Picture for Semeen Rehman

Semeen Rehman

BioNetExplorer: Architecture-Space Exploration of Bio-Signal Processing Deep Neural Networks for Wearables

Add code
Sep 07, 2021
Figure 1 for BioNetExplorer: Architecture-Space Exploration of Bio-Signal Processing Deep Neural Networks for Wearables
Figure 2 for BioNetExplorer: Architecture-Space Exploration of Bio-Signal Processing Deep Neural Networks for Wearables
Figure 3 for BioNetExplorer: Architecture-Space Exploration of Bio-Signal Processing Deep Neural Networks for Wearables
Figure 4 for BioNetExplorer: Architecture-Space Exploration of Bio-Signal Processing Deep Neural Networks for Wearables
Viaarxiv icon

MLComp: A Methodology for Machine Learning-based Performance Estimation and Adaptive Selection of Pareto-Optimal Compiler Optimization Sequences

Add code
Dec 11, 2020
Figure 1 for MLComp: A Methodology for Machine Learning-based Performance Estimation and Adaptive Selection of Pareto-Optimal Compiler Optimization Sequences
Figure 2 for MLComp: A Methodology for Machine Learning-based Performance Estimation and Adaptive Selection of Pareto-Optimal Compiler Optimization Sequences
Figure 3 for MLComp: A Methodology for Machine Learning-based Performance Estimation and Adaptive Selection of Pareto-Optimal Compiler Optimization Sequences
Figure 4 for MLComp: A Methodology for Machine Learning-based Performance Estimation and Adaptive Selection of Pareto-Optimal Compiler Optimization Sequences
Viaarxiv icon

RED-Attack: Resource Efficient Decision based Attack for Machine Learning

Add code
Jan 30, 2019
Figure 1 for RED-Attack: Resource Efficient Decision based Attack for Machine Learning
Figure 2 for RED-Attack: Resource Efficient Decision based Attack for Machine Learning
Figure 3 for RED-Attack: Resource Efficient Decision based Attack for Machine Learning
Figure 4 for RED-Attack: Resource Efficient Decision based Attack for Machine Learning
Viaarxiv icon

Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference

Add code
Nov 05, 2018
Figure 1 for Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference
Figure 2 for Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference
Figure 3 for Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference
Figure 4 for Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference
Viaarxiv icon

FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning

Add code
Nov 04, 2018
Figure 1 for FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning
Figure 2 for FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning
Figure 3 for FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning
Figure 4 for FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning
Viaarxiv icon

SSCNets: A Selective Sobel Convolution-based Technique to Enhance the Robustness of Deep Neural Networks against Security Attacks

Add code
Nov 04, 2018
Figure 1 for SSCNets: A Selective Sobel Convolution-based Technique to Enhance the Robustness of Deep Neural Networks against Security Attacks
Figure 2 for SSCNets: A Selective Sobel Convolution-based Technique to Enhance the Robustness of Deep Neural Networks against Security Attacks
Figure 3 for SSCNets: A Selective Sobel Convolution-based Technique to Enhance the Robustness of Deep Neural Networks against Security Attacks
Figure 4 for SSCNets: A Selective Sobel Convolution-based Technique to Enhance the Robustness of Deep Neural Networks against Security Attacks
Viaarxiv icon

QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks

Add code
Nov 04, 2018
Figure 1 for QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks
Figure 2 for QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks
Figure 3 for QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks
Figure 4 for QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks
Viaarxiv icon

ISA4ML: Training Data-Unaware Imperceptible Security Attacks on Machine Learning Modules of Autonomous Vehicles

Add code
Nov 02, 2018
Figure 1 for ISA4ML: Training Data-Unaware Imperceptible Security Attacks on Machine Learning Modules of Autonomous Vehicles
Figure 2 for ISA4ML: Training Data-Unaware Imperceptible Security Attacks on Machine Learning Modules of Autonomous Vehicles
Figure 3 for ISA4ML: Training Data-Unaware Imperceptible Security Attacks on Machine Learning Modules of Autonomous Vehicles
Figure 4 for ISA4ML: Training Data-Unaware Imperceptible Security Attacks on Machine Learning Modules of Autonomous Vehicles
Viaarxiv icon

MPNA: A Massively-Parallel Neural Array Accelerator with Dataflow Optimization for Convolutional Neural Networks

Add code
Oct 30, 2018
Figure 1 for MPNA: A Massively-Parallel Neural Array Accelerator with Dataflow Optimization for Convolutional Neural Networks
Figure 2 for MPNA: A Massively-Parallel Neural Array Accelerator with Dataflow Optimization for Convolutional Neural Networks
Figure 3 for MPNA: A Massively-Parallel Neural Array Accelerator with Dataflow Optimization for Convolutional Neural Networks
Figure 4 for MPNA: A Massively-Parallel Neural Array Accelerator with Dataflow Optimization for Convolutional Neural Networks
Viaarxiv icon