Skip to main content

Showing 1–29 of 29 results for author: Abbas, W

  1. arXiv:2405.03706  [pdf, other

    cs.LG

    Improving Graph Machine Learning Performance Through Feature Augmentation Based on Network Control Theory

    Authors: Anwar Said, Obaid Ullah Ahmad, Waseem Abbas, Mudassir Shabbir, Xenofon Koutsoukos

    Abstract: Network control theory (NCT) offers a robust analytical framework for understanding the influence of network topology on dynamic behaviors, enabling researchers to decipher how certain patterns of external control measures can steer system dynamics towards desired states. Distinguished from other structure-function methodologies, NCT's predictive capabilities can be coupled with deploying Graph Ne… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: Conference paper

  2. arXiv:2403.04923  [pdf, other

    cs.LG cs.MA eess.SY

    Control-based Graph Embeddings with Data Augmentation for Contrastive Learning

    Authors: Obaid Ullah Ahmad, Anwar Said, Mudassir Shabbir, Waseem Abbas, Xenofon Koutsoukos

    Abstract: In this paper, we study the problem of unsupervised graph representation learning by harnessing the control properties of dynamical networks defined on graphs. Our approach introduces a novel framework for contrastive learning, a widely prevalent technique for unsupervised representation learning. A crucial step in contrastive learning is the creation of 'augmented' graphs from the input graphs. T… ▽ More

    Submitted 17 April, 2024; v1 submitted 7 March, 2024; originally announced March 2024.

    Comments: Accepted in 2024 American Control Conference (ACC), July 8-12, 2024 in Toronto, ON, Canada

  3. arXiv:2310.12169  [pdf, other

    cs.SI cs.LG

    Enhanced Graph Neural Networks with Ego-Centric Spectral Subgraph Embeddings Augmentation

    Authors: Anwar Said, Mudassir Shabbir, Tyler Derr, Waseem Abbas, Xenofon Koutsoukos

    Abstract: Graph Neural Networks (GNNs) have shown remarkable merit in performing various learning-based tasks in complex networks. The superior performance of GNNs often correlates with the availability and quality of node-level features in the input networks. However, for many network applications, such node-level information may be missing or unreliable, thereby limiting the applicability and efficacy of… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

    Comments: 22nd IEEE International Conference on Machine Learning and Applications 2023

  4. arXiv:2310.02164  [pdf, other

    cs.LG

    A Survey of Graph Unlearning

    Authors: Anwar Said, Tyler Derr, Mudassir Shabbir, Waseem Abbas, Xenofon Koutsoukos

    Abstract: Graph unlearning emerges as a crucial advancement in the pursuit of responsible AI, providing the means to remove sensitive data traces from trained models, thereby upholding the right to be forgotten. It is evident that graph machine learning exhibits sensitivity to data privacy and adversarial attacks, necessitating the application of graph unlearning techniques to address these concerns effecti… ▽ More

    Submitted 7 October, 2023; v1 submitted 23 August, 2023; originally announced October 2023.

    Comments: 22 page review paper on graph unlearning

  5. arXiv:2309.02649  [pdf, other

    eess.SY cs.MA

    Controllability Backbone in Networks

    Authors: Obaid Ullah Ahmad, Waseem Abbas, Mudassir Shabbir

    Abstract: This paper studies the controllability backbone problem in dynamical networks defined over graphs. The main idea of the controllability backbone is to identify a small subset of edges in a given network such that any subnetwork containing those edges/links has at least the same network controllability as the original network while assuming the same set of input/leader vertices. We consider the str… ▽ More

    Submitted 5 September, 2023; originally announced September 2023.

    Comments: Accepted in 62nd IEEE Conference on Decision and Control, Dec. 13-15, 2023, Singapore

  6. arXiv:2109.01494  [pdf, other

    cs.LG cs.AI cs.DS

    Computing Graph Descriptors on Edge Streams

    Authors: Zohair Raza Hassan, Sarwan Ali, Imdadullah Khan, Mudassir Shabbir, Waseem Abbas

    Abstract: Feature extraction is an essential task in graph analytics. These feature vectors, called graph descriptors, are used in downstream vector-space-based graph analysis models. This idea has proved fruitful in the past, with spectral-based graph descriptors providing state-of-the-art classification accuracy. However, known algorithms to compute meaningful descriptors do not scale to large graphs sinc… ▽ More

    Submitted 8 April, 2023; v1 submitted 2 September, 2021; originally announced September 2021.

