skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Khreishah, Abdallah"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. In this paper, we propose IMA-GNN as an In-Memory Accelerator for centralized and decentralized Graph Neural Network inference, explore its potential in both settings and provide a guideline for the community targeting flexible and efficient edge computation. Leveraging IMA-GNN, we first model the computation and communication latencies of edge devices. We then present practical case studies on GNN-based taxi demand and supply prediction and also adopt four large graph datasets to quantitatively compare and analyze centralized and decentralized settings. Our cross-layer simulation results demonstrate that on average, IMA-GNN in the centralized setting can obtain ~790x communication speed-up compared to the decentralized GNN setting. However, the decentralized setting performs computation ~1400x faster while reducing the power consumption per device. This further underlines the need for a hybrid semi-decentralized GNN approach. 
    more » « less
  2. Retroreflective visible light communication and positioning (R-VLCP) is a novel ultra-low-power Internet-of-Things (IoT) technology leveraging indoor light infrastructures. Compared to traditional VLCP, R-VLCP offers several additional favorable features including self-alignment, low-size, weight, and power (SWaP), glaring-free, and sniff-proof. In analogy to RFID, R-VLCP employs a microwatt optical modulator (e.g., LCD shutter) to manipulate the intensity of the reflected light from a corner-cube retroreflector (CCR) to the photodiodes (PDs) mounted on a light source. In our previous works, we derived a closed-form expression for the retroreflection channel model, assuming that the PD is much smaller than the CCR in geometric analysis. In this paper, we generalize the channel model to arbitrary size of PD and CCR. The received optical power is fully characterized relative to the sizes of PD and CCR, and the 3D location of CCR. We also develop a custom and open-source ray tracing simulator – RetroRay, and use it to validate the channel model. Performance evaluation of area spectral efficiency and horizontal location error is carried out based on the channel model validated by RetroRay. The results reveal that increasing the size of PD and the density of CCRs improves communication and positioning performance with diminishing returns. 
    more » « less
  3. Many real-world applications require real-time and robust positioning of Internet of Things (IoT) devices. In this context, visible light communication (VLC) is a promising approach due to its advantages in terms of high accuracy, low cost, ubiquitous infrastructure, and freedom from RF interference. Nevertheless, there is a growing need to improve positioning speed and accuracy. In this paper, we propose and prototype a VLC-based positioning solution using retroreflectors attached to the IoT device of interest. The proposed algorithm uses the retroreflected power received by multiple photodiodes to estimate the euclidean and directional coordinates of the underlying IoT device. In particular, the relative relationship between reflected light magnitude and reflected power is used as input to trainable machine learning regression models. Such models are trained to estimate the coordinates. The proposed algorithm excels in its simplicity and fast computation. It also reduces the need for sensory devices and active operation. Additionally, after regression, Kalman filtering is applied as a post-processing operation to further stabilize the obtained estimates. The proposed algorithm is shown to provide stable, accurate, and fast. This has been verified by extensive experiments performed on a prototype in real-world environments. Experiments confirm a high level of positioning accuracy and the added benefit of Kalman filtering stabilization. 
    more » « less
  4. Convolutional Neural Networks (CNNs) are widely used due to their effectiveness in various AI applications such as object recognition, speech processing, etc., where the multiply-and-accumulate (MAC) operation contributes to ∼95% of the computation time. From the hardware implementation perspective, the performance of current CMOS-based MAC accelerators is limited mainly due to their von-Neumann architecture and corresponding limited memory bandwidth. In this way, silicon photonics has been recently explored as a promising solution for accelerator design to improve the speed and power-efficiency of the designs as opposed to electronic memristive crossbars. In this work, we briefly study recent silicon photonics accelerators and take initial steps to develop an open-source and adaptive crossbar architecture simulator for that. Keeping the original functionality of the MNSIM tool [1], we add a new photonic mode that utilizes the pre-existing algorithm to work with a photonic Phase Change Memory (pPCM) based crossbar structure. With inputs from the CNN's topology, the accelerator configuration, and experimentally-benchmarked data, the presented simulator can report the optimal crossbar size, the number of crossbars needed, and the estimation of total area, power, and latency. 
    more » « less
  5. The pervasiveness of neural networks (NNs) in critical computer vision and image processing applications makes them very attractive for adversarial manipulation. A large body of existing research thoroughly investigates two broad categories of attacks targeting the integrity of NN models. The first category of attacks, commonly called Adversarial Examples, perturbs the model's inference by carefully adding noise into input examples. In the second category of attacks, adversaries try to manipulate the model during the training process by implanting Trojan backdoors. Researchers show that such attacks pose severe threats to the growing applications of NNs and propose several defenses against each attack type individually. However, such one-sided defense approaches leave potentially unknown risks in real-world scenarios when an adversary can unify different attacks to create new and more lethal ones bypassing existing defenses. In this work, we show how to jointly exploit adversarial perturbation and model poisoning vulnerabilities to practically launch a new stealthy attack, dubbed AdvTrojan. AdvTrojan is stealthy because it can be activated only when: 1) a carefully crafted adversarial perturbation is injected into the input examples during inference, and 2) a Trojan backdoor is implanted during the training process of the model. We leverage adversarial noise in the input space to move Trojan-infected examples across the model decision boundary, making it difficult to detect. The stealthiness behavior of AdvTrojan fools the users into accidentally trusting the infected model as a robust classifier against adversarial examples. AdvTrojan can be implemented by only poisoning the training data similar to conventional Trojan backdoor attacks. Our thorough analysis and extensive experiments on several benchmark datasets show that AdvTrojan can bypass existing defenses with a success rate close to 100% in most of our experimental scenarios and can be extended to attack federated learning as well as high-resolution images. 
    more » « less