SHF:Small:Collaborative Research:Software Hardware Architecture Co-design for Low-power Heterogeneous Edge Devices

项目来源

美国国家科学基金(NSF)

项目主持人

Yan Wang

项目受资助机构

TEMPLE UNIVERSITY

立项年度

2020

立项时间

未公开

项目编号

2000480

项目级别

国家级

研究期限

未知 / 未知

受资助金额

179999.00美元

学科

未公开

学科代码

未公开

基金类别

Standard Grant

关键词

Software&Hardware Foundation ; SMALL PROJECT ; COMPUTER ARCHITECTURE

参与者

未公开

参与机构

Temple University

项目标书摘要:The advancement of deep learning techniques,a sub-field of machine learning,is profoundly changing the field of mobile edge computing,thanks to recent research demonstrating that deep learning methods provide significant performance gains.However,the requirement of heavy computations and resources prevent deep learning methods from being widely deployed in mobile edge devices,such as smartphones and Internet of Things(IoT)devices.A significant advantage of enabling deep learning methods in mobile edge devices is that it can drastically reduce the response delay and energy consumption of mobile applications because the computations are executed locally.By removing the barrier that keeps deep learning techniques away from pervasive low-power mobile edge computing devices,this research enables high-accuracy,low-latency applications in future mobile edge computing.In particular,this research systematically investigates the fundamental and challenging issues targeting to significantly reduce the cost of deep learning inference process in mobile edge devices with guaranteed performance.The success of this project could significantly benefit the entire spectrum of deep learning across various research domains,including computer architecture,mobile sensing,cyber security,and human-computer interaction research areas.This project also aims to develop new curricula and encourage the participation of female engineering students.The primary goal of this research is to build a software accelerator that enables the broad deployment of heavy-cost deep learning models into resource-constrained,heterogeneous mobile edge devices(e.g.,low-cost sensing platforms and IoT devices).The basic idea is to develop deep-learning resource management algorithms that can adjust structures of different deep learning models according to hardware constraints of heterogeneous edge devices.More specifically,this research analyzes distinct deep learning behaviors on mobile edge devices and designs different strategies to improve the efficiency of multiple deep-learning-based inference models.Furthermore,this research develops algorithms that can adjust the complexity of different deep learning models to reduce their energy and memory consumption on mobile edge devices.In addition,this project designs power-centric resource reallocation algorithms to verify and deploy the mobile-friendly deep learning models.This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

  • 排序方式:
  • 2
  • /
  • 1.Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info via AR/VR Motion Sensors

    • 关键词:
    • Deep learning;Learning systems;Virtual reality;Augmented reality and virtual reality headset;Body fats;Information leakage;Motion sensors;Privacy Attacks;Rapid growth;Sensitive info;Sensitive informations;Virtual-reality headsets;Vital sign
    • Zhang, Tianfang;Ye, Zhengkun;Mahdad, Ahmed Tanvir;Akanda, Md Mojibur Rahman Redoy;Shi, Cong;Saxena, Nitesh;Wang, Yan;Chen, Yingying
    • 《2023 International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, MobiHoc 2023》
    • 2023年
    • October 23, 2023 - October 26, 2023
    • Washington, DC, United states
    • 会议

    Despite the rapid growth of augmented reality and virtual reality (AR/VR) in various applications, the understanding of information leakage through sensor-rich headsets remains in its infancy. In this poster, we investigate an unobtrusive privacy attack, which exposes users' vital signs and embedded sensitive information (e.g., gender, identity, body fat ratio), based on unrestricted AR/VR motion sensors. The key insight is that the headset is closely mounted on the user's face, allowing the motion sensors to detect facial vibrations produced by users' breathing and heartbeats. Specifically, we employ deep-learning techniques to reconstruct vital signs, achieving signal qualities comparable to dedicated medical instruments, as well as deriving users' gender, identity, and body fat information. Experiments on three types of commodity AR/VR headsets reveal that our attack can successfully reconstruct high-quality vital signs, detect gender (accuracy over 93.33%), re-identify users (accuracy over 97.83%), and derive body fat ratio (error less than 4.43%). © 2023 Owner/Author(s).

