Skip to main content

Showing 1–50 of 114 results for author: Ali, H

  1. arXiv:2407.08754  [pdf

    cs.NE

    Unraveling the Versatility and Impact of Multi-Objective Optimization: Algorithms, Applications, and Trends for Solving Complex Real-World Problems

    Authors: Noor A. Rashed, Yossra H. Ali, Tarik A. Rashid, A. Salih

    Abstract: Multi-Objective Optimization (MOO) techniques have become increasingly popular in recent years due to their potential for solving real-world problems in various fields, such as logistics, finance, environmental management, and engineering. These techniques offer comprehensive solutions that traditional single-objective approaches fail to provide. Due to the many innovative algorithms, it has been… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

    Comments: 21 pages

  2. arXiv:2407.03369  [pdf

    cs.NE

    FOXANN: A Method for Boosting Neural Network Performance

    Authors: Mahmood A. Jumaah, Yossra H. Ali, Tarik A. Rashid, S. Vimal

    Abstract: Artificial neural networks play a crucial role in machine learning and there is a need to improve their performance. This paper presents FOXANN, a novel classification model that combines the recently developed Fox optimizer with ANN to solve ML problems. Fox optimizer replaces the backpropagation algorithm in ANN; optimizes synaptic weights; and achieves high classification accuracy with a minimu… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

    Comments: 12 pages

  3. arXiv:2407.00518  [pdf, other

    cs.RO

    When Robots Get Chatty: Grounding Multimodal Human-Robot Conversation and Collaboration

    Authors: Philipp Allgeuer, Hassan Ali, Stefan Wermter

    Abstract: We investigate the use of Large Language Models (LLMs) to equip neural robotic agents with human-like social and cognitive competencies, for the purpose of open-ended human-robot conversation and collaboration. We introduce a modular and extensible methodology for grounding an LLM with the sensory perceptions and capabilities of a physical robot, and integrate multiple deep learning models through… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

    Journal ref: International Conference on Artificial Neural Networks 2024

  4. arXiv:2406.08344  [pdf, other

    cs.CV

    Blind Image Deblurring using FFT-ReLU with Deep Learning Pipeline Integration

    Authors: Abdul Mohaimen Al Radi, Prothito Shovon Majumder, Syed Mumtahin Mahmud, Mahdi Mohd Hossain Noki, Md. Haider Ali, Md. Mosaddek Khan

    Abstract: Blind image deblurring is the process of deriving a sharp image and a blur kernel from a blurred image. Blurry images are typically modeled as the convolution of a sharp image with a blur kernel, necessitating the estimation of the unknown blur kernel to perform blind image deblurring effectively. Existing approaches primarily focus on domain-specific features of images, such as salient edges, dar… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

    Comments: 20 pages, 13 figures

  5. arXiv:2406.00667  [pdf, other

    eess.IV cs.AI cs.CL cs.CV cs.LG

    An Early Investigation into the Utility of Multimodal Large Language Models in Medical Imaging

    Authors: Sulaiman Khan, Md. Rafiul Biswas, Alina Murad, Hazrat Ali, Zubair Shah

    Abstract: Recent developments in multimodal large language models (MLLMs) have spurred significant interest in their potential applications across various medical imaging domains. On the one hand, there is a temptation to use these generative models to synthesize realistic-looking medical image data, while on the other hand, the ability to identify synthetic image data in a pool of data is also significantl… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

    Comments: Accepted in Fifth IEEE Workshop on Artificial Intelligence for HealthCare, IEEE 25th International Conference on Information Reuse and Integration for Data Science

  6. arXiv:2405.01612  [pdf

    cs.SE

    Effective Delegation and Leadership in Software Management

    Authors: Star Dawood Mirkhan, Skala Kamaran Omer, Hussein Mohammed Ali, Mahmood Yashar Hamza, Tarik Ahmed Rashid, Poornima Nedunchezhian

    Abstract: Delegation and leadership are critical components of software management, as they play a crucial role in determining the success of the software development process. This study examined the relationship between delegation and leadership in software management and the impact of these factors on project outcomes. Results showed that effective delegation and transformational leadership styles can imp… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 9 pages

  7. arXiv:2405.01608  [pdf

    cs.SE

    A Comprehensive Study on Automated Testing with the Software Lifecycle

    Authors: Hussein Mohammed Ali, Mahmood Yashar Hamza, Tarik Ahmed Rashid

    Abstract: The software development lifecycle depends heavily on the testing process, which is an essential part of finding issues and reviewing the quality of software. Software testing can be done in two ways: manually and automatically. With an emphasis on its primary function within the software lifecycle, the relevance of testing in general, and the advantages that come with it, this article aims to giv… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 9

