Skip to main content

Showing 1–50 of 188 results for author: Shafique, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.22557  [pdf, ps, other

    cs.CR cs.LG

    MetaCipher: A General and Extensible Reinforcement Learning Framework for Obfuscation-Based Jailbreak Attacks on Black-Box LLMs

    Authors: Boyuan Chen, Minghao Shao, Abdul Basit, Siddharth Garg, Muhammad Shafique

    Abstract: The growing capabilities of large language models (LLMs) have exposed them to increasingly sophisticated jailbreak attacks. Among these, obfuscation-based attacks -- which encrypt malicious content to evade detection -- remain highly effective. By leveraging the reasoning ability of advanced LLMs to interpret encrypted prompts, such attacks circumvent conventional defenses that rely on keyword det… ▽ More

    Submitted 27 June, 2025; originally announced June 2025.

  2. arXiv:2506.20008  [pdf, ps, other

    cs.AI cs.PL cs.SE

    QHackBench: Benchmarking Large Language Models for Quantum Code Generation Using PennyLane Hackathon Challenges

    Authors: Abdul Basit, Minghao Shao, Haider Asif, Nouhaila Innan, Muhammad Kashif, Alberto Marchisio, Muhammad Shafique

    Abstract: Recent advances in Large Language Models (LLMs) have demonstrated strong potential in code generation, yet their effectiveness in quantum computing remains underexplored. This paper benchmarks LLMs for PennyLane-based quantum code generation using real-world challenges from the Quantum Hackathon (QHack). We introduce QHackBench, a novel benchmark dataset derived from QHack competitions, and evalua… ▽ More

    Submitted 24 June, 2025; originally announced June 2025.

    Comments: 8 pages, 6 figures, 3 tables, submitted to QAI 2025

    MSC Class: 68T50; 81P68; 68T07; 68T20 ACM Class: I.2.7; I.2.2

  3. arXiv:2506.18749  [pdf, ps, other

    cs.HC cs.AI cs.RO

    BRAVE: Brain-Controlled Prosthetic Arm with Voice Integration and Embodied Learning for Enhanced Mobility

    Authors: Abdul Basit, Maha Nawaz, Muhammad Shafique

    Abstract: Non-invasive brain-computer interfaces (BCIs) have the potential to enable intuitive control of prosthetic limbs for individuals with upper limb amputations. However, existing EEG-based control systems face challenges related to signal noise, classification accuracy, and real-time adaptability. In this work, we present BRAVE, a hybrid EEG and voice-controlled prosthetic system that integrates ense… ▽ More

    Submitted 23 May, 2025; originally announced June 2025.

    Comments: 9 pages, 12 figures, Accepted at IJCNN 2025

    ACM Class: I.2.9; I.2.7

  4. arXiv:2506.02089  [pdf, ps, other

    cs.LG cs.AI cs.CR

    SALAD: Systematic Assessment of Machine Unlearing on LLM-Aided Hardware Design

    Authors: Zeng Wang, Minghao Shao, Rupesh Karn, Likhitha Mankali, Jitendra Bhandari, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel

    Abstract: Large Language Models (LLMs) offer transformative capabilities for hardware design automation, particularly in Verilog code generation. However, they also pose significant data security challenges, including Verilog evaluation data contamination, intellectual property (IP) design leakage, and the risk of malicious Verilog generation. We introduce SALAD, a comprehensive assessment that leverages ma… ▽ More

    Submitted 11 June, 2025; v1 submitted 2 June, 2025; originally announced June 2025.

  5. arXiv:2505.19613  [pdf, other

    cs.CV

    TESSER: Transfer-Enhancing Adversarial Attacks from Vision Transformers via Spectral and Semantic Regularization

    Authors: Amira Guesmi, Bassem Ouni, Muhammad Shafique

    Abstract: Adversarial transferability remains a critical challenge in evaluating the robustness of deep neural networks. In security-critical applications, transferability enables black-box attacks without access to model internals, making it a key concern for real-world adversarial threat assessment. While Vision Transformers (ViTs) have demonstrated strong adversarial performance, existing attacks often f… ▽ More

    Submitted 26 May, 2025; originally announced May 2025.

  6. arXiv:2505.17107  [pdf, ps, other

    cs.CR cs.AI cs.LG cs.MA

    CRAKEN: Cybersecurity LLM Agent with Knowledge-Based Execution

    Authors: Minghao Shao, Haoran Xi, Nanda Rani, Meet Udeshi, Venkata Sai Charan Putrevu, Kimberly Milner, Brendan Dolan-Gavitt, Sandeep Kumar Shukla, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Muhammad Shafique

    Abstract: Large Language Model (LLM) agents can automate cybersecurity tasks and can adapt to the evolving cybersecurity landscape without re-engineering. While LLM agents have demonstrated cybersecurity capabilities on Capture-The-Flag (CTF) competitions, they have two key limitations: accessing latest cybersecurity expertise beyond training data, and integrating new knowledge into complex task planning. K… ▽ More

    Submitted 21 May, 2025; originally announced May 2025.

