Skip to main content

Showing 1–48 of 48 results for author: Rehman, S

  1. arXiv:2405.12427  [pdf, other

    cs.LG

    Deep learning approaches to indoor wireless channel estimation for low-power communication

    Authors: Samrah Arif, Muhammad Arif Khan, Sabih Ur Rehman

    Abstract: In the rapidly growing development of the Internet of Things (IoT) infrastructure, achieving reliable wireless communication is a challenge. IoT devices operate in diverse environments with common signal interference and fluctuating channel conditions. Accurate channel estimation helps adapt the transmission strategies to current conditions, ensuring reliable communication. Traditional methods, su… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

  2. arXiv:2405.04735  [pdf, other

    cs.CR cs.DS cs.IR

    Cryptanalysis of the SIMON Cypher Using Neo4j

    Authors: Jonathan Cook, Sabih ur Rehman, M. Arif Khan

    Abstract: The exponential growth in the number of Internet of Things (IoT) devices has seen the introduction of several Lightweight Encryption Algorithms (LEA). While LEAs are designed to enhance the integrity, privacy and security of data collected and transmitted by IoT devices, it is hazardous to assume that all LEAs are secure and exhibit similar levels of protection. To improve encryption strength, cry… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 10 pages, 10 figures, 2 algorithms, accepted by the 4th International Conference on Electrical, Computer and Energy Technologies (ICECET) to be presented in July 2024

  3. arXiv:2404.15337  [pdf, other

    eess.SP cs.LG cs.NI

    RSSI Estimation for Constrained Indoor Wireless Networks using ANN

    Authors: Samrah Arif, M. Arif Khan, Sabih Ur Rehman

    Abstract: In the expanding field of the Internet of Things (IoT), wireless channel estimation is a significant challenge. This is specifically true for low-power IoT (LP-IoT) communication, where efficiency and accuracy are extremely important. This research establishes two distinct LP-IoT wireless channel estimation models using Artificial Neural Networks (ANN): a Feature-based ANN model and a Sequence-bas… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

  4. arXiv:2404.08165  [pdf, other

    cs.CR

    Lightweight Cryptanalysis of IoT Encryption Algorithms : Is Quota Sampling the Answer?

    Authors: Jonathan Cook, Sabih ur Rehman, M. Arif Khan

    Abstract: Rapid growth in the number of small sensor devices known as the Internet of Things (IoT) has seen the development of lightweight encryption algorithms. Two well-known lightweight algorithms are SIMON and SIMECK which have been specifically designed for use on resource-constrained IoT devices. These lightweight encryption algorithms are based on the efficient Feistel block structure which is known… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

    Comments: 24 pages, 21 figures, 7 tables

  5. arXiv:2402.00874  [pdf

    cs.NI cs.AI eess.SP

    dRG-MEC: Decentralized Reinforced Green Offloading for MEC-enabled Cloud Network

    Authors: Asad Aftab, Semeen Rehman

    Abstract: Multi-access-Mobile Edge Computing (MEC) is a promising solution for computationally demanding rigorous applications, that can meet 6G network service requirements. However, edge servers incur high computation costs during task processing. In this paper, we proposed a technique to minimize the total computation and communication overhead for optimal resource utilization with joint computational of… ▽ More

    Submitted 10 January, 2024; originally announced February 2024.

  6. arXiv:2401.14888  [pdf

    cs.AR

    HOPE: Holistic STT-RAM Architecture Exploration Framework for Future Cross-Platform Analysis

    Authors: Saeed SeyedFaraji, Markus Bichl, Asad Aftab, Semeen Rehman

    Abstract: Spin Transfer Torque Random Access Memory (STT-RAM) is an emerging Non-Volatile Memory (NVM) technology that has garnered attention to overcome the drawbacks of conventional CMOS-based technologies. However, such technologies must be evaluated before deployment under real workloads and architecture. But there is a lack of available open-source STT-RAM-based system evaluation framework, which hampe… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

  7. arXiv:2308.15868  [pdf

    cs.CV eess.IV

    Feature Attention Network (FA-Net): A Deep-Learning Based Approach for Underwater Single Image Enhancement

