Skip to main content

Showing 1–50 of 75 results for author: Hanif, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.16460  [pdf, ps, other

    cs.CL cs.AI

    University of Indonesia at SemEval-2025 Task 11: Evaluating State-of-the-Art Encoders for Multi-Label Emotion Detection

    Authors: Ikhlasul Akmal Hanif, Eryawan Presma Yulianrifat, Jaycent Gunawan Ongris, Eduardus Tjitrahardja, Muhammad Falensi Azmi, Rahmat Bryan Naufal, Alfan Farizki Wicaksono

    Abstract: This paper presents our approach for SemEval 2025 Task 11 Track A, focusing on multilabel emotion classification across 28 languages. We explore two main strategies: fully fine-tuning transformer models and classifier-only training, evaluating different settings such as fine-tuning strategies, model architectures, loss functions, encoders, and classifiers. Our findings suggest that training a clas… ▽ More

    Submitted 22 May, 2025; originally announced May 2025.

    Comments: 16 pages, 13 tables, 1 figures

    ACM Class: I.2.7

  2. arXiv:2503.07920  [pdf, other

    cs.CV cs.AI cs.CL

    Crowdsource, Crawl, or Generate? Creating SEA-VL, a Multicultural Vision-Language Dataset for Southeast Asia

    Authors: Samuel Cahyawijaya, Holy Lovenia, Joel Ruben Antony Moniz, Tack Hwa Wong, Mohammad Rifqi Farhansyah, Thant Thiri Maung, Frederikus Hudi, David Anugraha, Muhammad Ravi Shulthan Habibi, Muhammad Reza Qorib, Amit Agarwal, Joseph Marvin Imperial, Hitesh Laxmichand Patel, Vicky Feliren, Bahrul Ilmi Nasution, Manuel Antonio Rufino, Genta Indra Winata, Rian Adam Rajagede, Carlos Rafael Catalan, Mohamed Fazli Imam, Priyaranjan Pattnayak, Salsabila Zahirah Pranida, Kevin Pratama, Yeshil Bangera, Adisai Na-Thalang , et al. (67 additional authors not shown)

    Abstract: Southeast Asia (SEA) is a region of extraordinary linguistic and cultural diversity, yet it remains significantly underrepresented in vision-language (VL) research. This often results in artificial intelligence (AI) models that fail to capture SEA cultural nuances. To fill this gap, we present SEA-VL, an open-source initiative dedicated to developing high-quality, culturally relevant data for SEA… ▽ More

    Submitted 18 March, 2025; v1 submitted 10 March, 2025; originally announced March 2025.

    Comments: [SEA-VL Dataset] https://huggingface.co/collections/SEACrowd/sea-vl-multicultural-vl-dataset-for-southeast-asia-67cf223d0c341d4ba2b236e7 [Appendix J] https://github.com/SEACrowd/seacrowd.github.io/blob/master/docs/SEA_VL_Appendix_J.pdf

  3. arXiv:2502.19341  [pdf, other

    cs.IT cs.CR eess.SP

    Unveiling Wireless Users' Locations via Modulation Classification-based Passive Attack

    Authors: Ali Hanif, Abdulrahman Katranji, Nour Kouzayha, Muhammad Mahboob Ur Rahman, Tareq Y. Al-Naffouri

    Abstract: The broadcast nature of the wireless medium and openness of wireless standards, e.g., 3GPP releases 16-20, invite adversaries to launch various active and passive attacks on cellular and other wireless networks. This work identifies one such loose end of wireless standards and presents a novel passive attack method enabling an eavesdropper (Eve) to localize a line of sight wireless user (Bob) who… ▽ More

    Submitted 26 February, 2025; originally announced February 2025.

    Comments: 7 pages, 4 figures, submitted to IEEE for possible publication

  4. arXiv:2502.06019  [pdf, other

    cs.CV

    Noise is an Efficient Learner for Zero-Shot Vision-Language Models

    Authors: Raza Imam, Asif Hanif, Jian Zhang, Khaled Waleed Dawoud, Yova Kementchedjhieva, Mohammad Yaqub

    Abstract: Recently, test-time adaptation has garnered attention as a method for tuning models without labeled data. The conventional modus operandi for adapting pre-trained vision-language models (VLMs) during test-time primarily focuses on tuning learnable prompts; however, this approach overlooks potential distribution shifts in the visual representations themselves. In this work, we address this limitati… ▽ More

    Submitted 9 February, 2025; originally announced February 2025.