  7. arXiv:2504.13541  [pdf, other

    cs.NE cs.AI cs.LG cs.RO

    SwitchMT: An Adaptive Context Switching Methodology for Scalable Multi-Task Learning in Intelligent Autonomous Agents

    Authors: Avaneesh Devkota, Rachmad Vidya Wicaksana Putra, Muhammad Shafique

    Abstract: The ability to train intelligent autonomous agents (such as mobile robots) on multiple tasks is crucial for adapting to dynamic real-world environments. However, state-of-the-art reinforcement learning (RL) methods only excel in single-task settings, and still struggle to generalize across multiple tasks due to task interference. Moreover, real-world environments also demand the agents to have dat… ▽ More

    Submitted 18 April, 2025; originally announced April 2025.

    Comments: 7 pages, 7 figures, 3 tables

  8. arXiv:2504.00957  [pdf, other

    cs.NE cs.AI cs.AR cs.LG

    Enabling Efficient Processing of Spiking Neural Networks with On-Chip Learning on Commodity Neuromorphic Processors for Edge AI Systems

    Authors: Rachmad Vidya Wicaksana Putra, Pasindu Wickramasinghe, Muhammad Shafique

    Abstract: The rising demand for energy-efficient edge AI systems (e.g., mobile agents/robots) has increased the interest in neuromorphic computing, since it offers ultra-low power/energy AI computation through spiking neural network (SNN) algorithms on neuromorphic processors. However, their efficient implementation strategy has not been comprehensively studied, hence limiting SNN deployments for edge AI sy… ▽ More

    Submitted 19 April, 2025; v1 submitted 1 April, 2025; originally announced April 2025.

    Comments: Accepted at the International Joint Conference on Neural Networks (IJCNN) 2025 in Rome, Italy

  9. arXiv:2504.00948  [pdf, other

    cs.NE cs.AI cs.LG

    QSViT: A Methodology for Quantizing Spiking Vision Transformers

    Authors: Rachmad Vidya Wicaksana Putra, Saad Iftikhar, Muhammad Shafique

    Abstract: Vision Transformer (ViT)-based models have shown state-of-the-art performance (e.g., accuracy) in vision-based AI tasks. However, realizing their capability in resource-constrained embedded AI systems is challenging due to their inherent large memory footprints and complex computations, thereby incurring high power/energy consumption. Recently, Spiking Vision Transformer (SViT)-based models have e… ▽ More

    Submitted 1 April, 2025; originally announced April 2025.

    Comments: Accepted at the International Joint Conference on Neural Networks (IJCNN) 2025 in Rome, Italy

  10. arXiv:2503.17061  [pdf, other

    cs.NE cs.AI cs.LG

    Replay4NCL: An Efficient Memory Replay-based Methodology for Neuromorphic Continual Learning in Embedded AI Systems

    Authors: Mishal Fatima Minhas, Rachmad Vidya Wicaksana Putra, Falah Awwad, Osman Hasan, Muhammad Shafique

    Abstract: Neuromorphic Continual Learning (NCL) paradigm leverages Spiking Neural Networks (SNNs) to enable continual learning (CL) capabilities for AI systems to adapt to dynamically changing environments. Currently, the state-of-the-art employ a memory replay-based method to maintain the old knowledge. However, this technique relies on long timesteps and compression-decompression steps, thereby incurring… ▽ More

    Submitted 21 March, 2025; originally announced March 2025.

    Comments: Accepted at the 62th Design Automation Conference (DAC) 2025, June 2025, San Francisco, CA, USA

  11. arXiv:2503.15403  [pdf, other

    q-fin.ST cs.LG quant-ph

    HQNN-FSP: A Hybrid Classical-Quantum Neural Network for Regression-Based Financial Stock Market Prediction

    Authors: Prashant Kumar Choudhary, Nouhaila Innan, Muhammad Shafique, Rajeev Singh

    Abstract: Financial time-series forecasting remains a challenging task due to complex temporal dependencies and market fluctuations. This study explores the potential of hybrid quantum-classical approaches to assist in financial trend prediction by leveraging quantum resources for improved feature representation and learning. A custom Quantum Neural Network (QNN) regressor is introduced, designed with a nov… ▽ More

    Submitted 19 March, 2025; originally announced March 2025.

    Comments: 11 pages and 11 figures

  12. arXiv:2503.13572  [pdf, ps, other

    cs.AR cs.CR cs.LG

    VeriContaminated: Assessing LLM-Driven Verilog Coding for Data Contamination

    Authors: Zeng Wang, Minghao Shao, Jitendra Bhandari, Likhitha Mankali, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel

    Abstract: Large Language Models (LLMs) have revolutionized code generation, achieving exceptional results on various established benchmarking frameworks. However, concerns about data contamination - where benchmark data inadvertently leaks into pre-training or fine-tuning datasets - raise questions about the validity of these evaluations. While this issue is known, limiting the industrial adoption of LLM-dr… ▽ More

    Submitted 12 June, 2025; v1 submitted 17 March, 2025; originally announced March 2025.