    Authors: Muhammad Hamza, Ammar Hawbani, Sami Ul Rehman, Xingfu Wang, Liang Zhao

    Abstract: Underwater image processing and analysis have been a hotspot of study in recent years, as more emphasis has been focused to underwater monitoring and usage of marine resources. Compared with the open environment, underwater image encountered with more complicated conditions such as light abortion, scattering, turbulence, nonuniform illumination and color diffusion. Although considerable advances a… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

    Comments: Fourteenth International Conference on Digital Image Processing (ICDIP 2022), 2022, Wuhan, China, May 20-23, 2022.8 pages.5 Figures.doi: 10.1117/12.2644516

    Journal ref: Fourteenth International Conference on Digital Image Processing (ICDIP 2022), 2022, Wuhan, China, May 20-23, 2022

  8. Holo-Block Chain: A Hybrid Approach for Secured IoT Healthcare Ecosystem

    Authors: Asad Aftab, Chrysostomos Chrysostomou, Hassaan Khaliq Qureshi, Semeen Rehman

    Abstract: The Internet-of-Things (IoT) is an imminent and corporal technology that enables the connectivity of smart physical devices with virtual objects contriving in distinct platforms with the help of the internet. The IoT is under massive experimentation to operate in a distributed manner, making it favourable to be utilized in the healthcare ecosystem. However, un- der the IoT healthcare ecosystem (Io… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

    Comments: 8 pages, 8 figures, IEEE 18th International Conference on Wireless and Mobile Computing, Networking and Communications

  9. arXiv:2304.10511  [pdf, other

    cs.CR cs.AI cs.LG

    OutCenTR: A novel semi-supervised framework for predicting exploits of vulnerabilities in high-dimensional datasets

    Authors: Hadi Eskandari, Michael Bewong, Sabih ur Rehman

    Abstract: An ever-growing number of vulnerabilities are reported every day. Yet these vulnerabilities are not all the same; Some are more targeted than others. Correctly estimating the likelihood of a vulnerability being exploited is a critical task for system administrators. This aids the system administrators in prioritizing and patching the right vulnerabilities. Our work makes use of outlier detection t… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Comments: 11 pages, 6 figures

  10. arXiv:2304.00713  [pdf, other

    cs.CR

    Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions

    Authors: Jonathan Cook, Sabih ur Rehman, M. Arif Khan

    Abstract: The growth in the use of small sensor devices, commonly known as the Internet of Things (IoT), has resulted in unprecedented amounts of data being generated and captured. With the rapidly growing popularity of personal IoT devices, the collection of personal data through such devices has also increased exponentially. To accommodate the anticipated growth in connected devices, researchers are now i… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Comments: 28 pages, 5 figures

  11. arXiv:2302.06142  [pdf, other

    cs.SI

    Combined Location Online Weather Data: Easy-to-use Targeted Weather Analysis for Agriculture

    Authors: Darren Yates, Christopher Blanchard, Allister Clarke, Sabih-Ur Rehman, Md Zahidul Islam, Russell Ford, Rob Walsh

    Abstract: The continuing effects of climate change require farmers and growers to have greater understanding of how these changes affect crop production. However, while climatic data is generally available to help provide much of that understanding, it can often be in a form not easy to digest. The proposed Combined Location Online Weather Data (CLOWD) framework is an easy-to-use online platform for analysi… ▽ More

    Submitted 13 February, 2023; originally announced February 2023.

    Comments: 21 pages, 11 figures, original research paper

    ACM Class: J.2

  12. Reliable and Resilient AI and IoT-based Personalised Healthcare Services: A Survey

    Authors: Najma Taimoor, Semeen Rehman

    Abstract: Recent technological and economic developments have transformed the healthcare sector towards more personalized and IoT-based healthcare services. These services are realized through control and monitoring applications that are typically developed using artificial intelligence/machine learning-based algorithms, which play a significant role in highlighting the efficiency of traditional healthcare… ▽ More

    Submitted 29 August, 2022; originally announced September 2022.

    Journal ref: in IEEE Access, vol. 10, pp. 535-563, 2022

  13. SMART: Investigating the Impact of Threshold Voltage Suppression in an In-SRAM Multiplication/Accumulation Accelerator for Accuracy Improvement in 65 nm CMOS Technology

    Authors: Saeed Seyedfaraji, Baset Mesgari, Semeen Rehman

    Abstract: State-of-the-art in-memory computation has recently emerged as the most promising solution to overcome design challenges related to data movement inside current computing systems. One of the approaches to performing in-memory computation is based on the analog behavior of the data stored inside the memory cell. These approaches proposed various system architectures for that. In this paper, we inve… ▽ More

    Submitted 2 August, 2022; originally announced September 2022.