    Comments: Extension of work accepted to PAKDD 2020. Accepted to ACM TKDD in 2023

  7. arXiv:2105.06011  [pdf, other

    eess.SY cs.DM

    Edge Augmentation with Controllability Constraints in Directed Laplacian Networks

    Authors: Waseem Abbas, Mudassir Shabbir, Yasin Yazıcıoglu, Xenofon Koutsoukos

    Abstract: In this paper, we study the maximum edge augmentation problem in directed Laplacian networks to improve their robustness while preserving lower bounds on their strong structural controllability (SSC). Since adding edges could adversely impact network controllability, the main objective is to maximally densify a given network by selectively adding missing edges while ensuring that SSC of the networ… ▽ More

    Submitted 12 May, 2021; originally announced May 2021.

  8. arXiv:2102.01495  [pdf, other

    cs.IT eess.SP

    Deep Learning based Joint Precoder Design and Antenna Selection for Partially Connected Hybrid Massive MIMO Systems

    Authors: Salman Khalid, Waqas bin Abbas, Farhan Khalid

    Abstract: Efficient resource allocation with hybrid precoder design is essential for massive MIMO systems operating in millimeter wave (mmW) domain. Owing to a higher energy efficiency and a lower complexity of a partially connected hybrid architecture, in this letter, we propose a joint deep convolutional neural network (CNN) based scheme for precoder design and antenna selection of a partially connected m… ▽ More

    Submitted 2 February, 2021; originally announced February 2021.

  9. arXiv:2010.13032  [pdf, other

    cs.LG stat.ML

    Byzantine Resilient Distributed Multi-Task Learning

    Authors: Jiani Li, Waseem Abbas, Xenofon Koutsoukos

    Abstract: Distributed multi-task learning provides significant advantages in multi-agent networks with heterogeneous data sources where agents aim to learn distinct but correlated models simultaneously.However, distributed algorithms for learning relatedness among tasks are not resilient in the presence of Byzantine agents. In this paper, we present an approach for Byzantine resilient distributed multi-task… ▽ More

    Submitted 7 January, 2021; v1 submitted 25 October, 2020; originally announced October 2020.

    Journal ref: Thirty-fourth Conference on Neural Information Processing Systems (NeurIPS 2020)

  10. arXiv:2006.16854  [pdf, ps, other

    eess.SP cs.IT

    User Selection in Millimeter Wave Massive MIMO System using Convolutional Neural Networks

    Authors: Salman Khalid, Waqas bin Abbas, Farhan Khalid, Michele Zorzi

    Abstract: A hybrid architecture for millimeter wave (mmW) massive MIMO systems is considered practically implementable due to low power consumption and high energy efficiency. However, due to the limited number of RF chains, user selection becomes necessary for such architecture. Traditional user selection algorithms suffer from high computational complexity and, therefore, may not be scalable in 5G and bey… ▽ More

    Submitted 30 June, 2020; originally announced June 2020.

    Comments: 4 pages, 5 Figures

  11. Resilient Distributed Diffusion in Networks with Adversaries

    Authors: Jiani Li, Waseem Abbas, Xenofon Koutsoukos

    Abstract: In this paper, we study resilient distributed diffusion for multi-task estimation in the presence of adversaries where networked agents must estimate distinct but correlated states of interest by processing streaming data. We show that in general diffusion strategies are not resilient to malicious agents that do not adhere to the diffusion-based information processing rules. In particular, by expl… ▽ More

    Submitted 23 March, 2020; originally announced March 2020.