  8. arXiv:2404.15168  [pdf, other

    eess.AS cs.HC cs.LG cs.SD

    Artificial Neural Networks to Recognize Speakers Division from Continuous Bengali Speech

    Authors: Hasmot Ali, Md. Fahad Hossain, Md. Mehedi Hasan, Sheikh Abujar, Sheak Rashed Haider Noori

    Abstract: Voice based applications are ruling over the era of automation because speech has a lot of factors that determine a speakers information as well as speech. Modern Automatic Speech Recognition (ASR) is a blessing in the field of Human-Computer Interaction (HCI) for efficient communication among humans and devices using Artificial Intelligence technology. Speech is one of the easiest mediums of comm… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

  9. arXiv:2404.08424  [pdf, other

    cs.RO cs.AI cs.HC

    Comparing Apples to Oranges: LLM-powered Multimodal Intention Prediction in an Object Categorization Task

    Authors: Hassan Ali, Philipp Allgeuer, Stefan Wermter

    Abstract: Intention-based Human-Robot Interaction (HRI) systems allow robots to perceive and interpret user actions to proactively interact with humans and adapt to their behavior. Therefore, intention prediction is pivotal in creating a natural interactive collaboration between humans and robots. In this paper, we examine the use of Large Language Models (LLMs) for inferring human intention during a collab… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

  10. arXiv:2403.05210  [pdf, other

    cs.CR

    TIPS: Threat Sharing Information Platform for Enhanced Security

    Authors: Lakshmi Rama Kiran Pasumarthy, Hisham Ali, William J Buchanan, Jawad Ahmad, Audun Josang, Vasileios Mavroeidis, Mouad Lemoudden

    Abstract: There is an increasing need to share threat information for the prevention of widespread cyber-attacks. While threat-related information sharing can be conducted through traditional information exchange methods, such as email communications etc., these methods are often weak in terms of their trustworthiness and privacy. Additionally, the absence of a trust infrastructure between different informa… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  11. arXiv:2402.18614  [pdf, other

    cs.LG cs.CV cs.NE

    Deep Neural Network Models Trained With A Fixed Random Classifier Transfer Better Across Domains

    Authors: Hafiz Tiomoko Ali, Umberto Michieli, Ji Joong Moon, Daehyun Kim, Mete Ozay

    Abstract: The recently discovered Neural collapse (NC) phenomenon states that the last-layer weights of Deep Neural Networks (DNN), converge to the so-called Equiangular Tight Frame (ETF) simplex, at the terminal phase of their training. This ETF geometry is equivalent to vanishing within-class variability of the last layer activations. Inspired by NC properties, we explore in this paper the transferability… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

    Comments: ICASSP 2024. Copyright 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other

  12. arXiv:2402.16562  [pdf

    cs.LG cs.AI cs.NE

    Q-FOX Learning: Breaking Tradition in Reinforcement Learning

    Authors: Mahmood A. Jumaah, Yossra H. Ali, Tarik A. Rashid

    Abstract: Reinforcement learning (RL) is a subset of artificial intelligence (AI) where agents learn the best action by interacting with the environment, making it suitable for tasks that do not require labeled data or direct supervision. Hyperparameters (HP) tuning refers to choosing the best parameter that leads to optimal solutions in RL algorithms. Manual or random tuning of the HP may be a crucial proc… ▽ More

    Submitted 29 March, 2024; v1 submitted 26 February, 2024; originally announced February 2024.

  13. arXiv:2402.11050  [pdf, other

    cs.IT eess.SP

    Adaptive Constellation Multiple Access for Beyond 5G Wireless Systems

    Authors: Indu L. Shakya, Falah H. Ali

    Abstract: We propose a novel nonorthogonal multiple access (NOMA) scheme referred as adaptive constellation multiple access (ACMA) which addresses key limitations of existing NOMA schemes for beyond 5G wireless systems. Unlike the latter, that are often constrained in choices of allocation of power, modulations and phases to allow enough separation of clusters from users combined signals, ACMA is power, mod… ▽ More

    Submitted 28 February, 2024; v1 submitted 16 February, 2024; originally announced February 2024.

