Skip to main content

Showing 1–9 of 9 results for author: Teodorescu, R

  1. arXiv:2208.00498  [pdf, other

    cs.CR cs.AR cs.LG

    DNNShield: Dynamic Randomized Model Sparsification, A Defense Against Adversarial Machine Learning

    Authors: Mohammad Hossein Samavatian, Saikat Majumdar, Kristin Barber, Radu Teodorescu

    Abstract: DNNs are known to be vulnerable to so-called adversarial attacks that manipulate inputs to cause incorrect results that can be beneficial to an attacker or damaging to the victim. Recent works have proposed approximate computation as a defense mechanism against machine learning attacks. We show that these approaches, while successful for a range of inputs, are insufficient to address stronger, hig… ▽ More

    Submitted 31 July, 2022; originally announced August 2022.

  2. Using Undervolting as an On-Device Defense Against Adversarial Machine Learning Attacks

    Authors: Saikat Majumdar, Mohammad Hossein Samavatian, Kristin Barber, Radu Teodorescu

    Abstract: Deep neural network (DNN) classifiers are powerful tools that drive a broad spectrum of important applications, from image recognition to autonomous vehicles. Unfortunately, DNNs are known to be vulnerable to adversarial attacks that affect virtually all state-of-the-art models. These attacks make small imperceptible modifications to inputs that are sufficient to induce the DNNs to produce the wro… ▽ More

    Submitted 6 August, 2021; v1 submitted 20 July, 2021; originally announced July 2021.

    Journal ref: 2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)

  3. arXiv:2106.05825  [pdf, other

    cs.CR cs.AR cs.LG

    HASI: Hardware-Accelerated Stochastic Inference, A Defense Against Adversarial Machine Learning Attacks

    Authors: Mohammad Hossein Samavatian, Saikat Majumdar, Kristin Barber, Radu Teodorescu

    Abstract: Deep Neural Networks (DNNs) are employed in an increasing number of applications, some of which are safety critical. Unfortunately, DNNs are known to be vulnerable to so-called adversarial attacks that manipulate inputs to cause incorrect results that can be beneficial to an attacker or damaging to the victim. Multiple defenses have been proposed to increase the robustness of DNNs. In general, the… ▽ More

    Submitted 6 August, 2021; v1 submitted 9 June, 2021; originally announced June 2021.

    Journal ref: Secure and Private Systems for Machine Learning Workshop 2021

  4. arXiv:1912.00329  [pdf, other

    cs.CR

    SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities

    Authors: Yuan Xiao, Yinqian Zhang, Radu Teodorescu

    Abstract: SPEculative Execution side Channel Hardware (SPEECH) Vulnerabilities have enabled the notorious Meltdown, Spectre, and L1 terminal fault (L1TF) attacks. While a number of studies have reported different variants of SPEECH vulnerabilities, they are still not well understood. This is primarily due to the lack of information about microprocessor implementation details that impact the timing and order… ▽ More

    Submitted 9 December, 2019; v1 submitted 1 December, 2019; originally announced December 2019.

  5. arXiv:1909.09638  [pdf, other

    cs.LG cs.DB stat.ML

    Accident Risk Prediction based on Heterogeneous Sparse Data: New Dataset and Insights

    Authors: Sobhan Moosavi, Mohammad Hossein Samavatian, Srinivasan Parthasarathy, Radu Teodorescu, Rajiv Ramnath

    Abstract: Reducing traffic accidents is an important public safety challenge, therefore, accident analysis and prediction has been a topic of much research over the past few decades. Using small-scale datasets with limited coverage, being dependent on extensive set of data, and being not applicable for real-time purposes are the important shortcomings of the existing studies. To address these challenges, we… ▽ More

    Submitted 19 September, 2019; originally announced September 2019.

    Comments: In Proceedings of the 27th ACM SIGSPATIAL, International Conference on Advances in Geographic Information Systems (2019). arXiv admin note: substantial text overlap with arXiv:1906.05409

  6. arXiv:1902.05786  [pdf, ps, other

    math.PR cs.IT

    Effective distribution of codewords for Low Density Parity Check Cycle codes in the presence of disorder

    Authors: Roshan Warman, Iuliana Teodorescu, Razvan Teodorescu

    Abstract: We review the zeta-function representation of codewords allowed by a parity-check code based on a bipartite graph, and then investigate the effect of disorder on the effective distribution of codewords. The randomness (or disorder) is implemented by sampling the graph from an ensemble of random graphs, and computing the average zeta function of the ensemble. In the limit of arbitrarily large size… ▽ More

    Submitted 15 February, 2019; originally announced February 2019.

    MSC Class: 60B05; 60B20

  7. arXiv:1812.07609  [pdf, other

    cs.NE cs.AR

    RNNFast: An Accelerator for Recurrent Neural Networks Using Domain Wall Memory

    Authors: Mohammad Hossein Samavatian, Anys Bacha, Li Zhou, Radu Teodorescu

    Abstract: Recurrent Neural Networks (RNNs) are an important class of neural networks designed to retain and incorporate context into current decisions. RNNs are particularly well suited for machine learning problems in which context is important, such as speech recognition and language translation. This work presents RNNFast, a hardware accelerator for RNNs that leverages an emerging class of non-volatile m… ▽ More

    Submitted 20 May, 2020; v1 submitted 7 November, 2018; originally announced December 2018.

    Comments: 26 pages

    Journal ref: JETC January 2020 Volume 1 26 pages

  8. arXiv:0811.4717  [pdf

    cs.IR cs.CL

    Prospective Study for Semantic Inter-Media Fusion in Content-Based Medical Image Retrieval

    Authors: Roxana Teodorescu, Daniel Racoceanu, Wee-Kheng Leow, Vladimir Cretu

    Abstract: One important challenge in modern Content-Based Medical Image Retrieval (CBMIR) approaches is represented by the semantic gap, related to the complexity of the medical knowledge. Among the methods that are able to close this gap in CBMIR, the use of medical thesauri/ontologies has interesting perspectives due to the possibility of accessing on-line updated relevant webservices and to extract rea… ▽ More

    Submitted 28 November, 2008; originally announced November 2008.

    Comments: 11 pages

    Report number: Onco-media Teodorescu 2008

  9. arXiv:0802.3950  [pdf, other

    cond-mat.stat-mech cs.AI cs.IT

    Belief Propagation and Loop Series on Planar Graphs

    Authors: Michael Chertkov, Vladimir Y. Chernyak, Razvan Teodorescu

    Abstract: We discuss a generic model of Bayesian inference with binary variables defined on edges of a planar graph. The Loop Calculus approach of [1, 2] is used to evaluate the resulting series expansion for the partition function. We show that, for planar graphs, truncating the series at single-connected loops reduces, via a map reminiscent of the Fisher transformation [3], to evaluating the partition f… ▽ More

    Submitted 11 April, 2008; v1 submitted 27 February, 2008; originally announced February 2008.

    Comments: Accepted for publication in Journal of Statistical Mechanics: theory and experiment

    Journal ref: J. Stat. Mech. (2008) P05003