    Journal ref: 2022 25th Euromicro Conference on Digital System Design (DSD)

  14. EXTENT: Enabling Approximation-Oriented Energy Efficient STT-RAM Write Circuit

    Authors: Saeed Seyedfaraji, Javad Talafy Daryani, Mohamed M. Sabry Aly, Semeen Rehman

    Abstract: Spin Transfer Torque Random Access Memory (STT-RAM) has garnered interest due to its various characteristics such as non-volatility, low leakage power, high density. Its magnetic properties have a vital role in STT switching operations through thermal effectiveness. A key challenge for STT-RAM in industrial adaptation is the high write energy and latency. In this paper, we overcome this challenge… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

    Journal ref: IEEE Access ( Volume: 10), 2022, Page(s): 82144 - 82155

  15. arXiv:2207.11723  [pdf, other

    cs.SE cs.LO

    On the Validation of Multi-Level Personalised Health Condition Model

    Authors: Najma Taimoor, Semeen Rehman

    Abstract: This paper presents a verification-based methodology to validate the model of personalized health conditions. The model identifies the values that may result in unsafe, un-reachable, in-exhaustive, and overlapping states that otherwise threaten patients' life by producing false alarms by accepting suspicious behaviour of the target health condition. Contemporary approaches to validating a model em… ▽ More

    Submitted 24 July, 2022; originally announced July 2022.

  16. AID: Accuracy Improvement of Analog Discharge-Based in-SRAM Multiplication Accelerator

    Authors: Saeed Seyedfaraji, Baset Mesgari, Semeen Rehman

    Abstract: This paper presents a novel circuit (AID) to improve the accuracy of an energy-efficient in-memory multiplier using a standard 6T-SRAM. The state-of-the-art discharge-based in-SRAM multiplication accelerators suffer from a non-linear behavior in their bit-line (BL, BLB) due to the quadratic nature of the access transistor that leads to a poor signal-to-noise ratio (SNR). In order to achieve linear… ▽ More

    Submitted 15 April, 2022; originally announced April 2022.

  17. arXiv:2111.14634  [pdf

    cs.NE

    Optimal Load Scheduling Using Genetic Algorithm to Improve the Load Profile

    Authors: Farhat Iqbal, Shafiq ur Rehman, Khawar Iqbal

    Abstract: Stability and protection of the electrical power systems are always of primary concern. Stability can be affected mostly by increase in the load demand. Power grids are overloaded in peak hours so more power generation units are required to cope the demand. Increase in power generation is not an optimal solution. With the enlargement in Smart grid (SG), it becomes easier to correlate the consumer… ▽ More

    Submitted 14 October, 2021; originally announced November 2021.

  18. arXiv:2111.14157  [pdf, other

    cs.CV

    Implicit Equivariance in Convolutional Networks

    Authors: Naman Khetan, Tushar Arora, Samee Ur Rehman, Deepak K. Gupta

    Abstract: Convolutional Neural Networks(CNN) are inherently equivariant under translations, however, they do not have an equivalent embedded mechanism to handle other transformations such as rotations and change in scale. Several approaches exist that make CNNs equivariant under other transformation groups by design. Among these, steerable CNNs have been especially effective. However, these approaches requi… ▽ More

    Submitted 28 November, 2021; originally announced November 2021.

  19. arXiv:2110.09615  [pdf, other

    cs.CR cs.SE

    A Generalised Logical Layered Architecture for Blockchain Technology

    Authors: Jared Newell, Quazi Mamun, Sabih ur Rehman, Md Zahidul Islam

    Abstract: Precision, validity, reliability, timeliness, availability, and granularity are the desired characteristics for data and information systems. However due to the desired trait of data mutability, information systems have inherently lacked the ability to enforce data integrity without governance. A resolution to this challenge has emerged in the shape of blockchain architecture, which ensures immuta… ▽ More

    Submitted 18 October, 2021; originally announced October 2021.

