Skip to main content

Showing 1–25 of 25 results for author: Badawy, A A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.07937  [pdf, ps, other

    cs.CL quant-ph

    Quantum Graph Transformer for NLP Sentiment Classification

    Authors: Shamminuj Aktar, Andreas Bärtschi, Abdel-Hameed A. Badawy, Stephan Eidenbenz

    Abstract: Quantum machine learning is a promising direction for building more efficient and expressive models, particularly in domains where understanding complex, structured data is critical. We present the Quantum Graph Transformer (QGT), a hybrid graph-based architecture that integrates a quantum self-attention mechanism into the message-passing framework for structured language modeling. The attention m… ▽ More

    Submitted 9 June, 2025; originally announced June 2025.

    Report number: LA-UR-25-24685

  2. arXiv:2505.22469  [pdf, ps, other

    cs.PF cs.LG

    CPINN-ABPI: Physics-Informed Neural Networks for Accurate Power Estimation in MPSoCs

    Authors: Mohamed R. Elshamy, Mehdi Elahi, Ahmad Patooghy, Abdel-Hameed A. Badawy

    Abstract: Efficient thermal and power management in modern multiprocessor systems-on-chip (MPSoCs) demands accurate power consumption estimation. One of the state-of-the-art approaches, Alternative Blind Power Identification (ABPI), theoretically eliminates the dependence on steady-state temperatures, addressing a major shortcoming of previous approaches. However, ABPI performance has remained unverified in… ▽ More

    Submitted 28 May, 2025; originally announced May 2025.

  3. arXiv:2502.11906  [pdf, other

    cs.PF cs.DC

    Comparison of Vectorization Capabilities of Different Compilers for X86 and ARM CPUs

    Authors: Nazmus Sakib, Tarun Prabhu, Nandakishore Santhi, John Shalf, Abdel-Hameed A. Badawy

    Abstract: Most modern processors contain vector units that simultaneously perform the same arithmetic operation over multiple sets of operands. The ability of compilers to automatically vectorize code is critical to effectively using these units. Understanding this capability is important for anyone writing compute-intensive, high-performance, and portable code. We tested the ability of several compilers to… ▽ More

    Submitted 17 February, 2025; originally announced February 2025.

    Comments: IEEE HPEC 2024

  4. arXiv:2501.01057  [pdf, other

    cs.PF cs.LG eess.SY

    HPC Application Parameter Autotuning on Edge Devices: A Bandit Learning Approach

    Authors: Abrar Hossain, Abdel-Hameed A. Badawy, Mohammad A. Islam, Tapasya Patki, Kishwar Ahmed

    Abstract: The growing necessity for enhanced processing capabilities in edge devices with limited resources has led us to develop effective methods for improving high-performance computing (HPC) applications. In this paper, we introduce LASP (Lightweight Autotuning of Scientific Application Parameters), a novel strategy designed to address the parameter search space challenge in edge devices. Our strategy e… ▽ More

    Submitted 1 January, 2025; originally announced January 2025.

  5. arXiv:2412.07636  [pdf, other

    cs.CR cs.AI

    TrojanWhisper: Evaluating Pre-trained LLMs to Detect and Localize Hardware Trojans

    Authors: Md Omar Faruque, Peter Jamieson, Ahmad Patooghy, Abdel-Hameed A. Badawy

    Abstract: Existing Hardware Trojans (HT) detection methods face several critical limitations: logic testing struggles with scalability and coverage for large designs, side-channel analysis requires golden reference chips, and formal verification methods suffer from state-space explosion. The emergence of Large Language Models (LLMs) offers a promising new direction for HT detection by leveraging their natur… ▽ More

    Submitted 10 December, 2024; originally announced December 2024.

  6. arXiv:2412.02816  [pdf, other

    cs.CR

    Unleashing GHOST: An LLM-Powered Framework for Automated Hardware Trojan Design

    Authors: Md Omar Faruque, Peter Jamieson, Ahmad Patooghy, Abdel-Hameed A. Badawy

    Abstract: Traditionally, inserting realistic Hardware Trojans (HTs) into complex hardware systems has been a time-consuming and manual process, requiring comprehensive knowledge of the design and navigating intricate Hardware Description Language (HDL) codebases. Machine Learning (ML)-based approaches have attempted to automate this process but often face challenges such as the need for extensive training d… ▽ More

    Submitted 3 December, 2024; originally announced December 2024.

