Zum Hauptinhalt springen

Showing 1–11 of 11 results for author: Khan, N I

Searching in archive cs. Search in all archives.
.
  1. Analysis of Arrhythmia Classification on ECG Dataset

    Authors: Taminul Islam, Arindom Kundu, Tanzim Ahmed, Nazmul Islam Khan

    Abstract: The heart is one of the most vital organs in the human body. It supplies blood and nutrients in other parts of the body. Therefore, maintaining a healthy heart is essential. As a heart disorder, arrhythmia is a condition in which the heart's pumping mechanism becomes aberrant. The Electrocardiogram is used to analyze the arrhythmia problem from the ECG signals because of its fewer difficulties and… ▽ More

    Submitted 10 January, 2023; originally announced January 2023.

    Comments: 6 pages, 5 figures. This paper has been published to 2022 proceedings of IEEE 7th International conference for Convergence in Technology (I2CT), 07-09 April 2022, Mumbai, India

    Journal ref: In 2022 IEEE 7th International conference for Convergence in Technology (I2CT) (pp. 1-6). IEEE

  2. arXiv:2206.14972  [pdf

    cs.LG

    Machine Learning Approaches to Predict Breast Cancer: Bangladesh Perspective

    Authors: Taminul Islam, Arindom Kundu, Nazmul Islam Khan, Choyon Chandra Bonik, Flora Akter, Md Jihadul Islam

    Abstract: Nowadays, Breast cancer has risen to become one of the most prominent causes of death in recent years. Among all malignancies, this is the most frequent and the major cause of death for women globally. Manually diagnosing this disease requires a good amount of time and expertise. Breast cancer detection is time-consuming, and the spread of the disease can be reduced by developing machine-based bre… ▽ More

    Submitted 29 June, 2022; originally announced June 2022.

    Comments: 15 pages, 9 figures, accepted for publication as a book chapter to 2nd International Conference on Ubiquitous Computing and Intelligent Information Systems

  3. arXiv:2204.04768  [pdf, other

    cs.AI cs.NE

    Analysis of Power-Oriented Fault Injection Attacks on Spiking Neural Networks

    Authors: Karthikeyan Nagarajan, Junde Li, Sina Sayyah Ensan, Mohammad Nasim Imtiaz Khan, Sachhidh Kannan, Swaroop Ghosh

    Abstract: Spiking Neural Networks (SNN) are quickly gaining traction as a viable alternative to Deep Neural Networks (DNN). In comparison to DNNs, SNNs are more computationally powerful and provide superior energy efficiency. SNNs, while exciting at first appearance, contain security-sensitive assets (e.g., neuron threshold voltage) and vulnerabilities (e.g., sensitivity of classification accuracy to neuron… ▽ More

    Submitted 10 April, 2022; originally announced April 2022.

    Comments: Design, Automation and Test in Europe Conference (DATE) 2022

  4. arXiv:2105.06401  [pdf

    cs.CR cs.ET

    Comprehensive Study of Security and Privacy of Emerging Non-Volatile Memories

    Authors: Mohammad Nasim Imtiaz Khan, Swaroop Ghosh

    Abstract: At the end of Silicon roadmap, keeping the leakage power in tolerable limit and bridging the bandwidth gap between processor and memory have become some of the biggest challenges. Several promising Non-Volatile Memories (NVMs) such as, Spin-Transfer Torque RAM (STTRAM), Magnetic RAM (MRAM), Phase Change Memory (PCM), Resistive RAM (RRAM) and Ferroelectric RAM (FeRAM) are being investigated to addr… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

  5. arXiv:2006.13095  [pdf, other

    cs.AR

    SCARE: Side Channel Attack on In-Memory Computing for Reverse Engineering

    Authors: Sina Sayyah Ensan, Karthikeyan Nagarajan, Mohammad Nasim Imtia Khan, Swaroop Ghosh

    Abstract: In-memory computing architectures provide a much needed solution to energy-efficiency barriers posed by Von-Neumann computing due to the movement of data between the processor and the memory. Functions implemented in such in-memory architectures are often proprietary and constitute confidential Intellectual Property. Our studies indicate that IMCs implemented using RRAM are susceptible to Side Cha… ▽ More

    Submitted 23 June, 2020; originally announced June 2020.

