Search Results for author: Avesta Sasan

Found 12 papers, 1 papers with code

Generative AI-Based Effective Malware Detection for Embedded Computing Systems

no code implementations2 Apr 2024 Sreenitha Kasarapu, Sanket Shukla, Rakibul Hassan, Avesta Sasan, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao

Furthermore, such constraints limit the detection of emerging malware samples due to the lack of sufficient malware samples required for efficient training.

Malware Detection

SMOOT: Saliency Guided Mask Optimized Online Training

no code implementations1 Oct 2023 Ali Karkehabadi, Houman Homayoun, Avesta Sasan

Saliency-Guided Training (SGT) methods try to highlight the prominent features in the model's training based on the output to alleviate this problem.

Adaptive-Gravity: A Defense Against Adversarial Samples

no code implementations7 Apr 2022 Ali Mirzaeian, Zhi Tian, Sai Manoj P D, Banafsheh S. Latibari, Ioannis Savidis, Houman Homayoun, Avesta Sasan

We conceptualize the model parameters/features associated with each class as a mass characterized by its centroid location and the spread (standard deviation of the distance) of features around the centroid.

Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks

no code implementations16 Jan 2020 Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan

In this paper, we propose Code-Bridged Classifier (CBC), a framework for making a Convolutional Neural Network (CNNs) robust against adversarial attacks without increasing or even by decreasing the overall models' computational complexity.

Denoising Image Classification

TCD-NPE: A Re-configurable and Efficient Neural Processing Engine, Powered by Novel Temporal-Carry-deferring MACs

no code implementations14 Oct 2019 Ali Mirzaeian, Houman Homayoun, Avesta Sasan

In this paper, we first propose the design of Temporal-Carry-deferring MAC (TCD-MAC) and illustrate how our proposed solution can gain significant energy and performance benefit when utilized to process a stream of input data.

NESTA: Hamming Weight Compression-Based Neural Proc. Engine

no code implementations1 Oct 2019 Ali Mirzaeian, Houman Homayoun, Avesta Sasan

In this paper, we present NESTA, a specialized Neural engine that significantly accelerates the computation of convolution layers in a deep convolutional neural network, while reducing the computational energy.

Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design

no code implementations29 Jul 2019 Hosein Mohammadi Makrani, Farnoud Farahmand, Hossein Sayadi, Sara Bondi, Sai Manoj Pudukotai Dinakarrao, Liang Zhao, Avesta Sasan, Houman Homayoun, Setareh Rafatirad

HLS tools offer a plethora of techniques to optimize designs for both area and performance, but resource usage and timing reports of HLS tools mostly deviate from the post-implementation results.

Benchmarking the Capabilities and Limitations of SAT Solvers in Defeating Obfuscation Schemes

no code implementations30 Apr 2018 Shervin Roshanisefat, Harshith K. Thirumala, Kris Gaj, Houman Homayoun, Avesta Sasan

In this paper, we investigate the strength of six different SAT solvers in attacking various obfuscation schemes.

Cryptography and Security

LUT-Lock: A Novel LUT-based Logic Obfuscation for FPGA-Bitstream and ASIC-Hardware Protection

no code implementations30 Apr 2018 Hadi Mardani Kamali, Kimia Zamiri Azar, Kris Gaj, Houman Homayoun, Avesta Sasan

In this work, we propose LUT-Lock, a novel Look-Up-Table-based netlist obfuscation algorithm, for protecting the intellectual property that is mapped to an FPGA bitstream or an ASIC netlist.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.