CSC 801 (002) | Fall 2023

Systems Seminar

 

Schedule and Details

Date/Time Location Speaker Note
Friday, Aug 25, 12:00 PM EB2 3211 All Systems Faculty Coordination
Friday, Sept 1, 12:00 PM EB2 3211 Wujie Wen -
Friday, Sept 8, 12:00 PM EB2 3211 Chenhan Xu -
Friday, Sept 15, 12:00 PM EB2 3211 Hsin-Hsuan Sung ATC'23 paper
Friday, Sept 22, 11:30 PM EB2 3211 Mohammad Ashiqur Rahman External, FIU
Friday, Sept 29, 12:00 PM EB2 3211 Fogo Tunde-Onadele
Friday, Oct 6, 12:00 PM EB2 3211 Kurt Wilson DAC'22, RTAS'23
Thursday, Oct 19, 3:30 PM EB2 3211 Peifei Su External, UC Merced
Friday, Oct 20, 12:00 PM EB2 3211 Wenqian Dong External, FIU
Fall Break -
Friday, Nov 3, 12:00 PM EB2 3300 Eason Li ICIST'23
Friday, Nov 10, 12:00 PM EB2 3211 Abdullah Al Arafat RTSS'23
Friday, Nov 17, 12:00 PM EB2 3211 Xiaorui Liu
Thanksgiving Break -
Wednesday, Nov 29, 12:00 PM EB2 3211 Huining Li External, U Buffalo
Friday, Dec 1, 12:00 PM EB2 3211 Dong Li External, U Mass

More Details

Sept 1, Fri, 12:00 PM at EB2 3211 (CPS Lunch)

Title: A New Paradigm of Accelerating Privacy Preserving Machine Learning as A Service
Speaker: Wujie Wen
Abstract: Fueled by data proliferation and machine learning advancement, intelligence is becoming a household brand from cloud to edge, transforming every walk of life. While enticing, current smart data services, especially machine learning as a service (MLaaS) on cloud, face ever-increasing privacy concerns. For example, protecting the confidentiality of clients’ data is crucial for sensitive applications such as healthcare and financial analysis. Unfortunately, achieving privacy comes at the cost of prohibitively high inference latency or significantly downgraded accuracy. In this talk, I will discuss our recent progress on achieving and accelerating privacy-preserving machine learning inference. The talk starts with “CryptoGCN”-the very first endeavor to facilitate and accelerate Homomorphic Encryption (HE)-based private graph convolutional neural network (GCN) inference, followed by “SpENCNN”-a HE-based fast convolution neural network (CNN) inference framework built upon the co-design of encryption operation-aware model sparsity and the single-instruction-multiple-data (SIMD)-friendly data packing. I will also share our key finding from these studies, which is to significantly decrease the memory and computation footprint needed in costly encryption operations by orchestrating ciphertext encoding, sparsity pattern and model architecture design based on an individual network’s unique computing pattern. The prospects on the research along this direction will also be given at the end of this talk.

 

Sept 8, Fri, 12:00 PM at EB2 3211 (CPS Lunch)

Title: Towards Precision Sensing in IoT for Human Machine Interface
Speaker: Chenhan Xu
Abstract: Nowadays, IoT devices are encroaching on every environment of our lives, including but not limited to homes, vehicles, and offices. However, due to the complexity of human activities, unavoidable variance in signal scaling, and privacy-preserving requirements, only limited human information can be cognized by the IoT environment, leading to a great gap between IoT intelligence and human demands. In this talk, I will introduce how we build sensing and computing systems that aim for precise, secure, intelligent, and broad-spectrum human-computer interaction (HCI). In particular, I will present our work that is the first to exploit high-precision millimeter wave direct sensing of the human vocal system to solve acoustic noise problems on conventional voice sensing for decades, which is a fundamental refactor of voice sensing and enables new voice computing applications. I will also present our work on a next-generation voice-user interface that enables pervasive heart-sensing functions. I will conclude my talk with future directions in IoT systems for humans.

