Skip to main content

Showing 1–50 of 55 results for author: Khan, S A

  1. arXiv:2404.01240  [pdf, other

    cs.SE cs.CL cs.CV cs.HC

    AURORA: Navigating UI Tarpits via Automated Neural Screen Understanding

    Authors: Safwat Ali Khan, Wenyu Wang, Yiran Ren, Bin Zhu, Jiangfan Shi, Alyssa McGowan, Wing Lam, Kevin Moran

    Abstract: Nearly a decade of research in software engineering has focused on automating mobile app testing to help engineers in overcoming the unique challenges associated with the software platform. Much of this work has come in the form of Automated Input Generation tools (AIG tools) that dynamically explore app screens. However, such tools have repeatedly been demonstrated to achieve lower-than-expected… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

    Comments: Published at 17th IEEE International Conference on Software Testing, Verification and Validation (ICST) 2024, 12 pages

  2. arXiv:2402.14693  [pdf, ps, other

    cs.NI cs.IT

    Joint AP-UE Association and Power Factor Optimization for Distributed Massive MIMO

    Authors: Mohd Saif Ali Khan, Samar Agnihotri, Karthik R. M

    Abstract: The uplink sum-throughput of distributed massive multiple-input-multiple-output (mMIMO) networks depends majorly on Access point (AP)-User Equipment (UE) association and power control. The AP-UE association and power control both are important problems in their own right in distributed mMIMO networks to improve scalability and reduce front-haul load of the network, and to enhance the system perfor… ▽ More

    Submitted 1 July, 2024; v1 submitted 22 February, 2024; originally announced February 2024.

    Comments: This will be presented in the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2024

  3. arXiv:2402.12927  [pdf, other

    cs.CV

    CLIPping the Deception: Adapting Vision-Language Models for Universal Deepfake Detection

    Authors: Sohail Ahmed Khan, Duc-Tien Dang-Nguyen

    Abstract: The recent advancements in Generative Adversarial Networks (GANs) and the emergence of Diffusion models have significantly streamlined the production of highly realistic and widely accessible synthetic content. As a result, there is a pressing need for effective general purpose detection mechanisms to mitigate the potential risks posed by deepfakes. In this paper, we explore the effectiveness of p… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

  4. An advanced data fabric architecture leveraging homomorphic encryption and federated learning

    Authors: Sakib Anwar Rieyan, Md. Raisul Kabir News, A. B. M. Muntasir Rahman, Sadia Afrin Khan, Sultan Tasneem Jawad Zaarif, Md. Golam Rabiul Alam, Mohammad Mehedi Hassan, Michele Ianni, Giancarlo Fortino

    Abstract: Data fabric is an automated and AI-driven data fusion approach to accomplish data management unification without moving data to a centralized location for solving complex data problems. In a Federated learning architecture, the global model is trained based on the learned parameters of several local models that eliminate the necessity of moving data to a centralized repository for machine learning… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

    Journal ref: Information Fusion, 102, 102004 (2024)

  5. arXiv:2310.08083  [pdf, other

    cs.SE cs.IR

    On Using GUI Interaction Data to Improve Text Retrieval-based Bug Localization

    Authors: Junayed Mahmud, Nadeeshan De Silva, Safwat Ali Khan, Seyed Hooman Mostafavi, SM Hasan Mansur, Oscar Chaparro, Andrian Marcus, Kevin Moran

    Abstract: One of the most important tasks related to managing bug reports is localizing the fault so that a fix can be applied. As such, prior work has aimed to automate this task of bug localization by formulating it as an information retrieval problem, where potentially buggy files are retrieved and ranked according to their textual similarity with a given bug report. However, there is often a notable sem… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

    Comments: 13 pages, to appear in the Proceedings of the 46th International Conference on Software Engineering (ICSE'24)

  6. arXiv:2310.06434  [pdf, other

    cs.CL cs.AI cs.MM cs.SD eess.AS

    Whispering LLaMA: A Cross-Modal Generative Error Correction Framework for Speech Recognition

    Authors: Srijith Radhakrishnan, Chao-Han Huck Yang, Sumeer Ahmad Khan, Rohit Kumar, Narsis A. Kiani, David Gomez-Cabrero, Jesper N. Tegner

    Abstract: We introduce a new cross-modal fusion technique designed for generative error correction in automatic speech recognition (ASR). Our methodology leverages both acoustic information and external linguistic representations to generate accurate speech transcription contexts. This marks a step towards a fresh paradigm in generative error correction within the realm of n-best hypotheses. Unlike the exis… ▽ More

    Submitted 16 October, 2023; v1 submitted 10 October, 2023; originally announced October 2023.