  7. arXiv:2411.13854  [pdf, other

    cs.PF

    Static Reuse Profile Estimation for Array Applications

    Authors: Abdur Razzak, Atanu Barai, Nandakishore Santhi, Abdel-Hameed A. Badawy

    Abstract: Reuse distance analysis is a widely recognized method for application characterization that illustrates cache locality. Although there are various techniques to calculate the reuse profile from dynamic memory traces, it is both time and space-consuming due to the requirement to collect dynamic memory traces at runtime. In contrast, static analysis reuse profile estimation is a promisingly faster a… ▽ More

    Submitted 21 November, 2024; originally announced November 2024.

    Comments: Accepted in The International Symposium on Memory Systems (MEMSYS 24), September 30 to October 03, 2024, Washington, DC, USA

  8. arXiv:2410.21261  [pdf, other

    cs.PF

    Fine-Grained Clustering-Based Power Identification for Multicores

    Authors: Mohamed R. Elshamy, Mehdi Elahi, Ahmad Patooghy, Abdel-Hameed A. Badawy

    Abstract: Fine-grained power estimation in multicore Systems on Chips (SoCs) is crucial for efficient thermal management. BPI (Blind Power Identification) is a recent approach that determines the power consumption of different cores and the thermal model of the chip using only thermal sensor measurements and total power consumption. BPI relies on steady-state thermal data along with a naive initialization i… ▽ More

    Submitted 28 October, 2024; originally announced October 2024.

  9. arXiv:2410.15602  [pdf, other

    cs.AI cs.CV

    P-YOLOv8: Efficient and Accurate Real-Time Detection of Distracted Driving

    Authors: Mohamed R. Elshamy, Heba M. Emara, Mohamed R. Shoaib, Abdel-Hameed A. Badawy

    Abstract: Distracted driving is a critical safety issue that leads to numerous fatalities and injuries worldwide. This study addresses the urgent need for efficient and real-time machine learning models to detect distracted driving behaviors. Leveraging the Pretrained YOLOv8 (P-YOLOv8) model, a real-time object detection system is introduced, optimized for both speed and accuracy. This approach addresses th… ▽ More

    Submitted 20 October, 2024; originally announced October 2024.

  10. arXiv:2410.15550  [pdf, other

    cs.CR cs.AR cs.LG

    Hiding in Plain Sight: Reframing Hardware Trojan Benchmarking as a Hide&Seek Modification

    Authors: Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy

    Abstract: This work focuses on advancing security research in the hardware design space by formally defining the realistic problem of Hardware Trojan (HT) detection. The goal is to model HT detection more closely to the real world, i.e., describing the problem as The Seeker's Dilemma where a detecting agent is unaware of whether circuits are infected by HTs or not. Using this theoretical problem formulation… ▽ More

    Submitted 20 October, 2024; originally announced October 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2402.17918

    ACM Class: B.8.1

  11. arXiv:2409.18921  [pdf, other

    cs.CR cs.PF eess.SP

    Cluster-BPI: Efficient Fine-Grain Blind Power Identification for Defending against Hardware Thermal Trojans in Multicore SoCs

    Authors: Mohamed R. Elshamy, Mehdi Elahi, Ahmad Patooghy, Abdel-Hameed A. Badawy

    Abstract: Modern multicore System-on-Chips (SoCs) feature hardware monitoring mechanisms that measure total power consumption. However, these aggregate measurements are often insufficient for fine-grained thermal and power management. This paper presents an enhanced Clustering Blind Power Identification (ICBPI) approach, designed to improve the sensitivity and robustness of the traditional Blind Power Ident… ▽ More

    Submitted 27 September, 2024; originally announced September 2024.

  12. arXiv:2405.15184  [pdf, other

    cs.CR cs.AR cs.LG

    TrojanForge: Generating Adversarial Hardware Trojan Examples Using Reinforcement Learning

    Authors: Amin Sarihi, Peter Jamieson, Ahmad Patooghy, Abdel-Hameed A. Badawy

    Abstract: The Hardware Trojan (HT) problem can be thought of as a continuous game between attackers and defenders, each striving to outsmart the other by leveraging any available means for an advantage. Machine Learning (ML) has recently played a key role in advancing HT research. Various novel techniques, such as Reinforcement Learning (RL) and Graph Neural Networks (GNNs), have shown HT insertion and dete… ▽ More

    Submitted 8 December, 2024; v1 submitted 23 May, 2024; originally announced May 2024.