    Comments: 24 pages, 7 figures

  20. BioNetExplorer: Architecture-Space Exploration of Bio-Signal Processing Deep Neural Networks for Wearables

    Authors: Bharath Srinivas Prabakaran, Asima Akhtar, Semeen Rehman, Osman Hasan, Muhammad Shafique

    Abstract: In this work, we propose the BioNetExplorer framework to systematically generate and explore multiple DNN architectures for bio-signal processing in wearables. Our framework adapts key neural architecture parameters to search for an embedded DNN with a low hardware overhead, which can be deployed in wearable edge devices to analyse the bio-signal data and to extract the relevant information, such… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Journal ref: IEEE Internet of Things Journal (Volume: 8, Issue: 17, Sept.1, 1 2021)

  21. arXiv:2105.13906  [pdf, other

    cs.CV cs.AI cs.DC eess.IV

    Training of SSD(Single Shot Detector) for Facial Detection using Nvidia Jetson Nano

    Authors: Saif Ur Rehman, Muhammad Rashid Razzaq, Muhammad Hadi Hussian

    Abstract: In this project, we have used the computer vision algorithm SSD (Single Shot detector) computer vision algorithm and trained this algorithm from the dataset which consists of 139 Pictures. Images were labeled using Intel CVAT (Computer Vision Annotation Tool) We trained this model for facial detection. We have deployed our trained model and software in the Nvidia Jetson Nano Developer kit. Model… ▽ More

    Submitted 28 May, 2021; originally announced May 2021.

    Comments: 7 Pages, 7 figures

  22. Hardware Implementation of an OPC UA Server for Industrial Field Devices

    Authors: Heiner Bauer, Sebastian Höppner, Chris Iatrou, Zohra Charania, Stephan Hartmann, Saif-Ur Rehman, Andreas Dixius, Georg Ellguth, Dennis Walter, Johannes Uhlig, Felix Neumärker, Marc Berthel, Marco Stolba, Florian Kelber, Leon Urbas, Christian Mayr

    Abstract: Industrial plants suffer from a high degree of complexity and incompatibility in their communication infrastructure, caused by a wild mix of proprietary technologies. This prevents transformation towards Industry 4.0 and the Industrial Internet of Things. Open Platform Communications Unified Architecture (OPC UA) is a standardized protocol that addresses these problems with uniform and semantic co… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

    Comments: 5 pages, 6 figures, 2 tables

    Journal ref: IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29 (2021)

  23. arXiv:2104.08743  [pdf, ps, other

    math.CO cs.IT

    Rough Sets in Graphs Using Similarity Relations

    Authors: Imran Javaid, Shahroz Ali, Shahid Ur Rehman, Aqsa Shah

    Abstract: In this paper, we use theory of rough set to study graphs using the concept of orbits. We investigate the indiscernibility partitions and approximations of graphs induced by orbits of graphs. We also study rough membership functions, essential sets, discernibility matrix and their relationships for graphs.

    Submitted 18 April, 2021; originally announced April 2021.

    Comments: 15 pages, 2 figures, 1 table

  24. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

    Authors: Andrew Churcher, Rehmat Ullah, Jawad Ahmad, Sadaqat ur Rehman, Fawad Masood, Mandar Gogate, Fehaid Alqahtani, Boubakr Nour, William J. Buchanan

    Abstract: In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As… ▽ More

    Submitted 10 January, 2021; originally announced January 2021.

    Journal ref: Sensors. 2021; 21(2):446

  25. MLComp: A Methodology for Machine Learning-based Performance Estimation and Adaptive Selection of Pareto-Optimal Compiler Optimization Sequences

    Authors: Alessio Colucci, Dávid Juhász, Martin Mosbeck, Alberto Marchisio, Semeen Rehman, Manfred Kreutzer, Guenther Nadbath, Axel Jantsch, Muhammad Shafique

    Abstract: Embedded systems have proliferated in various consumer and industrial applications with the evolution of Cyber-Physical Systems and the Internet of Things. These systems are subjected to stringent constraints so that embedded software must be optimized for multiple objectives simultaneously, namely reduced energy consumption, execution time, and code size. Compilers offer optimization phases to im… ▽ More

    Submitted 11 December, 2020; v1 submitted 9 December, 2020; originally announced December 2020.