    Comments: 5 pages, 6 figures, Submission to an IEEE Journal

  14. arXiv:2402.05158  [pdf, other

    cs.CV cs.AI cs.LG

    Enhancement of Bengali OCR by Specialized Models and Advanced Techniques for Diverse Document Types

    Authors: AKM Shahariar Azad Rabby, Hasmot Ali, Md. Majedul Islam, Sheikh Abujar, Fuad Rahman

    Abstract: This research paper presents a unique Bengali OCR system with some capabilities. The system excels in reconstructing document layouts while preserving structure, alignment, and images. It incorporates advanced image and signature detection for accurate extraction. Specialized models for word segmentation cater to diverse document types, including computer-composed, letterpress, typewriter, and han… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

    Comments: 8 pages, 7 figures, 4 table Link of the paper https://openaccess.thecvf.com/content/WACV2024W/WVLL/html/Rabby_Enhancement_of_Bengali_OCR_by_Specialized_Models_and_Advanced_Techniques_WACVW_2024_paper.html

    Journal ref: Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) Workshops, 2024, pp. 1102-1109

  15. arXiv:2401.15417  [pdf, other

    cs.LG eess.SY

    Fault Diagnosis on Induction Motor using Machine Learning and Signal Processing

    Authors: Muhammad Samiullah, Hasan Ali, Shehryar Zahoor, Anas Ali

    Abstract: The detection and identification of induction motor faults using machine learning and signal processing is a valuable approach to avoiding plant disturbances and shutdowns in the context of Industry 4.0. In this work, we present a study on the detection and identification of induction motor faults using machine learning and signal processing with MATLAB Simulink. We developed a model of a three-ph… ▽ More

    Submitted 27 January, 2024; originally announced January 2024.

    Comments: 6 pages, 17 figures, 2 tables

  16. Walert: Putting Conversational Search Knowledge into Action by Building and Evaluating a Large Language Model-Powered Chatbot

    Authors: Sachin Pathiyan Cherumanal, Lin Tian, Futoon M. Abushaqra, Angel Felipe Magnossao de Paula, Kaixin Ji, Danula Hettiachchi, Johanne R. Trippas, Halil Ali, Falk Scholer, Damiano Spina

    Abstract: Creating and deploying customized applications is crucial for operational success and enriching user experiences in the rapidly evolving modern business world. A prominent facet of modern user experiences is the integration of chatbots or voice assistants. The rapid evolution of Large Language Models (LLMs) has provided a powerful tool to build conversational applications. We present Walert, a cus… ▽ More

    Submitted 14 January, 2024; originally announced January 2024.

    Comments: Accepted at 2024 ACM SIGIR CHIIR

  17. Optimisation and Performance Computation of a Phase Frequency Detector Module for IoT Devices

    Authors: Md. Shahriar Khan Hemel, Mamun Bin Ibne Reaz, Sawal Hamid Bin Md Ali, Mohammad Arif Sobhan Bhuiyan, Mahdi H. Miraz

    Abstract: The Internet of Things (IoT) is pivotal in transforming the way we live and interact with our surroundings. To cope with the advancement in technologies, it is vital to acquire accuracy with the speed. A phase frequency detector (PFD) is a critical device to regulate and provide accurate frequency in IoT devices. Designing a PFD poses challenges in achieving precise phase detection, minimising dea… ▽ More

    Submitted 6 January, 2024; originally announced January 2024.

    Journal ref: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 13-21, Vol. 8, No. 1, 1st January 2024, Available: http://aetic.theiaer.org/archive/v8/v8n1/p1.html

  18. arXiv:2401.03191  [pdf, other

    cs.CV

    DistFormer: Enhancing Local and Global Features for Monocular Per-Object Distance Estimation

    Authors: Aniello Panariello, Gianluca Mancusi, Fedy Haj Ali, Angelo Porrello, Simone Calderara, Rita Cucchiara

    Abstract: Accurate per-object distance estimation is crucial in safety-critical applications such as autonomous driving, surveillance, and robotics. Existing approaches rely on two scales: local information (i.e., the bounding box proportions) or global information, which encodes the semantics of the scene as well as the spatial relations with neighboring objects. However, these approaches may struggle with… ▽ More

    Submitted 6 January, 2024; originally announced January 2024.

  19. arXiv:2312.09162  [pdf, other

    cs.CC cs.AI

    Approximation Algorithms for Preference Aggregation Using CP-Nets

    Authors: Abu Mohammmad Hammad Ali, Boting Yang, Sandra Zilles

    Abstract: This paper studies the design and analysis of approximation algorithms for aggregating preferences over combinatorial domains, represented using Conditional Preference Networks (CP-nets). Its focus is on aggregating preferences over so-called \emph{swaps}, for which optimal solutions in general are already known to be of exponential size. We first analyze a trivial 2-approximation algorithm that s… ▽ More

    Submitted 15 December, 2023; v1 submitted 14 December, 2023; originally announced December 2023.

