Skip to main content

Showing 1–31 of 31 results for author: Raza, M

  1. arXiv:2407.07361  [pdf, other

    cs.NI cs.CR cs.LG

    Characterizing Encrypted Application Traffic through Cellular Radio Interface Protocol

    Authors: Md Ruman Islam, Raja Hasnain Anwar, Spyridon Mastorakis, Muhammad Taqi Raza

    Abstract: Modern applications are end-to-end encrypted to prevent data from being read or secretly modified. 5G tech nology provides ubiquitous access to these applications without compromising the application-specific performance and latency goals. In this paper, we empirically demonstrate that 5G radio communication becomes the side channel to precisely infer the user's applications in real-time. The key… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

    Comments: 9 pages, 8 figures, 2 tables. This paper has been accepted for publication by the 21st IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS 2024)

  2. arXiv:2406.15225  [pdf, other

    cs.AI cs.RO eess.SP

    Deep UAV Path Planning with Assured Connectivity in Dense Urban Setting

    Authors: Jiyong Oh, Syed M. Raza, Lusungu J. Mwasinga, Moonseong Kim, Hyunseung Choo

    Abstract: Unmanned Ariel Vehicle (UAV) services with 5G connectivity is an emerging field with numerous applications. Operator-controlled UAV flights and manual static flight configurations are major limitations for the wide adoption of scalability of UAV services. Several services depend on excellent UAV connectivity with a cellular network and maintaining it is challenging in predetermined flight paths. T… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: 5 pages, 4 figures, Published in the 2024 IEEE Network Operations and Management Symposium (NOMS 2024)

  3. arXiv:2406.10045  [pdf, other

    cs.CV

    Unobtrusive Monitoring of Physical Weakness: A Simulated Approach

    Authors: Chen Long-fei, Muhammad Ahmed Raza, Craig Innes, Subramanian Ramamoorthy, Robert B. Fisher

    Abstract: Aging and chronic conditions affect older adults' daily lives, making early detection of developing health issues crucial. Weakness, common in many conditions, alters physical movements and daily activities subtly. However, detecting such changes can be challenging due to their subtle and gradual nature. To address this, we employ a non-intrusive camera sensor to monitor individuals' daily sitting… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  4. arXiv:2312.06279  [pdf, other

    cs.LG cs.AI

    Regional Correlation Aided Mobile Traffic Prediction with Spatiotemporal Deep Learning

    Authors: JeongJun Park, Lusungu J. Mwasinga, Huigyu Yang, Syed M. Raza, Duc-Tai Le, Moonseong Kim, Min Young Chung, Hyunseung Choo

    Abstract: Mobile traffic data in urban regions shows differentiated patterns during different hours of the day. The exploitation of these patterns enables highly accurate mobile traffic prediction for proactive network management. However, recent Deep Learning (DL) driven studies have only exploited spatiotemporal features and have ignored the geographical correlations, causing high complexity and erroneous… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Comments: 4 pages, 5 figures, 1 table. This paper is already accepted on IEEE Consumer Communications & Networking Conference(CCNC) 2024

  5. arXiv:2311.14674  [pdf

    cs.CL cs.AI cs.IT

    Emotion-Oriented Behavior Model Using Deep Learning

    Authors: Muhammad Arslan Raza, Muhammad Shoaib Farooq, Adel Khelifi, Atif Alvi

    Abstract: Emotions, as a fundamental ingredient of any social interaction, lead to behaviors that represent the effectiveness of the interaction through facial expressions and gestures in humans. Hence an agent must possess the social and cognitive abilities to understand human social parameters and behave accordingly. However, no such emotion-oriented behavior model is presented yet in the existing researc… ▽ More

    Submitted 28 October, 2023; originally announced November 2023.