    Comments: Our code is available at https://github.com/Razaimam45/TNT

  5. arXiv:2410.19336  [pdf, other

    cs.CV

    DECADE: Towards Designing Efficient-yet-Accurate Distance Estimation Modules for Collision Avoidance in Mobile Advanced Driver Assistance Systems

    Authors: Muhammad Zaeem Shahzad, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: The proliferation of smartphones and other mobile devices provides a unique opportunity to make Advanced Driver Assistance Systems (ADAS) accessible to everyone in the form of an application empowered by low-cost Machine/Deep Learning (ML/DL) models to enhance road safety. For the critical feature of Collision Avoidance in Mobile ADAS, lightweight Deep Neural Networks (DNN) for object detection ex… ▽ More

    Submitted 25 October, 2024; originally announced October 2024.

    Comments: 8 pages, 17 figures, 4 tables

  6. arXiv:2410.00986  [pdf, other

    eess.IV cs.CV

    TransResNet: Integrating the Strengths of ViTs and CNNs for High Resolution Medical Image Segmentation via Feature Grafting

    Authors: Muhammad Hamza Sharif, Dmitry Demidov, Asif Hanif, Mohammad Yaqub, Min Xu

    Abstract: High-resolution images are preferable in medical imaging domain as they significantly improve the diagnostic capability of the underlying method. In particular, high resolution helps substantially in improving automatic image segmentation. However, most of the existing deep learning-based techniques for medical image segmentation are optimized for input images having small spatial dimensions and p… ▽ More

    Submitted 1 October, 2024; originally announced October 2024.

    Comments: The 33rd British Machine Vision Conference 2022

  7. arXiv:2409.19806  [pdf, other

    cs.SD cs.AI eess.AS

    PALM: Few-Shot Prompt Learning for Audio Language Models

    Authors: Asif Hanif, Maha Tufail Agro, Mohammad Areeb Qazi, Hanan Aldarmaki

    Abstract: Audio-Language Models (ALMs) have recently achieved remarkable success in zero-shot audio recognition tasks, which match features of audio waveforms with class-specific text prompt features, inspired by advancements in Vision-Language Models (VLMs). Given the sensitivity of zero-shot performance to the choice of hand-crafted text prompts, many prompt learning techniques have been developed for VLM… ▽ More

    Submitted 29 September, 2024; originally announced September 2024.

    Comments: EMNLP 2024 (Main)

  8. arXiv:2409.14515  [pdf, other

    cs.RO cs.CV cs.LG

    SPAQ-DL-SLAM: Towards Optimizing Deep Learning-based SLAM for Resource-Constrained Embedded Platforms

    Authors: Niraj Pudasaini, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Optimizing Deep Learning-based Simultaneous Localization and Mapping (DL-SLAM) algorithms is essential for efficient implementation on resource-constrained embedded platforms, enabling real-time on-board computation in autonomous mobile robots. This paper presents SPAQ-DL-SLAM, a framework that strategically applies Structured Pruning and Quantization (SPAQ) to the architecture of one of the state… ▽ More

    Submitted 22 September, 2024; originally announced September 2024.

    Comments: To appear at the 18th International Conference on Control, Automation, Robotics and Vision (ICARCV), December 2024, Dubai, UAE

  9. arXiv:2409.12184  [pdf, other

    cs.LG cs.AI

    Democratizing MLLMs in Healthcare: TinyLLaVA-Med for Efficient Healthcare Diagnostics in Resource-Constrained Settings

    Authors: Aya El Mir, Lukelo Thadei Luoga, Boyuan Chen, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Deploying Multi-Modal Large Language Models (MLLMs) in healthcare is hindered by their high computational demands and significant memory requirements, which are particularly challenging for resource-constrained devices like the Nvidia Jetson Xavier. This problem is particularly evident in remote medical settings where advanced diagnostics are needed but resources are limited. In this paper, we int… ▽ More

    Submitted 2 September, 2024; originally announced September 2024.

  10. arXiv:2408.07440  [pdf, other

    cs.CV

    BAPLe: Backdoor Attacks on Medical Foundational Models using Prompt Learning

    Authors: Asif Hanif, Fahad Shamshad, Muhammad Awais, Muzammal Naseer, Fahad Shahbaz Khan, Karthik Nandakumar, Salman Khan, Rao Muhammad Anwer

    Abstract: Medical foundation models are gaining prominence in the medical community for their ability to derive general representations from extensive collections of medical image-text pairs. Recent research indicates that these models are susceptible to backdoor attacks, which allow them to classify clean images accurately but fail when specific triggers are introduced. However, traditional backdoor attack… ▽ More

    Submitted 15 August, 2024; v1 submitted 14 August, 2024; originally announced August 2024.

