Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems. Special Session

Archive ouverte : Communication dans un congrès

Dave, Shail | Marchisio, Alberto | Hanif, Muhammad Abdullah | Guesmi, Amira | Shrivastava, Aviral | Alouani, Ihsen | Shafique, Muhammad

Edité par HAL CCSD ; IEEE

International audience. The real-world use cases of Machine Learning (ML) have exploded over the past few years. However, the current computing infrastructure is insufficient to support all real-world applications and scenarios. Apart from high efficiency requirements, modern ML systems are expected to be highly reliable against hardware failures as well as secure against adversarial and IP stealing attacks. Privacy concerns are also becoming a first-order issue. This article summarizes the main challenges in agile development of efficient, reliable and secure ML systems, and then presents an outline of an agile design methodology to generate efficient, reliable and secure ML systems based on user-defined constraints and objectives.

Consulter en ligne

Suggestions

Du même auteur

Defensive approximation: securing CNNs using approximate computing

Archive ouverte: Communication dans un congrès

Guesmi, Amira | 2021-04-19

International audience. In the past few years, an increasing number of machine-learning and deep learning structures, such as Convolutional Neural Networks (CNNs), have been applied to solving a wide range of real-l...

SIT: Stochastic Input Transformation to Defend Against Adversarial Attacks ...

Archive ouverte: Article de revue

Guesmi, Amira | 2022-06

International audience. Deep Neural Networks (DNNs) have been deployed in a wide range of applications, including safety-critical domains, owing to their proven efficiency in solving complex problems. However, these...

ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints

Archive ouverte: Communication dans un congrès

Guesmi, Amira | 2022-07-18

International audience. Advances in deep-learning have enabled a wide range of promising applications. However, these systems are vulnerable to adversarial attacks; adversarially crafted pertur-bations to their inpu...

Du même sujet

Reading History of Science as a Physics and Mathematics Framework for Newto...

Archive ouverte: Communication dans un congrès

Pisano, Raffaele | 2017-04-19

International audience

On Mechanics and Thermodynamics Analogies in History of Physics-Mathematics...

Archive ouverte: Communication dans un congrès

Pisano, Raffaele | 2017-05-12

International audience

On the epistemic interplay between physics and mathematics such as a dynami...

Archive ouverte: Communication dans un congrès

Pisano, Raffaele | 2017-06-12

International audience

A CMOS Compatible Thermoelectric Device made of Crystalline Silicon Membran...

Archive ouverte: Article de revue

Bah, Thierno-Moussa | 2022-12-10

International audience. Herein, we report the use of nanostructured crystalline silicon as a thermoelectric material and its integration into thermoelectric devices. The proof-of-concept relies on the partial suppre...

Effet de l'angle de charge sur les harmoniques d'efforts magnétiques dans l...

Archive ouverte: Communication dans un congrès

Le Besnerais, Jean | 2016-06-07

International audience. Cet article étudie l'effet de l'angle de charge sur les efforts harmoniques de Maxwell (tangentiels et radiaux) et les bruits et vibrations d'origine magnétique dans deux machines synchrones ...

Further investigation of convolutional neural networks applied in computati...

Archive ouverte: Article de revue

Gong, Ruohan | 2022-04-07

International audience. Convolutional neural networks (CNN) have shown great potentials and have been proven to be an effective tool for some image-based deep learning tasks in the field of computational electromagn...

Chargement des enrichissements...