Skip to main content

Showing 1–15 of 15 results for author: Ghavami, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2507.05286  [pdf

    cs.LG cs.AI

    Compressing Deep Neural Networks Using Explainable AI

    Authors: Kimia Soroush, Mohsen Raji, Behnam Ghavami

    Abstract: Deep neural networks (DNNs) have demonstrated remarkable performance in many tasks but it often comes at a high computational cost and memory usage. Compression techniques, such as pruning and quantization, are applied to reduce the memory footprint of DNNs and make it possible to accommodate them on resource-constrained edge devices. Recently, explainable artificial intelligence (XAI) methods hav… ▽ More

    Submitted 4 July, 2025; originally announced July 2025.

  2. arXiv:2412.09450  [pdf, other

    cs.CR

    A Semi Black-Box Adversarial Bit-Flip Attack with Limited DNN Model Information

    Authors: Behnam Ghavami, Mani Sadati, Mohammad Shahidzadeh, Lesley Shannon, Steve Wilton

    Abstract: Despite the rising prevalence of deep neural networks (DNNs) in cyber-physical systems, their vulnerability to adversarial bit-flip attacks (BFAs) is a noteworthy concern. This paper proposes B3FA, a semi-black-box BFA-based parameter attack on DNNs, assuming the adversary has limited knowledge about the model. We consider practical scenarios often feature a more restricted threat model for real-w… ▽ More

    Submitted 12 December, 2024; originally announced December 2024.

  3. arXiv:2411.15442  [pdf, other

    cs.AR cs.AI

    Automatic High-quality Verilog Assertion Generation through Subtask-Focused Fine-Tuned LLMs and Iterative Prompting

    Authors: Mohammad Shahidzadeh, Behnam Ghavami, Steve Wilton, Lesley Shannon

    Abstract: Formal Property Verification (FPV), using SystemVerilog Assertions (SVA), is crucial for ensuring the completeness of design with respect to the specification. However, writing SVA is a laborious task and has a steep learning curve. In this work, we present a large language model (LLM) -based flow to automatically generate high-quality SVA from the design specification documents, named \ToolName.… ▽ More

    Submitted 22 November, 2024; originally announced November 2024.

  4. arXiv:2407.04964  [pdf, other

    cs.AI

    ZOBNN: Zero-Overhead Dependable Design of Binary Neural Networks with Deliberately Quantized Parameters

    Authors: Behnam Ghavami, Mohammad Shahidzadeh, Lesley Shannon, Steve Wilton

    Abstract: Low-precision weights and activations in deep neural networks (DNNs) outperform their full-precision counterparts in terms of hardware efficiency. When implemented with low-precision operations, specifically in the extreme case where network parameters are binarized (i.e. BNNs), the two most frequently mentioned benefits of quantization are reduced memory consumption and a faster inference process… ▽ More

    Submitted 6 July, 2024; originally announced July 2024.

  5. Quantizing YOLOv7: A Comprehensive Study

    Authors: Mohammadamin Baghbanbashi, Mohsen Raji, Behnam Ghavami

    Abstract: YOLO is a deep neural network (DNN) model presented for robust real-time object detection following the one-stage inference approach. It outperforms other real-time object detectors in terms of speed and accuracy by a wide margin. Nevertheless, since YOLO is developed upon a DNN backbone with numerous parameters, it will cause excessive memory load, thereby deploying it on memory-constrained devic… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

    Comments: Presented at the "2023 28th International Computer Conference, Computer Society of Iran (CSICC)" and indexed in IEEE

    ACM Class: I.2.10; I.4.0; I.5.1; E.4

  6. arXiv:2404.02947  [pdf, other

    cs.LG cs.AI

    DNN Memory Footprint Reduction via Post-Training Intra-Layer Multi-Precision Quantization

    Authors: Behnam Ghavami, Amin Kamjoo, Lesley Shannon, Steve Wilton

    Abstract: The imperative to deploy Deep Neural Network (DNN) models on resource-constrained edge devices, spurred by privacy concerns, has become increasingly apparent. To facilitate the transition from cloud to edge computing, this paper introduces a technique that effectively reduces the memory footprint of DNNs, accommodating the limitations of resource-constrained edge devices while preserving model acc… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    Comments: The 25th International Symposium on Quality Electronic Design (ISQED'24)

  7. arXiv:2303.12269  [pdf, other

    cs.AR

    A Cycle-Accurate Soft Error Vulnerability Analysis Framework for FPGA-based Designs

    Authors: Eduardo Rhod, Behnam Ghavami, Zhenman Fang, Lesley Shannon

    Abstract: Many aerospace and automotive applications use FPGAs in their designs due to their low power and reconfigurability requirements. Meanwhile, such applications also pose a high standard on system reliability, which makes the early-stage reliability analysis for FPGA-based designs very critical. In this paper, we present a framework that enables fast and accurate early-stage analysis of soft error… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

  8. arXiv:2303.10535  [pdf

    cs.NE

    A Decision Making Approach for Chemotherapy Planning based on Evolutionary Processing

    Authors: Mina Jafari, Behnam Ghavami, Vahid Sattari Naeini

    Abstract: The problem of chemotherapy treatment optimization can be defined in order to minimize the size of the tumor without endangering the patient's health; therefore, chemotherapy requires to achieve a number of objectives, simultaneously. For this reason, the optimization problem turns to a multi-objective problem. In this paper, a multi-objective meta-heuristic method is provided for cancer chemother… ▽ More

    Submitted 18 March, 2023; originally announced March 2023.