    ACM Class: B.8.1

  13. Graph Neural Networks for Parameterized Quantum Circuits Expressibility Estimation

    Authors: Shamminuj Aktar, Andreas Bärtschi, Diane Oyen, Stephan Eidenbenz, Abdel-Hameed A. Badawy

    Abstract: Parameterized quantum circuits (PQCs) are fundamental to quantum machine learning (QML), quantum optimization, and variational quantum algorithms (VQAs). The expressibility of PQCs is a measure that determines their capability to harness the full potential of the quantum state space. It is thus a crucial guidepost to know when selecting a particular PQC ansatz. However, the existing technique for… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Report number: LA-UR-23-33850

    Journal ref: IEEE International Conference on Quantum Computing and Engineering (QCE), Montreal, QC, Canada, 2024, pp. 1547-1557

  14. arXiv:2402.17918  [pdf, other

    cs.CR cs.AR cs.LG

    The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection

    Authors: Amin Sarihi, Ahmad Patooghy, Abdel-Hameed A. Badawy, Peter Jamieson

    Abstract: This work focuses on advancing security research in the hardware design space by formally defining the realistic problem of Hardware Trojan (HT) detection. The goal is to model HT detection more closely to the real world, i.e., describing the problem as "The Seeker's Dilemma" (an extension of Hide&Seek on a graph), where a detecting agent is unaware of whether circuits are infected by HTs or not.… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    ACM Class: B.8.1

  15. arXiv:2311.12883  [pdf, other

    cs.SE cs.PF cs.PL

    LLVM Static Analysis for Program Characterization and Memory Reuse Profile Estimation

    Authors: Atanu Barai, Nandakishore Santhi, Abdur Razzak, Stephan Eidenbenz, Abdel-Hameed A. Badawy

    Abstract: Profiling various application characteristics, including the number of different arithmetic operations performed, memory footprint, etc., dynamically is time- and space-consuming. On the other hand, static analysis methods, although fast, can be less accurate. This paper presents an LLVM-based probabilistic static analysis method that accurately predicts different program characteristics and estim… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

    Comments: This paper was accepted at the MEMSYS '23 conference, The International Symposium on Memory Systems, October 02, 2023 - October 05, 2023, Alexandria, VA

  16. Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection

    Authors: Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy

    Abstract: Current Hardware Trojan (HT) detection techniques are mostly developed based on a limited set of HT benchmarks. Existing HT benchmark circuits are generated with multiple shortcomings, i.e., i) they are heavily biased by the designers' mindset when created, and ii) they are created through a one-dimensional lens, mainly the signal activity of nets. We introduce the first automated Reinforcement Le… ▽ More

    Submitted 20 March, 2024; v1 submitted 16 May, 2023; originally announced May 2023.

    Comments: This paper appears in the Journal of Supercomputing: https://doi.org/10.1007/s11227-024-05963-8

    ACM Class: B.8.1

  17. arXiv:2304.13232  [pdf, other

    cs.AR cs.CR cs.LG

    Multi-criteria Hardware Trojan Detection: A Reinforcement Learning Approach

    Authors: Amin Sarihi, Peter Jamieson, Ahmad Patooghy, Abdel-Hameed A. Badawy

    Abstract: Hardware Trojans (HTs) are undesired design or manufacturing modifications that can severely alter the security and functionality of digital integrated circuits. HTs can be inserted according to various design criteria, e.g., nets switching activity, observability, controllability, etc. However, to our knowledge, most HT detection methods are only based on a single criterion, i.e., nets switching… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    ACM Class: B.8.1

  18. arXiv:2210.03048  [pdf, other

    quant-ph cs.DS

    Scalable Experimental Bounds for Entangled Quantum State Fidelities

    Authors: Shamminuj Aktar, Andreas Bärtschi, Abdel-Hameed A. Badawy, Stephan Eidenbenz

    Abstract: Estimating the state preparation fidelity of highly entangled states on noisy intermediate-scale quantum (NISQ) devices is important for benchmarking and application considerations. Unfortunately, exact fidelity measurements quickly become prohibitively expensive, as they scale exponentially as $O(3^N)$ for $N$-qubit states, using full state tomography with measurements in all Pauli bases combinat… ▽ More

    Submitted 27 January, 2025; v1 submitted 6 October, 2022; originally announced October 2022.

    Report number: LA-UR-23-31364

    Journal ref: ACM Transactions on Quantum Computing, 5(4), article no. 27, December 2024

  19. arXiv:2204.04350  [pdf, other

    cs.LG cs.AR cs.CR

    Hardware Trojan Insertion Using Reinforcement Learning

    Authors: Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy

    Abstract: This paper utilizes Reinforcement Learning (RL) as a means to automate the Hardware Trojan (HT) insertion process to eliminate the inherent human biases that limit the development of robust HT detection methods. An RL agent explores the design space and finds circuit locations that are best for keeping inserted HTs hidden. To achieve this, a digital circuit is converted to an environment in which… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

