no code implementations • 23 Nov 2024 • Mohammad Shahidzadeh, Behnam Ghavami, Steve Wilton, Lesley Shannon
Formal Property Verification (FPV), using SystemVerilog Assertions (SVA), is crucial for ensuring the completeness of design with respect to the specification.
no code implementations • 6 Jul 2024 • Behnam Ghavami, Mohammad Shahidzadeh, Lesley Shannon, Steve Wilton
Despite the inclusion of floating-point parameters in BNN architectures to improve accuracy, our findings reveal that BNNs are highly sensitive to deviations in these parameters caused by memory faults.
no code implementations • 6 Jul 2024 • Mohammadamin Baghbanbashi, Mohsen Raji, Behnam Ghavami
As the most recent version of YOLO, YOLOv7 achieves such state-of-the-art performance in speed and accuracy in the range of 5 FPS to 160 FPS that it surpasses all former versions of YOLO and other existing models in this regard.
no code implementations • 3 Apr 2024 • Behnam Ghavami, Amin Kamjoo, Lesley Shannon, Steve Wilton
The imperative to deploy Deep Neural Network (DNN) models on resource-constrained edge devices, spurred by privacy concerns, has become increasingly apparent.
no code implementations • 19 Mar 2023 • Mina Jafari, Behnam Ghavami, Vahid Sattari Naeini
In this paper, a multi-objective meta-heuristic method is provided for cancer chemotherapy with the aim of balancing between two objectives: the amount of toxicity and the number of cancerous cells.
1 code implementation • 27 Dec 2021 • Behnam Ghavami, Mani Sadati, Zhenman Fang, Lesley Shannon
Deep neural networks (DNNs) are increasingly being deployed in safety-critical systems such as personal healthcare devices and self-driving cars.
no code implementations • 7 Dec 2021 • Behnam Ghavami, Mani Sadati, Mohammad Shahidzadeh, Zhenman Fang, Lesley Shannon
Adversarial bit-flip attack (BFA) on Neural Network weights can result in catastrophic accuracy degradation by flipping a very small number of bits.
no code implementations • 21 Jan 2021 • Farzane Khajuyi, Behnam Ghavami, Human Nikmehr
We introduce a protection-based IP security scheme to protect soft and firm IP cores which are used on FPGA devices.
Cryptography and Security Hardware Architecture