    Comments: 11 pages, main body and appendix. Full version of a paper accepted at the 38th Annual AAAI Conference on Artificial Intelligence

  20. arXiv:2312.02699  [pdf, other

    cs.CV cs.AI

    Enhancing Vehicle Entrance and Parking Management: Deep Learning Solutions for Efficiency and Security

    Authors: Muhammad Umer Ramzan, Usman Ali, Syed Haider Abbas Naqvi, Zeeshan Aslam, Tehseen, Husnain Ali, Muhammad Faheem

    Abstract: The auto-management of vehicle entrance and parking in any organization is a complex challenge encompassing record-keeping, efficiency, and security concerns. Manual methods for tracking vehicles and finding parking spaces are slow and a waste of time. To solve the problem of auto management of vehicle entrance and parking, we have utilized state-of-the-art deep learning models and automated the p… ▽ More

    Submitted 5 December, 2023; originally announced December 2023.

    Comments: Accepted for publication in the 25th International Multitopic Conference (INMIC) IEEE 2023, 6 Pages, 3 figures

  21. arXiv:2311.16895  [pdf, other

    eess.SY cs.AI cs.IT

    Optimization Theory Based Deep Reinforcement Learning for Resource Allocation in Ultra-Reliable Wireless Networked Control Systems

    Authors: Hamida Qumber Ali, Amirhassan Babazadeh Darabi, Sinem Coleri

    Abstract: The design of Wireless Networked Control System (WNCS) requires addressing critical interactions between control and communication systems with minimal complexity and communication overhead while providing ultra-high reliability. This paper introduces a novel optimization theory based deep reinforcement learning (DRL) framework for the joint design of controller and communication systems. The obje… ▽ More

    Submitted 19 December, 2023; v1 submitted 28 November, 2023; originally announced November 2023.

    Comments: 14 pages, 11 figures

  22. arXiv:2311.08774  [pdf, other

    eess.IV cs.CV cs.LG

    Two-stage Joint Transductive and Inductive learning for Nuclei Segmentation

    Authors: Hesham Ali, Idriss Tondji, Mennatullah Siam

    Abstract: AI-assisted nuclei segmentation in histopathological images is a crucial task in the diagnosis and treatment of cancer diseases. It decreases the time required to manually screen microscopic tissue images and can resolve the conflict between pathologists during diagnosis. Deep Learning has proven useful in such a task. However, lack of labeled data is a significant barrier for deep learning-based… ▽ More

    Submitted 17 November, 2023; v1 submitted 15 November, 2023; originally announced November 2023.

    Comments: 5 pages

  23. arXiv:2310.05032  [pdf, other

    cs.CR

    PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks

    Authors: Hisham Ali, Mwrwan Abubakar, Jawad Ahmad, William J. Buchanan, Zakwan Jaroucheh

    Abstract: In recent years, there has been a significant proliferation of industrial Internet of Things (IoT) applications, with a wide variety of use cases being developed and put into operation. As the industrial IoT landscape expands, the establishment of secure and reliable infrastructure becomes crucial to instil trust among users and stakeholders, particularly in addressing fundamental concerns such as… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

  24. arXiv:2310.03614  [pdf

    cs.LG cs.CY

    Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally

    Authors: Shawqi Al-Maliki, Adnan Qayyum, Hassan Ali, Mohamed Abdallah, Junaid Qadir, Dinh Thai Hoang, Dusit Niyato, Ala Al-Fuqaha

    Abstract: Deep Neural Networks (DNNs) have been the driving force behind many of the recent advances in machine learning. However, research has shown that DNNs are vulnerable to adversarial examples -- input samples that have been perturbed to force DNN-based models to make errors. As a result, Adversarial Machine Learning (AdvML) has gained a lot of attention, and researchers have investigated these vulner… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  25. arXiv:2310.01426  [pdf, other

    q-bio.QM cs.LG

    REMEDI: REinforcement learning-driven adaptive MEtabolism modeling of primary sclerosing cholangitis DIsease progression

    Authors: Chang Hu, Krishnakant V. Saboo, Ahmad H. Ali, Brian D. Juran, Konstantinos N. Lazaridis, Ravishankar K. Iyer

    Abstract: Primary sclerosing cholangitis (PSC) is a rare disease wherein altered bile acid metabolism contributes to sustained liver injury. This paper introduces REMEDI, a framework that captures bile acid dynamics and the body's adaptive response during PSC progression that can assist in exploring treatments. REMEDI merges a differential equation (DE)-based mechanistic model that describes bile acid metab… ▽ More

    Submitted 2 October, 2023; originally announced October 2023.