  6. arXiv:2310.19656  [pdf, other

    eess.IV cs.CV cs.LG

    Domain Generalization in Computational Pathology: Survey and Guidelines

    Authors: Mostafa Jahanifar, Manahil Raza, Kesi Xu, Trinh Vuong, Rob Jewsbury, Adam Shephard, Neda Zamanitajeddin, Jin Tae Kwak, Shan E Ahmed Raza, Fayyaz Minhas, Nasir Rajpoot

    Abstract: Deep learning models have exhibited exceptional effectiveness in Computational Pathology (CPath) by tackling intricate tasks across an array of histology image analysis applications. Nevertheless, the presence of out-of-distribution data (stemming from a multitude of sources such as disparate imaging devices and diverse tissue preparation methods) can cause \emph{domain shift} (DS). DS decreases t… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

    Comments: Extended Version

  7. arXiv:2310.17306   

    cs.AI cs.CL cs.DB cs.PL

    FormaT5: Abstention and Examples for Conditional Table Formatting with Natural Language

    Authors: Mukul Singh, José Cambronero, Sumit Gulwani, Vu Le, Carina Negreanu, Elnaz Nouri, Mohammad Raza, Gust Verbruggen

    Abstract: Formatting is an important property in tables for visualization, presentation, and analysis. Spreadsheet software allows users to automatically format their tables by writing data-dependent conditional formatting (CF) rules. Writing such rules is often challenging for users as it requires them to understand and implement the underlying logic. We present FormaT5, a transformer-based model that can… ▽ More

    Submitted 1 November, 2023; v1 submitted 26 October, 2023; originally announced October 2023.

    Comments: Contains inappropriately sourced conjecture of OpenAI's ChatGPT parameter count from www.forbes.com/sites/forbestechcouncil/2023/02/17/is-bigger-better-why-the-chatgpt-vs-gpt-3-vs-gpt-4-battle-is-just-a-family-chat, a citation which was omitted. The authors do not have direct knowledge or verification of this information, and relied solely on this article, which may lead to public confusion

  8. arXiv:2307.13777  [pdf, other

    cs.SE cs.AI

    An Empirical Study on Bugs Inside PyTorch: A Replication Study

    Authors: Sharon Chee Yin Ho, Vahid Majdinasab, Mohayeminul Islam, Diego Elias Costa, Emad Shihab, Foutse Khomh, Sarah Nadi, Muhammad Raza

    Abstract: Software systems are increasingly relying on deep learning components, due to their remarkable capability of identifying complex data patterns and powering intelligent behaviour. A core enabler of this change in software development is the availability of easy-to-use deep learning libraries. Libraries like PyTorch and TensorFlow empower a large variety of intelligent systems, offering a multitude… ▽ More

    Submitted 1 August, 2023; v1 submitted 25 July, 2023; originally announced July 2023.

  9. arXiv:2305.10449  [pdf, other

    cs.LG cs.AI cs.NE

    Cooperation Is All You Need

    Authors: Ahsan Adeel, Junaid Muzaffar, Khubaib Ahmed, Mohsin Raza

    Abstract: Going beyond 'dendritic democracy', we introduce a 'democracy of local processors', termed Cooperator. Here we compare their capabilities when used in permutation-invariant neural networks for reinforcement learning (RL), with machine learning algorithms based on Transformers, such as ChatGPT. Transformers are based on the long-standing conception of integrate-and-fire 'point' neurons, whereas Coo… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

  10. arXiv:2305.01598  [pdf, other

    cs.DB cs.AI cs.HC

    From Words to Code: Harnessing Data for Program Synthesis from Natural Language

    Authors: Anirudh Khatry, Joyce Cahoon, Jordan Henkel, Shaleen Deep, Venkatesh Emani, Avrilia Floratou, Sumit Gulwani, Vu Le, Mohammad Raza, Sherry Shi, Mukul Singh, Ashish Tiwari

    Abstract: Creating programs to correctly manipulate data is a difficult task, as the underlying programming languages and APIs can be challenging to learn for many users who are not skilled programmers. Large language models (LLMs) demonstrate remarkable potential for generating code from natural language, but in the data manipulation domain, apart from the natural language (NL) description of the intended… ▽ More

    Submitted 3 May, 2023; v1 submitted 2 May, 2023; originally announced May 2023.

