Search Results for author: Derek Abbott

Found 10 papers, 2 papers with code

TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World

1 code implementation6 Sep 2022 Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Nepal Surya, Derek Abbott

We observe that the backdoor effect of both misclassification and the cloaking are robustly achieved in the wild when the backdoor is activated with inconspicuously natural physical triggers.

Event Detection Image Classification +4

Linear measurements from nonlinear sensors: identifying distortion with incidental noise

no code implementations9 May 2022 Lachlan J. Gunn, Andrew Allison, Derek Abbott

Nonlinearity in many systems is heavily dependent on component variation and environmental factors such as temperature.

NTD: Non-Transferability Enabled Backdoor Detection

no code implementations22 Nov 2021 Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott

A backdoor deep learning (DL) model behaves normally upon clean inputs but misbehaves upon trigger inputs as the backdoor attacker desires, posing severe consequences to DL model deployments.

Face Recognition Traffic Sign Recognition

RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things

no code implementations9 May 2021 Huming Qiu, Hua Ma, Zhi Zhang, Yifeng Zheng, Anmin Fu, Pan Zhou, Yansong Gao, Derek Abbott, Said F. Al-Sarawi

To this end, a 1-bit quantized DNN model or deep binary neural network maximizes the memory efficiency, where each parameter in a BNN model has only 1-bit.

Quantization

Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication

no code implementations20 Jun 2017 Yansong Gao, Said F. Al-Sarawi, Derek Abbott, Ahmad-Reza Sadeghi, Damith C. Ranasinghe

Physical unclonable functions (PUFs), as hardware security primitives, exploit manufacturing randomness to extract hardware instance-specific secrets.

Cryptography and Security

A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity

no code implementations30 Mar 2013 Mostafa Rahimi Azghadi, Said Al-Sarawi, Derek Abbott, Nicolangelo Iannella

Additionally, it has been shown that the behaviour inherent to the spike rate-based Bienenstock-Cooper-Munro (BCM) synaptic plasticity rule can also emerge from the TSTDP rule.

The gravitational field of a cube

1 code implementation18 Jun 2012 James M. Chappell, Mark J. Chappell, Azhar Iqbal, Derek Abbott

Large astronomical objects such as stars or planets, produce approximately spherical shapes due to the large gravitational forces, and if the object is rotating rapidly, it becomes an oblate spheroid.

Classical Physics Earth and Planetary Astrophysics

Cannot find the paper you are looking for? You can Submit a new open access paper.