Muhammad Junaid Farooq and Quanyan Zhu Cloud computing is becoming an essential component in the emerging Internet of Things (IoT) paradigm. The available resources at the cloud such as computing nodes, storage, databases, etc. are often packaged in the form of virtual machines (VMs) to be used by remotely located IoT client applications for computational...
Category: Publications
ADMM-based Networked Stochastic Variational Inference
Hamza Anwar and Quanyan Zhu Owing to the recent advances in “Big Data” modeling and prediction tasks, variational Bayesian estimation has gained popularity due to their ability to provide exact solutions to approximate posteriors. One key technique for approximate inference is stochastic variational inference (SVI) [1]. SVI poses variational inference as a stochastic optimization problem...
Concerted wire lifting: Enabling secure and cost-effective split manufacturing
Satwik Patnaik, Johann Knechtel, Mohammed Ashraf and Ozgur Sinanoglu Here we advance the protection of split manufacturing (SM)-based layouts through the judicious and well-controlled handling of interconnects. Initially, we explore the cost-security trade-offs of SM, which are limiting its adoption. Aiming to resolve this issue, we propose effective and efficient strategies to lift nets to...
Evolutionary Methods for Generating Synthetic MasterPrint Templates: Dictionary Attack in Fingerprint Recognition
Aditi Roy, Nasir Memon, Julian Togelius and Arun Ross Recent research has demonstrated the possibility of generating “Masterprints” that can be used by an adversary to launch a dictionary attack against a fingerprint recognition system. Masterprints are fingerprint images that fortuitously match with a large number of other fingerprints thereby compromising the security of a...
Analyzing and Mitigating the Impact of Permanent Faults on a Systolic Array Based Neural Network Accelerator
Jeff (Jun) Zhang, Tianyu Gu, Kanad Basu and Siddharth Garg Due to their growing popularity and computational cost, deep neural networks (DNNs) are being targeted for hardware acceleration. A popular architecture for DNN acceleration, adopted by the Google Tensor Processing Unit (TPU), utilizes a systolic array based matrix multiplication unit at its core. This paper deals...
Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps
Yanyan Zhuang,Albert Rafetseder, Yu Hu, Yuan Tian and Justin Cappos Due to their omnipresence, mobile devices such as smartphones could be tremendously valuable to researchers. However, since research projects can extract data about device owners that could be personal or sensitive, there are substantial privacy concerns. Currently, the only regulation to protect user privacy for...
EFFICIENT ENTROPY FOR POLICY GRADIENT WITH MULTI-DIMENSIONAL ACTION SPACE
Yiming Zhang , Quan Ho Vuong , Kenny Song , Xiao-Yue Gong and Keith W. Ross This paper considers entropy bonus, which is used to encourage exploration in policy gradient. In the case of high-dimensional action spaces, calculating the entropy and its gradient requires enumerating all the actions in the action space and running forward...
ThUnderVolt: Enabling Aggressive Voltage Underscaling and Timing Error Resilience for Energy Efficient Deep Neural Network Accelerators
Jeff Zhang, Kartheek Rangineni, Zahra Ghodsi, and Siddharth Garg Hardware accelerators are being increasingly deployed to boost the performance and energy efficiency of deep neural network (DNN) inference. In this paper we propose Thundervolt, a new framework that enables aggressive voltage underscaling of high-performance DNN accelerators without compromising classification accuracy even in the presence of high timing error...
A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines
Rui Zhang and Quanyan Zhu Distributed Support Vector Machines (DSVM) have been developed to solve large-scale classification problems in networked systems with a large number of sensors and control units. However, the systems become more vulnerable as detection and defense are increasingly difficult and expensive. This work aims to develop secure and resilient DSVM algorithms...
Typicality Matching for Pairs of Correlated Graphs
Farhad Shirani, Siddharth Garg and Elza Erkip In this paper, the problem of matching pairs of correlated random graphs with multi-valued edge attributes is considered. Graph matching problems of this nature arise in several settings of practical interest including social network deanonymization, study of biological data, web graphs, etc. An achievable region for successful matching...