    Comments: 14 pages

  11. arXiv:2303.11801  [pdf, other

    cs.RO

    SACPlanner: Real-World Collision Avoidance with a Soft Actor Critic Local Planner and Polar State Representations

    Authors: Khaled Nakhleh, Minahil Raza, Mack Tang, Matthew Andrews, Rinu Boney, Ilija Hadzic, Jeongran Lee, Atefeh Mohajeri, Karina Palyutina

    Abstract: We study the training performance of ROS local planners based on Reinforcement Learning (RL), and the trajectories they produce on real-world robots. We show that recent enhancements to the Soft Actor Critic (SAC) algorithm such as RAD and DrQ achieve almost perfect training after only 10000 episodes. We also observe that on real-world robots the resulting SACPlanner is more reactive to obstacles… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: Accepted at 2023 IEEE International Conference on Robotics and Automation (ICRA)

  12. arXiv:2302.09682  [pdf, other

    eess.IV cs.CV

    Mimicking a Pathologist: Dual Attention Model for Scoring of Gigapixel Histology Images

    Authors: Manahil Raza, Ruqayya Awan, Raja Muhammad Saad Bashir, Talha Qaiser, Nasir M. Rajpoot

    Abstract: Some major challenges associated with the automated processing of whole slide images (WSIs) includes their sheer size, different magnification levels and high resolution. Utilizing these images directly in AI frameworks is computationally expensive due to memory constraints, while downsampling WSIs incurs information loss and splitting WSIs into tiles and patches results in loss of important conte… ▽ More

    Submitted 19 February, 2023; originally announced February 2023.

  13. arXiv:2211.05237  [pdf, other

    cs.CV cs.AI cs.LG cs.RO eess.IV

    SimuShips -- A High Resolution Simulation Dataset for Ship Detection with Precise Annotations

    Authors: Minahil Raza, Hanna Prokopova, Samir Huseynzade, Sepinoud Azimi, Sebastien Lafond

    Abstract: Obstacle detection is a fundamental capability of an autonomous maritime surface vessel (AMSV). State-of-the-art obstacle detection algorithms are based on convolutional neural networks (CNNs). While CNNs provide higher detection accuracy and fast detection speed, they require enormous amounts of data for their training. In particular, the availability of domain-specific datasets is a challenge fo… ▽ More

    Submitted 22 September, 2022; originally announced November 2022.

  14. arXiv:2209.03275  [pdf, other

    cs.SD cs.LG cs.MM eess.AS

    Multimodal Speech Enhancement Using Burst Propagation

    Authors: Mohsin Raza, Leandro A. Passos, Ahmed Khubaib, Ahsan Adeel

    Abstract: This paper proposes the MBURST, a novel multimodal solution for audio-visual speech enhancements that consider the most recent neurological discoveries regarding pyramidal cells of the prefrontal cortex and other brain regions. The so-called burst propagation implements several criteria to address the credit assignment problem in a more biologically plausible manner: steering the sign and magnitud… ▽ More

    Submitted 5 February, 2024; v1 submitted 7 September, 2022; originally announced September 2022.

  15. arXiv:2208.06032  [pdf, other

    cs.AI cs.DB cs.SE

    CORNET: Learning Table Formatting Rules By Example

    Authors: Mukul Singh, José Cambronero, Sumit Gulwani, Vu Le, Carina Negreanu, Mohammad Raza, Gust Verbruggen

    Abstract: Spreadsheets are widely used for table manipulation and presentation. Stylistic formatting of these tables is an important property for both presentation and analysis. As a result, popular spreadsheet software, such as Excel, supports automatically formatting tables based on rules. Unfortunately, writing such formatting rules can be challenging for users as it requires knowledge of the underlying… ▽ More

    Submitted 5 December, 2022; v1 submitted 11 August, 2022; originally announced August 2022.