    Comments: 8 pages, 5 figures, 4 appendices

  26. arXiv:2309.11476  [pdf

    cs.CR

    CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption

    Authors: Hassan Ali, Muhammad Shahbaz Khan, Maha Driss, Jawad Ahmad, William J. Buchanan, Nikolaos Pitropakis

    Abstract: In the era of Industrial IoT (IIoT) and Industry 4.0, ensuring secure data transmission has become a critical concern. Among other data types, images are widely transmitted and utilized across various IIoT applications, ranging from sensor-generated visual data and real-time remote monitoring to quality control in production lines. The encryption of these images is essential for maintaining operat… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  27. arXiv:2309.02783  [pdf

    eess.IV cs.AI cs.CV cs.LG

    Improving diagnosis and prognosis of lung cancer using vision transformers: A scoping review

    Authors: Hazrat Ali, Farida Mohsen, Zubair Shah

    Abstract: Vision transformer-based methods are advancing the field of medical artificial intelligence and cancer imaging, including lung cancer applications. Recently, many researchers have developed vision transformer-based AI methods for lung cancer diagnosis and prognosis. This scoping review aims to identify the recent developments on vision transformer-based AI methods for lung cancer imaging applicati… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

    Comments: submitted to BMC Medical Imaging journal

  28. arXiv:2308.10834  [pdf, other

    cs.CR cs.IT

    SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Hisham Ali, Nikolaos Pitropakis, Ahmed Al-Dubai, Baraq Ghaleb, William J. Buchanan

    Abstract: With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlated regions of an image. This paper addresses the security issues presented by three prevalent S-box substitution methods, i.e., single S-box, multiple… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: 6 Pages

  29. arXiv:2308.06393  [pdf, other

    cs.CV

    R2S100K: Road-Region Segmentation Dataset For Semi-Supervised Autonomous Driving in the Wild

    Authors: Muhammad Atif Butt, Hassan Ali, Adnan Qayyum, Waqas Sultani, Ala Al-Fuqaha, Junaid Qadir

    Abstract: Semantic understanding of roadways is a key enabling factor for safe autonomous driving. However, existing autonomous driving datasets provide well-structured urban roads while ignoring unstructured roadways containing distress, potholes, water puddles, and various kinds of road patches i.e., earthen, gravel etc. To this end, we introduce Road Region Segmentation dataset (R2S100K) -- a large-scale… ▽ More

    Submitted 11 August, 2023; originally announced August 2023.

  30. arXiv:2308.01270  [pdf

    cs.NE

    BCDDO: Binary Child Drawing Development Optimization

    Authors: Abubakr S. Issa, Yossra H. Ali, Tarik A. Rashid

    Abstract: A lately created metaheuristic algorithm called Child Drawing Development Optimization (CDDO) has proven to be effective in a number of benchmark tests. A Binary Child Drawing Development Optimization (BCDDO) is suggested for choosing the wrapper features in this study. To achieve the best classification accuracy, a subset of crucial features is selected using the suggested BCDDO. The proposed fea… ▽ More

    Submitted 11 April, 2024; v1 submitted 19 July, 2023; originally announced August 2023.

    Comments: 13 pages

  31. arXiv:2307.05193  [pdf, other

    cs.LG cs.CR

    Membership Inference Attacks on DNNs using Adversarial Perturbations

    Authors: Hassan Ali, Adnan Qayyum, Ala Al-Fuqaha, Junaid Qadir

    Abstract: Several membership inference (MI) attacks have been proposed to audit a target DNN. Given a set of subjects, MI attacks tell which subjects the target DNN has seen during training. This work focuses on the post-training MI attacks emphasizing high confidence membership detection -- True Positive Rates (TPR) at low False Positive Rates (FPR). Current works in this category -- likelihood ratio attac… ▽ More

    Submitted 11 July, 2023; originally announced July 2023.

  32. arXiv:2307.01232  [pdf, other

    eess.IV cs.CV cs.LG

    Robust Surgical Tools Detection in Endoscopic Videos with Noisy Data

    Authors: Adnan Qayyum, Hassan Ali, Massimo Caputo, Hunaid Vohra, Taofeek Akinosho, Sofiat Abioye, Ilhem Berrou, Paweł Capik, Junaid Qadir, Muhammad Bilal

    Abstract: Over the past few years, surgical data science has attracted substantial interest from the machine learning (ML) community. Various studies have demonstrated the efficacy of emerging ML techniques in analysing surgical data, particularly recordings of procedures, for digitizing clinical and non-clinical functions like preoperative planning, context-aware decision-making, and operating skill assess… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

