

    Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Abdullah Hanif, Muhammad Shafique, Ozgur Sinanoglu

    Abstract: Graph neural networks (GNNs) have shown great success in detecting intellectual property (IP) piracy and hardware Trojans (HTs). However, the machine learning community has demonstrated that GNNs are susceptible to data poisoning attacks, which result in GNNs performing abnormally on graphs with pre-defined backdoor triggers (realized using crafted subgraphs). Thus, it is imperative to ensure that… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: This manuscript is currently under review at IEEE Transactions on Computers

  20. arXiv:2303.02495  [pdf, other

    cs.DC

    scaleTRIM: Scalable TRuncation-Based Integer Approximate Multiplier with Linearization and Compensation

    Authors: Ebrahim Farahmand, Ali Mahani, Behnam Ghavami, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Approximate computing (AC) has become a prominent solution to improve the performance, area, and power/energy efficiency of a digital design at the cost of output accuracy. We propose a novel scalable approximate multiplier that utilizes a lookup table-based compensation unit. To improve energy-efficiency, input operands are truncated to a reduced bitwidth representation (e.g., h bits) based on th… ▽ More

    Submitted 4 May, 2023; v1 submitted 4 March, 2023; originally announced March 2023.

  21. arXiv:2303.01819  [pdf, other

    cs.LG cs.CR cs.CV

    Exploring Machine Learning Privacy/Utility trade-off from a hyperparameters Lens

    Authors: Ayoub Arous, Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: Machine Learning (ML) architectures have been applied to several applications that involve sensitive data, where a guarantee of users' data privacy is required. Differentially Private Stochastic Gradient Descent (DPSGD) is the state-of-the-art method to train privacy-preserving models. However, DPSGD comes at a considerable accuracy loss leading to sub-optimal privacy/utility trade-offs. Towards i… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  22. arXiv:2303.01351  [pdf, other

    cs.CV cs.RO

    APARATE: Adaptive Adversarial Patch for CNN-based Monocular Depth Estimation for Autonomous Navigation

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: In recent times, monocular depth estimation (MDE) has experienced significant advancements in performance, largely attributed to the integration of innovative architectures, i.e., convolutional neural networks (CNNs) and Transformers. Nevertheless, the susceptibility of these models to adversarial attacks has emerged as a noteworthy concern, especially in domains where safety and security are para… ▽ More

    Submitted 20 November, 2023; v1 submitted 2 March, 2023; originally announced March 2023.

  23. arXiv:2303.01338  [pdf, other

    cs.CV cs.CR

    AdvRain: Adversarial Raindrops to Attack Camera-based Smart Vision Systems

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Vision-based perception modules are increasingly deployed in many applications, especially autonomous vehicles and intelligent robots. These modules are being used to acquire information about the surroundings and identify obstacles. Hence, accurate detection and classification are essential to reach appropriate decisions and take appropriate and safe actions at all times. Current studies have dem… ▽ More

    Submitted 5 October, 2023; v1 submitted 2 March, 2023; originally announced March 2023.

  24. arXiv:2208.00331  [pdf, other

    cs.AR cs.LG

    CoNLoCNN: Exploiting Correlation and Non-Uniform Quantization for Energy-Efficient Low-precision Deep Convolutional Neural Networks

    Authors: Muhammad Abdullah Hanif, Giuseppe Maria Sarda, Alberto Marchisio, Guido Masera, Maurizio Martina, Muhammad Shafique

    Abstract: In today's era of smart cyber-physical systems, Deep Neural Networks (DNNs) have become ubiquitous due to their state-of-the-art performance in complex real-world applications. The high computational complexity of these networks, which translates to increased energy consumption, is the foremost obstacle towards deploying large DNNs in resource-constrained systems. Fixed-Point (FP) implementations… ▽ More

    Submitted 30 July, 2022; originally announced August 2022.

    Comments: 8 pages, 15 figures, 2 tables

  25. arXiv:2204.09514  [pdf, other

    cs.AR cs.CR cs.CV cs.DC cs.LG

    Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems

    Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique

    Abstract: The real-world use cases of Machine Learning (ML) have exploded over the past few years. However, the current computing infrastructure is insufficient to support all real-world applications and scenarios. Apart from high efficiency requirements, modern ML systems are expected to be highly reliable against hardware failures as well as secure against adversarial and IP stealing attacks. Privacy conc… ▽ More

    Submitted 18 April, 2022; originally announced April 2022.