Sept 15, Fri, 12:00 PM at EB2 3211 
Title: Decentralized Application-Level Adaptive Scheduling for Multi-Instance DNNs on Open Mobile Devices
Speaker: Hsin-Hsuan Sung
Abstract: As more apps embrace AI, it is becoming increasingly common that multiple Deep Neural Networks (DNN)-powered apps may run at the same time on a mobile device. This paper explores scheduling in such multi-instance DNN scenarios, on general open mobile systems (e.g., common smartphones and tablets). Unlike closed systems (e.g., autonomous driving systems) where the set of co-run apps are known beforehand, the user of an open mobile system may install or uninstall arbitrary apps at any time, and a centralized solution is subject to adoption barriers. This work proposes the first-known decentralized application-level scheduling mechanism to address the problem. By leveraging the adaptivity of Deep Reinforcement Learning, the solution guarantees co-run apps converge to a Nash equilibrium point, yielding a good balance of gains among the apps. The solution moreover automatically adapts to the running environment and the underlying OS and hardware. Experiments show that the solution consistently produces significant speedups and energy savings across DNN workloads, hardware configurations, and running scenarios.

 

Sept 22, Fri, 12:00 PM11:30 PM at EB2 3211 (CPS Lunch)

Title: Formal Synthesis-Driven Noninvasive Attack-Resiliency Analytics for Internet of Things-Based Smart Systems
Speaker: Mohammad Ashiqur Rahman
Abstract: As cyber-physical systems (CPSs) evolved with the increasing availability of the internet of things (IoT) and improved communication infrastructures, their security has been a major concern to both practitioners and academicians. Empirical analysis or systematic verification of anticipated attacks, often considering control functions and attack properties in isolation, are not suitable for adequately realizing the threat space or making cost-effective hardening. Formal reasoning-based artificial intelligence has been proven advantageous for threat analysis because they are provable and noninvasive and have the power to model the system holistically. Furthermore, ML-based control techniques are increasingly used in modern IoT/CPSs, which often introduce different threat characteristics than typical physics-based controllers. These ML-based control functions lack systematic mathematical analyses. Therefore, we require mechanisms to conceptualize the control logic from the ML models to facilitate formal threat synthesis concerning such controllers. This talk will present several of our research works where we develop formal synthesis-based analytics to find potential attacks against smart systems, where ML is often used to increase the controller’s performance or add security to it.

Short Bio: Dr. Mohammad Ashiqur Rahman is an Associate Professor in the Department of Electrical and Computer Engineering and the School of Computing and Information Sciences at Florida International University. He obtained a PhD in computing and information systems from the University of North Carolina at Charlotte (UNC Charlotte) in 2015. Previously, he received BS and MS in computer science and engineering from Bangladesh University of Engineering and Technology (BUET). Dr. Rahman’s primary research interests cover a wide area of computer networks and cyber-physical systems (CPS). His research focus primarily includes computer and information security, risk analysis and security hardening, secure and dependable resource allocation, and distributed computing. His research is primarily funded by NSF, DOE, and DOD. He is currently leading multiple grants on CPS
security. Dr. Rahman coauthored a book and several book chapters and published over 100 peer-reviewed journal and conference papers. He served on the organization and technical program committees (TPCs) for various IEEE and ACM conferences. He served as the TPC Co-Chair of IEEE/IFIP NOMS 2023.

Sept 29, Fri, 12:00 PM at EB2 3211 

Title: Detecting Code Execution Vulnerabilities in Cloud Server Systems
Speaker: Fogo Tunde-Onadele
Abstract: Cloud systems are a popular platform for deploying production software. Accordingly, security attacks to cloud server systems can have extensive real-world impact. Although existing intrusion detection systems find anomalies in system behavior, they do not inform developers about the underlying code defects. Thus, developers spend resources to analyze and fix the security bugs. In this work, we leverage studied code patterns to proactively protect cloud server systems from a dominant category of security bugs that are due to the improper execution restrictions. We present work towards a new static analysis approach, ExeScope, that combines call graph analysis with data-flow analysis to efficiently detect code execution bugs. We evaluate our scheme over six common vulnerability exposures (CVEs) with unique root causes in five Java cloud server systems. The preliminary results show that ExeScope can detect the vulnerable function root causes but still suffers from false positives. We compare ExeScope to existing Java bug finding tools and discuss next steps for addressing the false positive issue.

