Skip to main content

Showing 1–7 of 7 results for author: Shayan, M

.
  1. arXiv:2306.05532  [pdf, other

    cs.CR

    FuncTeller: How Well Does eFPGA Hide Functionality?

    Authors: Zhaokun Han, Mohammed Shayan, Aneesh Dixit, Mustafa Shihab, Yiorgos Makris, Jeyavijayan Rajendran

    Abstract: Hardware intellectual property (IP) piracy is an emerging threat to the global supply chain. Correspondingly, various countermeasures aim to protect hardware IPs, such as logic locking, camouflaging, and split manufacturing. However, these countermeasures cannot always guarantee IP security. A malicious attacker can access the layout/netlist of the hardware IP protected by these countermeasures an… ▽ More

    Submitted 20 June, 2023; v1 submitted 8 June, 2023; originally announced June 2023.

    Comments: To be published in the proceedings of the 32nd USENIX Security Symposium, 2023

  2. arXiv:2305.16488  [pdf

    physics.soc-ph

    Assessing inequities in electrification via heat pumps across the U.S

    Authors: Morgan R. Edwards, Jaime Garibay-Rodriguez, Jacob Shimkus Erickson, Muhammad Shayan, Jing Ling Tan, Xingchi Shen, Yueming Lucy Qiu, Pengfei Liu

    Abstract: Heat pumps are an energy-efficient and increasingly cost-effective solution for reducing greenhouse gas emissions in the building sector. However, other clean energy technologies such as rooftop solar are less likely to be adopted in underserved communities, and thus policies incentivizing their adoption may funnel tax dollars to well-resourced communities. Unlike previously-studied technologies,… ▽ More

    Submitted 6 June, 2024; v1 submitted 25 May, 2023; originally announced May 2023.

    Comments: Figure 2 modified; included additional variables in Figure 3 (no change in main findings); SI updated with newer data and additional robustness results (no change in main findings); references added

  3. arXiv:2206.04187  [pdf, other

    cs.CL

    Few-shot Question Generation for Personalized Feedback in Intelligent Tutoring Systems

    Authors: Devang Kulshreshtha, Muhammad Shayan, Robert Belfer, Siva Reddy, Iulian Vlad Serban, Ekaterina Kochmar

    Abstract: Existing work on generating hints in Intelligent Tutoring Systems (ITS) focuses mostly on manual and non-personalized feedback. In this work, we explore automatically generated questions as personalized feedback in an ITS. Our personalized feedback can pinpoint correct and incorrect or missing phrases in student answers as well as guide them towards correct answer by asking a question in natural l… ▽ More

    Submitted 8 June, 2022; originally announced June 2022.

    Comments: PAIS 2022

  4. arXiv:2203.03724  [pdf, other

    cs.CY cs.AI cs.HC cs.LG

    A New Era: Intelligent Tutoring Systems Will Transform Online Learning for Millions

    Authors: Francois St-Hilaire, Dung Do Vu, Antoine Frau, Nathan Burns, Farid Faraji, Joseph Potochny, Stephane Robert, Arnaud Roussel, Selene Zheng, Taylor Glazier, Junfel Vincent Romano, Robert Belfer, Muhammad Shayan, Ariella Smofsky, Tommy Delarosbil, Seulmin Ahn, Simon Eden-Walker, Kritika Sony, Ansona Onyi Ching, Sabina Elkins, Anush Stepanyan, Adela Matajova, Victor Chen, Hossein Sahraei, Robert Larson , et al. (6 additional authors not shown)

    Abstract: Despite artificial intelligence (AI) having transformed major aspects of our society, less than a fraction of its potential has been explored, let alone deployed, for education. AI-powered learning can provide millions of learners with a highly personalized, active and practical learning experience, which is key to successful learning. This is especially relevant in the context of online learning… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

    Comments: 9 pages, 6 figures

    ACM Class: I.2.0; K.3.1; K.4.0

  5. arXiv:2104.07763  [pdf, other

    cs.CY cs.AI cs.CL cs.HC

    Comparative Study of Learning Outcomes for Online Learning Platforms

    Authors: Francois St-Hilaire, Nathan Burns, Robert Belfer, Muhammad Shayan, Ariella Smofsky, Dung Do Vu, Antoine Frau, Joseph Potochny, Farid Faraji, Vincent Pavero, Neroli Ko, Ansona Onyi Ching, Sabina Elkins, Anush Stepanyan, Adela Matajova, Laurent Charlin, Yoshua Bengio, Iulian Vlad Serban, Ekaterina Kochmar

    Abstract: Personalization and active learning are key aspects to successful learning. These aspects are important to address in intelligent educational applications, as they help systems to adapt and close the gap between students with varying abilities, which becomes increasingly important in the context of online and distance learning. We run a comparative head-to-head study of learning outcomes for two p… ▽ More

    Submitted 15 April, 2021; originally announced April 2021.

    Comments: 14 pages, 3 figures, 2 tables, accepted at AIED 2021 (2021 Conference on Artificial Intelligence in Education)

    ACM Class: I.2.0; I.2.1; I.2.7; K.3.1; G.4

  6. arXiv:2010.13155  [pdf, other

    cs.CR cs.AR

    Security Assessment of Interposer-based Chiplet Integration

    Authors: Mohammed Shayan, Kanad Basu, Ramesh Karri

    Abstract: With transistor scaling reaching its limits, interposer-based integration of dies (chiplets) is gaining traction. Such an interposer-based integration enables finer and tighter interconnect pitch than traditional system-on-packages and offers two key benefits: 1. It reduces design-to-market time by bypassing the time-consuming process of verification and fabrication. 2. It reduces the design cost… ▽ More

    Submitted 25 October, 2020; originally announced October 2020.

  7. arXiv:1811.09904  [pdf, other

    cs.LG cs.CR cs.DC stat.ML

    Biscotti: A Ledger for Private and Secure Peer-to-Peer Machine Learning

    Authors: Muhammad Shayan, Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh

    Abstract: Federated Learning is the current state of the art in supporting secure multi-party machine learning (ML): data is maintained on the owner's device and the updates to the model are aggregated through a secure protocol. However, this process assumes a trusted centralized infrastructure for coordination, and clients must trust that the central service does not use the byproducts of client data. In a… ▽ More

    Submitted 11 December, 2019; v1 submitted 24 November, 2018; originally announced November 2018.

    Comments: 20 pages