    Comments: Appears at 40th IEEE VLSI Test Symposium (VTS 2022), 14 pages

  26. arXiv:2203.05523  [pdf, other

    cs.AR cs.LG cs.NE

    SoftSNN: Low-Cost Fault Tolerance for Spiking Neural Network Accelerators under Soft Errors

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Specialized hardware accelerators have been designed and employed to maximize the performance efficiency of Spiking Neural Networks (SNNs). However, such accelerators are vulnerable to transient faults (i.e., soft errors), which occur due to high-energy particle strikes, and manifest as bit flips at the hardware layer. These errors can change the weight values and neuron operations in the compute… ▽ More

    Submitted 11 March, 2022; v1 submitted 10 March, 2022; originally announced March 2022.

    Comments: To appear at the 59th IEEE/ACM Design Automation Conference (DAC), July 2022, San Francisco, CA, USA

  27. arXiv:2111.07062  [pdf, other

    cs.CR

    UNTANGLE: Unlocking Routing and Logic Obfuscation Using Graph Neural Networks-based Link Prediction

    Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Abdullah Hanif, Muhammad Shafique, Ozgur Sinanoglu

    Abstract: Logic locking aims to prevent intellectual property (IP) piracy and unauthorized overproduction of integrated circuits (ICs). However, initial logic locking techniques were vulnerable to the Boolean satisfiability (SAT)-based attacks. In response, researchers proposed various SAT-resistant locking techniques such as point function-based locking and symmetric interconnection (SAT-hard) obfuscation.… ▽ More

    Submitted 13 November, 2021; originally announced November 2021.

    Comments: Published in 2021 International Conference On Computer-Aided Design (ICCAD)

  28. arXiv:2109.09829  [pdf, other

    cs.CR cs.AI cs.AR cs.LG cs.NE

    Towards Energy-Efficient and Secure Edge AI: A Cross-Layer Framework

    Authors: Muhammad Shafique, Alberto Marchisio, Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif

    Abstract: The security and privacy concerns along with the amount of data that is required to be processed on regular basis has pushed processing to the edge of the computing systems. Deploying advanced Neural Networks (NN), such as deep neural networks (DNNs) and spiking neural networks (SNNs), that offer state-of-the-art results on resource-constrained edge devices is challenging due to the stringent memo… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

    Comments: To appear at the 40th IEEE/ACM International Conference on Computer-Aided Design (ICCAD), November 2021, Virtual Event

  29. A Max-Min Task Offloading Algorithm for Mobile Edge Computing Using Non-Orthogonal Multiple Access

    Authors: Vaibhav Kumar, Muhammad Fainan Hanif, Markku Juntti, Le-Nam Tran

    Abstract: To mitigate computational power gap between the network core and edges, mobile edge computing (MEC) is poised to play a fundamental role in future generations of wireless networks. In this letter, we consider a non-orthogonal multiple access (NOMA) transmission model to maximize the worst task to be offloaded among all users to the network edge server. A provably convergent and efficient algorithm… ▽ More

    Submitted 12 October, 2023; v1 submitted 2 September, 2021; originally announced September 2021.

    Comments: 5 pages, 5 figures

    Journal ref: IEEE Transactions on Vehicular Technology, vol. 72, no. 9, pp. 12332-12337, Sept. 2023

  30. ReSpawn: Energy-Efficient Fault-Tolerance for Spiking Neural Networks considering Unreliable Memories

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Spiking neural networks (SNNs) have shown a potential for having low energy with unsupervised learning capabilities due to their biologically-inspired computation. However, they may suffer from accuracy degradation if their processing is performed under the presence of hardware-induced faults in memories, which can come from manufacturing defects or voltage-induced approximation errors. Since rece… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

    Comments: To appear at the 40th IEEE/ACM International Conference on Computer-Aided Design (ICCAD), November 2021, Virtual Event

  31. arXiv:2106.08800  [pdf, other

    cs.DC cs.AR

    Design and Analysis of High Performance Heterogeneous Block-based Approximate Adders

    Authors: Ebrahim Farahmand, Ali Mahani, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Approximate computing is an emerging paradigm to improve the power and performance efficiency of error-resilient applications. As adders are one of the key components in almost all processing systems, a significant amount of research has been carried out towards designing approximate adders that can offer better efficiency than conventional designs, however, at the cost of some accuracy loss. In t… ▽ More

    Submitted 14 September, 2023; v1 submitted 16 June, 2021; originally announced June 2021.