  6. arXiv:2001.00856  [pdf, other

    cs.AR cs.CR

    TrappeD: DRAM Trojan Designs for Information Leakage and Fault Injection Attacks

    Authors: Karthikeyan Nagarajan, Asmit De, Mohammad Nasim Imtiaz Khan, Swaroop Ghosh

    Abstract: In this paper, we investigate the advanced circuit features such as wordline- (WL) underdrive (prevents retention failure) and overdrive (assists write) employed in the peripherals of Dynamic RAM (DRAM) memories from a security perspective. In an ideal environment, these features ensure fast and reliable read and write operations. However, an adversary can re-purpose them by inserting Trojans to d… ▽ More

    Submitted 3 January, 2020; originally announced January 2020.

  7. arXiv:1904.07144  [pdf, other

    cs.CR

    RF-Trojan: Leaking Kernel Data Using Register File Trojan

    Authors: Mohammad Nasim Imtiaz Khan, Asmit De, Swaroop Ghosh

    Abstract: Register Files (RFs) are the most frequently accessed memories in a microprocessor for fast and efficient computation and control logic. Segment registers and control registers are especially critical for maintaining the CPU mode of execution that determinesthe access privileges. In this work, we explore the vulnerabilities in RF and propose a class of hardware Trojans which can inject faults duri… ▽ More

    Submitted 15 April, 2019; originally announced April 2019.

  8. arXiv:1606.00470  [pdf

    cs.ET

    Multi-Bit Read and Write Methodologies for Diode-STTRAM Crossbar Array

    Authors: Mohammad Nasim Imtiaz Khan, Swaroop Ghosh, Radha Krishna Aluru, Rashmi Jha

    Abstract: Crossbar arrays using emerging non-volatile memory technologies such as Resistive RAM (ReRAM) offer high density, fast access speed and low-power. However the bandwidth of the crossbar is limited to single-bit read/write per access to avoid selection of undesirable bits. We propose a technique to perform multi-bit read and write in a diode-STTRAM (Spin Transfer Torque RAM) crossbar array. Simulati… ▽ More

    Submitted 1 June, 2016; originally announced June 2016.

  9. arXiv:1606.00467  [pdf

    cs.ET

    Attack resilient architecture to replace embedded Flash with STTRAM in homogeneous IoTs

    Authors: Asmit De, Mohammad Nasim Imtiaz Khan, Swaroop Ghosh

    Abstract: Spin-Transfer Torque RAM (STTRAM) is an emerging Non-Volatile Memory (NVM) technology that provides better endurance, write energy and performance than traditional NVM technologies such as Flash. In embedded application such as microcontroller SoC of Internet of Things (IoT), embedded Flash (eFlash) is widely employed. However, eFlash is also associated with cost. Therefore, replacing eFlash with… ▽ More

    Submitted 1 June, 2016; originally announced June 2016.

  10. arXiv:1205.3125  [pdf

    cs.NI

    A Survey of TCP Reno, New Reno and Sack Over Mobile Ad-Hoc Network

    Authors: Md Nazmul Islam Khan, Rashed Ahmed, Md. Tariq Aziz

    Abstract: Transmission Control Protocol (TCP) is often preferred to be implemented at the transport layer of a Mobile Ad-hoc Network (MANET) because of its wide range of applications, which enjoys the advantage of reliable data transmission in the Internet. However, because of some unique characteristics of MANET, TCP cannot offer reliable services while using e-mail, internet search and file transmission i… ▽ More

    Submitted 9 February, 2012; originally announced May 2012.

    Comments: 8 Figures, MANET

    Journal ref: International Journal of Distributed and Parallel Systems (IJDPS), Volume 3(1) ISSN : 0976 - 9757 (2012) [Online]

  11. arXiv:1202.1877  [pdf

    cs.NI cs.PF

    Effect of Packet Delay Variation on Video-Voice over DiffServ-MPLS in IPv4-IPv6 Networks

    Authors: Md. Tariq Aziz, Mohammad Saiful Islam, Md. Nazmul Islam khan, Adrian Popescu

    Abstract: Over the last years, we have witnessed a rapid deployment of real-time applications on the Internet as well as many research works about Quality of Service (QoS), in particular IPv4 (Internet Protocol version 4). The inevitable exhaustion of the remaining IPv4 address pool has become progressively evident. As the evolution of Internet Protocol (IP) continues, the deployment of IPv6 QoS is underway… ▽ More

    Submitted 20 March, 2012; v1 submitted 8 February, 2012; originally announced February 2012.

    Comments: 21 Pages, 8 Figures; January 2012, Volume 3, Number 1 (IJDPS)