Hardware approximate techniques for deep neural network accelerators: A survey

G Armeniakos, G Zervakis, D Soudris… - ACM Computing …, 2022 - dl.acm.org
Deep Neural Networks (DNNs) are very popular because of their high performance in
various cognitive tasks in Machine Learning (ML). Recent advancements in DNNs have …

Secure and trustworthy artificial intelligence-extended reality (AI-XR) for metaverses

A Qayyum, MA Butt, H Ali, M Usman, O Halabi… - ACM Computing …, 2024 - dl.acm.org
Metaverse is expected to emerge as a new paradigm for the next-generation Internet,
providing fully immersive and personalized experiences to socialize, work, and play in self …

Hardware and software optimizations for accelerating deep neural networks: Survey of current trends, challenges, and the road ahead

M Capra, B Bussolino, A Marchisio, G Masera… - IEEE …, 2020 - ieeexplore.ieee.org
Currently, Machine Learning (ML) is becoming ubiquitous in everyday life. Deep Learning
(DL) is already present in many applications ranging from computer vision for medicine to …

Deep learning for edge computing: Current trends, cross-layer optimizations, and open research challenges

A Marchisio, MA Hanif, F Khalid… - 2019 IEEE Computer …, 2019 - ieeexplore.ieee.org
In the Machine Learning era, Deep Neural Networks (DNNs) have taken the spotlight, due to
their unmatchable performance in several applications, such as image processing, computer …

[HTML][HTML] Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study

MA Butt, A Qayyum, H Ali, A Al-Fuqaha, J Qadir - Computers & Security, 2023 - Elsevier
The use of artificial intelligence (AI) at the edge is transforming every aspect of the lives of
human beings from scheduling daily activities to personalized shopping recommendations …

Towards energy-efficient and secure edge AI: A cross-layer framework ICCAD special session paper

M Shafique, A Marchisio, RVW Putra… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
The security and privacy concerns along with the amount of data that is required to be
processed on regular basis has pushed processing to the edge of the computing systems …

All your fake detector are belong to us: evaluating adversarial robustness of fake-news detectors under black-box settings

H Ali, MS Khan, A AlGhadhban, M Alazmi… - IEEE …, 2021 - ieeexplore.ieee.org
With the hyperconnectivity and ubiquity of the Internet, the fake news problem now presents
a greater threat than ever before. One promising solution for countering this threat is to …

Securing deep spiking neural networks against adversarial attacks through inherent structural parameters

R El-Allami, A Marchisio, M Shafique… - … Design, Automation & …, 2021 - ieeexplore.ieee.org
Deep Learning (DL) algorithms have gained popularity owing to their practical problem-
solving capacity. However, they suffer from a serious integrity threat, ie, their vulnerability to …

Evasion Attack and Defense On Machine Learning Models in Cyber-Physical Systems: A Survey

S Wang, RKL Ko, G Bai, N Dong… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are increasingly relying on machine learning (ML)
techniques to reduce labor costs and improve efficiency. However, the adoption of ML also …

APNAS: Accuracy-and-performance-aware neural architecture search for neural hardware accelerators

P Achararit, MA Hanif, RVW Putra, M Shafique… - Ieee …, 2020 - ieeexplore.ieee.org
Designing resource-efficient deep neural networks (DNNs) is a challenging task due to the
enormous diversity of applications as well as their time-consuming design, training …