    Comments: Accepted for publication in ACM Transactions on Embedded Computing Systems (TECS)

  32. arXiv:2105.12374  [pdf, other

    cs.LG

    Continual Learning for Real-World Autonomous Systems: Algorithms, Challenges and Frameworks

    Authors: Khadija Shaheen, Muhammad Abdullah Hanif, Osman Hasan, Muhammad Shafique

    Abstract: Continual learning is essential for all real-world applications, as frozen pre-trained models cannot effectively deal with non-stationary data distributions. The purpose of this study is to review the state-of-the-art methods that allow continuous learning of computational models over time. We primarily focus on the learning algorithms that perform continuous learning in an online fashion from con… ▽ More

    Submitted 24 February, 2022; v1 submitted 26 May, 2021; originally announced May 2021.

  33. arXiv:2105.03251  [pdf, other

    cs.CR cs.LG

    Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks

    Authors: Faiq Khalid, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: From tiny pacemaker chips to aircraft collision avoidance systems, the state-of-the-art Cyber-Physical Systems (CPS) have increasingly started to rely on Deep Neural Networks (DNNs). However, as concluded in various studies, DNNs are highly susceptible to security threats, including adversarial attacks. In this paper, we first discuss different vulnerabilities that can be exploited for generating… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

    Comments: CYBER 2020, The Fifth International Conference on Cyber-Technologies and Cyber-Systems

  34. SparkXD: A Framework for Resilient and Energy-Efficient Spiking Neural Network Inference using Approximate DRAM

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Spiking Neural Networks (SNNs) have the potential for achieving low energy consumption due to their biologically sparse computation. Several studies have shown that the off-chip memory (DRAM) accesses are the most energy-consuming operations in SNN processing. However, state-of-the-art in SNN systems do not optimize the DRAM energy-per-access, thereby hindering achieving high energy-efficiency. To… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

    Comments: To appear at the 58th IEEE/ACM Design Automation Conference (DAC), December 2021, San Francisco, CA, USA

  35. arXiv:2102.04642  [pdf, other

    cs.IT eess.SP

    Frequency-Shift Chirp Spread Spectrum Communications with Index Modulation

    Authors: Muhammad Hanif, Ha H. Nguyen

    Abstract: This paper introduces a novel frequency-shift chirp spread spectrum (FSCSS) system with index modulation (IM). By using combinations of orthogonal chirp signals for message representation, the proposed FSCSS-IM system is very flexible to design and can achieve much higher data rates than the conventional FSCSS system under the same bandwidth. The paper presents optimal detection algorithms, both c… ▽ More

    Submitted 19 May, 2021; v1 submitted 8 February, 2021; originally announced February 2021.

    Comments: The first version of this paper was submitted to IEEE Internet of Things Journal on July 14, 2020. The revised version was submitted on October 28, 2020, accepted May 15, 2021. The main idea and results of this work are documented in United States Patent #10,778,282, Sept. 2020. (https://researchers.usask.ca/ha-nguyen/documents/patents/us10778282b1-hanif.pdf)

  36. arXiv:2101.12351  [pdf, other

    cs.AR

    DNN-Life: An Energy-Efficient Aging Mitigation Framework for Improving the Lifetime of On-Chip Weight Memories in Deep Neural Network Hardware Architectures

    Authors: Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Negative Biased Temperature Instability (NBTI)-induced aging is one of the critical reliability threats in nano-scale devices. This paper makes the first attempt to study the NBTI aging in the on-chip weight memories of deep neural network (DNN) hardware accelerators, subjected to complex DNN workloads. We propose DNN-Life, a specialized aging analysis and mitigation framework for DNNs, which join… ▽ More

    Submitted 28 January, 2021; originally announced January 2021.

  37. arXiv:2012.05948  [pdf, other

    cs.CR

    GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking

    Authors: Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur Sinanoglu

    Abstract: In this paper, we propose GNNUnlock, the first-of-its-kind oracle-less machine learning-based attack on provably secure logic locking that can identify any desired protection logic without focusing on a specific syntactic topology. The key is to leverage a well-trained graph neural network (GNN) to identify all the gates in a given locked netlist that belong to the targeted protection logic, witho… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

    Comments: 6 pages, 4 figures, 6 tables, conference

  38. DESCNet: Developing Efficient Scratchpad Memories for Capsule Network Hardware

    Authors: Alberto Marchisio, Vojtech Mrazek, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Deep Neural Networks (DNNs) have been established as the state-of-the-art algorithm for advanced machine learning applications. Recently proposed by the Google Brain's team, the Capsule Networks (CapsNets) have improved the generalization ability, as compared to DNNs, due to their multi-dimensional capsules and preserving the spatial relationship between different objects. However, they pose signi… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