    ...
  • 2.Secure and Efficient Mobile DNN Using Trusted Execution Environments

    • 关键词:
    • Digital storage;Mobile security;Mobile telecommunication systems;Network security;Open source software;ARM TrustZone;Input datas;Machine-learning;Mobile applications;Network pruning;Neural network architecture;Security in machine learning;Stringents;TEE;Trusted execution environments
    • Hu, Bin;Wang, Yan;Cheng, Jerry;Zhao, Tianming;Xie, Yucheng;Guo, Xiaonan;Chen, Yingying
    • 《18th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2023》
    • 2023年
    • July 10, 2023 - July 14, 2023
    • Melbourne, VIC, Australia
    • 会议

    Many mobile applications have resorted to deep neural networks (DNNs) because of their strong inference capabilities. Since both input data and DNN architectures could be sensitive, there is an increasing demand for secure DNN execution on mobile devices. Towards this end, hardware-based trusted execution environments on mobile devices (mobile TEEs), such as ARM TrustZone, have recently been exploited to execute CNN securely. However, running entire DNNs on mobile TEEs is challenging as TEEs have stringent resource and performance constraints. In this work, we develop a novel mobile TEE-based security framework that can efficiently execute the entire DNN in a resource-constrained mobile TEE with minimal inference time overhead. Specifically, we propose a progressive pruning to gradually identify and remove the redundant neurons from a DNN while maintaining a high inference accuracy. Next, we develop a memory optimization method to deallocate the memory storage of the pruned neurons utilizing the low-level programming technique. Finally, we devise a novel adaptive partitioning method that divides the pruned model into multiple partitions according to the available memory in the mobile TEE and loads the partitions into the mobile TEE separately with a minimal loading time overhead. Our experiments with various DNNs and open-source datasets demonstrate that we can achieve 2-30 times less inference time with comparable accuracy compared to existing approaches securing entire DNNs with mobile TEE. © 2023 ACM.

    ...
  • 3.FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors

    • 关键词:
    • Adaptive filtering;Adaptive filters;Deep learning;Learning systems;Virtual reality;Websites;Augmented reality and virtual reality headset;Body fats;Market sizes;Motion sensors;Privacy Attacks;Rapid growth;Sensitive info;Virtual-reality headsets;Vital sign;Vital sign signals
    • Zhang, Tianfang;Shi, Cong;Ye, Zhengkun;Wang, Yan;Mahdad, Ahmed Tanvir;Saxena, Nitesh;Rahman, Md Mojibur;Akanda, Redoy;Chen, Yingying
    • 《30th ACM SIGSAC Conference on Computer and Communications Security, CCS 2023》
    • 2023年
    • November 26, 2023 - November 30, 2023
    • Copenhagen, Denmark
    • 会议

    The market size of augmented reality and virtual reality (AR/VR) has been expanding rapidly in recent years, with the use of face-mounted headsets extending beyond gaming to various application sectors, such as education, healthcare, and the military. Despite the rapid growth, the understanding of information leakage through sensor-rich headsets remains in its infancy. Some of the headset's built-in sensors do not require users' permission to access, and any apps and websites can acquire their readings. While these unrestricted sensors are generally considered free of privacy risks, we find that an adversary could uncover private information by scrutinizing sensor readings, making existing AR/VR apps and websites potential eavesdroppers. In this work, we investigate a novel, unobtrusive privacy attack called FaceReader, which reconstructs high-quality vital sign signals (breathing and heartbeat patterns) based on unrestricted AR/VR motion sensors. FaceReader is built on the key insight that the headset is closely mounted on the user's face, allowing the motion sensors to detect subtle facial vibrations produced by users' breathing and heartbeats. Based on the reconstructed vital signs, we further investigate three more advanced attacks, including gender recognition, user re-identification, and body fat ratio estimation. Such attacks pose severe privacy concerns, as an adversary may obtain users' sensitive demographic/physiological traits and potentially uncover their real-world identities. Compared to prior privacy attacks relying on speeches and activities, FaceReader targets spontaneous breathing and heartbeat activities that are naturally produced by the human body and are unobtrusive to victims. In particular, we design an adaptive filter to dynamically mitigate the impacts of body motions. We further employ advanced deep-learning techniques to reconstruct vital sign signals, achieving signal qualities comparable to those of dedicated medical instruments, as well as deriving sensitive gender, identity, and body fat information. We conduct extensive experiments involving 35 users on three types of mainstream AR/VR headsets across 3 months. The results reveal that FaceReader can reconstruct vital signs with low mean errors and accurately detect gender (over 93.33%). The attack can also link/re-identify users across different apps, websites, and longitudinal sessions with over 97.83% accuracy. Furthermore, we present the first successful attempt at revealing body fat information from motion sensor data, achieving a remarkably low estimation error of 4.43%. © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM.