    Comments: Accepted to EMNLP 2023 as main paper. 10 pages. Revised math notations. GitHub: https://github.com/Srijith-rkr/Whispering-LLaMA

  7. arXiv:2310.01978  [pdf, other

    cs.MM cs.CY cs.IR

    Online Multimedia Verification with Computational Tools and OSINT: Russia-Ukraine Conflict Case Studies

    Authors: Sohail Ahmed Khan, Jan Gunnar Furuly, Henrik Brattli Vold, Rano Tahseen, Duc-Tien Dang-Nguyen

    Abstract: This paper investigates the use of computational tools and Open-Source Intelligence (OSINT) techniques for verifying online multimedia content, with a specific focus on real-world cases from the Russia-Ukraine conflict. Over a nine-month period from April to December 2022, we examine verification workflows, tools, and case studies published by \faktiskbar. Our study showcases the effectiveness of… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

    Comments: 18 pages

  8. arXiv:2309.15709  [pdf, ps, other

    cs.NI cs.IT

    Distributed Pilot Assignment for Distributed Massive-MIMO Networks

    Authors: Mohd Saif Ali Khan, Samar Agnihotri, Karthik R. M

    Abstract: Pilot contamination is a critical issue in distributed massive MIMO networks, where the reuse of pilot sequences due to limited availability of orthogonal pilots for channel estimation leads to performance degradation. In this work, we propose a novel distributed pilot assignment scheme to effectively mitigate the impact of pilot contamination. Our proposed scheme not only reduces signaling overhe… ▽ More

    Submitted 1 July, 2024; v1 submitted 27 September, 2023; originally announced September 2023.

    Comments: Presented at the IEEE Wireless Communications and Networking Conference (WCNC) 2024

  9. arXiv:2309.14547  [pdf, ps, other

    cs.NI cs.IT

    Distributed Resource Allocation for D2D Multicast in Underlay Cellular Networks

    Authors: Mohd Saif Ali Khan, Ajay Bhardwaj, Samar Agnihotri

    Abstract: We address the problem of distributed resource allocation for multicast communication in device-to-device (D2D) enabled underlay cellular networks. The optimal resource allocation is crucial for maximizing the performance of such networks, which are limited by the severe co-channel interference between cellular users (CU) and D2D multicast groups. However, finding such optimal allocation for netwo… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

  10. arXiv:2309.05920  [pdf, other

    cs.IR cs.AI cs.CL

    SAGE: Structured Attribute Value Generation for Billion-Scale Product Catalogs

    Authors: Athanasios N. Nikolakopoulos, Swati Kaul, Siva Karthik Gade, Bella Dubrov, Umit Batur, Suleiman Ali Khan

    Abstract: We introduce SAGE; a Generative LLM for inferring attribute values for products across world-wide e-Commerce catalogs. We introduce a novel formulation of the attribute-value prediction problem as a Seq2Seq summarization task, across languages, product types and target attributes. Our novel modeling approach lifts the restriction of predicting attribute values within a pre-specified set of choices… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

    Comments: (17 pages)

  11. arXiv:2308.16611  [pdf, other

    cs.CV

    Detecting Out-of-Context Image-Caption Pairs in News: A Counter-Intuitive Method

    Authors: Eivind Moholdt, Sohail Ahmed Khan, Duc-Tien Dang-Nguyen

    Abstract: The growth of misinformation and re-contextualized media in social media and news leads to an increasing need for fact-checking methods. Concurrently, the advancement in generative models makes cheapfakes and deepfakes both easier to make and harder to detect. In this paper, we present a novel approach using generative image models to our advantage for detecting Out-of-Context (OOC) use of images-… ▽ More

    Submitted 31 August, 2023; originally announced August 2023.

    Comments: ACM International Conference on Content-Based Multimedia Indexing (CBMI '23)

  12. arXiv:2308.03471  [pdf, other

    cs.CV

    Deepfake Detection: A Comparative Analysis

    Authors: Sohail Ahmed Khan, Duc-Tien Dang-Nguyen

    Abstract: This paper present a comprehensive comparative analysis of supervised and self-supervised models for deepfake detection. We evaluate eight supervised deep learning architectures and two transformer-based models pre-trained using self-supervised strategies (DINO, CLIP) on four benchmarks (FakeAVCeleb, CelebDF-V2, DFDC, and FaceForensics++). Our analysis includes intra-dataset and inter-dataset eval… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  13. arXiv:2308.00856  [pdf, other

    cs.LG cs.CR eess.IV

    Differential Privacy for Adaptive Weight Aggregation in Federated Tumor Segmentation

    Authors: Muhammad Irfan Khan, Esa Alhoniemi, Elina Kontio, Suleiman A. Khan, Mojtaba Jafaritadi

    Abstract: Federated Learning (FL) is a distributed machine learning approach that safeguards privacy by creating an impartial global model while respecting the privacy of individual client data. However, the conventional FL method can introduce security risks when dealing with diverse client data, potentially compromising privacy and data integrity. To address these challenges, we present a differential pri… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

  14. arXiv:2307.10814  [pdf, other

    cs.CL cs.NE cs.SD eess.AS

    Cross-Corpus Multilingual Speech Emotion Recognition: Amharic vs. Other Languages

