Zum Hauptinhalt springen

Showing 1–16 of 16 results for author: Bhasin, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.16467  [pdf, other

    cs.CR cs.AI

    Side-Channel Analysis of OpenVINO-based Neural Network Models

    Authors: Dirmanto Jap, Jakub Breier, Zdenko Lehocký, Shivam Bhasin, Xiaolu Hou

    Abstract: Embedded devices with neural network accelerators offer great versatility for their users, reducing the need to use cloud-based services. At the same time, they introduce new security challenges in the area of hardware attacks, the most prominent being side-channel analysis (SCA). It was shown that SCA can recover model parameters with a high accuracy, posing a threat to entities that wish to keep… ▽ More

    Submitted 20 August, 2024; v1 submitted 23 July, 2024; originally announced July 2024.

  2. arXiv:2406.09097  [pdf, ps, other

    eess.SY cs.RO

    Adaptive Actor-Critic Based Optimal Regulation for Drift-Free Uncertain Nonlinear Systems

    Authors: Ashwin P. Dani, Shubhendu Bhasin

    Abstract: In this paper, a continuous-time adaptive actor-critic reinforcement learning (RL) controller is developed for drift-free nonlinear systems. Practical examples of such systems are image-based visual servoing (IBVS) and wheeled mobile robots (WMR), where the system dynamics includes a parametric uncertainty in the control effectiveness matrix with no drift term. The uncertainty in the input term po… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  3. arXiv:2402.08964  [pdf, other

    cs.LG cs.HC

    Predicting User Experience on Laptops from Hardware Specifications

    Authors: Saswat Padhi, Sunil K. Bhasin, Udaya K. Ammu, Alex Bergman, Allan Knies

    Abstract: Estimating the overall user experience (UX) on a device is a common challenge faced by manufacturers. Today, device makers primarily rely on microbenchmark scores, such as Geekbench, that stress test specific hardware components, such as CPU or RAM, but do not satisfactorily capture consumer workloads. System designers often rely on domain-specific heuristics and extensive testing of prototypes to… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: Spotlight presentation at the ML for Systems workshop at NeurIPS 2023 ; 9 pages with appendix ; https://openreview.net/forum?id=mHShSE7MSU

  4. arXiv:2306.17427  [pdf

    cs.RO

    Modeling and parametric optimization of 3D tendon-sheath actuator system for upper limb soft exosuit

    Authors: Amit Yadav, Nitesh Kumar, Shaurya Surana, Aravind Ramasamy, Abhishek Rudra Pal, Sushma Santapuri, Lalan Kumar, Suriya Prakash Muthukrishnan, Shubhendu Bhasin, Sitikantha Roy

    Abstract: This paper presents an analysis of parametric characterization of a motor driven tendon-sheath actuator system for use in upper limb augmentation for applications such as rehabilitation, therapy, and industrial automation. The double tendon sheath system, which uses two sets of cables (agonist and antagonist side) guided through a sheath, is considered to produce smooth and natural-looking movemen… ▽ More

    Submitted 10 September, 2023; v1 submitted 30 June, 2023; originally announced June 2023.

  5. arXiv:2304.14823  [pdf, other

    cs.RO eess.SY

    Adaptive Gravity Compensation Control of a Cable-Driven Upper-Arm Soft Exosuit

    Authors: Joyjit Mukherjee, Ankit Chatterjee, Shreeshan Jena, Nitesh Kumar, Suriya Prakash Muthukrishnan, Sitikantha Roy, Shubhendu Bhasin

    Abstract: This paper proposes an adaptive gravity compensation (AGC) control strategy for a cable-driven upper-limb exosuit intended to assist the wearer with lifting tasks. Unlike most model-based control techniques used for this human-robot interaction task, the proposed control design does not assume knowledge of the anthropometric parameters of the wearer's arm and the payload. Instead, the uncertaintie… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

  6. arXiv:2303.18132  [pdf, other

    cs.CR cs.LG

    A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks

    Authors: Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin

    Abstract: Model extraction attacks have been widely applied, which can normally be used to recover confidential parameters of neural networks for multiple layers. Recently, side-channel analysis of neural networks allows parameter extraction even for networks with several multiple deep layers with high effectiveness. It is therefore of interest to implement a certain level of protection against these attack… ▽ More

    Submitted 25 March, 2023; originally announced March 2023.

    Comments: Accepted to the International Symposium on Cyber Security, Cryptology and Machine Learning 2023 (CSCML)

  7. BiCurNet: Pre-Movement EEG based Neural Decoder for Biceps Curl Trajectory Estimation

    Authors: Manali Saini, Anant Jain, Lalan Kumar, Suriya Prakash Muthukrishnan, Shubhendu Bhasin, Sitikantha Roy

    Abstract: Kinematic parameter (KP) estimation from early electroencephalogram (EEG) signals is essential for positive augmentation using wearable robot. However, work related to early estimation of KPs from surface EEG is sparse. In this work, a deep learning-based model, BiCurNet, is presented for early estimation of biceps curl using collected EEG signal. The model utilizes light-weight architecture with… ▽ More

    Submitted 26 October, 2023; v1 submitted 10 January, 2023; originally announced January 2023.

  8. arXiv:2207.01839  [pdf, other

    cs.LG cs.AI stat.ML

    What Do Graph Convolutional Neural Networks Learn?

    Authors: Sannat Singh Bhasin, Vaibhav Holani, Divij Sanjanwala

    Abstract: Graph neural networks (GNNs) have gained traction over the past few years for their superior performance in numerous machine learning tasks. Graph Convolutional Neural Networks (GCN) are a common variant of GNNs that are known to have high performance in semi-supervised node classification (SSNC), and work well under the assumption of homophily. Recent literature has highlighted that GCNs can achi… ▽ More

    Submitted 5 July, 2022; originally announced July 2022.

