Skip to main content

Showing 1–18 of 18 results for author: Saleh, H

  1. arXiv:2307.05035  [pdf, other

    cs.NE cs.AR cs.LG

    Number Systems for Deep Neural Network Architectures: A Survey

    Authors: Ghada Alsuhli, Vasileios Sakellariou, Hani Saleh, Mahmoud Al-Qutayri, Baker Mohammad, Thanos Stouraitis

    Abstract: Deep neural networks (DNNs) have become an enabling component for a myriad of artificial intelligence applications. DNNs have shown sometimes superior performance, even compared to humans, in cases such as self-driving, health applications, etc. Because of their computational complexity, deploying DNNs in resource-constrained devices still faces many challenges related to computing complexity, ene… ▽ More

    Submitted 11 July, 2023; originally announced July 2023.

    Comments: 28 pages

  2. arXiv:2209.07524  [pdf, ps, other

    cs.DS

    $\tilde{O}(n+\mathrm{poly}(k))$-time Algorithm for Bounded Tree Edit Distance

    Authors: Debarati Das, Jacob Gilbert, MohammadTaghi Hajiaghayi, Tomasz Kociumaka, Barna Saha, Hamed Saleh

    Abstract: Computing the edit distance of two strings is one of the most basic problems in computer science and combinatorial optimization. Tree edit distance is a natural generalization of edit distance in which the task is to compute a measure of dissimilarity between two (unweighted) rooted trees with node labels. Perhaps the most notable recent application of tree edit distance is in NoSQL big databases,… ▽ More

    Submitted 15 September, 2022; originally announced September 2022.

    Comments: Full version of a paper accepted to FOCS 2022

  3. arXiv:2209.04936  [pdf, ps, other

    cs.DS

    Dynamic Subset Sum with Truly Sublinear Processing Time

    Authors: Hamed Saleh, Saeed Seddighin

    Abstract: Subset sum is a very old and fundamental problem in theoretical computer science. In this problem, $n$ items with weights $w_1, w_2, w_3, \ldots, w_n$ are given as input and the goal is to find out if there is a subset of them whose weights sum up to a given value $t$. While the problem is NP-hard in general, when the values are non-negative integer, subset sum can be solved in pseudo-polynomial t… ▽ More

    Submitted 11 September, 2022; originally announced September 2022.

  4. arXiv:2205.14101  [pdf, ps, other

    cs.DS

    Adaptive Massively Parallel Algorithms for Cut Problems

    Authors: MohammadTaghi Hajiaghayi, Marina Knittel, Jan Olkowski, Hamed Saleh

    Abstract: We study the Weighted Min Cut problem in the Adaptive Massively Parallel Computation (AMPC) model. In 2019, Behnezhad et al. [3] introduced the AMPC model as an extension of the Massively Parallel Computation (MPC) model. In the past decade, research on highly scalable algorithms has had significant impact on many massive systems. The MPC model, introduced in 2010 by Karloff et al. [16], which is… ▽ More

    Submitted 27 May, 2022; originally announced May 2022.

  5. arXiv:2111.01904  [pdf, other

    cs.DS cs.DC

    Adaptive Massively Parallel Constant-round Tree Contraction

    Authors: MohammadTaghi Hajiaghayi, Marina Knittel, Hamed Saleh, Hsin-Hao Su

    Abstract: Miller and Reif's FOCS'85 classic and fundamental tree contraction algorithm is a broadly applicable technique for the parallel solution of a large number of tree problems. Additionally it is also used as an algorithmic design technique for a large number of parallel graph algorithms. In all previously explored models of computation, however, tree contractions have only been achieved in… ▽ More

    Submitted 2 November, 2021; originally announced November 2021.

    Comments: 35 pages, 3 figures, to be published in Innovations in Theoretical Computer Science (ITCS)

  6. arXiv:2111.01515  [pdf

    cs.CL

    Detection of Hate Speech using BERT and Hate Speech Word Embedding with Deep Model

    Authors: Hind Saleh, Areej Alhothali, Kawthar Moria

    Abstract: The enormous amount of data being generated on the web and social media has increased the demand for detecting online hate speech. Detecting hate speech will reduce their negative impact and influence on others. A lot of effort in the Natural Language Processing (NLP) domain aimed to detect hate speech in general or detect specific hate speech such as religion, race, gender, or sexual orientation.… ▽ More

    Submitted 2 November, 2021; originally announced November 2021.