    Journal ref: in IEEE Transactions on Signal and Information Processing over Networks, vol. 6, pp. 1-17, 2020

  12. arXiv:2001.10301  [pdf, other

    cs.DB

    Estimating Descriptors for Large Graphs

    Authors: Zohair Raza Hassan, Mudassir Shabbir, Imdadullah Khan, Waseem Abbas

    Abstract: Embedding networks into a fixed dimensional feature space, while preserving its essential structural properties is a fundamental task in graph analytics. These feature vectors (graph descriptors) are used to measure the pairwise similarity between graphs. This enables applying data mining algorithms (e.g classification, clustering, or anomaly detection) on graph-structured data which have numerous… ▽ More

    Submitted 19 February, 2020; v1 submitted 28 January, 2020; originally announced January 2020.

    Comments: Accepted to PAKDD 2020

  13. Patch-based Generative Adversarial Network Towards Retinal Vessel Segmentation

    Authors: Waseem Abbas, Muhammad Haroon Shakeel, Numan Khurshid, Murtaza Taj

    Abstract: Retinal blood vessels are considered to be the reliable diagnostic biomarkers of ophthalmologic and diabetic retinopathy. Monitoring and diagnosis totally depends on expert analysis of both thin and thick retinal vessels which has recently been carried out by various artificial intelligent techniques. Existing deep learning methods attempt to segment retinal vessels using a unified loss function o… ▽ More

    Submitted 21 December, 2019; originally announced December 2019.

    Journal ref: Neural Information Processing. ICONIP 2019

  14. arXiv:1907.10742  [pdf, other

    eess.SY cs.CR

    Leveraging Diversity for Achieving Resilient Consensus in Sparse Networks

    Authors: Faiq Ghawash, Waseem Abbas

    Abstract: A networked system can be made resilient against adversaries and attacks if the underlying network graph is structurally robust. For instance, to achieve distributed consensus in the presence of adversaries, the underlying network graph needs to satisfy certain robustness conditions. A typical approach to making networks structurally robust is to strategically add extra links between nodes, which… ▽ More

    Submitted 24 July, 2019; originally announced July 2019.

    Comments: 8th IFAC Workshop on Distributed Estimation and Control in Networked Systems (NecSys) 2019

  15. arXiv:1903.10422  [pdf, other

    cs.CV

    Locomotion and gesture tracking in mice and small animals for neurosceince applications: A survey

    Authors: Waseem Abbas, David Masip Rodo

    Abstract: Neuroscience has traditionally relied on manually observing lab animals in controlled environments. Researchers usually record animals behaving in free or restrained manner and then annotate the data manually. The manual annotation is not desirable for three reasons; one, it is time consuming, two, it is prone to human errors and three, no two human annotators will 100\% agree on annotation, so it… ▽ More

    Submitted 25 March, 2019; originally announced March 2019.

    Comments: 41 pages, 2 figures

    MSC Class: 68Txx

  16. arXiv:1811.12811  [pdf, other

    cs.IT

    Millimeter Wave Receiver Comparison Under Energy vs Spectral Efficiency Trade-off

    Authors: Waqas bin Abbas, Felipe Gomez-Cuba, Michele Zorzi

    Abstract: Receivers for mmWave systems suffer from high power consumption in Analog to Digital Converters (ADC), and there is a need to compare the three major receiver architectures: Analog, Hybrid and Digital Combining (AC, HC and DC). Moreover, the specific power consumption figure of merit of ADCs varies significantly between different component designs in the literature, so that comparisons performed f… ▽ More

    Submitted 28 January, 2019; v1 submitted 30 November, 2018; originally announced November 2018.

    Comments: This is a self-archived pre-print version of a paper presented in European Wireless Conference 2017. arXiv admin note: substantial text overlap with arXiv:1607.03725

  17. arXiv:1808.09090  [pdf, other

    cs.CR

    Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening

    Authors: Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: As the Industrial Internet of Things (IIot) becomes more prevalent in critical application domains, ensuring security and resilience in the face of cyber-attacks is becoming an issue of paramount importance. Cyber-attacks against critical infrastructures, for example, against smart water-distribution and transportation systems, pose serious threats to public health and safety. Owing to the severit… ▽ More

    Submitted 27 August, 2018; originally announced August 2018.

