no code implementations • 29 Jan 2024 • Souvika Sarkar, Mohammad Fakhruddin Babar, Monowar Hasan, Shubhra Kanti Karmaker
To address these issues, we introduce a concept of hierarchical, distributed LLM architecture that aims at enhancing the accessibility and deployability of LLMs across heterogeneous computing platforms, including general-purpose computers (e. g., laptops) and IoT-style devices (e. g., embedded systems).
2 code implementations • 23 Apr 2023 • Souvika Sarkar, Mohammad Fakhruddin Babar, Md Mahadi Hassan, Monowar Hasan, Shubhra Kanti Karmaker Santu
This paper presents a performance study of transformer language models under different hardware configurations and accuracy requirements and derives empirical observations about these resource/accuracy trade-offs.
no code implementations • 12 Mar 2020 • Monowar Hasan, Sibin Mohan, Takayuki Shimizu, HongSheng Lu
Modern vehicular wireless technology enables vehicles to exchange information at any time, from any place, to any network -- forms the vehicle-to-everything (V2X) communication platforms.
Networking and Internet Architecture Cryptography and Security
1 code implementation • 26 Aug 2019 • Monowar Hasan, Sibin Mohan
In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT) edge devices with timing requirements from control spoofing attacks where an adversary sends malicious control signals to the actuators.
Cryptography and Security Systems and Control Systems and Control
no code implementations • 4 Jun 2018 • Chien-Ying Chen, Monowar Hasan, AmirEmad Ghassami, Sibin Mohan, Negar Kiyavash
The deterministic (timing) behavior of real-time systems (RTS) can be used by adversaries - say, to launch side channel attacks or even destabilize the system by denying access to critical resources.
Cryptography and Security