no code implementations • 18 Feb 2022 • Adewale Adeyemo, Travis Sandefur, Tolulope A. Odetola, Syed Rafay Hasan
We further propose a library-based approach to design scalable and dynamic distributed CNN inference on the fly leveraging partial-reconfiguration techniques, which is particularly suitable for resource-constrained edge devices.
no code implementations • 22 Sep 2021 • Adewale Adeyemo, Faiq Khalid, Tolulope A. Odetola, Syed Rafay Hasan
Similar to traditional CNNs, CapsNet is also vulnerable to several malicious attacks, as studied by several researchers in the literature.
no code implementations • 13 Jul 2021 • Hawzhin Mohammed, Tolulope A. Odetola, Nan Guo, Syed Rafay Hasan
In this paper, dynamic deployment of Convolutional Neural Network (CNN) architecture is proposed utilizing only IoT-level devices.
no code implementations • 16 Mar 2021 • Tolulope A. Odetola, Syed Rafay Hasan
Security of inference phase deployment of Convolutional neural network (CNN) into resource constrained embedded systems (e. g. low end FPGAs) is a growing research area.
no code implementations • 16 Jun 2020 • Hawzhin Mohammed, Tolulope A. Odetola, Syed Rafay Hasan
The deployment of CNN on resource-constrained edge devices have proved challenging.
no code implementations • 14 Nov 2019 • Tolulope A. Odetola, Katie M. Groves, Syed Rafay Hasan
To the best of our knowledge this is the first work that proposes a 2-Level 3-Way (2L-3W) hardware-software co-verification methodology and provides a step-by-step guide for the successful mapping, deployment and verification of DLA on FPGA boards.
no code implementations • 5 Nov 2019 • Tolulope A. Odetola, Ogheneuriri Oderhohwo, Syed Rafay Hasan
In this paper, we propose a methodology that solves this problem by extending the capability of existing multi-label classification and provide models with lower latency that requires smaller memory size when deployed on edge devices.
no code implementations • 2 Nov 2019 • Tolulope A. Odetola, Hawzhin Raoof Mohammed, Syed Rafay Hasan
In this paper, we introduce a hardware Trojan attack called Input Interception Attack (IIA).