Search Results - "Arafin, Md Tanvir"

Refine Results
  1. 1

    Approximate computing for low power and security in the Internet of Things by Mingze Gao, Qian Wang, Arafin, Md Tanvir, Yongqiang Lyu, Gang Qu

    Published in Computer (Long Beach, Calif.) (2017)
    “…To save resources for Internet of Things (IoT) devices, a proposed approach segments operands and corresponding basic arithmetic operations that can be carried…”
    Get full text
    Journal Article
  2. 2

    Security of Neural Networks from Hardware Perspective: A Survey and Beyond by Xu, Qian, Tanvir Arafin, Md, Qu, Gang

    “…Recent advances in neural networks (NNs) and their applications in deep learning techniques have made the security aspects of NNs an important and timely topic…”
    Get full text
    Conference Proceeding
  3. 3

    Performance optimization for terahertz quantum cascade laser at higher temperature using genetic algorithm by Arafin, Md. Tanvir, Islam, Nazifah, Roy, Sourav, Islam, Saiful

    Published in Optical and quantum electronics (01-12-2012)
    “…The aim of this work is to establish an approach for obtaining improved design parameters for high temperature operation of terahertz quantum cascade lasers…”
    Get full text
    Journal Article
  4. 4

    Voltage Over-Scaling-Based Lightweight Authentication for IoT Security by Zhang, Jiliang, Shen, Chaoqun, Su, Haihan, Arafin, Md Tanvir, Qu, Gang

    Published in IEEE transactions on computers (01-02-2022)
    “…It is a challenging task to deploy lightweight security protocols in resource-constrained IoT applications. A hardware-oriented lightweight authentication…”
    Get full text
    Journal Article
  5. 5

    Memristors for Secret Sharing-Based Lightweight Authentication by Arafin, Md Tanvir, Qu, Gang

    “…User authentication is one of the most fundamental security problems that design effective ways of identifying single or multiple entities using shared…”
    Get full text
    Journal Article
  6. 6

    Ising Model Processors on a Spatial Computing Architecture by Wu, Yanze, Arafin, Md Tanvir

    “…Data-flow-driven spatial computing architectures are emerging to enable efficient acceleration of complex machine learning models at the edge devices…”
    Get full text
    Conference Proceeding
  7. 7

    An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks by Xu, Qian, Arafin, Md Tanvir, Qu, Gang

    “…Diverse and comprehensive training data is critical in building robust machine learning (ML) models. However, model inversion attacks (MIA) have demonstrated…”
    Get full text
    Journal Article
  8. 8

    An RRAM-Based Computing-in-Memory Architecture and Its Application in Accelerating Transformer Inference by Lu, Zhaojun, Wang, Xueyan, Arafin, Md Tanvir, Yang, Haoxiang, Liu, Zhenglin, Zhang, Jiliang, Qu, Gang

    “…Deep neural network (DNN)-based transformer models have demonstrated remarkable performance in natural language processing (NLP) applications. Unfortunately,…”
    Get full text
    Journal Article
  9. 9

    ADLPT: Improving 3D NAND Flash Memory Reliability By Adaptive Lifetime Prediction Techniques by Pan, Yuqian, Lu, Zhaojun, Zhang, Haichun, Zhang, Haoming, Arafin, Md Tanvir, Liu, Zhenglin, Qu, Gang

    Published in IEEE transactions on computers (01-06-2023)
    “…NAND flash memory has become increasingly popular in various computing systems. Although NAND flash memory offers attractive performance, it suffers limited…”
    Get full text
    Journal Article
  10. 10

    Hardware-based anti-counterfeiting techniques for safeguarding supply chain integrity by Arafin, Md Tanvir, Stanley, Andrew, Sharma, Praveen

    “…Counterfeit integrated circuits (ICs) and systems have emerged as a menace to the supply chain of electronic goods and products. Simple physical inspection for…”
    Get full text
    Conference Proceeding
  11. 11

    Computation-in-Memory Accelerators for Secure Graph Database: Opportunities and Challenges by Arafin, Md Tanvir

    “…This work presents the challenges and opportunities for developing computing-in-memory (CIM) accelerators to support secure graph databases (GDB). First, we…”
    Get full text
    Conference Proceeding
  12. 12

    Hardware-Based Authentication for the Internet of Things by Arafin, Md Tanvir

    Published 01-01-2018
    “…Entity authentication is one of the most fundamental problems in computer security. Implementation of any authentication protocol requires the solution of…”
    Get full text
    Dissertation
  13. 13

    Attack Detection and Countermeasures for Autonomous Navigation by Arafin, Md Tanvir, Kornegay, Kevin

    “…Advances in artificial intelligence, machine learning, and robotics have profoundly impacted the field of autonomous navigation and driving. However, sensor…”
    Get full text
    Conference Proceeding
  14. 14

    RIME: A Scalable and Energy-Efficient Processing-In-Memory Architecture for Floating-Point Operations by Lu, Zhaojun, Arafin, Md Tanvir, Qu, Gang

    “…Processing in-memory (PIM) is an emerging technology poised to break the memory-wall in the conventional von Neumann architecture. PIM reduces data movement…”
    Get full text
    Conference Proceeding
  15. 15

    VOLtA: Voltage over-scaling based lightweight authentication for IoT applications by Arafin, Md Tanvir, Gao, Mingze, Qu, Gang

    “…Incorporating security protocols in IoT components is challenging due to their extremely constrained resources. We address this challenge by proposing a…”
    Get full text
    Conference Proceeding
  16. 16

    Securing Industrial Control Systems Using Physical Device Fingerprinting by Yimer, Tsion, Arafin, Md Tanvir, Kornegay, Kevin

    “…The advent of the Internet-of-Things (IoT) has introduced new connectivity modalities, communication protocols, and optimized architectures to coordinate…”
    Get full text
    Conference Proceeding
  17. 17

    MIDAS: Model Inversion Defenses Using an Approximate Memory System by Xu, Qian, Tanvir Arafin, Md, Qu, Gang

    “…Private data constitute a significant share of the training information for machine learning (ML) algorithms. Recent works on model inversion attacks (MIA)…”
    Get full text
    Conference Proceeding
  18. 18

    Cyber Threat Analysis and Trustworthy Artificial Intelligence by Wang, Shuangbao Paul, Arafin, Md Tanvir, Osuagwu, Onyema, Wandji, Ketchiozo

    “…Cyber threats can cause severe damage to computing infrastructure and systems as well as data breaches that make sensitive data vulnerable to attackers and…”
    Get full text
    Conference Proceeding
  19. 19

    Poster: Address Resolution Protocol Based Attacks for Multi-Robot Systems by Todorowski, Blake E, Fox, Michael Lane, Laing, Harris E, Gaddam, Kirthan, Mian, Anosh, Eagala, Rohit, Ferrari, Jair, Arafin, Md Tanvir

    “…Robot Operating System (ROS) is a popular open-source middleware that provides a standard robotic application development framework using…”
    Get full text
    Conference Proceeding
  20. 20

    Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks by Jain, Shalabh, Wang, Qian, Arafin, Md Tanvir, Guajardo, Jorge

    “…Efficient key management for automotive networks (CAN) is critical, governing the adoption of security in the next generation of vehicles. A recent promising…”
    Get full text
    Conference Proceeding