    Comments: 12 pages content, 2 pages references

  16. arXiv:2207.12456  [pdf, other

    cs.PL cs.AI cs.SE

    Overwatch: Learning Patterns in Code Edit Sequences

    Authors: Yuhao Zhang, Yasharth Bajpai, Priyanshu Gupta, Ameya Ketkar, Miltiadis Allamanis, Titus Barik, Sumit Gulwani, Arjun Radhakrishna, Mohammad Raza, Gustavo Soares, Ashish Tiwari

    Abstract: Integrated Development Environments (IDEs) provide tool support to automate many source code editing tasks. Traditionally, IDEs use only the spatial context, i.e., the location where the developer is editing, to generate candidate edit recommendations. However, spatial context alone is often not sufficient to confidently predict the developer's next edit, and thus IDEs generate many suggestions at… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Comments: 25 pages, 7 Figures, 4 Algorithms, 3 Tables

  17. arXiv:2207.07338  [pdf, other

    cs.NE cs.AI cs.LG

    Context-sensitive neocortical neurons transform the effectiveness and efficiency of neural information processing

    Authors: Ahsan Adeel, Mario Franco, Mohsin Raza, Khubaib Ahmed

    Abstract: Deep learning (DL) has big-data processing capabilities that are as good, or even better, than those of humans in many real-world domains, but at the cost of high energy requirements that may be unsustainable in some applications and of errors, that, though infrequent, can be large. We hypothesise that a fundamental weakness of DL lies in its intrinsic dependence on integrate-and-fire point neuron… ▽ More

    Submitted 4 April, 2023; v1 submitted 15 July, 2022; originally announced July 2022.

  18. arXiv:2204.05021  [pdf, other

    cs.SE cs.IR cs.PL

    Landmarks and Regions: A Robust Approach to Data Extraction

    Authors: Suresh Parthasarathy, Lincy Pattanaik, Anirudh Khatry, Arun Iyer, Arjun Radhakrishna, Sriram Rajamani, Mohammad Raza

    Abstract: We propose a new approach to extracting data items or field values from semi-structured documents. Examples of such problems include extracting passenger name, departure time and departure airport from a travel itinerary, or extracting price of an item from a purchase receipt. Traditional approaches to data extraction use machine learning or program synthesis to process the whole document to extra… ▽ More

    Submitted 11 April, 2022; originally announced April 2022.

    Comments: To be published at PLDI,2022

  19. arXiv:2203.02510  [pdf, ps, other

    q-bio.QM cs.CV cs.LG eess.IV

    Cellular Segmentation and Composition in Routine Histology Images using Deep Learning

    Authors: Muhammad Dawood, Raja Muhammad Saad Bashir, Srijay Deshpande, Manahil Raza, Adam Shephard

    Abstract: Identification and quantification of nuclei in colorectal cancer haematoxylin \& eosin (H\&E) stained histology images is crucial to prognosis and patient management. In computational pathology these tasks are referred to as nuclear segmentation, classification and composition and are used to extract meaningful interpretable cytological and architectural features for downstream analysis. The CoNIC… ▽ More

    Submitted 4 March, 2022; originally announced March 2022.

  20. arXiv:2111.05393  [pdf, other

    cs.LG cs.CV

    Object-Centric Representation Learning with Generative Spatial-Temporal Factorization

    Authors: Li Nanbo, Muhammad Ahmed Raza, Hu Wenbin, Zhaole Sun, Robert B. Fisher

    Abstract: Learning object-centric scene representations is essential for attaining structural understanding and abstraction of complex scenes. Yet, as current approaches for unsupervised object-centric representation learning are built upon either a stationary observer assumption or a static scene assumption, they often: i) suffer single-view spatial ambiguities, or ii) infer incorrectly or inaccurately obj… ▽ More

    Submitted 9 November, 2021; originally announced November 2021.

