Skip to main content

Showing 1–50 of 79 results for author: Rahman, R

  1. arXiv:2406.19171  [pdf, other

    cs.SE

    Towards Crowd-Based Requirements Engineering for Digital Farming (CrowdRE4DF)

    Authors: Eduard C. Groen, Kazi Rezoanur Rahman, Nikita Narsinghani, Joerg Doerr

    Abstract: The farming domain has seen a tremendous shift towards digital solutions. However, capturing farmers' requirements regarding Digital Farming (DF) technology remains a difficult task due to domain-specific challenges. Farmers form a diverse and international crowd of practitioners who use a common pool of agricultural products and services, which means we can consider the possibility of applying Cr… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: Accepted at 32nd IEEE International Requirements Engineering Conference 2024 (RE'24)

  2. arXiv:2406.00257  [pdf, other

    cs.CL

    Are Large Vision Language Models up to the Challenge of Chart Comprehension and Reasoning? An Extensive Investigation into the Capabilities and Limitations of LVLMs

    Authors: Mohammed Saidul Islam, Raian Rahman, Ahmed Masry, Md Tahmid Rahman Laskar, Mir Tafseer Nayeem, Enamul Hoque

    Abstract: Natural language is a powerful complementary modality of communication for data visualizations, such as bar and line charts. To facilitate chart-based reasoning using natural language, various downstream tasks have been introduced recently such as chart question answering, chart summarization, and fact-checking with charts. These tasks pose a unique challenge, demanding both vision-language reason… ▽ More

    Submitted 31 May, 2024; originally announced June 2024.

  3. arXiv:2405.21015  [pdf, other

    cs.CY

    The rising costs of training frontier AI models

    Authors: Ben Cottier, Robi Rahman, Loredana Fattorini, Nestor Maslej, David Owen

    Abstract: The costs of training frontier AI models have grown dramatically in recent years, but there is limited public data on the magnitude and growth of these expenses. This paper develops a detailed cost model to address this gap, estimating training costs using three approaches that account for hardware, energy, cloud rental, and staff expenses. The analysis reveals that the amortized cost to train the… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

  4. arXiv:2405.04305  [pdf, other

    cs.CV cs.AI

    A New Dataset and Comparative Study for Aphid Cluster Detection and Segmentation in Sorghum Fields

    Authors: Raiyan Rahman, Christopher Indris, Goetz Bramesfeld, Tianxiao Zhang, Kaidong Li, Xiangyu Chen, Ivan Grijalva, Brian McCornack, Daniel Flippo, Ajay Sharda, Guanghui Wang

    Abstract: Aphid infestations are one of the primary causes of extensive damage to wheat and sorghum fields and are one of the most common vectors for plant viruses, resulting in significant agricultural yield losses. To address this problem, farmers often employ the inefficient use of harmful chemical pesticides that have negative health and environmental impacts. As a result, a large amount of pesticide is… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

  5. arXiv:2405.02321  [pdf, other

    cs.AI cs.IR

    Accelerating Medical Knowledge Discovery through Automated Knowledge Graph Generation and Enrichment

    Authors: Mutahira Khalid, Raihana Rahman, Asim Abbas, Sushama Kumari, Iram Wajahat, Syed Ahmad Chan Bukhari

    Abstract: Knowledge graphs (KGs) serve as powerful tools for organizing and representing structured knowledge. While their utility is widely recognized, challenges persist in their automation and completeness. Despite efforts in automation and the utilization of expert-created ontologies, gaps in connectivity remain prevalent within KGs. In response to these challenges, we propose an innovative approach ter… ▽ More

    Submitted 21 April, 2024; originally announced May 2024.

    Comments: 18 pages, 5 figures

  6. arXiv:2404.10904  [pdf, other

    cs.CV

    Multi-Task Multi-Modal Self-Supervised Learning for Facial Expression Recognition

    Authors: Marah Halawa, Florian Blume, Pia Bideau, Martin Maier, Rasha Abdel Rahman, Olaf Hellwich

    Abstract: Human communication is multi-modal; e.g., face-to-face interaction involves auditory signals (speech) and visual signals (face movements and hand gestures). Hence, it is essential to exploit multiple modalities when designing machine learning-based facial expression recognition systems. In addition, given the ever-growing quantities of video data that capture human facial expressions, such systems… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: The paper will appear in the CVPR 2024 workshops proceedings

  7. arXiv:2404.05049  [pdf, other

    cs.CV

    PlateSegFL: A Privacy-Preserving License Plate Detection Using Federated Segmentation Learning