  13. arXiv:2503.13116  [pdf, ps, other

    cs.CR cs.AR cs.LG

    VeriLeaky: Navigating IP Protection vs Utility in Fine-Tuning for LLM-Driven Verilog Coding

    Authors: Zeng Wang, Minghao Shao, Mohammed Nabeel, Prithwish Basu Roy, Likhitha Mankali, Jitendra Bhandari, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel

    Abstract: Large language models (LLMs) offer significant potential for coding, yet fine-tuning (FT) with curated data is essential for niche languages like Verilog. Using proprietary intellectual property (IP) for FT presents a serious risk, as FT data can be leaked through LLM inference. This leads to a critical dilemma for design houses: seeking to build externally accessible LLMs offering competitive Ver… ▽ More

    Submitted 17 June, 2025; v1 submitted 17 March, 2025; originally announced March 2025.

  14. arXiv:2503.12677  [pdf, other

    cs.LG eess.SY

    RL-TIME: Reinforcement Learning-based Task Replication in Multicore Embedded Systems

    Authors: Roozbeh Siyadatzadeh, Mohsen Ansari, Muhammad Shafique, Alireza Ejlali

    Abstract: Embedded systems power many modern applications and must often meet strict reliability, real-time, thermal, and power requirements. Task replication can improve reliability by duplicating a task's execution to handle transient and permanent faults, but blindly applying replication often leads to excessive overhead and higher temperatures. Existing design-time methods typically choose the number of… ▽ More

    Submitted 16 March, 2025; originally announced March 2025.

  15. arXiv:2503.08759  [pdf, other

    quant-ph cs.CV eess.IV

    QUIET-SR: Quantum Image Enhancement Transformer for Single Image Super-Resolution

    Authors: Siddhant Dutta, Nouhaila Innan, Khadijeh Najafi, Sadok Ben Yahia, Muhammad Shafique

    Abstract: Recent advancements in Single-Image Super-Resolution (SISR) using deep learning have significantly improved image restoration quality. However, the high computational cost of processing high-resolution images due to the large number of parameters in classical models, along with the scalability challenges of quantum algorithms for image processing, remains a major obstacle. In this paper, we propos… ▽ More

    Submitted 11 March, 2025; originally announced March 2025.

    Comments: 10 figures, 3 pages

  16. arXiv:2503.07058  [pdf, other

    cs.CV

    Breaking the Limits of Quantization-Aware Defenses: QADT-R for Robustness Against Patch-Based Adversarial Attacks in QNNs

    Authors: Amira Guesmi, Bassem Ouni, Muhammad Shafique

    Abstract: Quantized Neural Networks (QNNs) have emerged as a promising solution for reducing model size and computational costs, making them well-suited for deployment in edge and resource-constrained environments. While quantization is known to disrupt gradient propagation and enhance robustness against pixel-level adversarial attacks, its effectiveness against patch-based adversarial attacks remains large… ▽ More

    Submitted 10 March, 2025; originally announced March 2025.

  17. arXiv:2503.02497  [pdf, other

    cs.SE cs.AI quant-ph

    PennyLang: Pioneering LLM-Based Quantum Code Generation with a Novel PennyLane-Centric Dataset

    Authors: Abdul Basit, Nouhaila Innan, Haider Asif, Minghao Shao, Muhammad Kashif, Alberto Marchisio, Muhammad Shafique

    Abstract: Large Language Models (LLMs) offer remarkable capabilities in code generation, natural language processing, and domain-specific reasoning. However, their application in quantum software development remains underexplored, particularly for PennyLane-a leading framework for hybrid quantum-classical computing. To address this gap, we introduce a novel, high-quality dataset comprising 3,347 PennyLane-s… ▽ More

    Submitted 18 April, 2025; v1 submitted 4 March, 2025; originally announced March 2025.

    Comments: 10 pages, 7 figures, 7 tables, submitted for review under QCE 2025

    MSC Class: 68T50 (Primary) ACM Class: I.2.7

  18. arXiv:2503.00384  [pdf, other

    cs.CV cs.AI

    A Survey of Adversarial Defenses in Vision-based Systems: Categorization, Methods and Challenges

    Authors: Nandish Chattopadhyay, Abdul Basit, Bassem Ouni, Muhammad Shafique

    Abstract: Adversarial attacks have emerged as a major challenge to the trustworthy deployment of machine learning models, particularly in computer vision applications. These attacks have a varied level of potency and can be implemented in both white box and black box approaches. Practical attacks include methods to manipulate the physical world and enforce adversarial behaviour by the corresponding target n… ▽ More

    Submitted 1 March, 2025; originally announced March 2025.

