no code implementations • 3 Apr 2024 • Behnam Ghavami, Amin Kamjoo, Lesley Shannon, Steve Wilton
The imperative to deploy Deep Neural Network (DNN) models on resource-constrained edge devices, spurred by privacy concerns, has become increasingly apparent.
no code implementations • 19 Mar 2023 • Mina Jafari, Behnam Ghavami, Vahid Sattari Naeini
In this paper, a multi-objective meta-heuristic method is provided for cancer chemotherapy with the aim of balancing between two objectives: the amount of toxicity and the number of cancerous cells.
no code implementations • 27 Dec 2021 • Behnam Ghavami, Mani Sadati, Zhenman Fang, Lesley Shannon
Deep neural networks (DNNs) are increasingly being deployed in safety-critical systems such as personal healthcare devices and self-driving cars.
no code implementations • 7 Dec 2021 • Behnam Ghavami, Mani Sadati, Mohammad Shahidzadeh, Zhenman Fang, Lesley Shannon
Adversarial bit-flip attack (BFA) on Neural Network weights can result in catastrophic accuracy degradation by flipping a very small number of bits.
no code implementations • 21 Jan 2021 • Farzane Khajuyi, Behnam Ghavami, Human Nikmehr
We introduce a protection-based IP security scheme to protect soft and firm IP cores which are used on FPGA devices.
Cryptography and Security Hardware Architecture