    Authors: Md. Shahriar Rahman Anuvab, Mishkat Sultana, Md. Atif Hossain, Shashwata Das, Suvarthi Chowdhury, Rafeed Rahman, Dibyo Fabian Dofadar, Shahriar Rahman Rana

    Abstract: Automatic License Plate Recognition (ALPR) is an integral component of an intelligent transport system with extensive applications in secure transportation, vehicle-to-vehicle communication, stolen vehicles detection, traffic violations, and traffic flow management. The existing license plate detection system focuses on one-shot learners or pre-trained models that operate with a geometric bounding… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

  8. arXiv:2403.18597  [pdf, other

    cond-mat.mtrl-sci cs.LG

    Heterogeneous Peridynamic Neural Operators: Discover Biotissue Constitutive Law and Microstructure From Digital Image Correlation Measurements

    Authors: Siavash Jafarzadeh, Stewart Silling, Lu Zhang, Colton Ross, Chung-Hao Lee, S. M. Rakibur Rahman, Shuodao Wang, Yue Yu

    Abstract: Human tissues are highly organized structures with specific collagen fiber arrangements varying from point to point. The effects of such heterogeneity play an important role for tissue function, and hence it is of critical to discover and understand the distribution of such fiber orientations from experimental measurements, such as the digital image correlation data. To this end, we introduce the… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  9. arXiv:2403.14038  [pdf, other

    cs.SI cs.HC

    PureConnect: A Localized Social Media System to Increase Awareness and Connectedness in Environmental Justice Communities

    Authors: Omar Hammad, Md Rezwanur Rahman, Gopala Krishna Vasanth Kanugo, Nicholas Clements, Shelly Miller, Shivakant Mishra, Esther Sullivan

    Abstract: Frequent disruptions like highway constructions are common now-a-days, often impacting environmental justice communities (communities with low socio-economic status with disproportionately high and adverse human health and environmental effects) that live nearby. Based on our interactions via focus groups with the members of four environmental justice communities impacted by a major highway constr… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: Submitted in COMPSAC 2024

  10. arXiv:2403.05812  [pdf, other

    cs.CL cs.AI

    Algorithmic progress in language models

    Authors: Anson Ho, Tamay Besiroglu, Ege Erdil, David Owen, Robi Rahman, Zifan Carl Guo, David Atkinson, Neil Thompson, Jaime Sevilla

    Abstract: We investigate the rate at which algorithms for pre-training language models have improved since the advent of deep learning. Using a dataset of over 200 language model evaluations on Wikitext and Penn Treebank spanning 2012-2023, we find that the compute required to reach a set performance threshold has halved approximately every 8 months, with a 95% confidence interval of around 5 to 14 months,… ▽ More

    Submitted 9 March, 2024; originally announced March 2024.

  11. arXiv:2402.11180  [pdf, other

    cs.SI cs.HC

    PureNav: A Personalized Navigation Service for Environmental Justice Communities Impacted by Planned Disruptions

    Authors: Omar Hammad, Md Rezwanur Rahman, Nicholas Clements, Shivakant Mishra, Shelly Miller, Esther Sullivan

    Abstract: Planned disruptions such as highway constructions are commonplace nowadays and the communities living near these disruptions generally tend to be environmental justice communities -- low socioeconomic status with disproportionately high and adverse human health and environmental effects. A major concern is that such activities negatively impact people's well-being by disrupting their daily commute… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

    Comments: Accepted for publication in the proceedings of the 2023 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

  12. arXiv:2402.07832  [pdf

    cs.SE

    Best Practices for Facing the Security Challenges of Internet of Things Devices Focusing on Software Development Life Cycle

    Authors: Md Rafid Islam, Ratun Rahman

    Abstract: In the past few years, the number of IoT devices has grown substantially, and this trend is likely to continue. An increasing amount of effort is being put into developing software for the ever-increasing IoT devices. Every IoT system at its core has software that enables the devices to function efficiently. But security has always been a concern in this age of information and technology. Security… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

  13. arXiv:2402.06168  [pdf, other

    cs.ET cond-mat.mes-hall eess.SY

    Reconfigurable Stochastic Neurons Based on Strain Engineered Low Barrier Nanomagnets

    Authors: Rahnuma Rahman, Samiran Ganguly, Supriyo Bandyopadhyay

    Abstract: Stochastic neurons are efficient hardware accelerators for solving a large variety of combinatorial optimization problems. "Binary" stochastic neurons (BSN) are those whose states fluctuate randomly between two levels +1 and -1, with the probability of being in either level determined by an external bias. "Analog" stochastic neurons (ASNs), in contrast, can assume any state between the two levels… ▽ More

    Submitted 1 April, 2024; v1 submitted 8 February, 2024; originally announced February 2024.