    Comments: This paper was accepted for publication in GLSVLSI'22

    ACM Class: B.8.1

  20. A Divide-and-Conquer Approach to Dicke State Preparation

    Authors: Shamminuj Aktar, Andreas Bärtschi, Abdel-Hameed A. Badawy, Stephan Eidenbenz

    Abstract: We present a divide-and-conquer approach to deterministically prepare Dicke states $\lvert D_k^n\rangle$ (i.e., equal-weight superpositions of all $n$-qubit states with Hamming Weight $k$) on quantum computers. In an experimental evaluation for up to $n=6$ qubits on IBM Quantum Sydney and Montreal devices, we achieve significantly higher state fidelity compared to previous results [Mukherjee and o… ▽ More

    Submitted 9 June, 2022; v1 submitted 23 December, 2021; originally announced December 2021.

    Report number: LA-UR-21-31138

    Journal ref: IEEE Transactions on Quantum Engineering, vol. 3, pp. 1-16, 2022, Art no. 3101816

  21. arXiv:1907.12666  [pdf, other

    cs.PF cs.SE

    Modeling Shared Cache Performance of OpenMP Programs using Reuse Distance

    Authors: Atanu Barai, Gopinath Chennupati, Nandakishore Santhi, Abdel-Hameed A. Badawy, Stephan Eidenbenz

    Abstract: Performance modeling of parallel applications on multicore computers remains a challenge in computational co-design due to the complex design of multicore processors including private and shared memory hierarchies. We present a Scalable Analytical Shared Memory Model to predict the performance of parallel applications that runs on a multicore computer and shares the same level of cache in the hier… ▽ More

    Submitted 29 July, 2019; originally announced July 2019.

    Report number: LA-UR-19-27398

  22. arXiv:1806.07570  [pdf

    cs.ET

    Energy Efficient Tri-State CNFET Ternary Logic Gates

    Authors: Sepher Tabrizchi, Fazel Sharifi, Abdel-Hameed A. Badawy

    Abstract: Traditional silicon binary circuits continue to face challenges such as high leakage power dissipation and large area of interconnections. Multiple-Valued Logic (MVL) and nano devices are two feasible solutions to overcome these problems. In this paper, a novel method is presented to design ternary logic circuits based on Carbon Nanotube Field Effect Transistors (CNFETs). The proposed designs use… ▽ More

    Submitted 20 June, 2018; originally announced June 2018.

  23. MorphoNoC: Exploring the Design Space of a Configurable Hybrid NoC using Nanophotonics

    Authors: Vikram K. Narayana, Shuai Sun, Abdel-Hameed A. Badawy, Volker J. Sorger, Tarek El-Ghazawi

    Abstract: As diminishing feature sizes drive down the energy for computations, the power budget for on-chip communication is steadily rising. Furthermore, the increasing number of cores is placing a huge performance burden on the network-on-chip (NoC) infrastructure. While NoCs are designed as regular architectures that allow scaling to hundreds of cores, the lack of a flexible topology gives rise to higher… ▽ More

    Submitted 14 March, 2017; v1 submitted 12 December, 2016; originally announced January 2017.

    Comments: 14 pages, 15 figures

  24. Evaluating Discussion Boards on BlackBoard as a Collaborative Learning Tool A Students Survey and Reflections

    Authors: AbdelHameed A. Badawy, Michelle M. Hugue

    Abstract: In this paper, we investigate how the students think of their experience in a junior level course that has a blackboard course presence where the students use the discussion boards extensively. A survey is set up through blackboard as a voluntary quiz and the student who participated were given a freebie point. The results and the participation were very interesting in terms of the feedback we got… ▽ More

    Submitted 3 October, 2012; originally announced October 2012.

    Comments: 5 pages, 12 tables, appears in proceedings of the IEEE International Conference on Education and Management Technology (ICEMT 2010), Cairo, Egypt November 2010. arXiv admin note: substantial text overlap with arXiv:1210.1178

    Journal ref: In proceedings of the IEEE International Conference on Education and Management Technology (ICEMT 2010), pages 79 - 82, Cairo, Egypt November 2010

  25. arXiv:1210.1178  [pdf

    cs.CY

    Students Perceptions of the Effectiveness of Discussion Boards What can we get from our students for a freebie point

    Authors: Abdel-Hameed A. Badawy

    Abstract: We investigate how the students think of their experience in a junior 300 level computer science course that uses blackboard as the underlying course management system. The discussion boards in Blackboard are heavily used for programming project support and to foster cooperation among students to answer their questions and concerns. A survey is conducted through blackboard as a voluntary quiz and… ▽ More

    Submitted 3 October, 2012; originally announced October 2012.

    Comments: 9 pages

    Journal ref: International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 3, No. 9, 2012, 136-144