  33. arXiv:2304.07514  [pdf, other

    cs.LG cs.AI

    PI-FL: Personalized and Incentivized Federated Learning

    Authors: Ahmad Faraz Khan, Xinran Wang, Qi Le, Azal Ahmad Khan, Haider Ali, Jie Ding, Ali Butt, Ali Anwar

    Abstract: Personalized FL has been widely used to cater to heterogeneity challenges with non-IID data. A primary obstacle is considering the personalization process from the client's perspective to preserve their autonomy. Allowing the clients to participate in personalized FL decisions becomes significant due to privacy and security concerns, where the clients may not be at liberty to share private informa… ▽ More

    Submitted 27 April, 2023; v1 submitted 15 April, 2023; originally announced April 2023.

  34. arXiv:2304.06020  [pdf, other

    cs.CV

    VidStyleODE: Disentangled Video Editing via StyleGAN and NeuralODEs

    Authors: Moayed Haji Ali, Andrew Bond, Tolga Birdal, Duygu Ceylan, Levent Karacan, Erkut Erdem, Aykut Erdem

    Abstract: We propose $\textbf{VidStyleODE}$, a spatiotemporally continuous disentangled $\textbf{Vid}$eo representation based upon $\textbf{Style}$GAN and Neural-$\textbf{ODE}$s. Effective traversal of the latent space learned by Generative Adversarial Networks (GANs) has been the basis for recent breakthroughs in image editing. However, the applicability of such advancements to the video domain has been hi… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

    Journal ref: ICCV 2023

  35. arXiv:2304.03536  [pdf

    eess.IV cs.CV cs.LG

    Leveraging GANs for data scarcity of COVID-19: Beyond the hype

    Authors: Hazrat Ali, Christer Gronlund, Zubair Shah

    Abstract: Artificial Intelligence (AI)-based models can help in diagnosing COVID-19 from lung CT scans and X-ray images; however, these models require large amounts of data for training and validation. Many researchers studied Generative Adversarial Networks (GANs) for producing synthetic lung CT scans and X-Ray images to improve the performance of AI-based models. It is not well explored how good GAN-based… ▽ More

    Submitted 7 April, 2023; originally announced April 2023.

    Comments: submitted to 2023 CVPR workshop on Generative Models for Computer Vision

  36. arXiv:2303.09063  [pdf, other

    cs.CV cs.LG

    Plant Disease Detection using Region-Based Convolutional Neural Network

    Authors: Hasin Rehana, Muhammad Ibrahim, Md. Haider Ali

    Abstract: Agriculture plays an important role in the food and economy of Bangladesh. The rapid growth of population over the years also has increased the demand for food production. One of the major reasons behind low crop production is numerous bacteria, virus and fungal plant diseases. Early detection of plant diseases and proper usage of pesticides and fertilizers are vital for preventing the diseases an… ▽ More

    Submitted 12 September, 2023; v1 submitted 15 March, 2023; originally announced March 2023.

    Comments: 23 pages

  37. Consistent Valid Physically-Realizable Adversarial Attack against Crowd-flow Prediction Models

    Authors: Hassan Ali, Muhammad Atif Butt, Fethi Filali, Ala Al-Fuqaha, Junaid Qadir

    Abstract: Recent works have shown that deep learning (DL) models can effectively learn city-wide crowd-flow patterns, which can be used for more effective urban planning and smart city management. However, DL models have been known to perform poorly on inconspicuous adversarial perturbations. Although many works have studied these adversarial perturbations in general, the adversarial vulnerabilities of deep… ▽ More

    Submitted 5 March, 2023; originally announced March 2023.

    Journal ref: IEEE Transactions on Intelligent Transportation Systems (2023)

  38. Brain Tumor Synthetic Data Generation with Adaptive StyleGANs

    Authors: Usama Tariq, Rizwan Qureshi, Anas Zafar, Danyal Aftab, Jia Wu, Tanvir Alam, Zubair Shah, Hazrat Ali

    Abstract: Generative models have been very successful over the years and have received significant attention for synthetic data generation. As deep learning models are getting more and more complex, they require large amounts of data to perform accurately. In medical image analysis, such generative models play a crucial role as the available data is limited due to challenges related to data privacy, lack of… ▽ More

    Submitted 4 December, 2022; originally announced December 2022.