    Comments: MICCAI 2024

  11. arXiv:2408.02412  [pdf, other

    cs.AR cs.AI cs.LG cs.NE

    PENDRAM: Enabling High-Performance and Energy-Efficient Processing of Deep Neural Networks through a Generalized DRAM Data Mapping Policy

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Convolutional Neural Networks (CNNs), a prominent type of Deep Neural Networks (DNNs), have emerged as a state-of-the-art solution for solving machine learning tasks. To improve the performance and energy efficiency of CNN inference, the employment of specialized hardware accelerators is prevalent. However, CNN accelerators still face performance- and energy-efficiency challenges due to high off-c… ▽ More

    Submitted 5 August, 2024; originally announced August 2024.

    Comments: 11 pages, 15 figures, 2 tables. arXiv admin note: substantial text overlap with arXiv:2004.10341

  12. arXiv:2408.00480  [pdf

    cs.NI

    Enhance the Detection of DoS and Brute Force Attacks within the MQTT Environment through Feature Engineering and Employing an Ensemble Technique

    Authors: Abdulelah Al Hanif, Mohammad Ilyas

    Abstract: The rapid development of the Internet of Things (IoT) environment has introduced unprecedented levels of connectivity and automation. The Message Queuing Telemetry Transport (MQTT) protocol has become recognized in IoT applications due to its lightweight and efficient features; however, this simplicity also renders MQTT vulnerable to multiple attacks that can be launched against the protocol, incl… ▽ More

    Submitted 1 August, 2024; originally announced August 2024.

  13. arXiv:2407.02581  [pdf, other

    cs.CV

    Robust ADAS: Enhancing Robustness of Machine Learning-based Advanced Driver Assistance Systems for Adverse Weather

    Authors: Muhammad Zaeem Shahzad, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: In the realm of deploying Machine Learning-based Advanced Driver Assistance Systems (ML-ADAS) into real-world scenarios, adverse weather conditions pose a significant challenge. Conventional ML models trained on clear weather data falter when faced with scenarios like extreme fog or heavy rain, potentially leading to accidents and safety hazards. This paper addresses this issue by proposing a nove… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

    Comments: 7 pages, 10 figures, 1 table

  14. arXiv:2406.08486  [pdf, other

    eess.IV cs.CV

    On Evaluating Adversarial Robustness of Volumetric Medical Segmentation Models

    Authors: Hashmat Shadab Malik, Numan Saeed, Asif Hanif, Muzammal Naseer, Mohammad Yaqub, Salman Khan, Fahad Shahbaz Khan

    Abstract: Volumetric medical segmentation models have achieved significant success on organ and tumor-based segmentation tasks in recent years. However, their vulnerability to adversarial attacks remains largely unexplored, raising serious concerns regarding the real-world deployment of tools employing such models in the healthcare sector. This underscores the importance of investigating the robustness of e… ▽ More

    Submitted 2 September, 2024; v1 submitted 12 June, 2024; originally announced June 2024.

    Comments: Accepted at British Machine Vision Conference 2024

  15. arXiv:2405.03244  [pdf, other

    cs.LG

    Examining Changes in Internal Representations of Continual Learning Models Through Tensor Decomposition

    Authors: Nishant Suresh Aswani, Amira Guesmi, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Continual learning (CL) has spurred the development of several methods aimed at consolidating previous knowledge across sequential learning. Yet, the evaluations of these methods have primarily focused on the final output, such as changes in the accuracy of predicted classes, overlooking the issue of representational forgetting within the model. In this paper, we propose a novel representation-bas… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Journal ref: Proceedings of the 1st ContinualAI Unconference, 2023, PMLR 249:62-82, 2024

  16. arXiv:2403.11515  [pdf, other

    cs.CV cs.RO

    SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Bassem Ouni, Muhammad Shafique

    Abstract: Monocular depth estimation (MDE) has advanced significantly, primarily through the integration of convolutional neural networks (CNNs) and more recently, Transformers. However, concerns about their susceptibility to adversarial attacks have emerged, especially in safety-critical domains like autonomous driving and robotic navigation. Existing approaches for assessing CNN-based depth prediction met… ▽ More

    Submitted 5 August, 2024; v1 submitted 18 March, 2024; originally announced March 2024.

    Comments: arXiv admin note: text overlap with arXiv:2303.01351

  17. arXiv:2403.00830  [pdf, other

    cs.AI cs.CL

    MedAide: Leveraging Large Language Models for On-Premise Medical Assistance on Edge Devices

    Authors: Abdul Basit, Khizar Hussain, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Large language models (LLMs) are revolutionizing various domains with their remarkable natural language processing (NLP) abilities. However, deploying LLMs in resource-constrained edge computing and embedded systems presents significant challenges. Another challenge lies in delivering medical assistance in remote areas with limited healthcare facilities and infrastructure. To address this, we intr… ▽ More

    Submitted 28 February, 2024; originally announced March 2024.