    Comments: Accepted for publication at the 24th IEEE/ACM Design, Automation and Test in Europe (DATE'21) Conference, February, 2021

  26. arXiv:2010.08006  [pdf

    cs.LG cs.CV eess.IV

    Data Valuation for Medical Imaging Using Shapley Value: Application on A Large-scale Chest X-ray Dataset

    Authors: Siyi Tang, Amirata Ghorbani, Rikiya Yamashita, Sameer Rehman, Jared A. Dunnmon, James Zou, Daniel L. Rubin

    Abstract: The reliability of machine learning models can be compromised when trained on low quality data. Many large-scale medical imaging datasets contain low quality labels extracted from sources such as medical reports. Moreover, images within a dataset may have heterogeneous quality due to artifacts and biases arising from equipment or measurement errors. Therefore, algorithms that can automatically ide… ▽ More

    Submitted 15 October, 2020; originally announced October 2020.

  27. arXiv:2008.01191  [pdf, other

    cs.IR cs.CV cs.LG

    Deep Learning Techniques for Future Intelligent Cross-Media Retrieval

    Authors: Sadaqat ur Rehman, Muhammad Waqas, Shanshan Tu, Anis Koubaa, Obaid ur Rehman, Jawad Ahmad, Muhammad Hanif, Zhu Han

    Abstract: With the advancement in technology and the expansion of broadcasting, cross-media retrieval has gained much attention. It plays a significant role in big data applications and consists in searching and finding data from different types of media. In this paper, we provide a novel taxonomy according to the challenges faced by multi-modal deep learning approaches in solving cross-media retrieval, nam… ▽ More

    Submitted 21 July, 2020; originally announced August 2020.

    Comments: arXiv admin note: text overlap with arXiv:1804.09539 by other authors

  28. arXiv:2004.02758  [pdf, other

    cs.CV cs.LG eess.IV stat.ML

    Towards Detection of Sheep Onboard a UAV

    Authors: Farah Sarwar, Anthony Griffin, Saeed Ur Rehman, Timotius Pasang

    Abstract: In this work we consider the task of detecting sheep onboard an unmanned aerial vehicle (UAV) flying at an altitude of 80 m. At this height, the sheep are relatively small, only about 15 pixels across. Although deep learning strategies have gained enormous popularity in the last decade and are now extensively used for object detection in many fields, state-of-the-art detectors perform poorly in th… ▽ More

    Submitted 18 March, 2020; originally announced April 2020.

    Comments: This was accepted for publication and presentation at the Embedded AI for Real-time Machine Vision 2019 in conjunction with the British Machine Vision Conference (BMVC) 2019. It was presented on 12 September 2019 in Cardiff, Wales. 10 pages, 3 figures, and 1 table, note that this is a web-friendly format as used at BMVC, so the pages are about A5 size (but not exactly!)

  29. arXiv:1906.10852  [pdf, other

    cs.NE

    Water Preservation in Soan River Basin using Deep Learning Techniques

    Authors: Sadaqat ur Rehman, Zhongliang Yang, Muhammad Shahid, Nan Wei, Yongfeng Huang, Muhammad Waqas, Shanshan Tu, Obaid ur Rehman

    Abstract: Water supplies are crucial for the development of living beings. However, change in the hydrological process i.e. climate and land usage are the key issues. Sustaining water level and accurate estimating for dynamic conditions is a critical job for hydrologists, but predicting hydrological extremes is an open issue. In this paper, we proposed two deep learning techniques and three machine learning… ▽ More

    Submitted 26 June, 2019; originally announced June 2019.

    Comments: 14 pages

  30. arXiv:1905.13447  [pdf, other

    cs.CR

    Comparative Analysis of State-of-the-Art EDoS Mitigation Techniques in Cloud Computing Environment

    Authors: Parminder Singh, Shafiq Ul Rehman, Selvakumar Manickam

    Abstract: A new variant of the DDoS attack, called Economic Denial of Sustainability attack has emerged. Since the cloud service is based on the pay-per-use model, the EDoS attack endeavors to scale up the resource usage over time to the point the purveyor of the server is financially incapable of sustaining the service due to the incurred unaffordable usage charges. The implication of the EDoS attack is a… ▽ More

    Submitted 11 June, 2019; v1 submitted 31 May, 2019; originally announced May 2019.