    Comments: Accepted in AICS conference

  39. arXiv:2211.07290  [pdf, other

    cs.HC

    AI-Based Emotion Recognition: Promise, Peril, and Prescriptions for Prosocial Path

    Authors: Siddique Latif, Hafiz Shehbaz Ali, Muhammad Usama, Rajib Rana, Björn Schuller, Junaid Qadir

    Abstract: Automated emotion recognition (AER) technology can detect humans' emotional states in real-time using facial expressions, voice attributes, text, body movements, and neurological signals and has a broad range of applications across many sectors. It helps businesses get a much deeper understanding of their customers, enables monitoring of individuals' moods in healthcare, education, or the automoti… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

    Comments: Under review in IEEE TAC

  40. arXiv:2211.00902  [pdf, other

    eess.IV cs.AI cs.CV cs.LG

    Spot the fake lungs: Generating Synthetic Medical Images using Neural Diffusion Models

    Authors: Hazrat Ali, Shafaq Murad, Zubair Shah

    Abstract: Generative models are becoming popular for the synthesis of medical images. Recently, neural diffusion models have demonstrated the potential to generate photo-realistic images of objects. However, their potential to generate medical images is not explored yet. In this work, we explore the possibilities of synthesis of medical images using neural diffusion models. First, we use a pre-trained DALLE… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

    Comments: 8 pages. Submitted to AICS 2022 conference

  41. Artificial Intelligence-Based Methods for Fusion of Electronic Health Records and Imaging Data

    Authors: Farida Mohsen, Hazrat Ali, Nady El Hajj, Zubair Shah

    Abstract: Healthcare data are inherently multimodal, including electronic health records (EHR), medical images, and multi-omics data. Combining these multimodal data sources contributes to a better understanding of human health and provides optimal personalized healthcare. Advances in artificial intelligence (AI) technologies, particularly machine learning (ML), enable the fusion of these different data mod… ▽ More

    Submitted 23 October, 2022; originally announced October 2022.

    Comments: Accepted in Nature Scientific Reports. 20 pages

    Journal ref: Sci Rep 12, 17981 (2022)

  42. arXiv:2210.13289  [pdf, other

    cs.AI cs.CR cs.CY

    Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR) for Metaverses

    Authors: Adnan Qayyum, Muhammad Atif Butt, Hassan Ali, Muhammad Usman, Osama Halabi, Ala Al-Fuqaha, Qammer H. Abbasi, Muhammad Ali Imran, Junaid Qadir

    Abstract: Metaverse is expected to emerge as a new paradigm for the next-generation Internet, providing fully immersive and personalised experiences to socialize, work, and play in self-sustaining and hyper-spatio-temporal virtual world(s). The advancements in different technologies like augmented reality, virtual reality, extended reality (XR), artificial intelligence (AI), and 5G/6G communication will be… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

    Comments: 24 pages, 11 figures

    Journal ref: ACM Computing Surveys (2023)

  43. arXiv:2210.06040  [pdf, other

    cs.AI cs.DB cs.IR

    Question Answering Over Biological Knowledge Graph via Amazon Alexa

    Authors: Md. Rezaul Karim, Hussain Ali, Prinon Das, Mohamed Abdelwaheb, Stefan Decker

    Abstract: Structured and unstructured data and facts about drugs, genes, protein, viruses, and their mechanism are spread across a huge number of scientific articles. These articles are a large-scale knowledge source and can have a huge impact on disseminating knowledge about the mechanisms of certain biological processes. A knowledge graph (KG) can be constructed by integrating such facts and data and be u… ▽ More

    Submitted 12 October, 2022; originally announced October 2022.

    Comments: This paper is based on the Knowledge Graph Lab course (https://dbis.rwth-aachen.de/dbis/index.php/) offered at Computer Science 5 - Information Systems and Databases, RWTH Aachen University, Germany, and a joint collaboration with Osthus GmbH (https://www.osthus.com/), Aachen, Germany

  44. arXiv:2209.14022  [pdf, other

    cs.CV cs.AI cs.LG eess.IV

    Leveraging machine learning for less developed languages: Progress on Urdu text detection

    Authors: Hazrat Ali

    Abstract: Text detection in natural scene images has applications for autonomous driving, navigation help for elderly and blind people. However, the research on Urdu text detection is usually hindered by lack of data resources. We have developed a dataset of scene images with Urdu text. We present the use of machine learning methods to perform detection of Urdu text from the scene images. We extract text re… ▽ More

    Submitted 28 September, 2022; originally announced September 2022.