    Authors: Ephrem Afele Retta, Richard Sutcliffe, Jabar Mahmood, Michael Abebe Berwo, Eiad Almekhlafi, Sajjad Ahmed Khan, Shehzad Ashraf Chaudhry, Mustafa Mhamed, Jun Feng

    Abstract: In a conventional Speech emotion recognition (SER) task, a classifier for a given language is trained on a pre-existing dataset for that same language. However, where training data for a language does not exist, data from other languages can be used instead. We experiment with cross-lingual and multilingual SER, working with Amharic, English, German and URDU. For Amharic, we use our own publicly-a… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

    Comments: 16 pages, 9 tables, 5 figures

  15. arXiv:2305.11244  [pdf, other

    cs.CL cs.AI cs.LG cs.NE eess.AS

    A Parameter-Efficient Learning Approach to Arabic Dialect Identification with Pre-Trained General-Purpose Speech Model

    Authors: Srijith Radhakrishnan, Chao-Han Huck Yang, Sumeer Ahmad Khan, Narsis A. Kiani, David Gomez-Cabrero, Jesper N. Tegner

    Abstract: In this work, we explore Parameter-Efficient-Learning (PEL) techniques to repurpose a General-Purpose-Speech (GSM) model for Arabic dialect identification (ADI). Specifically, we investigate different setups to incorporate trainable features into a multi-layer encoder-decoder GSM formulation under frozen pre-trained settings. Our architecture includes residual adapter and model reprogramming (inpu… ▽ More

    Submitted 3 October, 2023; v1 submitted 18 May, 2023; originally announced May 2023.

    Comments: Accepted to Interspeech 2023, 5 pages. Code is available at: https://github.com/Srijith-rkr/KAUST-Whisper-Adapter under MIT license

  16. arXiv:2304.01328  [pdf, other

    cs.CV cs.CL

    Grand Challenge On Detecting Cheapfakes

    Authors: Duc-Tien Dang-Nguyen, Sohail Ahmed Khan, Cise Midoglu, Michael Riegler, Pål Halvorsen, Minh-Son Dao

    Abstract: Cheapfake is a recently coined term that encompasses non-AI ("cheap") manipulations of multimedia content. Cheapfakes are known to be more prevalent than deepfakes. Cheapfake media can be created using editing software for image/video manipulations, or even without using any software, by simply altering the context of an image/video by sharing the media alongside misleading claims. This alteration… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2207.14534

  17. arXiv:2301.12617  [pdf, other

    cs.LG cs.AI cs.DC cs.NI

    Regularized Weight Aggregation in Networked Federated Learning for Glioblastoma Segmentation

    Authors: Muhammad Irfan Khan, Mohammad Ayyaz Azeem, Esa Alhoniemi, Elina Kontio, Suleiman A. Khan, Mojtaba Jafaritadi

    Abstract: In federated learning (FL), the global model at the server requires an efficient mechanism for weight aggregation and a systematic strategy for collaboration selection to manage and optimize communication payload. We introduce a practical and cost-efficient method for regularized weight aggregation and propose a laborsaving technique to select collaborators per round. We illustrate the performance… ▽ More

    Submitted 29 January, 2023; originally announced January 2023.

  18. arXiv:2212.08568  [pdf, other

    cs.CV cs.LG

    Biomedical image analysis competitions: The state of current participation practice

    Authors: Matthias Eisenmann, Annika Reinke, Vivienn Weru, Minu Dietlinde Tizabi, Fabian Isensee, Tim J. Adler, Patrick Godau, Veronika Cheplygina, Michal Kozubek, Sharib Ali, Anubha Gupta, Jan Kybic, Alison Noble, Carlos Ortiz de Solórzano, Samiksha Pachade, Caroline Petitjean, Daniel Sage, Donglai Wei, Elizabeth Wilden, Deepak Alapatt, Vincent Andrearczyk, Ujjwal Baid, Spyridon Bakas, Niranjan Balu, Sophia Bano , et al. (331 additional authors not shown)

    Abstract: The number of international benchmarking competitions is steadily increasing in various fields of machine learning (ML) research and practice. So far, however, little is known about the common practice as well as bottlenecks faced by the community in tackling the research questions posed. To shed light on the status quo of algorithm development in the specific field of biomedical imaging analysis,… ▽ More

    Submitted 12 September, 2023; v1 submitted 16 December, 2022; originally announced December 2022.

  19. Avgust: Automating Usage-Based Test Generation from Videos of App Executions

    Authors: Yixue Zhao, Saghar Talebipour, Kesina Baral, Hyojae Park, Leon Yee, Safwat Ali Khan, Yuriy Brun, Nenad Medvidovic, Kevin Moran

    Abstract: Writing and maintaining UI tests for mobile apps is a time-consuming and tedious task. While decades of research have produced automated approaches for UI test generation, these approaches typically focus on testing for crashes or maximizing code coverage. By contrast, recent research has shown that developers prefer usage-based tests, which center around specific uses of app features, to help sup… ▽ More

    Submitted 1 November, 2022; v1 submitted 6 September, 2022; originally announced September 2022.