    Comments: Some typos in the previous version have been corrected

  14. arXiv:2401.15175  [pdf, other

    cs.CV

    Kitchen Food Waste Image Segmentation and Classification for Compost Nutrients Estimation

    Authors: Raiyan Rahman, Mohsena Chowdhury, Yueyang Tang, Huayi Gao, George Yin, Guanghui Wang

    Abstract: The escalating global concern over extensive food wastage necessitates innovative solutions to foster a net-zero lifestyle and reduce emissions. The LILA home composter presents a convenient means of recycling kitchen scraps and daily food waste into nutrient-rich, high-quality compost. To capture the nutritional information of the produced compost, we have created and annotated a large high-resol… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

  15. arXiv:2401.06676  [pdf

    cs.IR cs.AI

    LLMRS: Unlocking Potentials of LLM-Based Recommender Systems for Software Purchase

    Authors: Angela John, Theophilus Aidoo, Hamayoon Behmanush, Irem B. Gunduz, Hewan Shrestha, Maxx Richard Rahman, Wolfgang Maaß

    Abstract: Recommendation systems are ubiquitous, from Spotify playlist suggestions to Amazon product suggestions. Nevertheless, depending on the methodology or the dataset, these systems typically fail to capture user preferences and generate general recommendations. Recent advancements in Large Language Models (LLM) offer promising results for analyzing user queries. However, employing these models to capt… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

  16. arXiv:2401.01883  [pdf, other

    cs.CR cs.IR cs.LG cs.SE

    Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports

    Authors: Md Rayhanur Rahman, Brandon Wroblewski, Quinn Matthews, Brantley Morgan, Tim Menzies, Laurie Williams

    Abstract: Defending from cyberattacks requires practitioners to operate on high-level adversary behavior. Cyberthreat intelligence (CTI) reports on past cyberattack incidents describe the chain of malicious actions with respect to time. To avoid repeating cyberattack incidents, practitioners must proactively identify and defend against recurring chain of actions - which we refer to as temporal attack patter… ▽ More

    Submitted 3 January, 2024; originally announced January 2024.

    Comments: A modified version of this pre-print is submitted to IEEE Transactions on Software Engineering, and is under review

  17. arXiv:2401.01865  [pdf, other

    cs.CR

    Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports

    Authors: Md Rayhanur Rahman, Setu Kumar Basak, Rezvan Mahdavi Hezaveh, Laurie Williams

    Abstract: Context: Cybersecurity vendors often publish cyber threat intelligence (CTI) reports, referring to the written artifacts on technical and forensic analysis of the techniques used by the malware in APT attacks. Objective: The goal of this research is to inform cybersecurity practitioners about how adversaries form cyberattacks through an analysis of adversarial techniques documented in cyberthreat… ▽ More

    Submitted 3 January, 2024; originally announced January 2024.

    Comments: This version is submitted to ACM Transactions on Privacy and Security. This version is under review

  18. arXiv:2311.18471  [pdf, other

    quant-ph cs.CR

    Enhancing the security of image transmission in Quantum era: A Chaos-Assisted QKD Approach using entanglement

    Authors: Raiyan Rahman, Md Shawmoon Azad, Mohammed Rakibul Hasan, Syed Emad Uddin Shubha, M. R. C. Mahdy

    Abstract: The emergence of quantum computing has introduced unprecedented security challenges to conventional cryptographic systems, particularly in the domain of optical communications. This research addresses these challenges by innovatively combining quantum key distribution (QKD), specifically the E91 protocol, with logistic chaotic maps to establish a secure image transmission scheme. Our approach util… ▽ More

    Submitted 30 November, 2023; originally announced November 2023.

    Comments: 29 pages, 10 equations, 11 figures

  19. arXiv:2311.09498  [pdf

    cs.LG

    Network Wide Evacuation Traffic Prediction in a Rapidly Intensifying Hurricane from Traffic Detectors and Facebook Movement Data: A Deep Learning Approach

    Authors: Md Mobasshir Rashid, Rezaur Rahman, Samiul Hasan

    Abstract: Traffic prediction during hurricane evacuation is essential for optimizing the use of transportation infrastructures. It can reduce evacuation time by providing information on future congestion in advance. However, evacuation traffic prediction can be challenging as evacuation traffic patterns is significantly different than regular period traffic. A data-driven traffic prediction model is develop… ▽ More

    Submitted 15 November, 2023; originally announced November 2023.