Oct 6, Fri, 12:00 PM at EB2 3211 (CPS Lunch)

Title: ROS2 Scheduling with Dynamic Priorities
Speaker: Kurt Wilson
Abstract: Robot Operating System (ROS) is the most popular framework for developing robotics software. Typically, robotics software is safety-critical and employed in real-time systems requiring timing guarantees. ROS2 attempts to address the needs of real-time systems, but lacks proper scheduling guarantees, which severely affects the response time of ROS2 applications. We propose a deadline-based scheduling strategy for the ROS2 executor, and modify it to include both deadline-based and priority scheduling. We also analyse and address potential edge cases in multithreaded ROS2 systems. Our modifications increase the predictability of ROS2, and allow for the development of real-time systems. Our modifications can be dropped into existing ROS2 systems with minimal changes.

Oct 19, Thu, 3:30 PM at EB2 3211 

Title: Pinpointing resource wastage with profiling
Speaker: Pengfei Su
Abstract: Software packages have become increasingly complex with millions of lines of code, sophisticated control and data flow, and escalating levels of abstraction. This complexity often introduces resource wastage across software stacks, making it practically impossible for users to pinpoint them. Profilers abound in the community to aid software developers in understanding program behavior. However, classic profiling techniques focus on execution hotspots with a myopic view of resource wastage; for example, they can hardly diagnose whether a resource is being used in a productive manner that contributes to the overall efficiency of a program. In this talk, I will describe various forms of resource wastage, which pervasively exist in modern software packages and expose great potential for optimization. I will discuss the design of an instrumentation-based profiler that identifies wasteful memory operations, which guides nontrivial performance improvement. Furthermore, I will discuss the design of a lightweight sampling-based profiler that pinpoints execution anomalies, an overlooked indicator of resource wastage. Last but not least, I will show our recent efforts in saving scarce GPU memory resources.
Short Bio: Pengfei Su is an assistant professor in the Department of Computer Science and Engineering at the University of California, Merced. He obtained his Ph.D. from William & Mary in 2020. His research interests lie in high-performance computing, programming languages, and program analysis, with a focus on providing tools support for analyzing and optimizing software inefficiencies. He has published papers in peer-reviewed conferences and journals, including ICSE, ESEC/FSE,  SC, PPoPP, CGO, ASPLOS, and TACO. His papers received Best Paper Award at PPoPP'19 and Distinguished Paper Award at ICSE'19.

Oct 20, Fri, 12:00 PM at EB2 3211 

Title: Accelerating HPC Applications Using Neural Network-based Surrogates
Speaker: Wenqian Dong
Abstract: Neural network-based surrogate, aiming to use neural networks to accelerate time-consuming computation in scientific applications, is promising in high-performance computing (HPC). However, there is a lack of tools that can help domain scientists automatically apply neural network-based surrogate models to HPC applications. In this talk, we introduce a framework, named Auto-HPCnet, to democratize the usage of neural network-based surrogates. Auto-HPCnet is the first end-to-end framework that makes past proposals for the neural network-based surrogate model practical and disciplined. Auto-HPCnet introduces a workflow to address unique challenges when applying the approximation, such as feature acquisition and meeting the application-specific constraint on the quality of the final computation outcome.  We show that Auto-HPCnet can leverage neural networks for a set of HPC applications and achieve 5.50 x speedup on average (up to 16.8 x speedup and with data preparation cost included) while meeting the application-specific constraint on the final computation quality.
Short Bio: Dr. Wenqian Dong is an assistant professor in the KFSCIS department at Florida International University (FIU). She earned her Ph.D. in EECS at the University of California, Merced, in Spring 2022. Recently, she is selected for the IEEE-CS Technical Community on High-Performance Computing (TCHPC) Early Career Researchers Award for Excellence in High-Performance Computing. Her research focuses on three main areas. She has contributed significantly to scientific machine learning, particularly in using machine learning to speed up HPC applications. Her work is showcased in conferences like SC’19 and SC’20. Wenqian has excelled in automatic machine learning, concentrating on creating machine learning models for HPC applications. Her papers in VLDB’21, HPDC’23, and ASPLOS’22 highlight her notable contributions. She’s skilled in optimizing system performance, aiming to enhance HPC applications’ quality and efficiency through system optimization. Her work presented at conferences like ICS’21, Eurosys’21, ICPP’18, and Parallel Computing’23 illustrates her dedication to this field. Her work has generated real impacts in the HPC community. For example, her work on power grid simulation using ML led to 3.28 times performance improvement and highlighted Newswise as a DOE science innovation. Furthermore, Wenqian is committed to enriching the HPC community. Her commitment is apparent in her various roles as an organizer for the MLBench’23 workshop, and as a member of the Technical Program Committee (TPC) for the IEEE Cloud 2023, IEEE Cluster 2023, AI4Science 2022 workshop, and the GPGPU 2023 workshop.