    Journal ref: ESEC/FSE 2022

  20. arXiv:2208.05820  [pdf, other

    cs.CV

    Hybrid Transformer Network for Deepfake Detection

    Authors: Sohail Ahmed Khan, Duc-Tien Dang-Nguyen

    Abstract: Deepfake media is becoming widespread nowadays because of the easily available tools and mobile apps which can generate realistic looking deepfake videos/images without requiring any technical knowledge. With further advances in this field of technology in the near future, the quantity and quality of deepfake media is also expected to flourish, while making deepfake media a likely new practical to… ▽ More

    Submitted 11 August, 2022; originally announced August 2022.

    Comments: Accepted for publication at ACM International Conference on Content-Based Multimedia Indexing

  21. arXiv:2207.14534  [pdf, other

    cs.MM

    ACM Multimedia Grand Challenge on Detecting Cheapfakes

    Authors: Shivangi Aneja, Cise Midoglu, Duc-Tien Dang-Nguyen, Sohail Ahmed Khan, Michael Riegler, Pål Halvorsen, Chris Bregler, Balu Adsumilli

    Abstract: Cheapfake is a recently coined term that encompasses non-AI (``cheap'') manipulations of multimedia content. Cheapfakes are known to be more prevalent than deepfakes. Cheapfake media can be created using editing software for image/video manipulations, or even without using any software, by simply altering the context of an image/video by sharing the media alongside misleading claims. This alterati… ▽ More

    Submitted 29 July, 2022; originally announced July 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2107.05297

  22. arXiv:2201.02574  [pdf, other

    eess.IV cs.CV

    An Incremental Learning Approach to Automatically Recognize Pulmonary Diseases from the Multi-vendor Chest Radiographs

    Authors: Mehreen Sirshar, Taimur Hassan, Muhammad Usman Akram, Shoab Ahmed Khan

    Abstract: Pulmonary diseases can cause severe respiratory problems, leading to sudden death if not treated timely. Many researchers have utilized deep learning systems to diagnose pulmonary disorders using chest X-rays (CXRs). However, such systems require exhaustive training efforts on large-scale data to effectively diagnose chest abnormalities. Furthermore, procuring such large-scale data is often infeas… ▽ More

    Submitted 14 January, 2022; v1 submitted 7 January, 2022; originally announced January 2022.

    Comments: Computers in Biology and Medicine

    Journal ref: Computers in Biology and Medicine, 2021

  23. arXiv:2108.05307  [pdf

    cs.CV

    Video Transformer for Deepfake Detection with Incremental Learning

    Authors: Sohail A. Khan, Hang Dai

    Abstract: Face forgery by deepfake is widely spread over the internet and this raises severe societal concerns. In this paper, we propose a novel video transformer with incremental learning for detecting deepfake videos. To better align the input face images, we use a 3D face reconstruction method to generate UV texture from a single input face image. The aligned face image can also provide pose, eyes blink… ▽ More

    Submitted 11 August, 2021; originally announced August 2021.

    Comments: Accepted at ACM International Conference on Multimedia, October 20 to 24, 2021, Virtual Event, China

  24. arXiv:2106.12753  [pdf, other

    cs.CR cs.LG

    DeepAuditor: Distributed Online Intrusion Detection System for IoT devices via Power Side-channel Auditing

    Authors: Woosub Jung, Yizhou Feng, Sabbir Ahmed Khan, Chunsheng Xin, Danella Zhao, Gang Zhou

    Abstract: As the number of IoT devices has increased rapidly, IoT botnets have exploited the vulnerabilities of IoT devices. However, it is still challenging to detect the initial intrusion on IoT devices prior to massive attacks. Recent studies have utilized power side-channel information to identify this intrusion behavior on IoT devices but still lack accurate models in real-time for ubiquitous botnet de… ▽ More

    Submitted 9 May, 2022; v1 submitted 23 June, 2021; originally announced June 2021.

    Comments: The 21st ACM/IEEE Conference on Information Processing in Sensor Networks (IPSN'22)

    ACM Class: C.2.4; I.2.11

  25. arXiv:2106.01309  [pdf, other

    cond-mat.mtrl-sci cs.LG physics.data-an

    Benchmarking the Performance of Bayesian Optimization across Multiple Experimental Materials Science Domains

    Authors: Qiaohao Liang, Aldair E. Gongora, Zekun Ren, Armi Tiihonen, Zhe Liu, Shijing Sun, James R. Deneault, Daniil Bash, Flore Mekki-Berrada, Saif A. Khan, Kedar Hippalgaonkar, Benji Maruyama, Keith A. Brown, John Fisher III, Tonio Buonassisi

    Abstract: In the field of machine learning (ML) for materials optimization, active learning algorithms, such as Bayesian Optimization (BO), have been leveraged for guiding autonomous and high-throughput experimentation systems. However, very few studies have evaluated the efficiency of BO as a general optimization algorithm across a broad range of experimental materials science domains. In this work, we eva… ▽ More

    Submitted 23 May, 2021; originally announced June 2021.