    Comments: 7 pages, 11 figures, ACM conference paper, 33 references

    ACM Class: I.2.7

  18. arXiv:2311.12211  [pdf, other

    cs.CR

    DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction

    Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique

    Abstract: Adversarial patch-based attacks have shown to be a major deterrent towards the reliable use of machine learning models. These attacks involve the strategic modification of localized patches or specific image areas to deceive trained machine learning models. In this paper, we propose \textit{DefensiveDR}, a practical mechanism using a dimensionality reduction technique to thwart such patch-based at… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  19. arXiv:2311.12084  [pdf, other

    cs.CR cs.CV

    ODDR: Outlier Detection & Dimension Reduction Based Defense Against Adversarial Patches

    Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique

    Abstract: Adversarial attacks present a significant challenge to the dependable deployment of machine learning models, with patch-based attacks being particularly potent. These attacks introduce adversarial perturbations in localized regions of an image, deceiving even well-trained models. In this paper, we propose Outlier Detection and Dimension Reduction (ODDR), a comprehensive defense strategy engineered… ▽ More

    Submitted 27 August, 2024; v1 submitted 20 November, 2023; originally announced November 2023.

  20. arXiv:2310.10315  [pdf, ps, other

    quant-ph cs.LG

    A Survey on Quantum Machine Learning: Current Trends, Challenges, Opportunities, and the Road Ahead

    Authors: Kamila Zaman, Alberto Marchisio, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Quantum Computing (QC) claims to improve the efficiency of solving complex problems, compared to classical computing. When QC is integrated with Machine Learning (ML), it creates a Quantum Machine Learning (QML) system. This paper aims to provide a thorough understanding of the foundational concepts of QC and its notable advantages over classical computing. Following this, we delve into the key as… ▽ More

    Submitted 10 June, 2025; v1 submitted 16 October, 2023; originally announced October 2023.

  21. arXiv:2308.06173  [pdf, other

    cs.CR cs.AI cs.CV cs.LG cs.RO

    Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammed Shafique

    Abstract: In this paper, we present a comprehensive survey of the current trends focusing specifically on physical adversarial attacks. We aim to provide a thorough understanding of the concept of physical adversarial attacks, analyzing their key characteristics and distinguishing features. Furthermore, we explore the specific requirements and challenges associated with executing attacks in the physical wor… ▽ More

    Submitted 11 August, 2023; originally announced August 2023.

  22. arXiv:2308.03108  [pdf, other

    cs.CV cs.CR

    SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique

    Abstract: In this paper, we investigate the vulnerability of MDE to adversarial patches. We propose a novel \underline{S}tealthy \underline{A}dversarial \underline{A}ttacks on \underline{M}DE (SAAM) that compromises MDE by either corrupting the estimated distance or causing an object to seamlessly blend into its surroundings. Our experiments, demonstrate that the designed stealthy patch successfully causes… ▽ More

    Submitted 20 December, 2023; v1 submitted 6 August, 2023; originally announced August 2023.

  23. arXiv:2307.11128  [pdf, other

    cs.AR cs.AI cs.ET cs.PL

    Approximate Computing Survey, Part II: Application-Specific & Architectural Approximation Techniques and Applications

    Authors: Vasileios Leon, Muhammad Abdullah Hanif, Giorgos Armeniakos, Xun Jiao, Muhammad Shafique, Kiamal Pekmestzi, Dimitrios Soudris

    Abstract: The challenging deployment of compute-intensive applications from domains such as Artificial Intelligence (AI) and Digital Signal Processing (DSP), forces the community of computing systems to explore new design approaches. Approximate Computing appears as an emerging solution, allowing to tune the quality of results in the design of a system in order to improve the energy efficiency and/or perfor… ▽ More

    Submitted 19 March, 2025; v1 submitted 20 July, 2023; originally announced July 2023.

    Comments: Published in ACM Computing Surveys (Volume 57, Issue 7, 2025)

    Journal ref: ACM Computing Surveys, Volume 57, Issue 7, Article 177, 2025

  24. arXiv:2307.11124  [pdf, other

    cs.AR cs.ET cs.PL

    Approximate Computing Survey, Part I: Terminology and Software & Hardware Approximation Techniques

    Authors: Vasileios Leon, Muhammad Abdullah Hanif, Giorgos Armeniakos, Xun Jiao, Muhammad Shafique, Kiamal Pekmestzi, Dimitrios Soudris

    Abstract: The rapid growth of demanding applications in domains applying multimedia processing and machine learning has marked a new era for edge and cloud computing. These applications involve massive data and compute-intensive tasks, and thus, typical computing paradigms in embedded systems and data centers are stressed to meet the worldwide demand for high performance. Concurrently, over the last 15 year… ▽ More

    Submitted 19 March, 2025; v1 submitted 20 July, 2023; originally announced July 2023.