  20. arXiv:2310.12304  [pdf, other

    stat.ML cs.AI cs.LG

    Preference Optimization for Molecular Language Models

    Authors: Ryan Park, Ryan Theisen, Navriti Sahni, Marcel Patek, Anna Cichońska, Rayees Rahman

    Abstract: Molecular language modeling is an effective approach to generating novel chemical structures. However, these models do not \emph{a priori} encode certain preferences a chemist may desire. We investigate the use of fine-tuning using Direct Preference Optimization to better align generated molecules with chemist preferences. Our findings suggest that this approach is simple, efficient, and highly ef… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

  21. arXiv:2310.08187  [pdf, other

    cs.CL

    Visual Question Generation in Bengali

    Authors: Mahmud Hasan, Labiba Islam, Jannatul Ferdous Ruma, Tasmiah Tahsin Mayeesha, Rashedur M. Rahman

    Abstract: The task of Visual Question Generation (VQG) is to generate human-like questions relevant to the given image. As VQG is an emerging research field, existing works tend to focus only on resource-rich language such as English due to the availability of datasets. In this paper, we propose the first Bengali Visual Question Generation task and develop a novel transformer-based encoder-decoder architect… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

    Comments: 19 pages including references, 4 figures and 3 tables. Accepted in the Proceedings of the Workshop on Multimodal, Multilingual Natural Language Generation and Multilingual WebNLG Challenge (MM-NLG 2023)

    Journal ref: Proceedings of the Workshop on Multimodal, Multilingual Natural Language Generation and Multilingual WebNLG Challenge (MM-NLG 2023), 2023, 10-19

  22. arXiv:2309.09126  [pdf, other

    cs.AI cs.CL

    How much can ChatGPT really help Computational Biologists in Programming?

    Authors: Chowdhury Rafeed Rahman, Limsoon Wong

    Abstract: ChatGPT, a recently developed product by openAI, is successfully leaving its mark as a multi-purpose natural language based chatbot. In this paper, we are more interested in analyzing its potential in the field of computational biology. A major share of work done by computational biologists these days involve coding up bioinformatics algorithms, analyzing data, creating pipelining scripts and even… ▽ More

    Submitted 4 December, 2023; v1 submitted 16 September, 2023; originally announced September 2023.

  23. arXiv:2308.10586  [pdf, other

    cs.CL cs.AI

    Age Recommendation from Texts and Sentences for Children

    Authors: Rashedur Rahman, Gwénolé Lecorvé, Nicolas Béchet

    Abstract: Children have less text understanding capability than adults. Moreover, this capability differs among the children of different ages. Hence, automatically predicting a recommended age based on texts or sentences would be a great benefit to propose adequate texts to children and to help authors writing in the most appropriate way. This paper presents our recent advances on the age recommendation ta… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: 26 pages (incl. 4 pages for appendices), 4 figures, 20 tables

  24. arXiv:2307.10267  [pdf, other

    cs.CV cs.AI

    On the Real-Time Semantic Segmentation of Aphid Clusters in the Wild

    Authors: Raiyan Rahman, Christopher Indris, Tianxiao Zhang, Kaidong Li, Brian McCornack, Daniel Flippo, Ajay Sharda, Guanghui Wang

    Abstract: Aphid infestations can cause extensive damage to wheat and sorghum fields and spread plant viruses, resulting in significant yield losses in agriculture. To address this issue, farmers often rely on chemical pesticides, which are inefficiently applied over large areas of fields. As a result, a considerable amount of pesticide is wasted on areas without pests, while inadequate amounts are applied t… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

  25. arXiv:2307.03996  [pdf, other

    cs.SE

    ReviewRanker: A Semi-Supervised Learning Based Approach for Code Review Quality Estimation

    Authors: Saifullah Mahbub, Md. Easin Arafat, Chowdhury Rafeed Rahman, Zannatul Ferdows, Masum Hasan

    Abstract: Code review is considered a key process in the software industry for minimizing bugs and improving code quality. Inspection of review process effectiveness and continuous improvement can boost development productivity. Such inspection is a time-consuming and human-bias-prone task. We propose a semi-supervised learning based system ReviewRanker which is aimed at assigning each code review a confide… ▽ More

    Submitted 8 July, 2023; originally announced July 2023.