    Comments: Accepted for publication at the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

  39. arXiv:2008.01191  [pdf, other

    cs.IR cs.CV cs.LG

    Deep Learning Techniques for Future Intelligent Cross-Media Retrieval

    Authors: Sadaqat ur Rehman, Muhammad Waqas, Shanshan Tu, Anis Koubaa, Obaid ur Rehman, Jawad Ahmad, Muhammad Hanif, Zhu Han

    Abstract: With the advancement in technology and the expansion of broadcasting, cross-media retrieval has gained much attention. It plays a significant role in big data applications and consists in searching and finding data from different types of media. In this paper, we provide a novel taxonomy according to the challenges faced by multi-modal deep learning approaches in solving cross-media retrieval, nam… ▽ More

    Submitted 21 July, 2020; originally announced August 2020.

    Comments: arXiv admin note: text overlap with arXiv:1804.09539 by other authors

  40. DRMap: A Generic DRAM Data Mapping Policy for Energy-Efficient Processing of Convolutional Neural Networks

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Many convolutional neural network (CNN) accelerators face performance- and energy-efficiency challenges which are crucial for embedded implementations, due to high DRAM access latency and energy. Recently, some DRAM architectures have been proposed to exploit subarray-level parallelism for decreasing the access latency. Towards this, we present a design space exploration methodology to study the l… ▽ More

    Submitted 21 April, 2020; originally announced April 2020.

    Comments: To appear at the 57th Design Automation Conference (DAC), July 2020, San Francisco, CA, USA

  41. arXiv:1912.01978  [pdf, other

    cs.LG stat.ML

    FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks

    Authors: Mahum Naseer, Mishal Fatima Minhas, Faiq Khalid, Muhammad Abdullah Hanif, Osman Hasan, Muhammad Shafique

    Abstract: With a constant improvement in the network architectures and training methodologies, Neural Networks (NNs) are increasingly being deployed in real-world Machine Learning systems. However, despite their impressive performance on "known inputs", these NNs can fail absurdly on the "unseen inputs", especially if these real-time inputs deviate from the training dataset distributions, or contain certain… ▽ More

    Submitted 14 May, 2020; v1 submitted 3 December, 2019; originally announced December 2019.

    Comments: To appear at the 23rd Design, Automation and Test in Europe (DATE 2020). Grenoble, France

  42. arXiv:1912.00941  [pdf, other

    cs.LG stat.ML

    FT-ClipAct: Resilience Analysis of Deep Neural Networks and Improving their Fault Tolerance using Clipped Activation

    Authors: Le-Ha Hoang, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Deep Neural Networks (DNNs) are widely being adopted for safety-critical applications, e.g., healthcare and autonomous driving. Inherently, they are considered to be highly error-tolerant. However, recent studies have shown that hardware faults that impact the parameters of a DNN (e.g., weights) can have drastic impacts on its classification accuracy. In this paper, we perform a comprehensive erro… ▽ More

    Submitted 2 December, 2019; originally announced December 2019.

    Comments: The 23rd Design, Automation and Test in Europe (DATE 2020)

  43. ReD-CaNe: A Systematic Methodology for Resilience Analysis and Design of Capsule Networks under Approximations

    Authors: Alberto Marchisio, Vojtech Mrazek, Muhammad Abudllah Hanif, Muhammad Shafique

    Abstract: Recent advances in Capsule Networks (CapsNets) have shown their superior learning capability, compared to the traditional Convolutional Neural Networks (CNNs). However, the extremely high complexity of CapsNets limits their fast deployment in real-world applications. Moreover, while the resilience of CNNs have been extensively investigated to enable their energy-efficient implementations, the anal… ▽ More

    Submitted 2 December, 2019; originally announced December 2019.

    Comments: To appear at the 23rd Design, Automation and Test in Europe (DATE 2020). Grenoble, France

  44. ALWANN: Automatic Layer-Wise Approximation of Deep Neural Network Accelerators without Retraining

    Authors: Vojtech Mrazek, Zdenek Vasicek, Lukas Sekanina, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: The state-of-the-art approaches employ approximate computing to reduce the energy consumption of DNN hardware. Approximate DNNs then require extensive retraining afterwards to recover from the accuracy loss caused by the use of approximate operations. However, retraining of complex DNNs does not scale well. In this paper, we demonstrate that efficient approximations can be introduced into the comp… ▽ More

    Submitted 25 July, 2019; v1 submitted 11 June, 2019; originally announced July 2019.