  9. arXiv:2303.10508  [pdf, ps, other

    cs.AR

    Unraveling the Integration of Deep Machine Learning in FPGA CAD Flow: A Concise Survey and Future Insights

    Authors: Behnam Ghavami, Lesley Shannon

    Abstract: This paper presents an overview of the integration of deep machine learning (DL) in FPGA CAD design flow, focusing on high-level and logic synthesis, placement, and routing. Our analysis identifies key research areas that require more attention in FPGA CAD design, including the development of open-source benchmarks optimized for end-to-end machine learning experiences and the potential of knowledg… ▽ More

    Submitted 18 March, 2023; originally announced March 2023.

  10. arXiv:2303.02495  [pdf, other

    cs.DC

    scaleTRIM: Scalable TRuncation-Based Integer Approximate Multiplier with Linearization and Compensation

    Authors: Ebrahim Farahmand, Ali Mahani, Behnam Ghavami, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Approximate computing (AC) has become a prominent solution to improve the performance, area, and power/energy efficiency of a digital design at the cost of output accuracy. We propose a novel scalable approximate multiplier that utilizes a lookup table-based compensation unit. To improve energy-efficiency, input operands are truncated to a reduced bitwidth representation (e.g., h bits) based on th… ▽ More

    Submitted 4 May, 2023; v1 submitted 4 March, 2023; originally announced March 2023.

  11. arXiv:2112.13544  [pdf, other

    cs.LG cs.AI

    FitAct: Error Resilient Deep Neural Networks via Fine-Grained Post-Trainable Activation Functions

    Authors: Behnam Ghavami, Mani Sadati, Zhenman Fang, Lesley Shannon

    Abstract: Deep neural networks (DNNs) are increasingly being deployed in safety-critical systems such as personal healthcare devices and self-driving cars. In such DNN-based systems, error resilience is a top priority since faults in DNN inference could lead to mispredictions and safety hazards. For latency-critical DNN inference on resource-constrained edge devices, it is nontrivial to apply conventional r… ▽ More

    Submitted 27 December, 2021; originally announced December 2021.

    Comments: Accepted in the Design, Automation and Test in Europe Conference (DATE 2022)

  12. arXiv:2112.13162  [pdf, other

    cs.CR

    Stealthy Attack on Algorithmic-Protected DNNs via Smart Bit Flipping

    Authors: Behnam Ghavami, Seyd Movi, Zhenman Fang, Lesley Shannon

    Abstract: Recently, deep neural networks (DNNs) have been deployed in safety-critical systems such as autonomous vehicles and medical devices. Shortly after that, the vulnerability of DNNs were revealed by stealthy adversarial examples where crafted inputs -- by adding tiny perturbations to original inputs -- can lead a DNN to generate misclassification outputs. To improve the robustness of DNNs, some algor… ▽ More

    Submitted 24 December, 2021; originally announced December 2021.

    Comments: Accepted for the 23rd International Symposium on Quality Electronic Design (ISQED'22)

  13. arXiv:2112.04136  [pdf, other

    cs.AR

    SeaPlace: Process Variation Aware Placement for Reliable Combinational Circuits against SETs and METs

    Authors: Kiarash Saremi, Hossein Pedram, Behnam Ghavami, Mohsen Raji, Zhenman Fang, Lesley Shannon

    Abstract: Nowadays nanoscale combinational circuits are facing significant reliability challenges including soft errors and process variations. This paper presents novel process variation-aware placement strategies that include two algorithms to increase the reliability of combinational circuits against both Single Event Transients (SETs) and Multiple Event Transients (METs). The first proposed algorithm is… ▽ More

    Submitted 8 December, 2021; originally announced December 2021.

    Comments: 14 pages

  14. arXiv:2112.03477  [pdf, other

    cs.CR cs.LG

    BDFA: A Blind Data Adversarial Bit-flip Attack on Deep Neural Networks

    Authors: Behnam Ghavami, Mani Sadati, Mohammad Shahidzadeh, Zhenman Fang, Lesley Shannon

    Abstract: Adversarial bit-flip attack (BFA) on Neural Network weights can result in catastrophic accuracy degradation by flipping a very small number of bits. A major drawback of prior bit flip attack techniques is their reliance on test data. This is frequently not possible for applications that contain sensitive or proprietary data. In this paper, we propose Blind Data Adversarial Bit-flip Attack (BDFA),… ▽ More

    Submitted 6 January, 2022; v1 submitted 6 December, 2021; originally announced December 2021.

  15. arXiv:2101.08754  [pdf

    cs.CR cs.AR

    An Efficient Communication Protocol for FPGA IP Protection

    Authors: Farzane Khajuyi, Behnam Ghavami, Human Nikmehr

    Abstract: We introduce a protection-based IP security scheme to protect soft and firm IP cores which are used on FPGA devices. The scheme is based on Finite State Machin (FSM) obfuscation and exploits Physical Unclonable Function (PUF) for FPGA unique identification (ID) generation which help pay-per-device licensing. We introduce a communication protocol to protect the rights of parties in this market. On… ▽ More

    Submitted 21 January, 2021; originally announced January 2021.