Nov 3, Fri, 12:00 PM at EB2 3300 (CPS Lunch)

Title: Real-Time Deep Learning Framework for Dermatology Image Classification on Low-Power Embedded Devices
Speaker: Yixin Li
Abstract: The utilization of deep learning (DL) in medical research and industry has witnessed substantial growth in recent years. A pivotal application involves employing DL for dermatology image classification tasks. However, the major challenges in such tasks, in terms of the scarcity and bias of high-quality labeled data, significantly hinder further advancement in this domain. Such data insufficiency gives rise to concerns regarding accuracy disparities across different demographic groups, which may ultimately lead to unfair outcomes. Additionally, complex and effective DL models are often unsuitable with low-power embedded devices, which hinders their usability in resource-limited environments. In this paper, we propose a DL framework to address these issues. Our major approach involves augmenting data with Gaussian white noise to generate synthetic data samples and employing knowledge distillation techniques to transfer valuable knowledge from a larger and more complex model to a smaller and more efficient counterpart. Through comprehensive experimentation on an open-access skin disease classification dataset, we demonstrate that our proposed framework significantly enhances the performance of DL models on low-power embedded devices, thereby optimizing the trade-offs among overall accuracy, fairness for different demographic groups, and inference latency on low-power embedded devices.

Nov 10, Fri, 12:00 PM at EB2 3211 (CPS Lunch)

Title: Stealing Static Slack via WCRT and Sporadic P-Servers in Deadline-Driven Scheduling
Speaker: Abdullah Al Arafat
Abstract: Real-time systems are characterized by strict timing constraints represented by deadlines. Some systems are tight, such that jobs finish their execution right at the deadlines in the worst case, while others may not be so tight. Static slack is a concept that captures such non-tightness, and it can often be ``stolen'' to handle additional aperiodic job requests, task suspensions, and occasional task overruns. This paper identifies an interesting and direct correlation between worst-case response time (WCRT) and static slack in a deadline-driven uniprocessor system. We propose a systematic approach for safely constructing a set of Sporadic P-Servers to tightly capture the available static slack, given any feasible task set under a preemptive earliest deadline first. These P-Servers are special in that each task has only a unit-length execution budget and runs in a discrete manner. To leverage these P-Servers and ``steal'' the slack, we propose a novel consume-replenish algorithm to handle online hard aperiodic jobs. We also extend the theory for other applications, such as dealing with early and arbitrary self-suspensions and servicing job overruns in mixed-criticality systems without triggering a mode switch. Experiments demonstrate that the proposed theory can provide new and better schedulability in some subcases for each application.

Nov 17, Fri, 12:00 PM at EB2 3211 (CPS Lunch)

Title: Scaling Up Deep Learning on Graphs: An Implicit Modeling Perspective
Speaker: Xiaorui Liu
Abstract: In recent years, the remarkable success of deep learning on graph-structured data has opened up new frontiers in artificial intelligence. In particular, graph neural networks (GNNs) have played a pivotal role in expanding the horizons of deep learning, offering unprecedented versatility in tackling various applications. However, GNNs encounter formidable scalability challenges due to the intricate interdependencies among data points. Existing techniques to alleviate the neighbor explosion problem in large-scale GNN training have their limitations.
This talk presents a promising perspective on implicit modeling for enhancing data sampling, computation, memory usage, parallelism, and end-to-end training for large-scale GNNs. By adopting this novel approach, we can transcend the current boundaries in GNN scalability and unlock new possibilities in harnessing the power of graph-structured data. Moreover, we will delve into the practical applications of this approach, demonstrating its substantial impact on web-scale recommender systems. The insights shared in this talk have the potential to revolutionize the field of deep learning on graph-structured data, offering solutions to long-standing scalability challenges and paving the way for more efficient and effective AI techniques.