  26. ChartSumm: A Comprehensive Benchmark for Automatic Chart Summarization of Long and Short Summaries

    Authors: Raian Rahman, Rizvi Hasan, Abdullah Al Farhad, Md Tahmid Rahman Laskar, Md. Hamjajul Ashmafee, Abu Raihan Mostofa Kamal

    Abstract: Automatic chart to text summarization is an effective tool for the visually impaired people along with providing precise insights of tabular data in natural language to the user. A large and well-structured dataset is always a key part for data driven models. In this paper, we propose ChartSumm: a large-scale benchmark dataset consisting of a total of 84,363 charts along with their metadata and de… ▽ More

    Submitted 11 June, 2023; v1 submitted 26 April, 2023; originally announced April 2023.

    Comments: Accepted as a long paper at the Canadian AI 2023

  27. arXiv:2304.10585  [pdf, other

    cs.CY

    VREd: A Virtual Reality-Based Classroom for Online Education Using Unity3D WebGL

    Authors: Ratun Rahman, Md Rafid Islam

    Abstract: Virtual reality is the way of the future. The use of virtual reality is expanding over time across all sectors, from the entertainment industry to the military and space. VREd is a similar concept where a virtual reality-based classroom is used for online education where the user will have better interaction and more control. Unity3D and WebGL software have been used for implementation. Students o… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

    Comments: 4 pages, 4 figures, 31 references

  28. arXiv:2304.05758  [pdf, other

    cs.CV

    Best Practices for 2-Body Pose Forecasting

    Authors: Muhammad Rameez Ur Rahman, Luca Scofano, Edoardo De Matteis, Alessandro Flaborea, Alessio Sampieri, Fabio Galasso

    Abstract: The task of collaborative human pose forecasting stands for predicting the future poses of multiple interacting people, given those in previous frames. Predicting two people in interaction, instead of each separately, promises better performance, due to their body-body motion correlations. But the task has remained so far primarily unexplored. In this paper, we review the progress in human pose… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

    Comments: The 5th IEEE/CVF CVPR Precognition Workshop '23

  29. arXiv:2303.02473  [pdf

    cs.SI physics.soc-ph

    Disparity in the Evolving COVID-19 Collaboration Network

    Authors: Huimin Xu, Redoan Rahman, Ajay Jaiswal, Julia Fensel, Abhinav Peri, Ka-mesh Peri, Griffin M Weber, Ying Ding

    Abstract: The COVID 19 pandemic has paused many ongoing research projects and unified researchers' attention to focus on COVID 19 related issues. Our project traces 712294 scientists' publications related to COVID 19 for two years, from January 2020 to December 2021, to detect the dynamic evolution patterns of the COVID 19 collaboration network over time. By studying the collaboration network of COVID 19 sc… ▽ More

    Submitted 4 March, 2023; originally announced March 2023.

  30. arXiv:2303.00517  [pdf

    cs.LG cs.AI cs.CY

    Analyzing Impact of Socio-Economic Factors on COVID-19 Mortality Prediction Using SHAP Value

    Authors: Redoan Rahman, Jooyeong Kang, Justin F Rousseau, Ying Ding

    Abstract: This paper applies multiple machine learning (ML) algorithms to a dataset of de-identified COVID-19 patients provided by the COVID-19 Research Database. The dataset consists of 20,878 COVID-positive patients, among which 9,177 patients died in the year 2020. This paper aims to understand and interpret the association of socio-economic characteristics of patients with their mortality instead of max… ▽ More

    Submitted 27 February, 2023; originally announced March 2023.

    Comments: 10 pages, 10 figures, American Medical Informatics Association(AMIA) Annual Conference 2022, Washington DC, USA, Nov 5-9, 2022

    Journal ref: AMIA 2022 Annual Symposium

  31. arXiv:2302.08605  [pdf

    cs.LG cs.AI cs.CY

    Using Explainable AI to Cross-Validate Socio-economic Disparities Among Covid-19 Patient Mortality

    Authors: Li Shi, Redoan Rahman, Esther Melamed, Jacek Gwizdka, Justin F. Rousseau, Ying Ding

    Abstract: This paper applies eXplainable Artificial Intelligence (XAI) methods to investigate the socioeconomic disparities in COVID patient mortality. An Extreme Gradient Boosting (XGBoost) prediction model is built based on a de-identified Austin area hospital dataset to predict the mortality of COVID-19 patients. We apply two XAI methods, Shapley Additive exPlanations (SHAP) and Locally Interpretable Mod… ▽ More

    Submitted 16 February, 2023; originally announced February 2023.