  26. arXiv:2102.05960  [pdf

    stat.ML cs.AI cs.LG

    Comparative Analysis of Machine Learning Approaches to Analyze and Predict the Covid-19 Outbreak

    Authors: Muhammad Naeem, Jian Yu, Muhammad Aamir, Sajjad Ahmad Khan, Olayinka Adeleye, Zardad Khan

    Abstract: Background. Forecasting the time of forthcoming pandemic reduces the impact of diseases by taking precautionary steps such as public health messaging and raising the consciousness of doctors. With the continuous and rapid increase in the cumulative incidence of COVID-19, statistical and outbreak prediction models including various machine learning (ML) models are being used by the research communi… ▽ More

    Submitted 11 February, 2021; originally announced February 2021.

    Comments: 22 pages, 10 figures

  27. arXiv:2102.05950  [pdf

    cs.CV cs.CR

    Adversarially robust deepfake media detection using fused convolutional neural network predictions

    Authors: Sohail Ahmed Khan, Alessandro Artusi, Hang Dai

    Abstract: Deepfakes are synthetically generated images, videos or audios, which fraudsters use to manipulate legitimate information. Current deepfake detection systems struggle against unseen data. To address this, we employ three different deep Convolutional Neural Network (CNN) models, (1) VGG16, (2) InceptionV3, and (3) XceptionNet to classify fake and real images extracted from videos. We also construct… ▽ More

    Submitted 11 February, 2021; originally announced February 2021.

  28. Phishing Attacks and Websites Classification Using Machine Learning and Multiple Datasets (A Comparative Analysis)

    Authors: Sohail Ahmed Khan, Wasiq Khan, Abir Hussain

    Abstract: Phishing attacks are the most common type of cyber-attacks used to obtain sensitive information and have been affecting individuals as well as organisations across the globe. Various techniques have been proposed to identify the phishing attacks specifically, deployment of machine intelligence in recent years. However, the deployed algorithms and discriminating factors are very diverse in existing… ▽ More

    Submitted 6 January, 2021; originally announced January 2021.

    Journal ref: In: Huang DS., Premaratne P. (eds) Intelligent Computing Methodologies. ICIC 2020. Lecture Notes in Computer Science, vol 12465. Springer, Cham

  29. arXiv:2011.14358  [pdf, other

    cs.CV

    Exploring Deep 3D Spatial Encodings for Large-Scale 3D Scene Understanding

    Authors: Saqib Ali Khan, Yilei Shi, Muhammad Shahzad, Xiao Xiang Zhu

    Abstract: Semantic segmentation of raw 3D point clouds is an essential component in 3D scene analysis, but it poses several challenges, primarily due to the non-Euclidean nature of 3D point clouds. Although, several deep learning based approaches have been proposed to address this task, but almost all of them emphasized on using the latent (global) feature representations from traditional convolutional neur… ▽ More

    Submitted 29 November, 2020; originally announced November 2020.

    Comments: Submitted to IEEE Geoscience and Remote Sensing Letters (GRSL) Journal

  30. arXiv:2010.12065  [pdf

    q-bio.QM cs.CV cs.LG eess.IV

    A generalized deep learning model for multi-disease Chest X-Ray diagnostics

    Authors: Nabit Bajwa, Kedar Bajwa, Atif Rana, M. Faique Shakeel, Kashif Haqqi, Suleiman Ali Khan

    Abstract: We investigate the generalizability of deep convolutional neural network (CNN) on the task of disease classification from chest x-rays collected over multiple sites. We systematically train the model using datasets from three independent sites with different patient populations: National Institute of Health (NIH), Stanford University Medical Centre (CheXpert), and Shifa International Hospital (SIH… ▽ More

    Submitted 17 October, 2020; originally announced October 2020.

  31. Analysing the impact of global demographic characteristics over the COVID-19 spread using class rule mining and pattern matching

    Authors: Wasiq Khan, Abir Hussain, Sohail Ahmed Khan, Mohammed Al-Jumailey, Raheel Nawaz, Panos Liatsis

    Abstract: Since the coronavirus disease (COVID-19) outbreak in December 2019, studies have been addressing diverse aspects in relation to COVID-19 and Variant of Concern 202012/01 (VOC 202012/01) such as potential symptoms and predictive tools. However, limited work has been performed towards the modelling of complex associations between the combined demographic attributes and varying nature of the COVID-19… ▽ More

    Submitted 31 January, 2021; v1 submitted 27 September, 2020; originally announced September 2020.