    Comments: Accepted at NeurIPS 2021

  21. arXiv:2109.09611  [pdf, other

    cs.CV

    Real-Time Trash Detection for Modern Societies using CCTV to Identifying Trash by utilizing Deep Convolutional Neural Network

    Authors: Syed Muhammad Raza, Syed Muhammad Ghazi Hassan, Syed Ali Hassan, Soo Young Shin

    Abstract: To protect the environment from trash pollution, especially in societies, and to take strict action against the red-handed people who throws the trash. As modern societies are developing and these societies need a modern solution to make the environment clean. Artificial intelligence (AI) evolution, especially in Deep Learning, gives an excellent opportunity to develop real-time trash detection us… ▽ More

    Submitted 21 September, 2021; v1 submitted 20 September, 2021; originally announced September 2021.

    Comments: 15 pages, 6 Figures

  22. arXiv:2109.02445  [pdf, other

    cs.AI cs.PL

    Multi-modal Program Inference: a Marriage of Pre-trainedLanguage Models and Component-based Synthesis

    Authors: Kia Rahmani, Mohammad Raza, Sumit Gulwani, Vu Le, Daniel Morris, Arjun Radhakrishna, Gustavo Soares, Ashish Tiwari

    Abstract: Multi-modal program synthesis refers to the task of synthesizing programs (code) from their specification given in different forms, such as a combination of natural language and examples. Examples provide a precise but incomplete specification, and natural language provides an ambiguous but more "complete" task description. Machine-learned pre-trained models (PTMs) are adept at handling ambiguous… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.

    Comments: To be published in OOPSLA 2021

  23. Reliability Aware Multiple Path Installation in Software Defined Networking

    Authors: Syed Mohsan Raza

    Abstract: Being a state-of-the-art network, Software Defined Networking (SDN) decouples control and management planes from data plane of the forwarding devices by implementing both the control and management planes at logically centralized entity, called controller. This helps to make simple and easy both the network control and management. Failure of links occurs frequently in a computer network. To deal w… ▽ More

    Submitted 17 December, 2020; originally announced January 2021.

    Journal ref: https://www.mdpi.com/2079-9292/10/22/2820

  24. arXiv:2012.07994  [pdf, other

    cs.CR cs.LG

    Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model

    Authors: Mohammadreza Ebrahimi, Ning Zhang, James Hu, Muhammad Taqi Raza, Hsinchun Chen

    Abstract: Anti-malware engines are the first line of defense against malicious software. While widely used, feature engineering-based anti-malware engines are vulnerable to unseen (zero-day) attacks. Recently, deep learning-based static anti-malware detectors have achieved success in identifying unseen attacks without requiring feature engineering and dynamic analysis. However, these detectors are susceptib… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

    Comments: Accepted in 35th AAAI Conference on Artificial Intelligence, Workshop on Robust, Secure, and Efficient Machine Learning (RSEML)

    Journal ref: AAAI Conference on Artificial Intelligence, Workshop on Robust, Secure, and Efficient Machine Learning (RSEML), February 2-9, 2021

  25. arXiv:2010.11627   

    cs.CR cs.LG

    Malware Traffic Classification: Evaluation of Algorithms and an Automated Ground-truth Generation Pipeline

    Authors: Syed Muhammad Kumail Raza, Juan Caballero

    Abstract: Identifying threats in a network traffic flow which is encrypted is uniquely challenging. On one hand it is extremely difficult to simply decrypt the traffic due to modern encryption algorithms. On the other hand, passing such an encrypted stream through pattern matching algorithms is useless because encryption ensures there aren't any. Moreover, evaluating such models is also difficult due to lac… ▽ More

    Submitted 7 November, 2020; v1 submitted 22 October, 2020; originally announced October 2020.

    Comments: Submission to arxiv was not authorized by one of the authors. They request removal of the document. Suspected plagiarised work without proper acknowledgement

    ACM Class: I.2.6; K.6.5

  26. arXiv:1808.07163  [pdf, ps, other

    cs.IT

    Signature-based Non-orthogonal Multiple Access (S-NOMA) for Massive Machine-Type Communications in 5G

    Authors: Mostafa Mohammadkarimi, Muhammad Ahmad Raza, Octavia A. Dobre

    Abstract: The problem of providing massive connectivity in Internet-of-Things (IoT) with a limited number of available resources motivates the non-orthogonal multiple access (NOMA) solutions. In this article, we provide a comprehensive review of the signature-based NOMA (S-NOMA) schemes as potential candidates for IoT. The signature in S-NOMA represents the way the data stream of an active device is spread… ▽ More

    Submitted 21 August, 2018; originally announced August 2018.