    Comments: AMIA 2023 Informatics Summit, March 13-16, Seattle, WA, USA. 10 pages

    Journal ref: AMIA 2023 Informatics Summit

  32. arXiv:2302.08563  [pdf

    cs.CR cs.NI

    PACMAN Attack: A Mobility-Powered Attack in Private 5G-Enabled Industrial Automation System

    Authors: Md Rashedur Rahman, Moinul Hossain, Jiang Xie

    Abstract: 3GPP has introduced Private 5G to support the next-generation industrial automation system (IAS) due to the versatility and flexibility of 5G architecture. Besides the 3.5GHz CBRS band, unlicensed spectrum bands, like 5GHz, are considered as an additional medium because of their free and abundant nature. However, while utilizing the unlicensed band, industrial equipment must coexist with incumbent… ▽ More

    Submitted 16 February, 2023; originally announced February 2023.

    Comments: 6 pages, 7 Figures, Accepted in IEEE International Conference on Communications 2023

  33. arXiv:2211.06500  [pdf, other

    cs.CR

    An investigation of security controls and MITRE ATT\&CK techniques

    Authors: Md Rayhanur Rahman, Laurie Williams

    Abstract: Attackers utilize a plethora of adversarial techniques in cyberattacks to compromise the confidentiality, integrity, and availability of the target organizations and systems. Information security standards such as NIST, ISO/IEC specify hundreds of security controls that organizations can enforce to protect and defend the information systems from adversarial techniques. However, implementing all th… ▽ More

    Submitted 11 November, 2022; originally announced November 2022.

  34. arXiv:2211.06495  [pdf, other

    cs.CR

    Investigating co-occurrences of MITRE ATT\&CK Techniques

    Authors: Md Rayhanur Rahman, Laurie Williams

    Abstract: Cyberattacks use adversarial techniques to bypass system defenses, persist, and eventually breach systems. The MITRE ATT\&CK framework catalogs a set of adversarial techniques and maps between adversaries and their used techniques and tactics. Understanding how adversaries deploy techniques in conjunction is pivotal for learning adversary behavior, hunting potential threats, and formulating a proa… ▽ More

    Submitted 11 November, 2022; originally announced November 2022.

  35. arXiv:2211.06490  [pdf

    cs.ET cond-mat.mes-hall eess.SP eess.SY physics.app-ph

    A Non-Volatile All-Spin Non-Binary Matrix Multiplier: An Efficient Hardware Accelerator for Machine Learning

    Authors: Rahnuma Rahman, Supriyo Bandyopadhyay

    Abstract: We propose and analyze a compact and non-volatile nanomagnetic (all-spin) non-binary matrix multiplier performing the multiply-and-accumulate (MAC) operation using two magnetic tunnel junctions - one activated by strain to act as the multiplier, and the other activated by spin-orbit torque pulses to act as a domain wall synapse that performs the operation of the accumulator. It has two advantages… ▽ More

    Submitted 20 November, 2022; v1 submitted 11 November, 2022; originally announced November 2022.

    Comments: A slightly shorter version of this article has been accepted for publication in IEEE Transactions on Electron Devices. The replacement corrects some errors in the previously uploaded version

    Journal ref: IEEE Transactions on Electron Devices, 69 (12), 7120-7127 (2022)

  36. Blockchain and Machine Learning for Fraud Detection: A Privacy-Preserving and Adaptive Incentive Based Approach

    Authors: Tahmid Hasan Pranto, Kazi Tamzid Akhter Md Hasib, Tahsinur Rahman, AKM Bahalul Haque, A. K. M. Najmul Islam, Rashedur M. Rahman

    Abstract: Financial fraud cases are on the rise even with the current technological advancements. Due to the lack of inter-organization synergy and because of privacy concerns, authentic financial transaction data is rarely available. On the other hand, data-driven technologies like machine learning need authentic data to perform precisely in real-world systems. This study proposes a blockchain and smart co… ▽ More

    Submitted 23 October, 2022; originally announced October 2022.