    ...
  • 4.Passive Vital Sign Monitoring via Facial Vibrations Leveraging AR/VR Headsets

    • 关键词:
    • Adaptive filtering;Adaptive filters;Biomedical signal processing;Deep learning;mHealth;Patient monitoring;Signal reconstruction;Augmented reality/virtual reality headset;Breathing rate;Facial vibration;Health monitoring;Personal identity;Signals reconstruction;Virtual reality devices;Virtual-reality headsets;Vital sign;Vital sign signals
    • Zhang, Tianfang;Shi, Cong;Walker, Payton;Ye, Zhengkun;Wang, Yan;Saxena, Nitesh;Chen, Yingying
    • 《21st Annual International Conference on Mobile Systems, Applications and Services, MobiSys 2023》
    • 2023年
    • June 18, 2023 - June 22, 2023
    • Helsinki, Finland
    • 会议

    Vital signs (e.g., breathing and heart rates) and personal identities are essential information for personalized medicine and healthcare. The popularity of augmented reality/virtual reality (AR/VR) provides an excellent opportunity for enabling long-term health monitoring in a broad range of scenarios, including virtual entertainment, education, and telemedicine. However, commercial-off-the-shelf AR/VR devices do not have dedicated biosensors for providing vital signs and personal identities. In this work, we propose a novel framework that can generate fine-grained vital sign signals and other personalized health information of an AR/VR user through passive sensing on AR/VR devices. In particular, we find that the user's minute facial vibrations induced by breathing and heart beating can impact the readily available motion sensors on AR/VR headsets, which encode rich vital sign patterns and unique biometrics. The proposed framework further estimates the breathing and heartbeat rates, detects the gender and identity, and derives the body fat percentage of the user. To mitigate the impacts of body movement, we design an adaptive filtering scheme to cancel the spontaneous and non-spontaneous motion artifacts. We also develop unique facial vibration features and deep learning techniques to facilitate vital sign signal reconstruction and user identification. Extensive experiments demonstrate that our framework can achieve a low error of vital sign signal reconstruction and rate measurement, along with 95.51% and 93.33% accuracy on identity and gender recognition. © 2023 Owner/Author(s).

    ...
  • 5.Universal Targeted Adversarial Attacks Against mmWave-based Human Activity Recognition

    • 关键词:
    • Distillation;Generative adversarial networks;Iterative methods;Pattern recognition;Adversarial learning;Black boxes;Black-box attack;Human activity recognition;Human activity recognition systems;Millimeter-wave technology;Privacy protection;Recognition models;Sensor resolution;Universal targeted attack
    • Xie, Yucheng;Jiang, Ruizhe;Guo, Xiaonan;Wang, Yan;Cheng, Jerry;Chen, Yingying
    • 《42nd IEEE International Conference on Computer Communications, INFOCOM 2023》
    • 2023年
    • May 17, 2023 - May 20, 2023
    • Hybrid, New York City, NY, United states
    • 会议

    Human activity recognition (HAR) systems based on millimeter wave (mmWave) technology have evolved in recent years due to their better privacy protection and enhanced sensor resolution. With the ever-growing HAR system deployment, the vulnerability of such systems has been revealed. However, existing efforts in HAR adversarial attacks only focus on untargeted attacks. In this paper, we propose the first targeted adversarial attacks against mmWave-based HAR through designed universal perturbation. A practical iteration algorithm is developed to craft perturbations that generalize well across different activity samples without additional training overhead. Different from existing work that only develops adversarial attacks for a particular mmWave-based HAR model, we improve the practicability of our attacks by broadening our target to the two most common mmWave-based HAR models (i.e., voxel-based and heatmap-based). In addition, we consider a more challenging black-box scenario by addressing the information deficiency issue with knowledge distillation and solving the insufficient activity sample with a generative adversarial network. We evaluate the proposed attacks on two different mmWave-based HAR models designed for fitness tracking. The evaluation results demonstrate the efficacy, efficiency, and practicality of the proposed targeted attacks with an average success rate of over 90%. © 2023 IEEE.