    Comments: Diversity in global death rate due to COVID-19 and Variant of Concern 202012/01 (VOC 202012/01)

    Journal ref: Royal Society Open Science, 27 January 2021, Volume 8, Issue 1

  32. arXiv:2009.06602  [pdf, other

    cs.AI cs.CY cs.LG

    VacSIM: Learning Effective Strategies for COVID-19 Vaccine Distribution using Reinforcement Learning

    Authors: Raghav Awasthi, Keerat Kaur Guliani, Saif Ahmad Khan, Aniket Vashishtha, Mehrab Singh Gill, Arshita Bhatt, Aditya Nagori, Aniket Gupta, Ponnurangam Kumaraguru, Tavpritesh Sethi

    Abstract: A COVID-19 vaccine is our best bet for mitigating the ongoing onslaught of the pandemic. However, vaccine is also expected to be a limited resource. An optimal allocation strategy, especially in countries with access inequities and temporal separation of hot-spots, might be an effective way of halting the disease spread. We approach this problem by proposing a novel pipeline VacSIM that dovetails… ▽ More

    Submitted 4 December, 2021; v1 submitted 14 September, 2020; originally announced September 2020.

    Comments: 14 pages, 5 figures

  33. Federated Multi-view Matrix Factorization for Personalized Recommendations

    Authors: Adrian Flanagan, Were Oyomno, Alexander Grigorievskiy, Kuan Eeik Tan, Suleiman A. Khan, Muhammad Ammad-Ud-Din

    Abstract: We introduce the federated multi-view matrix factorization method that extends the federated learning framework to matrix factorization with multiple data sources. Our method is able to learn the multi-view model without transferring the user's personal data to a central server. As far as we are aware this is the first federated model to provide recommendations using multi-view matrix factorizatio… ▽ More

    Submitted 8 April, 2020; originally announced April 2020.

    Comments: 16 pages, 3 figures, 5 tables, submitted to a conference

    Report number: 12458

    Journal ref: Machine Learning and Knowledge Discovery in Databases. ECML PKDD 2020. Lecture Notes in Computer Science, Springer, Cham

  34. Table Structure Extraction with Bi-directional Gated Recurrent Unit Networks

    Authors: Saqib Ali Khan, Syed Muhammad Daniyal Khalid, Muhammad Ali Shahzad, Faisal Shafait

    Abstract: Tables present summarized and structured information to the reader, which makes table structure extraction an important part of document understanding applications. However, table structure identification is a hard problem not only because of the large variation in the table layouts and styles, but also owing to the variations in the page layouts and the noise contamination levels. A lot of resear… ▽ More

    Submitted 8 January, 2020; originally announced January 2020.

    Comments: Proceedings of the 15th International Conference on Document Analysis and Recognition (ICDAR) 2019, Sydney, Australia

  35. arXiv:1907.05692  [pdf, other

    eess.SP cs.IT

    Low PAPR Reference Signal Transceiver Design for 3GPP 5G NR Uplink

    Authors: M. Sibgath Ali Khan, Sai Dhiraj Amuru, Kiran Kuchi

    Abstract: Low peak-to-average-power ratio (PAPR) transmissions significantly improve the cell coverage as they enable high power transmissions without saturating the power amplifier. A new modulation scheme, namely, pi/2-BPSK was introduced in the Rel-15 3GPP 5G NR specifications to support low PAPR transmissions using the DFT-spread-OFDM waveform in the uplink transmissions. To enable data demodulation usi… ▽ More

    Submitted 12 July, 2019; originally announced July 2019.

    Comments: 12 pages , Journal Paper

  36. arXiv:1901.09888  [pdf, other

    cs.IR cs.AI cs.LG stat.ML

    Federated Collaborative Filtering for Privacy-Preserving Personalized Recommendation System

    Authors: Muhammad Ammad-ud-din, Elena Ivannikova, Suleiman A. Khan, Were Oyomno, Qiang Fu, Kuan Eeik Tan, Adrian Flanagan

    Abstract: The increasing interest in user privacy is leading to new privacy preserving machine learning paradigms. In the Federated Learning paradigm, a master machine learning model is distributed to user clients, the clients use their locally stored data and model for both inference and calculating model updates. The model updates are sent back and aggregated on the server to update the master model then… ▽ More

    Submitted 29 January, 2019; originally announced January 2019.

    Comments: 12 pages, 2 figures, 2 tables, submitted to a conference

  37. arXiv:1809.10681  [pdf

    q-bio.GN cs.CE

    Cancer classification and pathway discovery using non-negative matrix factorization

    Authors: Zexian Zeng, Andy Vo, Chengsheng Mao, Susan E Clare, Seema A Khan, Yuan Luo

    Abstract: Extracting genetic information from a full range of sequencing data is important for understanding diseases. We propose a novel method to effectively explore the landscape of genetic mutations and aggregate them to predict cancer type. We used multinomial logistic regression, nonsmooth non-negative matrix factorization (nsNMF), and support vector machine (SVM) to utilize the full range of sequenci… ▽ More

    Submitted 8 October, 2018; v1 submitted 27 September, 2018; originally announced September 2018.