  18. arXiv:1808.08349  [pdf, other

    cs.CR cs.GT

    Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game

    Authors: Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: In recent years, state-of-the-art traffic-control devices have evolved from standalone hardware to networked smart devices. Smart traffic control enables operators to decrease traffic congestion and environmental impact by acquiring real-time traffic data and changing traffic signals from fixed to adaptive schedules. However, these capabilities have inadvertently exposed traffic control to a wide… ▽ More

    Submitted 2 August, 2019; v1 submitted 24 August, 2018; originally announced August 2018.

  19. arXiv:1801.10472  [pdf, other

    cs.SE cs.NE

    Soft Computing Techniques for Dependable Cyber-Physical Systems

    Authors: Muhammad Atif, Siddique Latif, Rizwan Ahmad, Adnan Khalid Kiani, Junaid Qadir, Adeel Baig, Hisao Ishibuchi, Waseem Abbas

    Abstract: Cyber-Physical Systems (CPS) allow us to manipulate objects in the physical world by providing a communication bridge between computation and actuation elements. In the current scheme of things, this sought-after control is marred by limitations inherent in the underlying communication network(s) as well as by the uncertainty found in the physical world. These limitations hamper fine-grained contr… ▽ More

    Submitted 27 July, 2020; v1 submitted 25 January, 2018; originally announced January 2018.

    Comments: IEEE Access

  20. arXiv:1610.09546  [pdf, ps, other

    cs.IT

    Bit Allocation for Increased Power Efficiency in 5G Receivers with Variable-Resolution ADCs

    Authors: Waqas bin Abbas, Felipe Gomez-Cuba, Michele Zorzi

    Abstract: In future high-capacity wireless systems based on mmWave or massive multiple input multiple output (MIMO), the power consumption of receiver Analog to Digital Converters (ADC) is a concern. Although hybrid or analog systems with fewer ADCs have been proposed, fully digital receivers with many lower resolution ADCs (and lower power) may be a more versatile solution. In this paper, focusing on an up… ▽ More

    Submitted 28 January, 2019; v1 submitted 29 October, 2016; originally announced October 2016.

  21. arXiv:1608.07329  [pdf, ps, other

    cs.NI

    Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks

    Authors: Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: In networked systems, monitoring devices such as sensors are typically deployed to monitor various target locations. Targets are the points in the physical space at which events of some interest, such as random faults or attacks, can occur. Most often, these devices have limited energy supplies, and they can operate for a limited duration. As a result, energy-efficient monitoring of various target… ▽ More

    Submitted 25 August, 2016; originally announced August 2016.

  22. arXiv:1608.04309  [pdf, other

    eess.SY cs.SI math.OC

    Graph Distances and Controllability of Networks

    Authors: A. Yasin Yazicioglu, Waseem Abbas, Magnus Egerstedt

    Abstract: In this technical note, we study the controllability of diffusively coupled networks from a graph theoretic perspective. We consider leader-follower networks, where the external control inputs are injected to only some of the agents, namely the leaders. Our main result relates the controllability of such systems to the graph distances between the agents. More specifically, we present a graph topol… ▽ More

    Submitted 15 August, 2016; originally announced August 2016.

    Comments: Accepted to the IEEE Transactions on Automatic Control

  23. arXiv:1607.03725  [pdf, ps, other

    cs.IT

    Millimeter Wave Receiver Efficiency: A Comprehensive Comparison of Beamforming Schemes with Low Resolution ADCs

    Authors: Waqas bin Abbas, Felipe Gomez-Cuba, Michele Zorzi

    Abstract: In this work, we study the achievable rate and the energy efficiency of Analog, Hybrid and Digital Combining (AC, HC and DC) for millimeter wave (mmW) receivers. We take into account the power consumption of all receiver components, not just Analog-to-Digital Converters (ADC), determine some practical limitations of beamforming in each architecture, and develop performance analysis charts that ena… ▽ More

    Submitted 20 February, 2020; v1 submitted 13 July, 2016; originally announced July 2016.