  27. arXiv:1703.03539  [pdf, other

    cs.PL

    Interactive Program Synthesis

    Authors: Vu Le, Daniel Perelman, Oleksandr Polozov, Mohammad Raza, Abhishek Udupa, Sumit Gulwani

    Abstract: Program synthesis from incomplete specifications (e.g. input-output examples) has gained popularity and found real-world applications, primarily due to its ease-of-use. Since this technology is often used in an interactive setting, efficiency and correctness are often the key user expectations from a system based on such technologies. Ensuring efficiency is challenging since the highly combinatori… ▽ More

    Submitted 9 March, 2017; originally announced March 2017.

  28. arXiv:1510.08531  [pdf

    cs.CR

    New Threats to SMS-Assisted Mobile Internet Services from 4G LTE: Lessons Learnt from Distributed Mobile-Initiated Attacks towards Facebook and Other Services

    Authors: Guan-Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Muhammad Taqi Raza, Hsiao-Yun Tseng, Songwu Lu

    Abstract: Mobile Internet is becoming the norm. With more personalized mobile devices in hand, many services choose to offer alternative, usually more convenient, approaches to authenticating and delivering the content between mobile users and service providers. One main option is to use SMS (i.e., short messaging service). Such carrier-grade text service has been widely used to assist versatile mobile serv… ▽ More

    Submitted 31 October, 2015; v1 submitted 28 October, 2015; originally announced October 2015.

    Comments: 16 pages, 13 figures

  29. arXiv:1404.4738  [pdf, other

    cs.IT

    On the Deployment of Cognitive Relay as Underlay Systems

    Authors: Ankit Kaushik, M. Rehan Raza, Friedrich K. Jondral

    Abstract: The objective of this paper is to extend the idea of Cognitive Relay (CR). CR, as a secondary user, follows an underlay paradigm to endorse secondary usage of the spectrum to the indoor devices. To seek a spatial opportunity, i.e., deciding its transmission over the primary user channels, CR models its deployment scenario and the movements of the primary receivers and indoor devices. Modeling is b… ▽ More

    Submitted 18 April, 2014; originally announced April 2014.

    Comments: 6 pages, 7 figures, 4 tables, accepted in Proceedings of CrownCom 2014, Oulu (Finland), June 2-4, 2014

  30. arXiv:1208.2321  [pdf, ps, other

    cs.NI

    Minimizing Electricity Theft using Smart Meters in AMI

    Authors: M. Anas, N. Javaid, A. Mahmood, S. M. Raza, U. Qasim, Z. A. Khan

    Abstract: Global energy crises are increasing every moment. Every one has the attention towards more and more energy production and also trying to save it. Electricity can be produced through many ways which is then synchronized on a main grid for usage. The main issue for which we have written this survey paper is losses in electrical system. Weather these losses are technical or non-technical. Technical l… ▽ More

    Submitted 11 August, 2012; originally announced August 2012.

    Comments: 7th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2012), Victoria, Canada, 2012

  31. Footprints in Local Reasoning

    Authors: Mohammad Raza, Philippa Gardner

    Abstract: Local reasoning about programs exploits the natural local behaviour common in programs by focussing on the footprint - that part of the resource accessed by the program. We address the problem of formally characterising and analysing the footprint notion for abstract local functions introduced by Calcagno, O Hearn and Yang. With our definition, we prove that the footprints are the only essential… ▽ More

    Submitted 24 April, 2009; v1 submitted 5 March, 2009; originally announced March 2009.

    Comments: LMCS 2009 (FOSSACS 2008 special issue)

    ACM Class: D.2.4; F.3.1

    Journal ref: Logical Methods in Computer Science, Volume 5, Issue 2 (April 24, 2009) lmcs:1118