Category: Publications

Home / Publications
Post

Enabling Extreme Energy Efficiency Via Timing Speculation for Deep Neural Network Accelerators

Jeff (Jun) Zhang, Zahra Ghodsi, Kartheek Rangineni and Siddharth Garg Due to the success of deep neural networks (DNN) in achieving and surpassing state-of-the-art results for a range of machine learning applications, there is growing interest in the design of high-performance hardware accelerators for DNN execution. Further, as DNN hardware accelerators are increasingly being deployed...

Post

Cognitive Connectivity Resilience in Multi-layer Remotely Deployed Mobile Internet of Things

Muhammad Junaid Farooq and Quanyan Zhu Enabling the Internet of things in remote areas without traditional communication infrastructure requires a multi-layer network architecture. The devices in the overlay network are required to provide coverage to the underlay devices as well as to remain connected to other overlay devices. The coordination, planning, and design of such...

Post

Secure Randomized Checkpointing for Digital Microfluidic Biochips

Jack Tang, Mohamed Ibrahim,Krishnendu Chakrabarty and Ramesh Karri Digital microfluidic biochips (DMFBs) integrated with processors and arrays of sensors form cyberphysical systems and consequently face a variety of unique, recently described security threats. It has been noted that techniques used for error recovery can provide some assurance of integrity when a cyberphysical DMFB is under...

Post

BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain

Tianyu Gu, Brendan Dolan-Gavitt and Siddharth Garg Deep learning-based techniques have achieved stateof-the-art performance on a wide variety of recognition and classification tasks. However, these networks are typically computationally expensive to train, requiring weeks of computation on many GPUs; as a result, many users outsource the training procedure to the cloud or rely on pre-trained models that...

Post

A network framework for dynamic models of urban food, energy and water systems (FEWS)

Rae Zimmerman, Quanyan Zhu and Carolyn Dimitri The urban food system addressed here centers on urban food processing, distribution and consumption (including food packaging and waste disposal) and as such addresses how food moves from processing and distribution centers to points of consumption and ultimately waste disposal within cities. The Food-Energy-Water Systems (FEWS) Nexus extends...

Post

HIV-1-infected T-cells dynamics and prognosis: An evolutionary game model

Bahareh Khazaei, Javad Salimi Sartakhti, Mohammad Hossein Manshaei, Quanyan Zhu, Mehdi Sadeghi and Seyed Rasoul Mousavi Understanding the dynamics of human immunodeficiency virus (HIV) is essential for depicting, developing, and investigating effective treatment strategies. HIV infects several types of immune cells, but its main target is to destroy helper T-cells. In the lymph nodes, the infected T-cells interact with each other...

Post

Detecting the Presence of ENF Signal in Digital Videos: A Superpixel-Based Approach

Saffet Vatansever, Ahmet Emer Dirik and Nasir Memon Electrical network frequency (ENF) instantaneously fluctuates around its nominal value (50/60 Hz) due to a continuous disparity between generated power and consumed power. Consequently, luminous intensity of a mains-powered light source varies depending on ENF fluctuations in the grid network. Variations in the luminance over time can...

Post

Backpage and Bitcoin: Uncovering Human Traffickers

Rebecca S. Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz and Damon McCoy Sites for online classified ads selling sex are widely used by human traffickers to support their pernicious business. The sheer quantity of ads makes manual exploration and analysis unscalable. In addition, discerning whether an ad is advertising a trafficked victim or a independent sex...

Post

Security features embedded in computer aided design (CAD) solid models for additive manufacturing

Fei Chen, Gary Mac, and Nikhil Gupta The additive manufacturing (AM) process chain relies heavily on cloud based resources and software programs that are connected to the internet. Cybersecurity has become a major concern for cloud based resources. While network security is important and is the responsibility of the information technology departments of corporations, a...

Post

CONGRESS: A Hybrid Reputation System for Coping with Rating Subjectivity

Yuan Liu, Jie Zhang, Quanyan Zhu and Xingwei Wang In electronic commerce, buyers and sellers conduct transactions without physical interactions. In reputation systems, the trustworthiness of sellers is achieved by aggregating the ratings shared by other buyers with whom the sellers have ever conducted transactions. However, the ratings provided by buyers for evaluating the same...