  7. arXiv:2110.05947  [pdf, other

    cs.LG cs.AI cs.ET eess.SY

    C3PU: Cross-Coupling Capacitor Processing Unit Using Analog-Mixed Signal In-Memory Computing for AI Inference

    Authors: Dima Kilani, Baker Mohammad, Yasmin Halawani, Mohammed F. Tolba, Hani Saleh

    Abstract: This paper presents a novel cross-coupling capacitor processing unit (C3PU) that supports analog-mixed signal in memory computing to perform multiply-and-accumulate (MAC) operations. The C3PU consists of a capacitive unit, a CMOS transistor, and a voltage-to-time converter (VTC). The capacitive unit serves as a computational element that holds the multiplier operand and performs multiplication onc… ▽ More

    Submitted 11 October, 2021; originally announced October 2021.

    Comments: 10 pages, 12 figures and 7 tables

  8. arXiv:2109.12111  [pdf

    cs.LG

    Accurate Remaining Useful Life Prediction with Uncertainty Quantification: a Deep Learning and Nonstationary Gaussian Process Approach

    Authors: Zhaoyi Xu, Yanjie Guo, Joseph Homer Saleh

    Abstract: Remaining useful life (RUL) refers to the expected remaining lifespan of a component or system. Accurate RUL prediction is critical for prognostic and health management and for maintenance planning. In this work, we address three prevalent challenges in data-driven RUL prediction, namely the handling of high dimensional input features, the robustness to noise in sensor data and prognostic datasets… ▽ More

    Submitted 23 September, 2021; originally announced September 2021.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. arXiv admin note: text overlap with arXiv:2109.11579

  9. arXiv:2109.11579  [pdf

    eess.SP cs.CE cs.LG

    Remaining useful life prediction with uncertainty quantification: development of a highly accurate model for rotating machinery

    Authors: Zhaoyi Xu, Yanjie Guo, Joseph Homer Saleh

    Abstract: Rotating machinery is essential to modern life, from power generation to transportation and a host of other industrial applications. Since such equipment generally operates under challenging working conditions, which can lead to untimely failures, accurate remaining useful life (RUL) prediction is essential for maintenance planning and to prevent catastrophic failures. In this work, we address cur… ▽ More

    Submitted 23 September, 2021; originally announced September 2021.

  10. arXiv:2105.02954  [pdf, other

    cs.CV cs.LG

    Deep Neural Networks Based Weight Approximation and Computation Reuse for 2-D Image Classification

    Authors: Mohammed F. Tolba, Huruy Tekle Tesfai, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri

    Abstract: Deep Neural Networks (DNNs) are computationally and memory intensive, which makes their hardware implementation a challenging task especially for resource constrained devices such as IoT nodes. To address this challenge, this paper introduces a new method to improve DNNs performance by fusing approximate computing with data reuse techniques to be used for image recognition applications. DNNs weigh… ▽ More

    Submitted 28 April, 2021; originally announced May 2021.

    Comments: 10 pages 9 figures

  11. UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking

    Authors: Lilas Alrahis, Satwik Patnaik, Johann Knechtel, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu

    Abstract: Logic locking aims to protect the intellectual property (IP) of integrated circuit (IC) designs throughout the globalized supply chain. The SAIL attack, based on tailored machine learning (ML) models, circumvents combinational logic locking with high accuracy and is amongst the most potent attacks as it does not require a functional IC acting as an oracle. In this work, we propose UNSAIL, a logic… ▽ More

    Submitted 9 February, 2021; v1 submitted 29 December, 2020; originally announced December 2020.