    Comments: Published in ACM Computing Surveys (Volume 57, Issue 7, 2025)

    Journal ref: ACM Computing Surveys, Volume 57, Issue 7, Article 185, 2025

  25. arXiv:2307.07269  [pdf, other

    eess.IV cs.CV cs.LG

    Frequency Domain Adversarial Training for Robust Volumetric Medical Segmentation

    Authors: Asif Hanif, Muzammal Naseer, Salman Khan, Mubarak Shah, Fahad Shahbaz Khan

    Abstract: It is imperative to ensure the robustness of deep learning models in critical applications such as, healthcare. While recent advances in deep learning have improved the performance of volumetric medical image segmentation models, these models cannot be deployed for real-world applications immediately due to their vulnerability to adversarial attacks. We present a 3D frequency domain adversarial at… ▽ More

    Submitted 20 July, 2023; v1 submitted 14 July, 2023; originally announced July 2023.

    Comments: This paper has been accepted in MICCAI 2023 conference

  26. arXiv:2305.14534  [pdf, other

    cs.CL cs.AI

    Detecting Propaganda Techniques in Code-Switched Social Media Text

    Authors: Muhammad Umar Salman, Asif Hanif, Shady Shehata, Preslav Nakov

    Abstract: Propaganda is a form of communication intended to influence the opinions and the mindset of the public to promote a particular agenda. With the rise of social media, propaganda has spread rapidly, leading to the need for automatic propaganda detection systems. Most work on propaganda detection has focused on high-resource languages, such as English, and little effort has been made to detect propag… ▽ More

    Submitted 15 March, 2024; v1 submitted 23 May, 2023; originally announced May 2023.

  27. arXiv:2305.12595  [pdf, other

    cs.AR

    Reduce: A Framework for Reducing the Overheads of Fault-Aware Retraining

    Authors: Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Fault-aware retraining has emerged as a prominent technique for mitigating permanent faults in Deep Neural Network (DNN) hardware accelerators. However, retraining leads to huge overheads, specifically when used for fine-tuning large DNNs designed for solving complex problems. Moreover, as each fabricated chip can have a distinct fault pattern, fault-aware retraining is required to be performed fo… ▽ More

    Submitted 21 May, 2023; originally announced May 2023.

    Comments: 2 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:2304.12949

  28. arXiv:2305.12590  [pdf, other

    cs.AR cs.LG

    FAQ: Mitigating the Impact of Faults in the Weight Memory of DNN Accelerators through Fault-Aware Quantization

    Authors: Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Permanent faults induced due to imperfections in the manufacturing process of Deep Neural Network (DNN) accelerators are a major concern, as they negatively impact the manufacturing yield of the chip fabrication process. Fault-aware training is the state-of-the-art approach for mitigating such faults. However, it incurs huge retraining overheads, specifically when used for large DNNs trained on co… ▽ More

    Submitted 21 May, 2023; originally announced May 2023.

    Comments: 8 pages, 15 figures

  29. arXiv:2305.11618  [pdf, other

    cs.CR cs.CV

    DAP: A Dynamic Adversarial Patch for Evading Person Detectors

    Authors: Amira Guesmi, Ruitian Ding, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: Patch-based adversarial attacks were proven to compromise the robustness and reliability of computer vision systems. However, their conspicuous and easily detectable nature challenge their practicality in real-world setting. To address this, recent work has proposed using Generative Adversarial Networks (GANs) to generate naturalistic patches that may not attract human attention. However, such app… ▽ More

    Submitted 20 November, 2023; v1 submitted 19 May, 2023; originally announced May 2023.

  30. arXiv:2304.12949  [pdf, other

    cs.AR cs.LG

    eFAT: Improving the Effectiveness of Fault-Aware Training for Mitigating Permanent Faults in DNN Hardware Accelerators

    Authors: Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Fault-Aware Training (FAT) has emerged as a highly effective technique for addressing permanent faults in DNN accelerators, as it offers fault mitigation without significant performance or accuracy loss, specifically at low and moderate fault rates. However, it leads to very high retraining overheads, especially when used for large DNNs designed for complex AI applications. Moreover, as each fabri… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

    Comments: 8 pages, 13 figures

  31. arXiv:2304.04041  [pdf, other

    cs.NE cs.AI cs.AR cs.LG

    RescueSNN: Enabling Reliable Executions on Spiking Neural Network Accelerators under Permanent Faults

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: To maximize the performance and energy efficiency of Spiking Neural Network (SNN) processing on resource-constrained embedded systems, specialized hardware accelerators/chips are employed. However, these SNN chips may suffer from permanent faults which can affect the functionality of weight memory and neuron behavior, thereby causing potentially significant accuracy degradation and system malfunct… ▽ More

    Submitted 8 April, 2023; originally announced April 2023.