    Comments: Anomaly Detection Techniques, Cloud Computing, DDoS Attack, EDoS Attack, Mitigation Techniques, Security Threats

  31. arXiv:1901.10258  [pdf, other

    cs.CR cs.LG

    RED-Attack: Resource Efficient Decision based Attack for Machine Learning

    Authors: Faiq Khalid, Hassan Ali, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

    Abstract: Due to data dependency and model leakage properties, Deep Neural Networks (DNNs) exhibit several security vulnerabilities. Several security attacks exploited them but most of them require the output probability vector. These attacks can be mitigated by concealing the output probability vector. To address this limitation, decision-based attacks have been proposed which can estimate the model but th… ▽ More

    Submitted 30 January, 2019; v1 submitted 29 January, 2019; originally announced January 2019.

  32. arXiv:1812.05446  [pdf, other

    cs.CR cs.AR

    ForASec: Formal Analysis of Security Vulnerabilities in Sequential Circuits

    Authors: Faiq Khalid, Imran Hafeez Abbassi, Semeen Rehman, Awais Mehmood Kamboh, Osman Hasan, Muhammad Shafique

    Abstract: Security vulnerability analysis of Integrated Circuits using conventional design-time validation and verification techniques (like simulations, emulations, etc.) is generally a computationally intensive task and incomplete by nature, especially under limited resources and time constraints. To overcome this limitation, we propose a novel methodology based on model checking to formally analyze secur… ▽ More

    Submitted 21 April, 2021; v1 submitted 4 November, 2018; originally announced December 2018.

    Comments: (Accepted in 2021)

    Journal ref: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2021

  33. arXiv:1812.02770  [pdf, other

    cs.CR cs.AR

    TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint

    Authors: Imran Hafeez Abbassi, Faiq Khalid, Semeen Rehman, Awais Mehmood Kamboh, Axel Jantsch, Siddharth Garg, Muhammad Shafique

    Abstract: Conventional Hardware Trojan (HT) detection techniques are based on the validation of integrated circuits to determine changes in their functionality, and on non-invasive side-channel analysis to identify the variations in their physical parameters. In particular, almost all the proposed side-channel power-based detection techniques presume that HTs are detectable because they only add gates to th… ▽ More

    Submitted 5 November, 2018; originally announced December 2018.

    Comments: Design, Automation and Test in Europe (DATE 2019)

  34. Architectural-Space Exploration of Heterogeneous Reliability and Checkpointing Modes for Out-of-Order Superscalar Processors

    Authors: Bharath Srinivas Prabakaran, Mihika Dave, Florian Kriebel, Semeen Rehman, Muhammad Shafique

    Abstract: Reliability has emerged as a key topic of interest for researchers around the world to detect and/or mitigate the side effects of decreasing transistor sizes, such as soft errors. Traditional solutions, like DMR and TMR, incur significant area and power overheads, which might not always be applicable due to power restrictions. Therefore, we investigate alternative heterogeneous reliability modes t… ▽ More

    Submitted 12 July, 2019; v1 submitted 19 November, 2018; originally announced November 2018.

    Comments: 16 Pages, 19 Figures, 6 Tables

    Journal ref: IEEE Access, vol. 7, pp. 145324-145339, 2019

  35. arXiv:1811.03980  [pdf, other

    cs.NE cs.LG stat.ML

    A Methodology for Automatic Selection of Activation Functions to Design Hybrid Deep Neural Networks

    Authors: Alberto Marchisio, Muhammad Abdullah Hanif, Semeen Rehman, Maurizio Martina, Muhammad Shafique

    Abstract: Activation functions influence behavior and performance of DNNs. Nonlinear activation functions, like Rectified Linear Units (ReLU), Exponential Linear Units (ELU) and Scaled Exponential Linear Units (SELU), outperform the linear counterparts. However, selecting an appropriate activation function is a challenging problem, as it affects the accuracy and the complexity of the given DNN. In this pape… ▽ More

    Submitted 27 October, 2018; originally announced November 2018.

  36. arXiv:1811.01463  [pdf

    cs.LG cs.CR stat.ML

    Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference

    Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique

    Abstract: The exponential increase in dependencies between the cyber and physical world leads to an enormous amount of data which must be efficiently processed and stored. Therefore, computing paradigms are evolving towards machine learning (ML)-based systems because of their ability to efficiently and accurately process the enormous amount of data. Although ML-based solutions address the efficient computin… ▽ More

    Submitted 4 November, 2018; originally announced November 2018.

