Skip to main content

Showing 1–7 of 7 results for author: Nazzal, M

Searching in archive cs. Search in all archives.
.
  1. Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code

    Authors: Khiem Ton, Nhi Nguyen, Mahmoud Nazzal, Abdallah Khreishah, Cristian Borcea, NhatHai Phan, Ruoming Jin, Issa Khalil, Yelong Shen

    Abstract: This paper introduces SGCode, a flexible prompt-optimizing system to generate secure code with large language models (LLMs). SGCode integrates recent prompt-optimization approaches with LLMs in a unified system accessible through front-end and back-end APIs, enabling users to 1) generate secure code, which is free of vulnerabilities, 2) review and share security analysis, and 3) easily switch from… ▽ More

    Submitted 15 September, 2024; v1 submitted 11 September, 2024; originally announced September 2024.

  2. arXiv:2404.10875  [pdf, other

    cs.AR

    SA-DS: A Dataset for Large Language Model-Driven AI Accelerator Design Generation

    Authors: Deepak Vungarala, Mahmoud Nazzal, Mehrdad Morsali, Chao Zhang, Arnob Ghosh, Abdallah Khreishah, Shaahin Angizi

    Abstract: In the ever-evolving landscape of Deep Neural Networks (DNN) hardware acceleration, unlocking the true potential of systolic array accelerators has long been hindered by the daunting challenges of expertise and time investment. Large Language Models (LLMs) offer a promising solution for automating code generation which is key to unlocking unprecedented efficiency and performance in various domains… ▽ More

    Submitted 17 July, 2024; v1 submitted 16 April, 2024; originally announced April 2024.

    Comments: 4 pages, 5 Figures

  3. arXiv:2310.06855  [pdf, other

    cs.CR cs.AI cs.LG

    Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification

    Authors: Mahmoud Nazzal, Nura Aljaafari, Ahmed Sawalmeh, Abdallah Khreishah, Muhammad Anan, Abdulelah Algosaibi, Mohammed Alnaeem, Adel Aldalbahi, Abdulaziz Alhumam, Conrado P. Vizcarra, Shadan Alhamed

    Abstract: Federated learning enables multiple clients to collaboratively contribute to the learning of a global model orchestrated by a central server. This learning scheme promotes clients' data privacy and requires reduced communication overheads. In an application like network traffic classification, this helps hide the network vulnerabilities and weakness points. However, federated learning is susceptib… ▽ More

    Submitted 27 September, 2023; originally announced October 2023.

  4. arXiv:2308.11754  [pdf, other

    cs.CR cs.AI

    Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection

    Authors: Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma

    Abstract: Malicious domain detection (MDD) is an open security challenge that aims to detect if an Internet domain is associated with cyber-attacks. Among many approaches to this problem, graph neural networks (GNNs) are deemed highly effective. GNN-based MDD uses DNS logs to represent Internet domains as nodes in a maliciousness graph (DMG) and trains a GNN to infer their maliciousness by leveraging identi… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

    Comments: To Appear in the 45th IEEE Symposium on Security and Privacy (IEEE S\&P 2024), May 20-23, 2024

  5. arXiv:2303.14162  [pdf, other

    cs.AR

    IMA-GNN: In-Memory Acceleration of Centralized and Decentralized Graph Neural Networks at the Edge

    Authors: Mehrdad Morsali, Mahmoud Nazzal, Abdallah Khreishah, Shaahin Angizi

    Abstract: In this paper, we propose IMA-GNN as an In-Memory Accelerator for centralized and decentralized Graph Neural Network inference, explore its potential in both settings and provide a guideline for the community targeting flexible and efficient edge computation. Leveraging IMA-GNN, we first model the computation and communication latencies of edge devices. We then present practical case studies on GN… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: 6 pages, 8 Figures, 2 Tables

  6. arXiv:2303.00524  [pdf, other

    cs.LG cs.AI

    Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach

    Authors: Mahmoud Nazzal, Abdallah Khreishah, Joyoung Lee, Shaahin Angizi, Ala Al-Fuqaha, Mohsen Guizani

    Abstract: Prediction of taxi service demand and supply is essential for improving customer's experience and provider's profit. Recently, graph neural networks (GNNs) have been shown promising for this application. This approach models city regions as nodes in a transportation graph and their relations as edges. GNNs utilize local node features and the graph structure in the prediction. However, more efficie… ▽ More

    Submitted 6 April, 2023; v1 submitted 27 February, 2023; originally announced March 2023.

    Comments: 13 pages, 10 figures, LaTeX; typos corrected, references added, mathematical analysis added

  7. arXiv:2110.13980  [pdf, other

    cs.CL

    Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions

    Authors: Izzat Alsmadi, Kashif Ahmad, Mahmoud Nazzal, Firoj Alam, Ala Al-Fuqaha, Abdallah Khreishah, Abdulelah Algosaibi

    Abstract: The growing use of social media has led to the development of several Machine Learning (ML) and Natural Language Processing(NLP) tools to process the unprecedented amount of social media content to make actionable decisions. However, these MLand NLP algorithms have been widely shown to be vulnerable to adversarial attacks. These vulnerabilities allow adversaries to launch a diversified set of adve… ▽ More

    Submitted 26 October, 2021; originally announced October 2021.

    Comments: 21 pages, 6 figures, 10 tables