    Comments: Accepted for publication at Frontiers in Neuroscience - Section Neuromorphic Engineering

  32. arXiv:2304.04039  [pdf, other

    cs.NE cs.AI cs.AR cs.LG

    EnforceSNN: Enabling Resilient and Energy-Efficient Spiking Neural Network Inference considering Approximate DRAMs for Embedded Systems

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Spiking Neural Networks (SNNs) have shown capabilities of achieving high accuracy under unsupervised settings and low operational power/energy due to their bio-plausible computations. Previous studies identified that DRAM-based off-chip memory accesses dominate the energy consumption of SNN processing. However, state-of-the-art works do not optimize the DRAM energy-per-access, thereby hindering th… ▽ More

    Submitted 8 April, 2023; originally announced April 2023.

    Comments: Accepted for publication at Frontiers in Neuroscience - Section Neuromorphic Engineering

  33. arXiv:2303.14009  [pdf, other

    cs.CR

    PoisonedGNN: Backdoor Attack on Graph Neural Networks-based Hardware Security Systems

    Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Abdullah Hanif, Muhammad Shafique, Ozgur Sinanoglu

    Abstract: Graph neural networks (GNNs) have shown great success in detecting intellectual property (IP) piracy and hardware Trojans (HTs). However, the machine learning community has demonstrated that GNNs are susceptible to data poisoning attacks, which result in GNNs performing abnormally on graphs with pre-defined backdoor triggers (realized using crafted subgraphs). Thus, it is imperative to ensure that… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: This manuscript is currently under review at IEEE Transactions on Computers

  34. arXiv:2303.02495  [pdf, other

    cs.DC

    scaleTRIM: Scalable TRuncation-Based Integer Approximate Multiplier with Linearization and Compensation

    Authors: Ebrahim Farahmand, Ali Mahani, Behnam Ghavami, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Approximate computing (AC) has become a prominent solution to improve the performance, area, and power/energy efficiency of a digital design at the cost of output accuracy. We propose a novel scalable approximate multiplier that utilizes a lookup table-based compensation unit. To improve energy-efficiency, input operands are truncated to a reduced bitwidth representation (e.g., h bits) based on th… ▽ More

    Submitted 4 May, 2023; v1 submitted 4 March, 2023; originally announced March 2023.

  35. arXiv:2303.01819  [pdf, other

    cs.LG cs.CR cs.CV

    Exploring Machine Learning Privacy/Utility trade-off from a hyperparameters Lens

    Authors: Ayoub Arous, Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: Machine Learning (ML) architectures have been applied to several applications that involve sensitive data, where a guarantee of users' data privacy is required. Differentially Private Stochastic Gradient Descent (DPSGD) is the state-of-the-art method to train privacy-preserving models. However, DPSGD comes at a considerable accuracy loss leading to sub-optimal privacy/utility trade-offs. Towards i… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  36. arXiv:2303.01351  [pdf, other

    cs.CV cs.RO

    APARATE: Adaptive Adversarial Patch for CNN-based Monocular Depth Estimation for Autonomous Navigation

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: In recent times, monocular depth estimation (MDE) has experienced significant advancements in performance, largely attributed to the integration of innovative architectures, i.e., convolutional neural networks (CNNs) and Transformers. Nevertheless, the susceptibility of these models to adversarial attacks has emerged as a noteworthy concern, especially in domains where safety and security are para… ▽ More

    Submitted 5 August, 2024; v1 submitted 2 March, 2023; originally announced March 2023.

  37. arXiv:2303.01338  [pdf, other

    cs.CV cs.CR

    AdvRain: Adversarial Raindrops to Attack Camera-based Smart Vision Systems

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Vision-based perception modules are increasingly deployed in many applications, especially autonomous vehicles and intelligent robots. These modules are being used to acquire information about the surroundings and identify obstacles. Hence, accurate detection and classification are essential to reach appropriate decisions and take appropriate and safe actions at all times. Current studies have dem… ▽ More

    Submitted 5 October, 2023; v1 submitted 2 March, 2023; originally announced March 2023.