  19. arXiv:2502.21171  [pdf, other

    cs.LG quant-ph

    QFAL: Quantum Federated Adversarial Learning

    Authors: Walid El Maouaki, Nouhaila Innan, Alberto Marchisio, Taoufik Said, Mohamed Bennai, Muhammad Shafique

    Abstract: Quantum federated learning (QFL) merges the privacy advantages of federated systems with the computational potential of quantum neural networks (QNNs), yet its vulnerability to adversarial attacks remains poorly understood. This work pioneers the integration of adversarial training into QFL, proposing a robust framework, quantum federated adversarial learning (QFAL), where clients collaboratively… ▽ More

    Submitted 28 February, 2025; originally announced February 2025.

    Comments: 10 pages

  20. arXiv:2502.10931  [pdf, other

    cs.AI cs.CR

    D-CIPHER: Dynamic Collaborative Intelligent Multi-Agent System with Planner and Heterogeneous Executors for Offensive Security

    Authors: Meet Udeshi, Minghao Shao, Haoran Xi, Nanda Rani, Kimberly Milner, Venkata Sai Charan Putrevu, Brendan Dolan-Gavitt, Sandeep Kumar Shukla, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Muhammad Shafique

    Abstract: Large Language Models (LLMs) have been used in cybersecurity such as autonomous security analysis or penetration testing. Capture the Flag (CTF) challenges serve as benchmarks to assess automated task-planning abilities of LLM agents for cybersecurity. Early attempts to apply LLMs for solving CTF challenges used single-agent systems, where feedback was restricted to a single reasoning-action loop.… ▽ More

    Submitted 10 May, 2025; v1 submitted 15 February, 2025; originally announced February 2025.

  21. arXiv:2502.07422  [pdf, other

    cs.LG cs.CV

    MoENAS: Mixture-of-Expert based Neural Architecture Search for jointly Accurate, Fair, and Robust Edge Deep Neural Networks

    Authors: Lotfi Abdelkrim Mecharbat, Alberto Marchisio, Muhammad Shafique, Mohammad M. Ghassemi, Tuka Alhanai

    Abstract: There has been a surge in optimizing edge Deep Neural Networks (DNNs) for accuracy and efficiency using traditional optimization techniques such as pruning, and more recently, employing automatic design methodologies. However, the focus of these design techniques has often overlooked critical metrics such as fairness, robustness, and generalization. As a result, when evaluating SOTA edge DNNs' per… ▽ More

    Submitted 11 February, 2025; originally announced February 2025.

  22. arXiv:2412.19441  [pdf, other

    quant-ph cs.LG

    Comparative Performance Analysis of Quantum Machine Learning Architectures for Credit Card Fraud Detection

    Authors: Mansour El Alami, Nouhaila Innan, Muhammad Shafique, Mohamed Bennai

    Abstract: As financial fraud becomes increasingly complex, effective detection methods are essential. Quantum Machine Learning (QML) introduces certain capabilities that may enhance both accuracy and efficiency in this area. This study examines how different quantum feature map and ansatz configurations affect the performance of three QML-based classifiers-the Variational Quantum Classifier (VQC), the Sampl… ▽ More

    Submitted 2 January, 2025; v1 submitted 26 December, 2024; originally announced December 2024.

    Comments: 12 pages, 17 figures, 7 tables, under review

  23. arXiv:2412.11310  [pdf

    cs.DC cs.ET cs.GT

    GAP: Game Theory-Based Approach for Reliability and Power Management in Emerging Fog Computing

    Authors: Abolfazl Younesi, Mohsen Ansari, Alireza Ejlali, Mohammad Amin Fazli, Muhammad Shafique, Jörg Henkel

    Abstract: Fog computing brings about a transformative shift in data management, presenting unprecedented opportunities for enhanced performance and reduced latency. However, one of the key aspects of fog computing revolves around ensuring efficient power and reliability management. To address this challenge, we have introduced a novel model that proposes a non-cooperative game theory-based strategy to strik… ▽ More

    Submitted 15 December, 2024; originally announced December 2024.

    Comments: 13 pages, 10 figures

  24. arXiv:2412.04847  [pdf, other

    cs.NE cs.AI cs.LG

    MTSpark: Enabling Multi-Task Learning with Spiking Neural Networks for Generalist Agents

    Authors: Avaneesh Devkota, Rachmad Vidya Wicaksana Putra, Muhammad Shafique

    Abstract: Currently, state-of-the-art RL methods excel in single-task settings, but they still struggle to generalize across multiple tasks due to catastrophic forgetting challenges, where previously learned tasks are forgotten as new tasks are introduced. This multi-task learning capability is significantly important for generalist agents, where adaptation features are highly required (e.g., autonomous rob… ▽ More

    Submitted 6 December, 2024; originally announced December 2024.

    Comments: 9 pages, 10 figures, 5 tables

  25. arXiv:2412.04844  [pdf, other

    quant-ph cs.ET

    Cutting is All You Need: Execution of Large-Scale Quantum Neural Networks on Limited-Qubit Devices

    Authors: Alberto Marchisio, Emman Sychiuco, Muhammad Kashif, Muhammad Shafique

    Abstract: The rapid advancement in Quantum Computing (QC), particularly through Noisy-Intermediate Scale Quantum (NISQ) devices, has spurred significant interest in Quantum Machine Learning (QML) applications. Despite their potential, fully-quantum QML algorithms remain impractical due to the limitations of current NISQ devices. Hybrid quantum-classical neural networks (HQNNs) have emerged as a viable alter… ▽ More

    Submitted 6 December, 2024; originally announced December 2024.