    Comments: Accepted at NeurIPS ML4D workshop. arXiv admin note: text overlap with arXiv:2109.08060

    Journal ref: NeurIPS ML4D 2021

  45. arXiv:2208.09269  [pdf, other

    eess.SP cs.AI cs.LG cs.SD eess.AS

    Feature Selection Enhancement and Feature Space Visualization for Speech-Based Emotion Recognition

    Authors: Sofia Kanwal, Sohail Asghar, Hazrat Ali

    Abstract: Robust speech emotion recognition relies on the quality of the speech features. We present speech features enhancement strategy that improves speech emotion recognition. We used the INTERSPEECH 2010 challenge feature-set. We identified subsets from the features set and applied Principle Component Analysis to the subsets. Finally, the features are fused horizontally. The resulting feature set is an… ▽ More

    Submitted 19 August, 2022; originally announced August 2022.

    Comments: Accepted at PeerJ Computer Science

  46. arXiv:2208.04947  [pdf, other

    cs.CV eess.IV

    Visual Heart Rate Estimation from RGB Facial Video using Spectral Reflectance

    Authors: Bharath Ramakrishnan, Ruijia Deng, Hassan Ali

    Abstract: Estimation of the Heart rate from the facial video has a number of applications in the medical and fitness industries. Additionally, it has become useful in the field of gaming as well. Several approaches have been proposed to seamlessly obtain the Heart rate from the facial video, but these approaches have had issues in dealing with motion and illumination artifacts. In this work, we propose a re… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

    Comments: Submitted as a student abstract to AAAI 2023

  47. arXiv:2207.10807  [pdf

    cs.LG eess.SP

    A Machine Learning Approach for Driver Identification Based on CAN-BUS Sensor Data

    Authors: Md. Abbas Ali Khan, Mphammad Hanif Ali, AKM Fazlul Haque, Md. Tarek Habib

    Abstract: Driver identification is a momentous field of modern decorated vehicles in the controller area network (CAN-BUS) perspective. Many conventional systems are used to identify the driver. One step ahead, most of the researchers use sensor data of CAN-BUS but there are some difficulties because of the variation of the protocol of different models of vehicle. Our aim is to identify the driver through s… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

  48. arXiv:2206.02358  [pdf, other

    eess.SP cs.AI cs.CV eess.SY

    Implementation of a Modified U-Net for Medical Image Segmentation on Edge Devices

    Authors: Owais Ali, Hazrat Ali, Syed Ayaz Ali Shah, Aamir Shahzad

    Abstract: Deep learning techniques, particularly convolutional neural networks, have shown great potential in computer vision and medical imaging applications. However, deep learning models are computationally demanding as they require enormous computational power and specialized processing hardware for model training. To make these models portable and compatible for prototyping, their implementation on low… ▽ More

    Submitted 6 June, 2022; originally announced June 2022.

    Comments: Preprint of paper accepted in IEEE Transactions on Circuits and Systems II: Express Brief

  49. arXiv:2206.01793  [pdf

    eess.IV cs.CV cs.LG

    R2U++: A Multiscale Recurrent Residual U-Net with Dense Skip Connections for Medical Image Segmentation

    Authors: Mehreen Mubashar, Hazrat Ali, Christer Gronlund, Shoaib Azmat

    Abstract: U-Net is a widely adopted neural network in the domain of medical image segmentation. Despite its quick embracement by the medical imaging community, its performance suffers on complicated datasets. The problem can be ascribed to its simple feature extracting blocks: encoder/decoder, and the semantic gap between encoder and decoder. Variants of U-Net (such as R2U-Net) have been proposed to address… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

    Comments: Paper accepted in Neural Computing and Applications (2022). Please cite the final version available from Springer website https://link.springer.com/article/10.1007/s00521-022-07419-7

  50. Snapture -- A Novel Neural Architecture for Combined Static and Dynamic Hand Gesture Recognition

    Authors: Hassan Ali, Doreen Jirak, Stefan Wermter

    Abstract: As robots are expected to get more involved in people's everyday lives, frameworks that enable intuitive user interfaces are in demand. Hand gesture recognition systems provide a natural way of communication and, thus, are an integral part of seamless Human-Robot Interaction (HRI). Recent years have witnessed an immense evolution of computational models powered by deep learning. However, state-of-… ▽ More

    Submitted 27 February, 2024; v1 submitted 28 May, 2022; originally announced May 2022.

    Comments: In Cognitive Computation(Accepted:30/06/2023, Published:17/07/2023),20 pages,20 figures,4 tables;Please find the published version/info to cite: https://doi.org/10.1007/s12559-023-10174-z;Repositories: https://zenodo.org/doi/10.5281/zenodo.10679196, https://zenodo.org/doi/10.5281/zenodo.10693816;This work was co-funded by Horizon Europe project TERAIS under Grant agreement number 101079338

    ACM Class: I.2.10; I.5.4; I.4.9

    Journal ref: Cognitive Computation 15, 2014-2033 (2023)