  38. arXiv:2302.06114  [pdf, other

    cs.LG

    A Comprehensive Survey on Graph Summarization with Graph Neural Networks

    Authors: Nasrin Shabani, Jia Wu, Amin Beheshti, Quan Z. Sheng, Jin Foo, Venus Haghighi, Ambreen Hanif, Maryam Shahabikargar

    Abstract: As large-scale graphs become more widespread, more and more computational challenges with extracting, processing, and interpreting large graph data are being exposed. It is therefore natural to search for ways to summarize these expansive graphs while preserving their key characteristics. In the past, most graph summarization techniques sought to capture the most important part of a graph statisti… ▽ More

    Submitted 3 January, 2024; v1 submitted 13 February, 2023; originally announced February 2023.

    Comments: 21 pages, 4 figures, 9 tables, Journal of IEEE Transactions on Artificial Intelligence

  39. arXiv:2208.00331  [pdf, other

    cs.AR cs.LG

    CoNLoCNN: Exploiting Correlation and Non-Uniform Quantization for Energy-Efficient Low-precision Deep Convolutional Neural Networks

    Authors: Muhammad Abdullah Hanif, Giuseppe Maria Sarda, Alberto Marchisio, Guido Masera, Maurizio Martina, Muhammad Shafique

    Abstract: In today's era of smart cyber-physical systems, Deep Neural Networks (DNNs) have become ubiquitous due to their state-of-the-art performance in complex real-world applications. The high computational complexity of these networks, which translates to increased energy consumption, is the foremost obstacle towards deploying large DNNs in resource-constrained systems. Fixed-Point (FP) implementations… ▽ More

    Submitted 30 July, 2022; originally announced August 2022.

    Comments: 8 pages, 15 figures, 2 tables

  40. arXiv:2204.09514  [pdf, other

    cs.AR cs.CR cs.CV cs.DC cs.LG

    Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems

    Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique

    Abstract: The real-world use cases of Machine Learning (ML) have exploded over the past few years. However, the current computing infrastructure is insufficient to support all real-world applications and scenarios. Apart from high efficiency requirements, modern ML systems are expected to be highly reliable against hardware failures as well as secure against adversarial and IP stealing attacks. Privacy conc… ▽ More

    Submitted 18 April, 2022; originally announced April 2022.

    Comments: Appears at 40th IEEE VLSI Test Symposium (VTS 2022), 14 pages

  41. arXiv:2203.05523  [pdf, other

    cs.AR cs.LG cs.NE

    SoftSNN: Low-Cost Fault Tolerance for Spiking Neural Network Accelerators under Soft Errors

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Specialized hardware accelerators have been designed and employed to maximize the performance efficiency of Spiking Neural Networks (SNNs). However, such accelerators are vulnerable to transient faults (i.e., soft errors), which occur due to high-energy particle strikes, and manifest as bit flips at the hardware layer. These errors can change the weight values and neuron operations in the compute… ▽ More

    Submitted 11 March, 2022; v1 submitted 10 March, 2022; originally announced March 2022.

    Comments: To appear at the 59th IEEE/ACM Design Automation Conference (DAC), July 2022, San Francisco, CA, USA

  42. arXiv:2112.08441  [pdf, other

    cs.LG cs.AI

    Towards Explainable Artificial Intelligence in Banking and Financial Services

    Authors: Ambreen Hanif

    Abstract: Artificial intelligence (AI) enables machines to learn from human experience, adjust to new inputs, and perform human-like tasks. AI is progressing rapidly and is transforming the way businesses operate, from process automation to cognitive augmentation of tasks and intelligent process/data analytics. However, the main challenge for human users would be to understand and appropriately trust the re… ▽ More

    Submitted 14 December, 2021; originally announced December 2021.

  43. arXiv:2112.04392  [pdf, other

    cs.IT

    Opportunistic Relay Selection over Generalized Fading and Inverse Gamma Composite Fading Mixed Multicast Channels: A Secrecy Tradeoff

    Authors: MD. Shakhawat Hossen, A. S. M. Badrudduza, S. M. Riazul Islam, Abu Hanif, Milton Kumar Kundu, Kyung-Sup Kwak

    Abstract: The secrecy performance of realistic wireless multicast scenarios can be significantly deteriorated by the simultaneous occurrence of multipath and shadowing. To resolve this security threat, in this work an opportunistic relaying-based dual-hop wireless multicast framework is proposed in which the source dispatches confidential information to a bunch of receivers via intermediate relays under the… ▽ More

    Submitted 8 December, 2021; originally announced December 2021.