  37. arXiv:2210.02601  [pdf, other

    cs.CR cs.LG

    From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts

    Authors: Md Rayhanur Rahman, Laurie Williams

    Abstract: The cyberthreat landscape is continuously evolving. Hence, continuous monitoring and sharing of threat intelligence have become a priority for organizations. Threat reports, published by cybersecurity vendors, contain detailed descriptions of attack Tactics, Techniques, and Procedures (TTP) written in an unstructured text format. Extracting TTP from these reports aids cybersecurity practitioners a… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

  38. A customer satisfaction centric food delivery system based on blockchain and smart contract

    Authors: A. A. Talha Talukder, Md. Anisul Islam Mahmud, Arbiya Sultana, Tahmid Hasan Pranto, AKM Bahalul Haque, Rashedur M. Rahman

    Abstract: Food delivery systems are gaining popularity recently due to the expansion of internet connectivity and for the increasing availability of devices. The growing popularity of such systems has raised concerns regarding (i) Information security, (ii) Business to business (B2B) deep discounting race, and (iii) Strict policy enforcement. Sensitive personal data and financial information of the users mu… ▽ More

    Submitted 10 September, 2022; originally announced September 2022.

  39. BSpell: A CNN-Blended BERT Based Bangla Spell Checker

    Authors: Chowdhury Rafeed Rahman, MD. Hasibur Rahman, Samiha Zakir, Mohammad Rafsan, Mohammed Eunus Ali

    Abstract: Bangla typing is mostly performed using English keyboard and can be highly erroneous due to the presence of compound and similarly pronounced letters. Spelling correction of a misspelled word requires understanding of word typing pattern as well as the context of the word usage. A specialized BERT model named BSpell has been proposed in this paper targeted towards word for word correction in sente… ▽ More

    Submitted 31 December, 2023; v1 submitted 20 August, 2022; originally announced August 2022.

    Journal ref: Association for Computational Linguistics, 2023

  40. arXiv:2208.09693  [pdf, other

    cs.CL

    Judge a Sentence by Its Content to Generate Grammatical Errors

    Authors: Chowdhury Rafeed Rahman

    Abstract: Data sparsity is a well-known problem for grammatical error correction (GEC). Generating synthetic training data is one widely proposed solution to this problem, and has allowed models to achieve state-of-the-art (SOTA) performance in recent years. However, these methods often generate unrealistic errors, or aim to generate sentences with only one error. We propose a learning based two stage metho… ▽ More

    Submitted 20 August, 2022; originally announced August 2022.

  41. arXiv:2208.06827  [pdf

    cs.CV

    BDSL 49: A Comprehensive Dataset of Bangla Sign Language

    Authors: Ayman Hasib, Saqib Sizan Khan, Jannatul Ferdous Eva, Mst. Nipa Khatun, Ashraful Haque, Nishat Shahrin, Rashik Rahman, Hasan Murad, Md. Rajibul Islam, Molla Rashied Hussein

    Abstract: Language is a method by which individuals express their thoughts. Each language has its own set of alphabetic and numeric characters. People can communicate with one another through either oral or written communication. However, each language has a sign language counterpart. Individuals who are deaf and/or mute communicate through sign language. The Bangla language also has a sign language, which… ▽ More

    Submitted 14 August, 2022; originally announced August 2022.

    Comments: 16 pages; 6 figures; Submitted to Data in Brief, a multidisciplinary, open-access and peer-reviewed journal for reviewing

  42. A Comparative Study on COVID-19 Fake News Detection Using Different Transformer Based Models

    Authors: Sajib Kumar Saha Joy, Dibyo Fabian Dofadar, Riyo Hayat Khan, Md. Sabbir Ahmed, Rafeed Rahman

    Abstract: The rapid advancement of social networks and the convenience of internet availability have accelerated the rampant spread of false news and rumors on social media sites. Amid the COVID 19 epidemic, this misleading information has aggravated the situation by putting peoples mental and physical lives in danger. To limit the spread of such inaccuracies, identifying the fake news from online platforms… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

  43. arXiv:2204.11119  [pdf

    cs.HC cs.SE

    NFS: A Hand Gesture Recognition Based Game Using MediaPipe and PyGame

    Authors: Md Rafid Islam, Ratun Rahman, Akib Ahmed, Rafsan Jany

    Abstract: This paper represents a game which interacts with humans via hand gesture movement. Nowadays, apps like this seem rare, and there seems to be a window opening for this kind of application to be more prevalent and useful in the near future. This application is based on hand gesture movement instead of being dependent on a keyboard and mouse. The main issue was to figure out how to utilize machine l… ▽ More

    Submitted 23 April, 2022; originally announced April 2022.