    ...
  • 6.Stealthy Backdoor Attack on RF Signal Classification

    • 关键词:
    • Classification (of information);Deep learning;Backdoors;Communications security;Deep learning security;Key technologies;Radio-frequency backdoor attack;Radiofrequencies;Radiofrequency signals;Signal classification;Wireless communication security;Wireless communications
    • Zhao, Tianming;Tang, Zijie;Zhang, Tianfang;Phan, Huy;Wang, Yan;Shi, Cong;Yuan, Bo;Chen, Yingying
    • 《32nd International Conference on Computer Communications and Networks, ICCCN 2023》
    • 2023年
    • July 24, 2023 - July 27, 2023
    • Honolulu, HI, United states
    • 会议

    Recently, deep learning (DL) has become one of the key technologies supporting radio frequency (RF) signal classification applications. Given the heavy DL training requirement, adopting outsourced training is a practical option for RF application developers. However, the outsourcing process exposes a security vulnerability that enables a backdoor attack. While backdoor attacks have been explored in the computer vision domain, it is rarely explored in the RF domain. In this work, we present a stealthy backdoor attack that targets DL-based RF signal classification. To realize such an attack, we extensively explore the characteristics of the RF data in different applications, which include RF modulation classification and RF fingerprint-based device identification. Particularly, we design a training-based backdoor trigger generation approach with an optimization procedure that not only accommodates dynamic application inputs but also is stealthy to RF receivers. Extensive experiments on two RF signal classification datasets show that the average attack success rate of our backdoor attack is over 99.2%, while its classification accuracy for the clean data remains high (i.e., less than a 0.6% drop compared to the clean model). Additionally, we demonstrate that our attack can bypass existing defense strategies, such as Neural Cleanse and STRIP. © 2023 IEEE.

    ...
  • 7.RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN

    • 关键词:
    • Efficiency ; Network security ; Neural network models;Analysis and explorations ; Backdoor attack ; Backdoors ; Learn+ ; Model efficiency ; Model security ; Modeling parameters ; Neural network model ; Systematic analysis ; Systematic exploration
    • PhanHuy;ShiCong;XieYi;ZhangTianfang;LiZhuohang;ZhaoTianming;LiuJian;WangYan;ChenYingying;YuanBo
    • 《17th European Conference on Computer Vision, ECCV 2022》
    • 2022年
    • October 23, 2022 - October 27, 2022
    • Tel Aviv, Israel
    • 会议

    Recently backdoor attack has become an emerging threat to the security of deep neural network (DNN) models. To date, most of the existing studies focus on backdoor attack against the uncompressed model; while the vulnerability of compressed DNNs, which are widely used in the practical applications, is little exploited yet. In this paper, we propose to study and develop Robust and Imperceptible Backdoor Attack against Compact DNN models (RIBAC). By performing systematic analysis and exploration on the important design knobs, we propose a framework that can learn the proper trigger patterns, model parameters and pruning masks in an efficient way. Thereby achieving high trigger stealthiness, high attack success rate and high model efficiency simultaneously. Extensive evaluations across different datasets, including the test against the state-of-the-art defense mechanisms, demonstrate the high robustness, stealthiness and model efficiency of RIBAC. Code is available at https://github.com/huyvnphan/ECCV2022-RIBAC. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.

    ...
  • 8.Audio-domain position-independent backdoor attack via unnoticeable triggers

    • 关键词:
    • Deep learning ; Speech recognition;Audio;domain backdoor attack ; Backdoors ; Learning models ; Over the airs ; Over;the;air physical attack ; Physical attacks ; Position;independent attack ; Temporal position ; Training phasis ; Voice user interface
    • ShiCong;ZhangTianfang;LiZhuohang;PhanHuy;ZhaoTianming;WangYan;LiuJian;YuanBo;ChenYingying
    • 《28th ACM Annual International Conference on Mobile Computing and Networking, MobiCom 2022》
    • 2022年
    • October 17, 2202 - October 21, 2202
    • Sydney, NSW, Australia
    • 会议

    Deep learning models have become key enablers of voice user interfaces. With the growing trend of adopting outsourced training of these models, backdoor attacks, stealthy yet effective training-phase attacks, have gained increasing attention. They inject hidden trigger patterns through training set poisoning and overwrite the model's predictions in the inference phase. Research in backdoor attacks has been focusing on image classification tasks, while there have been few studies in the audio domain. In this work, we explore the severity of audio-domain backdoor attacks and demonstrate their feasibility under practical scenarios of voice user interfaces, where an adversary injects (plays) an unnoticeable audio trigger into live speech to launch the attack. To realize such attacks, we consider jointly optimizing the audio trigger and the target model in the training phase, deriving a position-independent, unnoticeable, and robust audio trigger. We design new data poisoning techniques and penalty-based algorithms that inject the trigger into randomly generated temporal positions in the audio input during training, rendering the trigger resilient to any temporal position variations. We further design an environmental sound mimicking technique to make the trigger resemble unnoticeable situational sounds and simulate played over-The-Air distortions to improve the trigger's robustness during the joint optimization process. Extensive experiments on two important applications (i.e., speech command recognition and speaker recognition) demonstrate that our attack can achieve an average success rate of over 99% under both digital and physical attack settings. © 2022 ACM.

