Zum Hauptinhalt springen

Showing 1–8 of 8 results for author: Soni, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.03717  [pdf

    cs.CV

    Automated Real Time Delineation of Supraclavicular Brachial Plexus in Neck Ultrasonography Videos: A Deep Learning Approach

    Authors: Abhay Tyagi, Abhishek Tyagi, Manpreet Kaur, Jayanthi Sivaswami, Richa Aggarwal, Kapil Dev Soni, Anjan Trikha

    Abstract: Peripheral nerve blocks are crucial to treatment of post-surgical pain and are associated with reduction in perioperative opioid use and hospital stay. Accurate interpretation of sono-anatomy is critical for the success of ultrasound (US) guided peripheral nerve blocks and can be challenging to the new operators. This prospective study enrolled 227 subjects who were systematically scanned for supr… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  2. arXiv:2304.05237  [pdf

    cs.CR cs.AR cs.DC cs.PF

    TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation

    Authors: David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew Schmidt, Ajey Jacob, Benedict Reynwar, Kellie Canida, Akhilesh Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram

    Abstract: Secure computation is of critical importance to not only the DoD, but across financial institutions, healthcare, and anywhere personally identifiable information (PII) is accessed. Traditional security techniques require data to be decrypted before performing any computation. When processed on untrusted systems the decrypted data is vulnerable to attacks to extract the sensitive information. To ad… ▽ More

    Submitted 18 April, 2023; v1 submitted 11 April, 2023; originally announced April 2023.

    Comments: 6 pages, 5 figures and 2 tables

  3. arXiv:2303.17118  [pdf, other

    cs.AR cs.CR

    RPU: The Ring Processing Unit

    Authors: Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Nabeel, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew Schmidt, Brandon Reagen

    Abstract: Ring-Learning-with-Errors (RLWE) has emerged as the foundation of many important techniques for improving security and privacy, including homomorphic encryption and post-quantum cryptography. While promising, these techniques have received limited use due to their extreme overheads of running on general-purpose machines. In this paper, we present a novel vector Instruction Set Architecture (ISA) a… ▽ More

    Submitted 13 April, 2023; v1 submitted 29 March, 2023; originally announced March 2023.

  4. CoFHEE: A Co-processor for Fully Homomorphic Encryption Execution (Extended Version)

    Authors: Mohammed Nabeel, Homer Gamil, Deepraj Soni, Mohammed Ashraf, Mizan Abraha Gebremichael, Eduardo Chielle, Ramesh Karri, Mihai Sanduleanu, Michail Maniatakos

    Abstract: The migration of computation to the cloud has raised concerns regarding the security and privacy of sensitive data, as their need to be decrypted before processing, renders them susceptible to potential breaches. Fully Homomorphic Encryption (FHE) serves as a countermeasure to this issue by enabling computation to be executed directly on encrypted data. Nevertheless, the execution of FHE is orders… ▽ More

    Submitted 14 February, 2024; v1 submitted 19 April, 2022; originally announced April 2022.

    Comments: 13 pages

  5. Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Post-Quantum Signature Schemes

    Authors: Animesh Basak Chowdhury, Anushree Mahapatra, Deepraj Soni, Ramesh Karri

    Abstract: NIST is standardizing Post Quantum Cryptography (PQC) algorithms that are resilient to the computational capability of quantum computers. Past works show malicious subversion with cryptographic software (algorithm subversion attacks) that weaken the implementations. We show that PQC digital signature codes can be subverted in line with previously reported flawed implementations that generate verif… ▽ More

    Submitted 13 March, 2022; originally announced March 2022.

    Comments: Accepted in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

  6. Scaling Up Hardware Accelerator Verification using A-QED with Functional Decomposition

    Authors: Saranyu Chattopadhyay, Florian Lonsing, Luca Piccolboni, Deepraj Soni, Peng Wei, Xiaofan Zhang, Yuan Zhou, Luca Carloni, Deming Chen, Jason Cong, Ramesh Karri, Zhiru Zhang, Caroline Trippel, Clark Barrett, Subhasish Mitra

    Abstract: Hardware accelerators (HAs) are essential building blocks for fast and energy-efficient computing systems. Accelerator Quick Error Detection (A-QED) is a recent formal technique which uses Bounded Model Checking for pre-silicon verification of HAs. A-QED checks an HA for self-consistency, i.e., whether identical inputs within a sequence of operations always produce the same output. Under modest as… ▽ More

    Submitted 17 August, 2021; v1 submitted 13 August, 2021; originally announced August 2021.

    Comments: preprint of a paper to appear at FMCAD 2021, including appendix

  7. arXiv:1003.1456  [pdf

    cs.SE

    A Methodology for Empirical Quality Assessment of Object-Oriented Design

    Authors: Devpriya Soni, Namita Shrivastava, M. Kumar

    Abstract: The direct measurement of quality is difficult because there is no way we can measure quality factors. For measuring these factors, we have to express them in terms of metrics or models. Researchers have developed quality models that attempt to measure quality in terms of attributes, characteristics and metrics. In this work we have proposed the methodology of controlled experimentation coupled wi… ▽ More

    Submitted 7 March, 2010; originally announced March 2010.

    Comments: Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS February 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Computer Science ISSN 19475500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 2, pp. 047-055, February 2010, USA

  8. arXiv:1001.1970  [pdf

    cs.SE

    A Framework for Validation of Object Oriented Design Metrics

    Authors: Devpriya Soni, Ritu Shrivastava, M. Kumar

    Abstract: A large number of metrics have been proposed for the quality of object oriented software. Many of these metrics have not been properly validated due to poor methods of validation and non acceptance of metrics on scientific grounds. In the literature, two types of validations namely internal (theoretical) and external (empirical) are recommended. In this study, the authors have used both theoreti… ▽ More

    Submitted 12 January, 2010; originally announced January 2010.

    Comments: 7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS December 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 3, pp. 046-052, December 2009, USA