Search Results for author: Monowar Hasan

Found 5 papers, 2 papers with code

LLMs as On-demand Customizable Service

no code implementations29 Jan 2024 Souvika Sarkar, Mohammad Fakhruddin Babar, Monowar Hasan, Shubhra Kanti Karmaker

To address these issues, we introduce a concept of hierarchical, distributed LLM architecture that aims at enhancing the accessibility and deployability of LLMs across heterogeneous computing platforms, including general-purpose computers (e. g., laptops) and IoT-style devices (e. g., embedded systems).

Processing Natural Language on Embedded Devices: How Well Do Transformer Models Perform?

2 code implementations23 Apr 2023 Souvika Sarkar, Mohammad Fakhruddin Babar, Md Mahadi Hassan, Monowar Hasan, Shubhra Kanti Karmaker Santu

This paper presents a performance study of transformer language models under different hardware configurations and accuracy requirements and derives empirical observations about these resource/accuracy trade-offs.

Sentiment Analysis Sentiment Classification

Securing Vehicle-to-Everything (V2X) Communication Platforms

no code implementations12 Mar 2020 Monowar Hasan, Sibin Mohan, Takayuki Shimizu, HongSheng Lu

Modern vehicular wireless technology enables vehicles to exchange information at any time, from any place, to any network -- forms the vehicle-to-everything (V2X) communication platforms.

Networking and Internet Architecture Cryptography and Security

Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks

1 code implementation26 Aug 2019 Monowar Hasan, Sibin Mohan

In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT) edge devices with timing requirements from control spoofing attacks where an adversary sends malicious control signals to the actuators.

Cryptography and Security Systems and Control Systems and Control

REORDER: Securing Dynamic-Priority Real-Time Systems Using Schedule Obfuscation

no code implementations4 Jun 2018 Chien-Ying Chen, Monowar Hasan, AmirEmad Ghassami, Sibin Mohan, Negar Kiyavash

The deterministic (timing) behavior of real-time systems (RTS) can be used by adversaries - say, to launch side channel attacks or even destabilize the system by denying access to critical resources.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.