    Report number: INSPEC Accession Number: 18398499

    Journal ref: International Conference on Frontiers of Information Technology (FIT) 2018

  37. arXiv:1811.01444  [pdf, other

    cs.LG cs.CR stat.ML

    FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning

    Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique

    Abstract: Deep neural networks (DNN)-based machine learning (ML) algorithms have recently emerged as the leading ML paradigm particularly for the task of classification due to their superior capability of learning efficiently from large datasets. The discovery of a number of well-known attacks such as dataset poisoning, adversarial examples, and network manipulation (through the addition of malicious nodes)… ▽ More

    Submitted 4 November, 2018; originally announced November 2018.

    Comments: Accepted in Design, Automation and Test in Europe 2019

  38. arXiv:1811.01443  [pdf, other

    cs.LG cs.CR stat.ML

    SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters

    Authors: Hassan Ali, Faiq Khalid, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

    Abstract: In this paper, we introduce a novel technique based on the Secure Selective Convolutional (SSC) techniques in the training loop that increases the robustness of a given DNN by allowing it to learn the data distribution based on the important edges in the input image. We validate our technique on Convolutional DNNs against the state-of-the-art attacks from the open-source Cleverhans library using t… ▽ More

    Submitted 14 May, 2020; v1 submitted 4 November, 2018; originally announced November 2018.

    Journal ref: IEEE Design & Test, vol. 37, no. 2, pp. 58-65, April 2020

  39. arXiv:1811.01437  [pdf, other

    cs.LG cs.CR stat.ML

    QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks

    Authors: Faiq Khalid, Hassan Ali, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

    Abstract: Adversarial examples have emerged as a significant threat to machine learning algorithms, especially to the convolutional neural networks (CNNs). In this paper, we propose two quantization-based defense mechanisms, Constant Quantization (CQ) and Trainable Quantization (TQ), to increase the robustness of CNNs against adversarial examples. CQ quantizes input pixel intensities based on a "fixed" numb… ▽ More

    Submitted 14 May, 2020; v1 submitted 4 November, 2018; originally announced November 2018.

    Journal ref: 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), Rhodes, Greece, 2019, pp. 182-187

  40. arXiv:1811.01031  [pdf, other

    cs.LG cs.CR stat.ML

    TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks

    Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

    Abstract: Most of the data manipulation attacks on deep neural networks (DNNs) during the training stage introduce a perceptible noise that can be catered by preprocessing during inference or can be identified during the validation phase. Therefore, data poisoning attacks during inference (e.g., adversarial attacks) are becoming more popular. However, many of them do not consider the imperceptibility factor… ▽ More

    Submitted 14 May, 2020; v1 submitted 2 November, 2018; originally announced November 2018.

    Journal ref: 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), Rhodes, Greece, 2019, pp. 188-193

  41. arXiv:1810.12910  [pdf, other

    cs.DC cs.AR cs.LG

    MPNA: A Massively-Parallel Neural Array Accelerator with Dataflow Optimization for Convolutional Neural Networks

    Authors: Muhammad Abdullah Hanif, Rachmad Vidya Wicaksana Putra, Muhammad Tanvir, Rehan Hafiz, Semeen Rehman, Muhammad Shafique

    Abstract: The state-of-the-art accelerators for Convolutional Neural Networks (CNNs) typically focus on accelerating only the convolutional layers, but do not prioritize the fully-connected layers much. Hence, they lack a synergistic optimization of the hardware architecture and diverse dataflows for the complete CNN design, which can provide a higher potential for performance/energy efficiency. Towards thi… ▽ More

    Submitted 30 October, 2018; originally announced October 2018.

  42. arXiv:1706.02430  [pdf

    cs.CV

    Image Captioning with Object Detection and Localization

    Authors: Zhongliang Yang, Yu-Jin Zhang, Sadaqat ur Rehman, Yongfeng Huang

    Abstract: Automatically generating a natural language description of an image is a task close to the heart of image understanding. In this paper, we present a multi-model neural network method closely related to the human visual system that automatically learns to describe the content of images. Our model consists of two sub-models: an object detection and localization model, which extract the information o… ▽ More

    Submitted 7 June, 2017; originally announced June 2017.

