A
Ahmad Al Badawi
Publications - 5
Citations - 43
Ahmad Al Badawi is an academic researcher. The author has contributed to research in topics: Computer science & Geology. The author has an hindex of 2, co-authored 5 publications receiving 43 citations.
Papers
More filters
Journal ArticleDOI
Boost‐Defence for resilient IoT networks: A head‐to‐toe approach
TL;DR: In this article , the AdaBoost machine learning technique combined with decision trees and extensive data engineering techniques was employed to construct a robust classifier for detecting and classifying several cyber-attacks in IoT networks.
Journal ArticleDOI
High-performance intrusion detection system for networked UAVs via deep learning
Proceedings ArticleDOI
RPU: The Ring Processing Unit
Deepraj Soni,Negar Neda,Naifeng Zhang,Benedict J. Reynwar,Homer Gamil,Benjamin C. Heyman,Mohammed Nabeel,Ahmad Al Badawi,Yuriy Polyakov,Massoud Pedram,Michail Maniatakos,David Bruce Cousins,Franz Franchetti,Matthew French,B. Schmidt,Brandon Reagen +15 more
TL;DR: In this paper , the ring processing unit (RPU) is proposed to accelerate ring-based computations of homomorphic encryption and post-quantum cryptography using vector Instruction Set Architecture (ISA) and micro-architecture.
Journal Article
Demystifying Bootstrapping in Fully Homomorphic Encryption
TL;DR: In this article , the authors propose a solution to solve the problem of the problem: this article ] of "uniformity" and "uncertainty" of the solution.
Journal ArticleDOI
TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation
David Bruce Cousins,Yuriy Polyakov,Ahmad Al Badawi,Matthew French,B. Schmidt,Ajey P. Jacob,Benedict J. Reynwar,Akhilesh Jaiswal,Clynn Mathew,Homer Gamil,Negar Neda,Deepraj Soni,Michail Maniatakos,Brandon Reagen,Naifeng Zhang,Franz Franchetti,Patrick Brinich,Michael Franusich,B. Y. Zhang,Zeming Cheng,Massoud Pedram +20 more
TL;DR: TREBUCHET as discussed by the authors is a tile-based chip with highly parallel ALUs optimized for vectorized 128b modulo arithmetic for fully homomorphic encryption (FHE).