Alert button
Picture for Faiq Khalid

Faiq Khalid

Alert button

Security Analysis of Capsule Network Inference using Horizontal Collaboration

Add code
Bookmark button
Alert button
Sep 22, 2021
Adewale Adeyemo, Faiq Khalid, Tolulope A. Odetola, Syed Rafay Hasan

Figure 1 for Security Analysis of Capsule Network Inference using Horizontal Collaboration
Figure 2 for Security Analysis of Capsule Network Inference using Horizontal Collaboration
Figure 3 for Security Analysis of Capsule Network Inference using Horizontal Collaboration
Figure 4 for Security Analysis of Capsule Network Inference using Horizontal Collaboration
Viaarxiv icon

FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack

Add code
Bookmark button
Alert button
Jun 13, 2021
Tolulope Odetola, Faiq Khalid, Travis Sandefur, Hawzhin Mohammed, Syed Rafay Hasan

Figure 1 for FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack
Figure 2 for FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack
Figure 3 for FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack
Figure 4 for FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack
Viaarxiv icon

Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks

Add code
Bookmark button
Alert button
May 05, 2021
Faiq Khalid, Muhammad Abdullah Hanif, Muhammad Shafique

Figure 1 for Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks
Figure 2 for Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks
Figure 3 for Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks
Figure 4 for Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks
Viaarxiv icon

MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices

Add code
Bookmark button
Alert button
Nov 21, 2020
Faiq Khalid, Syed Rafay Hasan, Sara Zia, Osman Hasan, Falah Awwad, Muhammad Shafique

Figure 1 for MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices
Figure 2 for MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices
Figure 3 for MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices
Figure 4 for MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices
Viaarxiv icon

FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks

Add code
Bookmark button
Alert button
Dec 03, 2019
Mahum Naseer, Mishal Fatima Minhas, Faiq Khalid, Muhammad Abdullah Hanif, Osman Hasan, Muhammad Shafique

Figure 1 for FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks
Figure 2 for FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks
Figure 3 for FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks
Figure 4 for FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks
Viaarxiv icon

SNN under Attack: are Spiking Deep Belief Networks vulnerable to Adversarial Examples?

Add code
Bookmark button
Alert button
Feb 04, 2019
Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique

Figure 1 for SNN under Attack: are Spiking Deep Belief Networks vulnerable to Adversarial Examples?
Figure 2 for SNN under Attack: are Spiking Deep Belief Networks vulnerable to Adversarial Examples?
Figure 3 for SNN under Attack: are Spiking Deep Belief Networks vulnerable to Adversarial Examples?
Figure 4 for SNN under Attack: are Spiking Deep Belief Networks vulnerable to Adversarial Examples?
Viaarxiv icon

RED-Attack: Resource Efficient Decision based Attack for Machine Learning

Add code
Bookmark button
Alert button
Jan 30, 2019
Faiq Khalid, Hassan Ali, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

Figure 1 for RED-Attack: Resource Efficient Decision based Attack for Machine Learning
Figure 2 for RED-Attack: Resource Efficient Decision based Attack for Machine Learning
Figure 3 for RED-Attack: Resource Efficient Decision based Attack for Machine Learning
Figure 4 for RED-Attack: Resource Efficient Decision based Attack for Machine Learning
Viaarxiv icon

CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks

Add code
Bookmark button
Alert button
Jan 28, 2019
Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique

Figure 1 for CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks
Figure 2 for CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks
Figure 3 for CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks
Figure 4 for CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks
Viaarxiv icon

A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems

Add code
Bookmark button
Alert button
Nov 06, 2018
Denise Ratasich, Faiq Khalid, Florian Geissler, Radu Grosu, Muhammad Shafique, Ezio Bartocci

Figure 1 for A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems
Figure 2 for A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems
Figure 3 for A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems
Figure 4 for A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems
Viaarxiv icon