  9. arXiv:2203.03365  [pdf

    stat.ML cs.CY cs.LG

    Machine learning using longitudinal prescription and medical claims for the detection of nonalcoholic steatohepatitis (NASH)

    Authors: Ozge Yasar, Patrick Long, Brett Harder, Hanna Marshall, Sanjay Bhasin, Suyin Lee, Mark Delegge, Stephanie Roy, Orla Doyle, Nadea Leavitt, John Rigg

    Abstract: Objectives To develop and evaluate machine learning models to detect suspected undiagnosed nonalcoholic steatohepatitis (NASH) patients for diagnostic screening and clinical management. Methods In this retrospective observational noninterventional study using administrative medical claims data from 1,463,089 patients, gradient-boosted decision trees were trained to detect likely NASH patients fr… ▽ More

    Submitted 7 March, 2022; originally announced March 2022.

    Comments: 22 pages, 4 figures

  10. arXiv:2108.01281  [pdf, other

    cs.CR

    DeepFreeze: Cold Boot Attacks and High Fidelity Model Recovery on Commercial EdgeML Device

    Authors: Yoo-Seung Won, Soham Chatterjee, Dirmanto Jap, Arindam Basu, Shivam Bhasin

    Abstract: EdgeML accelerators like Intel Neural Compute Stick 2 (NCS) can enable efficient edge-based inference with complex pre-trained models. The models are loaded in the host (like Raspberry Pi) and then transferred to NCS for inference. In this paper, we demonstrate practical and low-cost cold boot based model recovery attacks on NCS to recover the model architecture and weights, loaded from the Raspbe… ▽ More

    Submitted 3 August, 2021; originally announced August 2021.

    Comments: 9 pages, 8 figures

  11. arXiv:2107.11336  [pdf, other

    cs.CR cs.AR

    Mitigating Power Attacks through Fine-Grained Instruction Reordering

    Authors: Yun Chen, Ali Hajiabadi, Romain Poussier, Andreas Diavastos, Shivam Bhasin, Trevor E. Carlson

    Abstract: Side-channel attacks are a security exploit that take advantage of information leakage. They use measurement and analysis of physical parameters to reverse engineer and extract secrets from a system. Power analysis attacks in particular, collect a set of power traces from a computing device and use statistical techniques to correlate this information with the attacked application data and source c… ▽ More

    Submitted 23 July, 2021; originally announced July 2021.

    Comments: 13 pages, 12 figures

  12. SNIFF: Reverse Engineering of Neural Networks with Fault Attacks

    Authors: Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin, Yang Liu

    Abstract: Neural networks have been shown to be vulnerable against fault injection attacks. These attacks change the physical behavior of the device during the computation, resulting in a change of value that is currently being computed. They can be realized by various fault injection techniques, ranging from clock/voltage glitching to application of lasers to rowhammer. In this paper we explore the possibi… ▽ More

    Submitted 28 February, 2023; v1 submitted 23 February, 2020; originally announced February 2020.

    Comments: Published in IEEE Transactions on Reliability

  13. arXiv:1902.04560  [pdf, other

    cs.LG cs.CR stat.ML

    Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications

    Authors: Manaar Alam, Arnab Bag, Debapriya Basu Roy, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay

    Abstract: Neural Networks (NN) have recently emerged as backbone of several sensitive applications like automobile, medical image, security, etc. NNs inherently offer Partial Fault Tolerance (PFT) in their architecture; however, the biased PFT of NNs can lead to severe consequences in applications like cryptography and security critical scenarios. In this paper, we propose a revised implementation which enh… ▽ More

    Submitted 5 February, 2019; originally announced February 2019.

  14. arXiv:1810.09076  [pdf, other

    cs.CR

    CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information

    Authors: Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek

    Abstract: Machine learning has become mainstream across industries. Numerous examples proved the validity of it for security applications. In this work, we investigate how to reverse engineer a neural network by using only power side-channel information. To this end, we consider a multilayer perceptron as the machine learning architecture of choice and assume a non-invasive and eavesdropping attacker capabl… ▽ More

    Submitted 22 October, 2018; originally announced October 2018.

    Comments: 15 pages, 16 figures

  15. arXiv:1806.05859  [pdf, other

    cs.CR cs.LG

    DeepLaser: Practical Fault Attack on Deep Neural Networks

    Authors: Jakub Breier, Xiaolu Hou, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu

    Abstract: As deep learning systems are widely adopted in safety- and security-critical applications, such as autonomous vehicles, banking systems, etc., malicious faults and attacks become a tremendous concern, which potentially could lead to catastrophic consequences. In this paper, we initiate the first study of leveraging physical fault injection attacks on Deep Neural Networks (DNNs), by using laser inj… ▽ More

    Submitted 29 September, 2018; v1 submitted 15 June, 2018; originally announced June 2018.

    Comments: 11 pages

  16. arXiv:1108.5619  [pdf

    cs.DB

    Modification of GTD from Flat File Format to OLAP for Data Mining

    Authors: Karanjit Singh, Shuchita Bhasin

    Abstract: This document is part of original research work by the authors in a bid to explore new fields for applying Data Mining Techniques. The sample data is part of a large data set from University of Maryland (UMD) and outlines how more meaningful patterns can be discovered by preprocessing the data in the form of OLAP cubes.

    Submitted 26 August, 2011; originally announced August 2011.

    Comments: GTD, OLAP, Data Mining, Terror Databases