  43. arXiv:1506.08966  [pdf

    cs.IR cs.DL

    Classification of Research Citations (CRC)

    Authors: Bilal Hayat Butt, Muhammad Rafi, Arsal Jamal, Raja Sami Ur Rehman, Syed Muhammad Zubair Alam, Muhammad Bilal Alam

    Abstract: Research is a continuous phenomenon. It is recursive in nature. Every research is based on some earlier research outcome. A general approach in reviewing the literature for a problem is to categorize earlier work for the same problem as positive and negative citations. In this paper, we propose a novel automated technique, which classifies whether an earlier work is cited as sentiment positive or… ▽ More

    Submitted 30 June, 2015; originally announced June 2015.

  44. arXiv:1504.06359  [pdf

    cs.HC

    Preprint Touch-less Interactive Augmented Reality Game on Vision Based Wearable Device

    Authors: Zhihan Lv, Alaa Halawani, Shengzhong Feng, Shafiq ur Rehman, Haibo Li

    Abstract: This is the preprint version of our paper on Personal and Ubiquitous Computing. There is an increasing interest in creating pervasive games based on emerging interaction technologies. In order to develop touch-less, interactive and augmented reality games on vision-based wearable device, a touch-less motion interaction technology is designed and evaluated in this work. Users interact with the augm… ▽ More

    Submitted 7 September, 2015; v1 submitted 23 April, 2015; originally announced April 2015.

    Comments: This is the preprint version of our paper on Personal and Ubiquitous Computing

    ACM Class: H.5.1

  45. arXiv:1409.2486  [pdf

    cs.NI

    Performance Evaluation of HEVC over Broadband Networks

    Authors: Saeed ur Rehman, Gulistan Raja

    Abstract: High efficiency video coding is the current trend setting standard for coding and transmission of video content. This standard has brought in many improvements over its predecessor H264 standard. In this paper, performance evaluation of transmitting HEVC content over the simulated network environment for disaster and calamity stricken area has been under taken. In the simulation the transmitted vi… ▽ More

    Submitted 8 September, 2014; originally announced September 2014.

    Comments: IJCSI International Journal of Computer Science Issues, Vol. 11, Issue 4, No 1, July 2014 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784

  46. Analyzing Energy-efficiency and Route-selection of Multi-level Hierarchal Routing Protocols in WSNs

    Authors: M. S. Fareed, N. Javaid, S. Ahmed, S. Rehman, U. Qasim, Z. A. Khan

    Abstract: The advent and development in the field of Wireless Sensor Networks (WSNs) in recent years has seen the growth of extremely small and low-cost sensors that possess sensing, signal processing and wireless communication capabilities. These sensors can be expended at a much lower cost and are capable of detecting conditions such as temperature, sound, security or any other system. A good protocol des… ▽ More

    Submitted 12 August, 2012; originally announced August 2012.

    Comments: NGWMN with 7th IEEE Inter- national Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2012), Victoria, Canada, 2012

  47. Optimal Number of Cluster Head Selection for Efficient Distribution of Sources in WSNs

    Authors: M. S. Fareed, N. Javaid, M. Akbar, S. Rehman, U. Qasim, Z. A. Khan

    Abstract: In this paper, we compare problems of cluster formation and cluster-head selection between different protocols for data aggregation and transmission. We focus on two aspects of the problem: (i) how to guess number of clusters required to proficiently consume available sources for a sensor network, and (ii) how to select number of cluster-heads to cover up sensor networks more proficiently. A senso… ▽ More

    Submitted 12 August, 2012; originally announced August 2012.

    Comments: NGWMN with 7th IEEE International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2012), Victoria, Canada, 2012

  48. arXiv:1203.3103  [pdf

    cs.CR cs.NI

    Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)

    Authors: Sadaqat Ur Rehman, Muhammad Bilal, Basharat Ahmad, Khawaja Muhammad Yahya, Anees Ullah, Obaid Ur Rehman

    Abstract: Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetr… ▽ More

    Submitted 14 March, 2012; originally announced March 2012.

    Comments: 6 Pages, International Journal of Computer Science issues 2012