    Comments: 32 pages, 17 figures, 4 tables. Published in IEEE Transactions on Wireless Communications

  24. arXiv:1606.06707  [pdf, other

    cs.GT cs.CR eess.SY

    Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments

    Authors: Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: In cyber-physical systems, malicious and resourceful attackers could penetrate the system through cyber means and cause significant physical damage. Consequently, detection of such attacks becomes integral towards making these systems resilient to attacks. To achieve this objective, intrusion detection systems (IDS) that are able to detect malicious behavior can be deployed. However, practical IDS… ▽ More

    Submitted 8 February, 2017; v1 submitted 21 June, 2016; originally announced June 2016.

    Comments: Decision and Game Theory for Security: 7th International Conference, GameSec 2016, New York, NY, USA

  25. arXiv:1606.06698  [pdf, other

    eess.SY cs.CR

    Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering

    Authors: Amin Ghafouri, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: Recent experimental studies have shown that traffic management systems are vulnerable to cyber-attacks on sensor data. This paper studies the vulnerability of fixed-time control of signalized intersections when sensors measuring traffic flow information are compromised and perturbed by an adversary. The problems are formulated by considering three malicious objectives: 1) worst-case network accumu… ▽ More

    Submitted 8 February, 2017; v1 submitted 21 June, 2016; originally announced June 2016.

    Journal ref: 9th International Symposium on Resilient Control Systems (ISRCS), Chicago, IL, pp. 130-135 (2016)

  26. arXiv:1605.01930  [pdf, ps, other

    cs.IT cs.NI

    Context Information Based Initial Cell Search for Millimeter Wave 5G Cellular Networks

    Authors: Waqas Bin Abbas, Michele Zorzi

    Abstract: Millimeter wave (mmWave) communication is envisioned as a cornerstone to fulfill the data rate requirements for fifth generation (5G) cellular networks. In mmWave communication, beamforming is considered as a key technology to combat the high path-loss, and unlike in conventional microwave communication, beamforming may be necessary even during initial access/cell search. Among the proposed beamfo… ▽ More

    Submitted 6 May, 2016; originally announced May 2016.

  27. arXiv:1605.00508  [pdf, ps, other

    cs.IT cs.NI

    Towards an Appropriate Beamforming Scheme for Initial Cell Discovery in mmW 5G Cellular Networks

    Authors: Waqas bin Abbas, Michele Zorzi

    Abstract: Beamforming is an essential requirement to combat high pathloss and to improve signal-to-noise ratio during initial cell discovery in future millimeter wave cellular networks. The choice of an appropriate beamforming is directly coupled with its energy consumption. The energy consumption is even of more concern at a battery limited mobile station (MS). In this work, we provide an energy consumptio… ▽ More

    Submitted 2 May, 2016; originally announced May 2016.

  28. arXiv:1604.05151  [pdf, ps, other

    cs.IT cs.NI

    Towards an Appropriate Receiver Beamforming Scheme for Millimeter Wave Communication: A Power Consumption Based Comparison

    Authors: Waqas Bin Abbas, Michele Zorzi

    Abstract: At millimeter wave (mmW) frequencies, beamforming and large antenna arrays are an essential requirement to combat the high path loss for mmW communication. Moreover, at these frequencies, very large bandwidths are available to fulfill the data rate requirements of future wireless networks. However, utilization of these large bandwidths and of large antenna arrays can result in a high power consump… ▽ More

    Submitted 18 April, 2016; originally announced April 2016.

    Comments: 6 pages

  29. arXiv:1503.04473  [pdf, ps, other

    cs.DM cs.CR eess.SY

    Guarding Networks Through Heterogeneous Mobile Guards

    Authors: Waseem Abbas, Sajal Bhatia, Xenofon Koutsoukos

    Abstract: In this article, the issue of guarding multi-agent systems against a sequence of intruder attacks through mobile heterogeneous guards (guards with different ranges) is discussed. The article makes use of graph theoretic abstractions of such systems in which agents are the nodes of a graph and edges represent interconnections between agents. Guards represent specialized mobile agents on specific no… ▽ More

    Submitted 15 March, 2015; originally announced March 2015.

    Comments: American Control Conference, Chicago, IL, 2015