    Comments: IEEE Transactions on Information Forensics and Security (TIFS)

  12. arXiv:2012.05948  [pdf, other

    cs.CR

    GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking

    Authors: Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur Sinanoglu

    Abstract: In this paper, we propose GNNUnlock, the first-of-its-kind oracle-less machine learning-based attack on provably secure logic locking that can identify any desired protection logic without focusing on a specific syntactic topology. The key is to leverage a well-trained graph neural network (GNN) to identify all the gates in a given locked netlist that belong to the targeted protection logic, witho… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

    Comments: 6 pages, 4 figures, 6 tables, conference

  13. arXiv:2008.08221  [pdf

    cs.LG stat.ML

    Machine Learning for Reliability Engineering and Safety Applications: Review of Current Status and Future Opportunities

    Authors: Zhaoyi Xu, Joseph Homer Saleh

    Abstract: Machine learning (ML) pervades an increasing number of academic disciplines and industries. Its impact is profound, and several fields have been fundamentally altered by it, autonomy and computer vision for example; reliability engineering and safety will undoubtedly follow suit. There is already a large but fragmented literature on ML for reliability and safety applications, and it can be overwhe… ▽ More

    Submitted 18 August, 2020; originally announced August 2020.

    Comments: 50 pages

  14. Explicit Effect Subtyping

    Authors: Georgios Karachalias, Matija Pretnar, Amr Hany Saleh, Stien Vanderhallen, Tom Schrijvers

    Abstract: As popularity of algebraic effects and handlers increases, so does a demand for their efficient execution. Eff, an ML-like language with native support for handlers, has a subtyping-based effect system on which an effect-aware optimizing compiler could be built. Unfortunately, in our experience, implementing optimizations for Eff is overly error-prone because its core language is implicitly-typed,… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

    Comments: 57 pages, 29 figures

    Journal ref: J. Funct. Prog. 30 (2020) e15

  15. String Matching with Wildcards in the Massively Parallel Computation Model

    Authors: MohammadTaghi Hajiaghayi, Hamed Saleh, Saeed Seddighin, Xiaorui Sun

    Abstract: We study distributed algorithms for string matching problem in presence of wildcard characters. Given a string T (a text), we look for all occurrences of another string P (a pattern) as a substring of string T . Each wildcard character in the pattern matches a specific class of strings based on its type. String matching is one of the most fundamental problems in computer science, especially in the… ▽ More

    Submitted 4 June, 2021; v1 submitted 25 October, 2019; originally announced October 2019.

  16. arXiv:1909.04428  [pdf, other

    cs.CR

    ScanSAT: Unlocking Static and Dynamic Scan Obfuscation

    Authors: Lilas Alrahis, Muhammad Yasin, Nimisha Limaye, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu

    Abstract: While financially advantageous, outsourcing key steps, such as testing, to potentially untrusted Outsourced Assembly and Test (OSAT) companies may pose a risk of compromising on-chip assets. Obfuscation of scan chains is a technique that hides the actual scan data from the untrusted testers; logic inserted between the scan cells, driven by a secret key, hides the transformation functions that map… ▽ More

    Submitted 10 September, 2019; originally announced September 2019.

    Comments: 16 pages, 14 figures, IEEE Transactions on Emerging Topics in Computing

  17. arXiv:1805.06191  [pdf, other

    cs.GT

    Fair Allocation of Indivisible Items With Externalities

    Authors: Mohammad Ghodsi, Hamed Saleh, Masoud Seddighin

    Abstract: One of the important yet insufficiently studied subjects in fair allocation is the externality effect among agents. For a resource allocation problem, externalities imply that a bundle allocated to an agent may affect the utilities of other agents. In this paper, we conduct a study of fair allocation of indivisible goods when the externalities are not negligible. We present a simple and natural… ▽ More

    Submitted 16 May, 2018; originally announced May 2018.

  18. arXiv:1608.00816  [pdf, ps, other

    cs.PL

    Efficient Algebraic Effect Handlers for Prolog

    Authors: Amr Hany Saleh, Tom Schrijvers

    Abstract: Recent work has provided delimited control for Prolog to dynamically manipulate the program control-flow, and to implement a wide range of control-flow and dataflow effects on top of. Unfortunately, delimited control is a rather primitive language feature that is not easy to use. As a remedy, this work introduces algebraic effect handlers for Prolog, as a high-level and structured way of definin… ▽ More

    Submitted 2 August, 2016; originally announced August 2016.

    Comments: Paper presented at the 32nd International Conference on Logic Programming (ICLP 2016), New York City, USA, 16-21 October 2016, LaTex, 14 pages, 2 figures