  44. arXiv:2111.07062  [pdf, other

    cs.CR

    UNTANGLE: Unlocking Routing and Logic Obfuscation Using Graph Neural Networks-based Link Prediction

    Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Abdullah Hanif, Muhammad Shafique, Ozgur Sinanoglu

    Abstract: Logic locking aims to prevent intellectual property (IP) piracy and unauthorized overproduction of integrated circuits (ICs). However, initial logic locking techniques were vulnerable to the Boolean satisfiability (SAT)-based attacks. In response, researchers proposed various SAT-resistant locking techniques such as point function-based locking and symmetric interconnection (SAT-hard) obfuscation.… ▽ More

    Submitted 13 November, 2021; originally announced November 2021.

    Comments: Published in 2021 International Conference On Computer-Aided Design (ICCAD)

  45. arXiv:2109.09829  [pdf, other

    cs.CR cs.AI cs.AR cs.LG cs.NE

    Towards Energy-Efficient and Secure Edge AI: A Cross-Layer Framework

    Authors: Muhammad Shafique, Alberto Marchisio, Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif

    Abstract: The security and privacy concerns along with the amount of data that is required to be processed on regular basis has pushed processing to the edge of the computing systems. Deploying advanced Neural Networks (NN), such as deep neural networks (DNNs) and spiking neural networks (SNNs), that offer state-of-the-art results on resource-constrained edge devices is challenging due to the stringent memo… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

    Comments: To appear at the 40th IEEE/ACM International Conference on Computer-Aided Design (ICCAD), November 2021, Virtual Event

  46. ReSpawn: Energy-Efficient Fault-Tolerance for Spiking Neural Networks considering Unreliable Memories

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Spiking neural networks (SNNs) have shown a potential for having low energy with unsupervised learning capabilities due to their biologically-inspired computation. However, they may suffer from accuracy degradation if their processing is performed under the presence of hardware-induced faults in memories, which can come from manufacturing defects or voltage-induced approximation errors. Since rece… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

    Comments: To appear at the 40th IEEE/ACM International Conference on Computer-Aided Design (ICCAD), November 2021, Virtual Event

  47. arXiv:2106.08800  [pdf, other

    cs.DC cs.AR

    Design and Analysis of High Performance Heterogeneous Block-based Approximate Adders

    Authors: Ebrahim Farahmand, Ali Mahani, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Approximate computing is an emerging paradigm to improve the power and performance efficiency of error-resilient applications. As adders are one of the key components in almost all processing systems, a significant amount of research has been carried out towards designing approximate adders that can offer better efficiency than conventional designs, however, at the cost of some accuracy loss. In t… ▽ More

    Submitted 14 September, 2023; v1 submitted 16 June, 2021; originally announced June 2021.

    Comments: Accepted for publication in ACM Transactions on Embedded Computing Systems (TECS)

  48. arXiv:2105.12374  [pdf, other

    cs.LG

    Continual Learning for Real-World Autonomous Systems: Algorithms, Challenges and Frameworks

    Authors: Khadija Shaheen, Muhammad Abdullah Hanif, Osman Hasan, Muhammad Shafique

    Abstract: Continual learning is essential for all real-world applications, as frozen pre-trained models cannot effectively deal with non-stationary data distributions. The purpose of this study is to review the state-of-the-art methods that allow continuous learning of computational models over time. We primarily focus on the learning algorithms that perform continuous learning in an online fashion from con… ▽ More

    Submitted 24 February, 2022; v1 submitted 26 May, 2021; originally announced May 2021.

  49. arXiv:2105.03251  [pdf, other

    cs.CR cs.LG

    Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks

    Authors: Faiq Khalid, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: From tiny pacemaker chips to aircraft collision avoidance systems, the state-of-the-art Cyber-Physical Systems (CPS) have increasingly started to rely on Deep Neural Networks (DNNs). However, as concluded in various studies, DNNs are highly susceptible to security threats, including adversarial attacks. In this paper, we first discuss different vulnerabilities that can be exploited for generating… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

    Comments: CYBER 2020, The Fifth International Conference on Cyber-Technologies and Cyber-Systems

  50. SparkXD: A Framework for Resilient and Energy-Efficient Spiking Neural Network Inference using Approximate DRAM

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Spiking Neural Networks (SNNs) have the potential for achieving low energy consumption due to their biologically sparse computation. Several studies have shown that the off-chip memory (DRAM) accesses are the most energy-consuming operations in SNN processing. However, state-of-the-art in SNN systems do not optimize the DRAM energy-per-access, thereby hindering achieving high energy-efficiency. To… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

    Comments: To appear at the 58th IEEE/ACM Design Automation Conference (DAC), December 2021, San Francisco, CA, USA