    Comments: 8 pages, 5 figures, conference

  38. Towards a computational model of social norms

    Authors: Ladislau Bölöni, Taranjeet Singh Bhatia, Saad Ahmad Khan, Jonathan Streater, Stephen M. Fiore

    Abstract: We describe a computational model of social norms based on identifying values that a certain culture finds desirable such as dignity, generosity and politeness. The model quantifies these values in the form of Culture-Sanctioned Social Metrics (CSSMs) and treats social norms as the requirement to maximize these metrics from the perspective of the self, peers and public. This model can be used to c… ▽ More

    Submitted 17 January, 2018; originally announced January 2018.

  39. arXiv:1709.05952  [pdf, other

    cs.CV

    Towards a Crowd Analytic Framework For Crowd Management in Majid-al-Haram

    Authors: Sultan Daud Khan, Muhammad Tayyab, Muhammad Khurram Amin, Akram Nour, Anas Basalamah, Saleh Basalamah, Sohaib Ahmad Khan

    Abstract: The scared cities of Makkah Al Mukarramah and Madina Al Munawarah host millions of pilgrims every year. During Hajj, the movement of large number of people has a unique spatial and temporal constraints, which makes Hajj one of toughest challenges for crowd management. In this paper, we propose a computer vision based framework that automatically analyses video sequence and computes important measu… ▽ More

    Submitted 14 September, 2017; originally announced September 2017.

    Comments: 17th Scientific Meeting on Hajj & Umrah Research, 2017

  40. arXiv:1611.05177  [pdf, ps, other

    cs.NI

    Leveraging Decoupling in Enabling Energy Aware D2D Communications

    Authors: Mukesh Kumar Giluka, M Sigbath Ali Khan, Vanlin Sathya, Antony A Franklin

    Abstract: Downlink/Uplink decoupling (DUDe) in LTE net- works has caught the attention of researchers as it provides better uplink SINR and reduced power consumption per device due to decoupled connection of a device with the Macro (in downlink) and a small cell (in uplink). These characteristics of DUDe can be exploited to encourage more D2D communications in the network. This paper first proposes a model… ▽ More

    Submitted 16 November, 2016; originally announced November 2016.

    Comments: 6 pages, 10 figures, Accepted for the proceedings in IEEE ANTS 2016

  41. arXiv:1607.00729  [pdf, ps, other

    cs.CR

    Retrofitting mutual authentication to GSM using RAND hijacking

    Authors: Mohammed Shafiul Alam Khan, Chris J Mitchell

    Abstract: As has been widely discussed, the GSM mobile telephony system only offers unilateral authentication of the mobile phone to the network; this limitation permits a range of attacks. While adding support for mutual authentication would be highly beneficial, changing the way GSM serving networks operate is not practical. This paper proposes a novel modification to the relationship between a Subscriber… ▽ More

    Submitted 4 July, 2016; v1 submitted 3 July, 2016; originally announced July 2016.

    Comments: 17 pages, 2 figures

  42. arXiv:1606.03623  [pdf, other

    stat.ML cs.LG q-bio.QM

    Drug response prediction by inferring pathway-response associations with Kernelized Bayesian Matrix Factorization

    Authors: Muhammad Ammad-ud-din, Suleiman A. Khan, Disha Malani, Astrid Murumägi, Olli Kallioniemi, Tero Aittokallio, Samuel Kaski

    Abstract: A key goal of computational personalized medicine is to systematically utilize genomic and other molecular features of samples to predict drug responses for a previously unseen sample. Such predictions are valuable for developing hypotheses for selecting therapies tailored for individual patients. This is especially valuable in oncology, where molecular and genetic heterogeneity of the cells has a… ▽ More

    Submitted 11 June, 2016; originally announced June 2016.

    Comments: Accepted in European Conference in Computational Biology, to be published in Bioinformatics 2016

    Report number: 32(17):i455-i463

    Journal ref: 2016 Bioinformatics Published by Oxford University Press

  43. arXiv:1507.01073  [pdf, ps, other

    stat.ML cs.LG

    Convex Factorization Machine for Regression

    Authors: Makoto Yamada, Wenzhao Lian, Amit Goyal, Jianhui Chen, Kishan Wimalawarne, Suleiman A Khan, Samuel Kaski, Hiroshi Mamitsuka, Yi Chang

    Abstract: We propose the convex factorization machine (CFM), which is a convex variant of the widely used Factorization Machines (FMs). Specifically, we employ a linear+quadratic model and regularize the linear term with the $\ell_2$-regularizer and the quadratic term with the trace norm regularizer. Then, we formulate the CFM optimization as a semidefinite programming problem and propose an efficient optim… ▽ More

    Submitted 9 August, 2016; v1 submitted 4 July, 2015; originally announced July 2015.