  26. Survey of different Large Language Model Architectures: Trends, Benchmarks, and Challenges

    Authors: Minghao Shao, Abdul Basit, Ramesh Karri, Muhammad Shafique

    Abstract: Large Language Models (LLMs) represent a class of deep learning models adept at understanding natural language and generating coherent responses to various prompts or queries. These models far exceed the complexity of conventional neural networks, often encompassing dozens of neural network layers and containing billions to trillions of parameters. They are typically trained on vast datasets, util… ▽ More

    Submitted 4 December, 2024; originally announced December 2024.

  27. arXiv:2412.03158  [pdf, other

    quant-ph cs.LG

    LEP-QNN: Loan Eligibility Prediction Using Quantum Neural Networks

    Authors: Nouhaila Innan, Alberto Marchisio, Mohamed Bennai, Muhammad Shafique

    Abstract: Predicting loan eligibility with high accuracy remains a significant challenge in the finance sector. Accurate predictions enable financial institutions to make informed decisions, mitigate risks, and effectively adapt services to meet customer needs. However, the complexity and the high-dimensional nature of financial data have always posed significant challenges to achieving this level of precis… ▽ More

    Submitted 4 December, 2024; originally announced December 2024.

    Comments: 8 pages. 6 figures, 3 tables

  28. arXiv:2412.02293  [pdf, other

    quant-ph cs.ET

    FL-QDSNNs: Federated Learning with Quantum Dynamic Spiking Neural Networks

    Authors: Nouhaila Innan, Alberto Marchisio, Muhammad Shafique

    Abstract: This paper introduces the Federated Learning-Quantum Dynamic Spiking Neural Networks (FL-QDSNNs) framework, an innovative approach specifically designed to tackle significant challenges in distributed learning systems, such as maintaining high accuracy while ensuring privacy. Central to our framework is a novel dynamic threshold mechanism for activating quantum gates in Quantum Spiking Neural Netw… ▽ More

    Submitted 3 December, 2024; originally announced December 2024.

    Comments: 9 pages, 6 figures

  29. arXiv:2412.01858  [pdf, other

    quant-ph cs.CR cs.DC cs.ET cs.LG

    MQFL-FHE: Multimodal Quantum Federated Learning Framework with Fully Homomorphic Encryption

    Authors: Siddhant Dutta, Nouhaila Innan, Sadok Ben Yahia, Muhammad Shafique, David Esteban Bernal Neira

    Abstract: The integration of fully homomorphic encryption (FHE) in federated learning (FL) has led to significant advances in data privacy. However, during the aggregation phase, it often results in performance degradation of the aggregated model, hindering the development of robust representational generalization. In this work, we propose a novel multimodal quantum federated learning framework that utilize… ▽ More

    Submitted 29 April, 2025; v1 submitted 30 November, 2024; originally announced December 2024.

    Comments: 10 pages, 6 figures, 6 Tables. Accepted at IJCNN 2025

  30. arXiv:2411.15246  [pdf, other

    cs.CR

    Exploring the Robustness and Transferability of Patch-Based Adversarial Attacks in Quantized Neural Networks

    Authors: Amira Guesmi, Bassem Ouni, Muhammad Shafique

    Abstract: Quantized neural networks (QNNs) are increasingly used for efficient deployment of deep learning models on resource-constrained platforms, such as mobile devices and edge computing systems. While quantization reduces model size and computational demands, its impact on adversarial robustness-especially against patch-based attacks-remains inadequately addressed. Patch-based attacks, characterized by… ▽ More

    Submitted 25 February, 2025; v1 submitted 22 November, 2024; originally announced November 2024.

  31. arXiv:2410.19336  [pdf, other

    cs.CV

    DECADE: Towards Designing Efficient-yet-Accurate Distance Estimation Modules for Collision Avoidance in Mobile Advanced Driver Assistance Systems

    Authors: Muhammad Zaeem Shahzad, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: The proliferation of smartphones and other mobile devices provides a unique opportunity to make Advanced Driver Assistance Systems (ADAS) accessible to everyone in the form of an application empowered by low-cost Machine/Deep Learning (ML/DL) models to enhance road safety. For the critical feature of Collision Avoidance in Mobile ADAS, lightweight Deep Neural Networks (DNN) for object detection ex… ▽ More

    Submitted 25 October, 2024; originally announced October 2024.