Nov 29, Wed, 12:00 PM at EB2 3211 (CPS Lunch)

Title: Privacy-aware Computing in Mobile Health Systems
Speaker: Huining Li
Abstract: One of the main hindrances to integrating mobile technologies into real-world healthcare applications is the privacy issue. Specifically, I formulate the privacy challenge in twofold. First, compared with traditional clinical computer systems, mobile health systems encounter a much larger attack surface due to their inherent high accessibility. Round-the-clock data collection in mobile health systems is always at odds with privacy preservation. Second, mobile health data are intrinsically heterogeneous and continuously streaming, which poses a challenge in harmonizing the privacy protection requirements across various data formalities and dynamics. To address these privacy-preserving challenges in the mobile health era, my research has primarily focused on the following aspects: 1) Compression-aware Privacy Computing to tame privacy protection in mobile data heterogeneity and dynamics. 2) Fairness-aware Privacy Computing to solve privacy preservation disparities in mobile health services.  My research innovation has been applied to multiple mobile health studies, including mental health intervention, wound care,  medication adherence detection, and medicine effectiveness assessment for Parkinson's disease self-management.
Bio: Huining Li is a Ph.D. candidate in the Computer Science and Engineering Department at the University at Buffalo, SUNY, advised by Professor Wenyao Xu. Her research interest lies broadly in internet-of-things, cybersecurity, and mobile computing. Especially, her recent focus is on applying research advancement to the field of mobile health. She has authored 28 papers in top-tier conferences and journals, including ACM MobiCom, MobiSys, SenSys, UbiComp, IEEE TMC, NDSS, ICHI, Elsevier Smart Health, and BodyNet. Her work has received three Best Paper Awards (SenSys’19, BodyNet’21, and ICHI’22) and one Best Paper Candidate (SenSys’22). Also, her research work has been recognized in various scholarly venues, including one 2023 IEEE EPICS Award (Elderly care wearables), Best Design Award Runner-up in the 2021 IEEE Healthcare Summit (COVID-19 Data Hackathon), and several research competition awards (e.g., UB Blackstone LaunchPad). She was selected for EECS rising star in 2023.

Dec 1, Fri, 12:00 PM at EB2 3211 (CPS Lunch)

Title: Pushing Acoustic Sensing from the Laboratory to Real World: Theory, Application, and Practical Problems
Speaker: Dong Li
Abstract: With the proliferation of voice assistants, speakers and microphones are essential components in billions of smart devices that people interact with on a daily basis, such as smartphones, smart watches, smart speakers, smart home appliances, etc. By transferring them into acoustic radars, we have successfully demonstrated the possibility of extending their primary use from simple audio playing and voice-based interactions to multifarious sensing applications, including gesture tracking, vital sign monitoring, and vibration measurement. In this talk, I will introduce how we identify and solve the fundamental technical challenges and practical real-world problems, which not only address the bottlenecks in existing systems but also lead to the design of new systems. In particular, I will present our work that pushes the sensing boundaries of acoustic signals in multiple aspects, including enabling simultaneous multi-target tracking, extending the sensing range, and boosting sensing granularity. Furthermore, I will present our findings on practical problems when deploying acoustic sensing systems from the laboratory to the real world. At last, I will conclude my talk with future directions in sensing for the common good.
Bio: Dong Li is a final-year Ph.D. candidate in the Manning College of Information & Computer Sciences at the University of Massachusetts Amherst, under the supervision of Prof. Jie Xiong. Before that, Dong received his M.Eng. in Software Engineering from Shanghai Jiao Tong University and his B.Eng. in Computer Science from University of Electronic Science and Technology of China. His research interests include Mobile and Wireless Sensing, Internet of Things, Human Computer Interaction, and Smart Health. The primary goal of his research is to develop innovative sensing and computing systems that can help humanity in healthcare equity, wealth distribution, and environmental sustainability by making them more affordable and accessible to the average user worldwide. His research work has been published in various high-impact venues such as MobiCom, SenSys, IPSN, UbiComp, and HotNets.