    Comments: Accepted for 2019 IEEE/ACM International Conference On Computer-Aided Design (ICCAD'19)

  45. FasTrCaps: An Integrated Framework for Fast yet Accurate Training of Capsule Networks

    Authors: Alberto Marchisio, Beatrice Bussolino, Alessio Colucci, Muhammad Abdullah Hanif, Maurizio Martina, Guido Masera, Muhammad Shafique

    Abstract: Recently, Capsule Networks (CapsNets) have shown improved performance compared to the traditional Convolutional Neural Networks (CNNs), by encoding and preserving spatial relationships between the detected features in a better way. This is achieved through the so-called Capsules (i.e., groups of neurons) that encode both the instantiation probability and the spatial information. However, one of th… ▽ More

    Submitted 18 May, 2020; v1 submitted 24 May, 2019; originally announced May 2019.

    Comments: Accepted for publication at the 2020 International Joint Conference on Neural Networks (IJCNN)

  46. autoAx: An Automatic Design Space Exploration and Circuit Building Methodology utilizing Libraries of Approximate Components

    Authors: Vojtech Mrazek, Muhammad Abdullah Hanif, Zdenek Vasicek, Lukas Sekanina, Muhammad Shafique

    Abstract: Approximate computing is an emerging paradigm for developing highly energy-efficient computing systems such as various accelerators. In the literature, many libraries of elementary approximate circuits have already been proposed to simplify the design process of approximate accelerators. Because these libraries contain from tens to thousands of approximate implementations for a single arithmetic o… ▽ More

    Submitted 1 April, 2019; v1 submitted 22 February, 2019; originally announced February 2019.

    Comments: Accepted for publication at the Design Automation Conference 2019 (DAC'19), Las Vegas, Nevada, USA

  47. ROMANet: Fine-Grained Reuse-Driven Off-Chip Memory Access Management and Data Organization for Deep Neural Network Accelerators

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Enabling high energy efficiency is crucial for embedded implementations of deep learning. Several studies have shown that the DRAM-based off-chip memory accesses are one of the most energy-consuming operations in deep neural network (DNN) accelerators, and thereby limit the designs from achieving efficiency gains at the full potential. DRAM access energy varies depending upon the number of accesse… ▽ More

    Submitted 2 August, 2020; v1 submitted 4 February, 2019; originally announced February 2019.

    Comments: Submitted to the IEEE-TVLSI journal, 14 pages, 26 figures

  48. arXiv:1902.01151  [pdf, other

    cs.LG cs.AR

    CapStore: Energy-Efficient Design and Management of the On-Chip Memory for CapsuleNet Inference Accelerators

    Authors: Alberto Marchisio, Muhammad Abdullah Hanif, Mohammad Taghi Teimoori, Muhammad Shafique

    Abstract: Deep Neural Networks (DNNs) have been established as the state-of-the-art algorithm for advanced machine learning applications. Recently, CapsuleNets have improved the generalization ability, as compared to DNNs, due to their multi-dimensional capsules. However, they pose high computational and memory requirements, which makes energy-efficient inference a challenging task. In this paper, we perfor… ▽ More

    Submitted 12 April, 2019; v1 submitted 4 February, 2019; originally announced February 2019.

  49. arXiv:1902.01147  [pdf, other

    cs.LG cs.CR eess.IV stat.ML

    Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks

    Authors: Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique

    Abstract: Spiking Neural Networks (SNNs) claim to present many advantages in terms of biological plausibility and energy efficiency compared to standard Deep Neural Networks (DNNs). Recent works have shown that DNNs are vulnerable to adversarial attacks, i.e., small perturbations added to the input data can lead to targeted or random misclassifications. In this paper, we aim at investigating the key researc… ▽ More

    Submitted 18 May, 2020; v1 submitted 4 February, 2019; originally announced February 2019.

    Comments: Accepted for publication at the 2020 International Joint Conference on Neural Networks (IJCNN)

  50. arXiv:1901.10258  [pdf, other

    cs.CR cs.LG

    RED-Attack: Resource Efficient Decision based Attack for Machine Learning

    Authors: Faiq Khalid, Hassan Ali, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

    Abstract: Due to data dependency and model leakage properties, Deep Neural Networks (DNNs) exhibit several security vulnerabilities. Several security attacks exploited them but most of them require the output probability vector. These attacks can be mitigated by concealing the output probability vector. To address this limitation, decision-based attacks have been proposed which can estimate the model but th… ▽ More

    Submitted 30 January, 2019; v1 submitted 29 January, 2019; originally announced January 2019.