    Comments: 8 pages, 17 figures, 4 tables

  32. arXiv:2410.09218  [pdf, other

    cs.NE cs.AI cs.LG

    Continual Learning with Neuromorphic Computing: Theories, Methods, and Applications

    Authors: Mishal Fatima Minhas, Rachmad Vidya Wicaksana Putra, Falah Awwad, Osman Hasan, Muhammad Shafique

    Abstract: To adapt to real-world dynamics, intelligent systems need to assimilate new knowledge without catastrophic forgetting, where learning new tasks leads to a degradation in performance on old tasks. To address this, continual learning concept is proposed for enabling autonomous systems to acquire new knowledge and dynamically adapt to changing environments. Specifically, energy-efficient continual le… ▽ More

    Submitted 28 October, 2024; v1 submitted 11 October, 2024; originally announced October 2024.

    Comments: This work has been submitted to the IEEE Access for possible publication

  33. arXiv:2409.20426  [pdf, other

    cs.CV

    Navigating Threats: A Survey of Physical Adversarial Attacks on LiDAR Perception Systems in Autonomous Vehicles

    Authors: Amira Guesmi, Muhammad Shafique

    Abstract: Autonomous vehicles (AVs) rely heavily on LiDAR (Light Detection and Ranging) systems for accurate perception and navigation, providing high-resolution 3D environmental data that is crucial for object detection and classification. However, LiDAR systems are vulnerable to adversarial attacks, which pose significant challenges to the safety and robustness of AVs. This survey presents a thorough revi… ▽ More

    Submitted 30 September, 2024; originally announced September 2024.

  34. arXiv:2409.16165  [pdf, ps, other

    cs.AI

    EnIGMA: Interactive Tools Substantially Assist LM Agents in Finding Security Vulnerabilities

    Authors: Talor Abramovich, Meet Udeshi, Minghao Shao, Kilian Lieret, Haoran Xi, Kimberly Milner, Sofija Jancheska, John Yang, Carlos E. Jimenez, Farshad Khorrami, Prashanth Krishnamurthy, Brendan Dolan-Gavitt, Muhammad Shafique, Karthik Narasimhan, Ramesh Karri, Ofir Press

    Abstract: Although language model (LM) agents have demonstrated increased performance in multiple domains, including coding and web-browsing, their success in cybersecurity has been limited. We present EnIGMA, an LM agent for autonomously solving Capture The Flag (CTF) challenges. We introduce new tools and interfaces to improve the agent's ability to find and exploit security vulnerabilities, focusing on i… ▽ More

    Submitted 5 June, 2025; v1 submitted 24 September, 2024; originally announced September 2024.

    Comments: ICML 2025; Project website https://enigma-agent.com

  35. arXiv:2409.14515  [pdf, other

    cs.RO cs.CV cs.LG

    SPAQ-DL-SLAM: Towards Optimizing Deep Learning-based SLAM for Resource-Constrained Embedded Platforms

    Authors: Niraj Pudasaini, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Optimizing Deep Learning-based Simultaneous Localization and Mapping (DL-SLAM) algorithms is essential for efficient implementation on resource-constrained embedded platforms, enabling real-time on-board computation in autonomous mobile robots. This paper presents SPAQ-DL-SLAM, a framework that strategically applies Structured Pruning and Quantization (SPAQ) to the architecture of one of the state… ▽ More

    Submitted 22 September, 2024; originally announced September 2024.

    Comments: To appear at the 18th International Conference on Control, Automation, Robotics and Vision (ICARCV), December 2024, Dubai, UAE

  36. arXiv:2409.12184  [pdf, other

    cs.LG cs.AI

    Democratizing MLLMs in Healthcare: TinyLLaVA-Med for Efficient Healthcare Diagnostics in Resource-Constrained Settings

    Authors: Aya El Mir, Lukelo Thadei Luoga, Boyuan Chen, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Deploying Multi-Modal Large Language Models (MLLMs) in healthcare is hindered by their high computational demands and significant memory requirements, which are particularly challenging for resource-constrained devices like the Nvidia Jetson Xavier. This problem is particularly evident in remote medical settings where advanced diagnostics are needed but resources are limited. In this paper, we int… ▽ More

    Submitted 2 September, 2024; originally announced September 2024.

  37. arXiv:2409.11430  [pdf, other

    quant-ph cs.AI cs.CR cs.LG cs.NE

    Federated Learning with Quantum Computing and Fully Homomorphic Encryption: A Novel Computing Paradigm Shift in Privacy-Preserving ML

    Authors: Siddhant Dutta, Pavana P Karanth, Pedro Maciel Xavier, Iago Leal de Freitas, Nouhaila Innan, Sadok Ben Yahia, Muhammad Shafique, David E. Bernal Neira

    Abstract: The widespread deployment of products powered by machine learning models is raising concerns around data privacy and information security worldwide. To address this issue, Federated Learning was first proposed as a privacy-preserving alternative to conventional methods that allow multiple learning clients to share model knowledge without disclosing private data. A complementary approach known as F… ▽ More

    Submitted 12 October, 2024; v1 submitted 13 September, 2024; originally announced September 2024.