    ...
  • 9.BioTag: Robust RFID-based Continuous User Verification Using Physiological Features from Respiration

    • 关键词:
    • Authentication ; Physiology ; Radio frequency identification (RFID);Continue verification ; Entry point ; Low;costs ; Physiological features ; Radio;frequency;identification ; Respiratory pattern ; User verification ; Verification method ; Verification systems ; Vital sign
    • HuBin;ZhaoTianming;WangYan;ChengJerry;HowardRichard;ChenYingying;WanHao
    • 《23rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2022》
    • 2022年
    • October 17, 2022 - October 20, 2022
    • Seoul, Korea, Republic of
    • 会议

    For decades, one-time verification has been the standard for user verification at entry points, office rooms, etc. However, such approaches request users to provide their secrets (e.g., entering passwords and collecting fingerprints) and re-verify (e.g., screen shutdown) manually. Thus, they cannot confirm whether the user is a legitimate or an imposter after verification, which raises the urgent demand for a more convenient and secure solution to perform continuous user verification. However, existing continuous verification methods heavily rely on users' active participation, which is inconvenient. Toward this end, we propose a continuous user verification system, BioTag, which utilizes the low-cost radio frequency identification (RFID) technology to capture unique physiological characteristics rooted in the users' respiration motions for continuous user verification. Specifically, we use two RFID tags attached to a user's chest and abdomen to capture the user's intrinsic respiratory patterns via RFID signals. We develop respiratory feature extraction methods based on waveform morphology analysis and fuzzy wavelet transformation (FWPT) to derive unique biometric information from the user's respiration signals. Furthermore, we develop an adaptive classifier using the gradient boosting decision tree (GBDT) to identify legitimate users and attackers accurately. Extensive experiments involving 41 participants demonstrate that BioTag can robustly authenticate users and detect various types of adversaries with low training effort. In particular, our system can achieve over 95.2% and 94.8% verification accuracy on random attack and imitation attack scenarios, respectively. © 2022 ACM.

    ...
  • 10.mmFit: Low-Effort Personalized Fitness Monitoring Using Millimeter Wave

    • 关键词:
    • Generative adversarial networks;Health;Millimeter waves;Personnel training;Camera-based;Domain adaptation;Domain adaptation training;Fitness monitoring;Mm waves;Mmwave sensing;Monitoring system;Privacy concerns;RF signal;User identification
    • Xie, Yucheng;Jiang, Ruizhe;Guo, Xiaonan;Wang, Yan;Cheng, Jerry;Chen, Yingying
    • 《31st International Conference on Computer Communications and Networks, ICCCN 2022》
    • 2022年
    • July 25, 2022 - July 27, 2022
    • Virtual, Online, United states
    • 会议

    There is a growing trend for people to perform work-outs at home due to the global pandemic of COVID-19 and the stay-at-home policy of many countries. Since a self-designed fitness plan often lacks professional guidance to achieve ideal outcomes, it is important to have an in-home fitness monitoring system that can track the exercise process of users. Traditional camera-based fitness monitoring may raise serious privacy concerns, while sensor-based methods require users to wear dedicated devices. Recently, researchers propose to utilize RF signals to enable non-intrusive fitness monitoring, but these approaches all require huge training efforts from users to achieve a satisfactory performance, especially when the system is used by multiple users (e.g., family members). In this work, we design and implement a fitness monitoring system using a single COTS mm Wave device. The proposed system integrates workout recognition, user identification, multi-user monitoring, and training effort reduction modules and makes them work together in a single system. In particular, we develop a domain adaptation framework to reduce the amount of training data collected from different domains via mitigating impacts caused by domain characteristics embedded in mm Wave signals. We also develop a GAN-assisted method to achieve better user identification and workout recognition when only limited training data from the same domain is available. We propose a unique spatialtemporal heatmap feature to achieve personalized workout recognition and develop a clustering-based method for concurrent workout monitoring. Extensive experiments with 14 typical workouts involving 11 participants demonstrate that our system can achieve 97% average workout recognition accuracy and 91% user identification accuracy. © 2022 IEEE.

    ...
  • 排序方式:
  • 2
  • /