    Comments: 4 pages, 5 figures, and a table

  44. arXiv:2203.08760  [pdf

    eess.SY cs.MA

    Incorporating Multi-Agent Systems Technology in Power and Energy Systems of Bangladesh: A Feasibility Study

    Authors: Syed Redwan Md Hassan, Nazmul Hasan, Mohammad Ali Siddique, K. M Solaiman Fahim, Rummana Rahman, Lamia Iftekhar

    Abstract: The power sector of Bangladesh is presently experiencing essential changes as demand for power services is increasing with rising population and economic development. With a gradual shift from a rigidly centralized structure to a more decentralized and fluid setup, fundamentally because of the enormous advancement of distributed renewable energy sources, the future power system of the nation requi… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

  45. arXiv:2203.00001  [pdf, other

    cs.LG

    AI-based approach for improving the detection of blood doping in sports

    Authors: Maxx Richard Rahman, Jacob Bejder, Thomas Christian Bonne, Andreas Breenfeldt Andersen, Jesús Rodríguez Huertas, Reid Aikin, Nikolai Baastrup Nordsborg, Wolfgang Maaß

    Abstract: Sports officials around the world are facing incredible challenges due to the unfair means of practices performed by the athletes to improve their performance in the game. It includes the intake of hormonal based drugs or transfusion of blood to increase their strength and the result of their training. However, the current direct test of detection of these cases includes the laboratory-based metho… ▽ More

    Submitted 9 February, 2022; originally announced March 2022.

  46. arXiv:2202.12505  [pdf

    cs.LG cs.SI

    A Deep Learning Approach for Network-wide Dynamic Traffic Prediction during Hurricane Evacuation

    Authors: Rezaur Rahman, Samiul Hasan

    Abstract: Proactive evacuation traffic management largely depends on real-time monitoring and prediction of traffic flow at a high spatiotemporal resolution. However, evacuation traffic prediction is challenging due to the uncertainties caused by sudden changes in projected hurricane paths and consequently household evacuation behavior. Moreover, modeling spatiotemporal traffic flow patterns requires extens… ▽ More

    Submitted 25 February, 2022; originally announced February 2022.

  47. arXiv:2202.10508  [pdf

    cs.LG

    Data-Driven Traffic Assignment: A Novel Approach for Learning Traffic Flow Patterns Using a Graph Convolutional Neural Network

    Authors: Rezaur Rahman, Samiul Hasan

    Abstract: We present a novel data-driven approach of learning traffic flow patterns of a transportation network given that many instances of origin to destination (OD) travel demand and link flows of the network are available. Instead of estimating traffic flow patterns assuming certain user behavior (e.g., user equilibrium or system optimal), here we explore the idea of learning those flow patterns directl… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

  48. arXiv:2202.06995  [pdf

    cs.CY cs.HC

    Intent-Aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps

    Authors: Md Rashedur Rahman, Elizabeth Miller, Moinul Hossain, Aisha Ali-Gombe

    Abstract: As data privacy continues to be a crucial human-right concern as recognized by the UN, regulatory agencies have demanded developers obtain user permission before accessing user-sensitive data. Mainly through the use of privacy policies statements, developers fulfill their legal requirements to keep users abreast of the requests for their data. In addition, platforms such as Android enforces explic… ▽ More

    Submitted 14 February, 2022; originally announced February 2022.

    Comments: 11 pages, 5 Figures,The International Conference on Information Systems Security and Privacy-ICISSP 2022

  49. arXiv:2110.13032  [pdf, other

    cs.CL

    Paradigm Shift in Language Modeling: Revisiting CNN for Modeling Sanskrit Originated Bengali and Hindi Language

    Authors: Chowdhury Rafeed Rahman, MD. Hasibur Rahman, Mohammad Rafsan, Samiha Zakir, Mohammed Eunus Ali, Rafsanjani Muhammod

    Abstract: Though there has been a large body of recent works in language modeling (LM) for high resource languages such as English and Chinese, the area is still unexplored for low resource languages like Bengali and Hindi. We propose an end to end trainable memory efficient CNN architecture named CoCNN to handle specific characteristics such as high inflection, morphological richness, flexible word order a… ▽ More

    Submitted 4 November, 2021; v1 submitted 25 October, 2021; originally announced October 2021.

  50. arXiv:2109.06808  [pdf, other

    cs.CR cs.CL cs.LG

    What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey

    Authors: Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams

    Abstract: Cybersecurity researchers have contributed to the automated extraction of CTI from textual sources, such as threat reports and online articles, where cyberattack strategies, procedures, and tools are described. The goal of this article is to aid cybersecurity researchers understand the current techniques used for cyberthreat intelligence extraction from text through a survey of relevant studies in… ▽ More

    Submitted 14 September, 2021; originally announced September 2021.

    Journal ref: ACM Comput. Surv. 55, 12, Article 241 (December 2023), 36 pages