    Comments: 10 pages, 2 figures

  38. arXiv:2409.01626  [pdf, other

    quant-ph cs.LG

    AQ-PINNs: Attention-Enhanced Quantum Physics-Informed Neural Networks for Carbon-Efficient Climate Modeling

    Authors: Siddhant Dutta, Nouhaila Innan, Sadok Ben Yahia, Muhammad Shafique

    Abstract: The growing computational demands of artificial intelligence (AI) in addressing climate change raise significant concerns about inefficiencies and environmental impact, as highlighted by the Jevons paradox. We propose an attention-enhanced quantum physics-informed neural networks model (AQ-PINNs) to tackle these challenges. This approach integrates quantum computing techniques into physics-informe… ▽ More

    Submitted 3 September, 2024; originally announced September 2024.

    Comments: 6 pages

  39. arXiv:2409.01308  [pdf, other

    cs.LG

    Representing Neural Network Layers as Linear Operations via Koopman Operator Theory

    Authors: Nishant Suresh Aswani, Saif Eddin Jabari, Muhammad Shafique

    Abstract: The strong performance of simple neural networks is often attributed to their nonlinear activations. However, a linear view of neural networks makes understanding and controlling networks much more approachable. We draw from a dynamical systems view of neural networks, offering a fresh perspective by using Koopman operator theory and its connections with dynamic mode decomposition (DMD). Together,… ▽ More

    Submitted 2 September, 2024; originally announced September 2024.

  40. arXiv:2408.03088  [pdf, other

    quant-ph cs.AI cs.LG

    QADQN: Quantum Attention Deep Q-Network for Financial Market Prediction

    Authors: Siddhant Dutta, Nouhaila Innan, Alberto Marchisio, Sadok Ben Yahia, Muhammad Shafique

    Abstract: Financial market prediction and optimal trading strategy development remain challenging due to market complexity and volatility. Our research in quantum finance and reinforcement learning for decision-making demonstrates the approach of quantum-classical hybrid algorithms to tackling real-world financial challenges. In this respect, we corroborate the concept with rigorous backtesting and validate… ▽ More

    Submitted 6 August, 2024; originally announced August 2024.

    Comments: Accepted at the 2024 IEEE International Conference on Quantum Computing and Engineering (QCE24), QCRL, September 2024

    Journal ref: 2024 IEEE International Conference on Quantum Computing and Engineering (QCE)

  41. arXiv:2408.02412  [pdf, other

    cs.AR cs.AI cs.LG cs.NE

    PENDRAM: Enabling High-Performance and Energy-Efficient Processing of Deep Neural Networks through a Generalized DRAM Data Mapping Policy

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Convolutional Neural Networks (CNNs), a prominent type of Deep Neural Networks (DNNs), have emerged as a state-of-the-art solution for solving machine learning tasks. To improve the performance and energy efficiency of CNN inference, the employment of specialized hardware accelerators is prevalent. However, CNN accelerators still face performance- and energy-efficiency challenges due to high off-c… ▽ More

    Submitted 5 August, 2024; originally announced August 2024.

    Comments: 11 pages, 15 figures, 2 tables. arXiv admin note: substantial text overlap with arXiv:2004.10341

  42. Quantum Clustering for Cybersecurity

    Authors: Walid El Maouaki, Nouhaila Innan, Alberto Marchisio, Taoufik Said, Mohamed Bennai, Muhammad Shafique

    Abstract: In this study, we develop a novel quantum machine learning (QML) framework to analyze cybersecurity vulnerabilities using data from the 2022 CISA Known Exploited Vulnerabilities catalog, which includes detailed information on vulnerability types, severity levels, common vulnerability scoring system (CVSS) scores, and product specifics. Our framework preprocesses this data into a quantum-compatible… ▽ More

    Submitted 5 August, 2024; originally announced August 2024.

    Comments: Accepted at the 2024 IEEE International Conference on Quantum Computing and Engineering (QCE24), QML@QCE, September 2024

    Journal ref: 2024 IEEE International Conference on Quantum Computing and Engineering (QCE)

  43. arXiv:2407.17587  [pdf, other

    cs.CV cs.LG

    S-E Pipeline: A Vision Transformer (ViT) based Resilient Classification Pipeline for Medical Imaging Against Adversarial Attacks

    Authors: Neha A S, Vivek Chaturvedi, Muhammad Shafique

    Abstract: Vision Transformer (ViT) is becoming widely popular in automating accurate disease diagnosis in medical imaging owing to its robust self-attention mechanism. However, ViTs remain vulnerable to adversarial attacks that may thwart the diagnosis process by leading it to intentional misclassification of critical disease. In this paper, we propose a novel image classification pipeline, namely, S-E Pipe… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.

