Skip to main content

Showing 1–7 of 7 results for author: Ahmadi, M M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.04489  [pdf

    cs.LG cs.AI

    CNN Autoencoders for Hierarchical Feature Extraction and Fusion in Multi-sensor Human Activity Recognition

    Authors: Saeed Arabzadeh, Farshad Almasganj, Mohammad Mahdi Ahmadi

    Abstract: Deep learning methods have been widely used for Human Activity Recognition (HAR) using recorded signals from Iner-tial Measurement Units (IMUs) sensors that are installed on various parts of the human body. For this type of HAR, sev-eral challenges exist, the most significant of which is the analysis of multivarious IMU sensors data. Here, we introduce a Hierarchically Unsupervised Fusion (HUF) mo… ▽ More

    Submitted 6 February, 2025; originally announced February 2025.

    Comments: 10 pages, 9 figures

  2. arXiv:2304.02510  [pdf, other

    cs.CR

    FPGA-Patch: Mitigating Remote Side-Channel Attacks on FPGAs using Dynamic Patch Generation

    Authors: Mahya Morid Ahmadi, Lilas Alrahis, Ozgur Sinanoglu, Muhammad Shafique

    Abstract: We propose FPGA-Patch, the first-of-its-kind defense that leverages automated program repair concepts to thwart power side-channel attacks on cloud FPGAs. FPGA-Patch generates isofunctional variants of the target hardware by injecting faults and finding transformations that eliminate failure. The obtained variants display different hardware characteristics, ensuring a maximal diversity in power tr… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

    Comments: 6 pages

  3. arXiv:2303.06746  [pdf, other

    cs.CR

    DNN-Alias: Deep Neural Network Protection Against Side-Channel Attacks via Layer Balancing

    Authors: Mahya Morid Ahmadi, Lilas Alrahis, Ozgur Sinanoglu, Muhammad Shafique

    Abstract: Extracting the architecture of layers of a given deep neural network (DNN) through hardware-based side channels allows adversaries to steal its intellectual property and even launch powerful adversarial attacks on the target system. In this work, we propose DNN-Alias, an obfuscation method for DNNs that forces all the layers in a given network to have similar execution traces, preventing attack mo… ▽ More

    Submitted 12 March, 2023; originally announced March 2023.

    Comments: 10 pages

  4. arXiv:2303.06486  [pdf, other

    cs.CR

    SHIELD: An Adaptive and Lightweight Defense against the Remote Power Side-Channel Attacks on Multi-tenant FPGAs

    Authors: Mahya Morid Ahmadi, Faiq Khalid, Radha Vaidya, Florian Kriebel, Andreas Steininger, Muhammad Shafique

    Abstract: Dynamic partial reconfiguration enables multi-tenancy in cloud-based FPGAs, which presents security challenges for tenants, IPs, and data. Malicious users can exploit FPGAs for remote side-channel attacks (SCAs), and shared on-chip resources can be used for attacks. Logical separation can ensure design integrity, but on-chip resources can still be exploited. Conventional SCA mitigation can help, b… ▽ More

    Submitted 11 March, 2023; originally announced March 2023.

    Comments: 11 pages, under review by IEEE ACCESS

  5. arXiv:2208.07291  [pdf

    cs.CV

    Elderly Fall Detection Using CCTV Cameras under Partial Occlusion of the Subjects Body

    Authors: Sara Khalili, Hoda Mohammadzade, Mohammad Mahdi Ahmadi

    Abstract: One of the possible dangers that older people face in their daily lives is falling. Occlusion is one of the biggest challenges of vision-based fall detection systems and degrades their detection performance considerably. To tackle this problem, we synthesize specifically-designed occluded videos for training fall detection systems using existing datasets. Then, by defining a new cost function, we… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Comments: 12 pages,7 figures, 5 tables

  6. arXiv:2206.00402  [pdf, other

    cs.CR cs.LG

    NeuroUnlock: Unlocking the Architecture of Obfuscated Deep Neural Networks

    Authors: Mahya Morid Ahmadi, Lilas Alrahis, Alessio Colucci, Ozgur Sinanoglu, Muhammad Shafique

    Abstract: The advancements of deep neural networks (DNNs) have led to their deployment in diverse settings, including safety and security-critical applications. As a result, the characteristics of these models have become sensitive intellectual properties that require protection from malicious users. Extracting the architecture of a DNN through leaky side-channels (e.g., memory access) allows adversaries to… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

    Comments: The definitive Version of Record will be Published in the 2022 International Joint Conference on Neural Networks (IJCNN)

  7. arXiv:2106.08877  [pdf, other

    cs.CR cs.AR

    Side-Channel Attacks on RISC-V Processors: Current Progress, Challenges, and Opportunities

    Authors: Mahya Morid Ahmadi, Faiq Khalid, Muhammad Shafique

    Abstract: Side-channel attacks on microprocessors, like the RISC-V, exhibit security vulnerabilities that lead to several design challenges. Hence, it is imperative to study and analyze these security vulnerabilities comprehensively. In this paper, we present a brief yet comprehensive study of the security vulnerabilities in modern microprocessors with respect to side-channel attacks and their respective mi… ▽ More

    Submitted 16 June, 2021; originally announced June 2021.

    Comments: CYBER 2020, The Fifth International Conference on Cyber-Technologies and Cyber-Systems