  44. arXiv:1504.03287  [pdf, ps, other

    cs.CR

    Improving Air Interface User Privacy in Mobile Telephony

    Authors: Mohammed Shafiul Alam Khan, Chris J Mitchell

    Abstract: Although the security properties of 3G and 4G mobile networks have significantly improved by comparison with 2G (GSM), significant shortcomings remain with respect to user privacy. A number of possible modifications to 2G, 3G and 4G protocols have been proposed designed to provide greater user privacy; however, they all require significant modifications to existing deployed infrastructures, which… ▽ More

    Submitted 13 April, 2015; originally announced April 2015.

  45. arXiv:1303.7445  [pdf, ps, other

    cs.AI q-fin.GN

    Agent-based modeling of a price information trading business

    Authors: Saad Ahmad Khan, Ladislau Boloni

    Abstract: We describe an agent-based simulation of a fictional (but feasible) information trading business. The Gas Price Information Trader (GPIT) buys information about real-time gas prices in a metropolitan area from drivers and resells the information to drivers who need to refuel their vehicles. Our simulation uses real world geographic data, lifestyle-dependent driving patterns and vehicle models to… ▽ More

    Submitted 29 March, 2013; originally announced March 2013.

    Comments: Extended version of the paper published at Computer and Information Sciences, Proc. of ISCIS-26, 2011

  46. arXiv:1205.6229  [pdf

    cs.CR

    An Approach of Digital Image Copyright Protection by Using Watermarking Technology

    Authors: Md. Selim Reza, Mohammed Shafiul Alam Khan, Md. Golam Robiul Alam, Serajul Islam

    Abstract: Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for a wide variety of applications such as copy prevention right management, authentication and filtering of internet content. The proposed system is able to protect… ▽ More

    Submitted 28 May, 2012; originally announced May 2012.

    Comments: 7 pages, 6 figures. arXiv admin note: text overlap with arXiv:1103.3802 by other authors

    Journal ref: International Journal of Computer Science Issues, Vol. 9, Issue 2, No 2, 2012, pp:280-286

  47. arXiv:1202.1918  [pdf

    cs.NI

    A Reliable Semi-Distributed Load Balancing Architecture of Heterogeneous Wireless Networks

    Authors: Md. Golam Rabiul Alam, Chayan Biswas, Naushin Nower, Mohammed Shafiul Alam Khan

    Abstract: Now a day's Heterogeneous wireless network is a promising field of research interest. Various challenges exist in this hybrid combination like load balancing, resource management and so on. In this paper we introduce a reliable load balancing architecture for heterogeneous wireless communications to ensure certain level of quality of service. To conquer the problem of centralized and distributed d… ▽ More

    Submitted 9 February, 2012; originally announced February 2012.

    Comments: Page 15 No of figure: 8

    Journal ref: International Journal of Computer Networks & Communications (IJCNC) Vol.4, No.1, January 2012

  48. arXiv:1109.1874   

    cs.IT

    A Capacity Improvement Method for CDMA based Mesh Networks in SUI Multipath Fading Channels

    Authors: Muhammad Zeeshan, Shoab A Khan, Muhammad Yasir Malik

    Abstract: Code Division Multiple Access (CDMA) is the most promising candidate for wideband data access. This is due to the advantage of soft limit on the number of active mobile devices. Many wireless mesh systems impose an upper bound on the BER performance which restricts the increase in number of mobile users. Capacity is further reduced in Multipath Fading Environment (MFE). This paper presents an effe… ▽ More

    Submitted 11 December, 2012; v1 submitted 8 September, 2011; originally announced September 2011.

    Comments: This paper has been withdrawn by the author due to a some mistakes in simulations

  49. arXiv:1109.1643   

    cs.IT

    An Efficient Hybrid Power Control Algorithm for Capacity Improvement of CDMA-based Fixed Wireless Applications

    Authors: Muhammad Zeeshan, Shoab A Khan, Muhammad Yasir Malik

    Abstract: In Fixed Wireless Applications (FWA), the Code Division Multiple Access (CDMA) is the most promising candidate for wideband data access. The reason is the soft limit on the number of active mobile devices. Many Fixed Wireless Applications impose an upper bound on the BER performance which restricts the increase in number of mobile users. The number of active mobile users or Capacity is further red… ▽ More

    Submitted 11 December, 2012; v1 submitted 8 September, 2011; originally announced September 2011.

    Comments: This paper has been withdrawn by the author due to some mistakes in simulations

  50. Software Development Standard and Software Engineering Practice: A Case Study of Bangladesh

    Authors: Zerina Begum, Mohammed Shafiul Alam Khan, Mohd. Zulfiquar Hafiz, Md. Saiful Islam, Md. Shoyaib

    Abstract: Improving software process to achieve high quality in a software development organization is the key factor to success. Bangladeshi software firms have not experienced much in this particular area in comparison to other countries. The ISO 9001 and CMM standard has become a basic part of software development. The main objectives of our study are: 1) To understand the software development process us… ▽ More

    Submitted 19 August, 2010; originally announced August 2010.

    Comments: 13 pages, 3 figures, 11 tables

    Journal ref: Bangladesh Academy of Science Journal, Vol. 32, No. 2, pp. 201-210, December 2008