  44. arXiv:2407.12029  [pdf

    cs.AR

    A Quality-Aware Voltage Overscaling Framework to Improve the Energy Efficiency and Lifetime of TPUs based on Statistical Error Modeling

    Authors: Alireza Senobari, Jafar Vafaei, Omid Akbari, Christian Hochberger, Muhammad Shafique

    Abstract: Deep neural networks (DNNs) are a type of artificial intelligence models that are inspired by the structure and function of the human brain, designed to process and learn from large amounts of data, making them particularly well-suited for tasks such as image and speech recognition. However, applications of DNNs are experiencing emerging growth due to the deployment of specialized accelerators suc… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

  45. arXiv:2407.05262  [pdf, other

    cs.NE cs.AI cs.LG cs.RO

    FastSpiker: Enabling Fast Training for Spiking Neural Networks on Event-based Data through Learning Rate Enhancements for Autonomous Embedded Systems

    Authors: Iqra Bano, Rachmad Vidya Wicaksana Putra, Alberto Marchisio, Muhammad Shafique

    Abstract: Autonomous embedded systems (e.g., robots) typically necessitate intelligent computation with low power/energy processing for completing their tasks. Such requirements can be fulfilled by embodied neuromorphic intelligence with spiking neural networks (SNNs) because of their high learning quality (e.g., accuracy) and sparse computation. Here, the employment of event-based data is preferred to ensu… ▽ More

    Submitted 12 September, 2024; v1 submitted 7 July, 2024; originally announced July 2024.

    Comments: To appear at the 18th International Conference on Control, Automation, Robotics and Vision (ICARCV), December 2024, Dubai, UAE

  46. arXiv:2407.02581  [pdf, other

    cs.CV

    Robust ADAS: Enhancing Robustness of Machine Learning-based Advanced Driver Assistance Systems for Adverse Weather

    Authors: Muhammad Zaeem Shahzad, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: In the realm of deploying Machine Learning-based Advanced Driver Assistance Systems (ML-ADAS) into real-world scenarios, adverse weather conditions pose a significant challenge. Conventional ML models trained on clear weather data falter when faced with scenarios like extreme fog or heavy rain, potentially leading to accidents and safety hazards. This paper addresses this issue by proposing a nove… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

    Comments: 7 pages, 10 figures, 1 table

  47. arXiv:2407.00641  [pdf, other

    cs.NE cs.AI cs.AR cs.LG

    NeuroNAS: Enhancing Efficiency of Neuromorphic In-Memory Computing for Intelligent Mobile Agents through Hardware-Aware Spiking Neural Architecture Search

    Authors: Rachmad Vidya Wicaksana Putra, Muhammad Shafique

    Abstract: Intelligent mobile agents (e.g., UGVs and UAVs) typically demand low power/energy consumption when solving their machine learning (ML)-based tasks, since they are usually powered by portable batteries with limited capacity. A potential solution is employing neuromorphic computing with Spiking Neural Networks (SNNs), which leverages event-based computation to enable ultra-low power/energy ML algori… ▽ More

    Submitted 18 April, 2025; v1 submitted 30 June, 2024; originally announced July 2024.

    Comments: 9 pages, 14 figures, 2 tables

  48. arXiv:2406.05590  [pdf, other

    cs.CR cs.AI cs.CY cs.LG

    NYU CTF Bench: A Scalable Open-Source Benchmark Dataset for Evaluating LLMs in Offensive Security

    Authors: Minghao Shao, Sofija Jancheska, Meet Udeshi, Brendan Dolan-Gavitt, Haoran Xi, Kimberly Milner, Boyuan Chen, Max Yin, Siddharth Garg, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Muhammad Shafique

    Abstract: Large Language Models (LLMs) are being deployed across various domains today. However, their capacity to solve Capture the Flag (CTF) challenges in cybersecurity has not been thoroughly evaluated. To address this, we develop a novel method to assess LLMs in solving CTF challenges by creating a scalable, open-source benchmark database specifically designed for these applications. This database incl… ▽ More

    Submitted 18 February, 2025; v1 submitted 8 June, 2024; originally announced June 2024.

  49. arXiv:2405.15842  [pdf, other

    cs.SE cs.LG

    Model Cascading for Code: A Cascaded Black-Box Multi-Model Framework for Cost-Efficient Code Completion with Self-Testing

    Authors: Boyuan Chen, Mingzhi Zhu, Brendan Dolan-Gavitt, Muhammad Shafique, Siddharth Garg

    Abstract: The rapid advancement of large language models (LLMs) has significantly improved code completion tasks, yet the trade-off between accuracy and computational cost remains a critical challenge. While using larger models and incorporating inference-time self-testing algorithms can significantly improve output accuracy, they incur substantial computational expenses at the same time. Furthermore, serve… ▽ More

    Submitted 13 February, 2025; v1 submitted 24 May, 2024; originally announced May 2024.

  50. arXiv:2405.06278  [pdf, other

    cs.CV cs.CR

    Exploring the Interplay of Interpretability and Robustness in Deep Neural Networks: A Saliency-guided Approach

    Authors: Amira Guesmi, Nishant Suresh Aswani, Muhammad Shafique

    Abstract: Adversarial attacks pose a significant challenge to deploying deep learning models in safety-critical applications. Maintaining model robustness while ensuring interpretability is vital for fostering trust and comprehension in these models. This study investigates the impact of Saliency-guided Training (SGT) on model robustness, a technique aimed at improving the clarity of saliency maps to deepen… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.