Skip to main content

Showing 1–50 of 51 results for author: Shaikh, S

  1. arXiv:2407.08855  [pdf, other

    eess.IV cs.CV

    BraTS-PEDs: Results of the Multi-Consortium International Pediatric Brain Tumor Segmentation Challenge 2023

    Authors: Anahita Fathi Kazerooni, Nastaran Khalili, Xinyang Liu, Debanjan Haldar, Zhifan Jiang, Anna Zapaishchykova, Julija Pavaine, Lubdha M. Shah, Blaise V. Jones, Nakul Sheth, Sanjay P. Prabhu, Aaron S. McAllister, Wenxin Tu, Khanak K. Nandolia, Andres F. Rodriguez, Ibraheem Salman Shaikh, Mariana Sanchez Montano, Hollie Anne Lai, Maruf Adewole, Jake Albrecht, Udunna Anazodo, Hannah Anderson, Syed Muhammed Anwar, Alejandro Aristizabal, Sina Bagheri , et al. (54 additional authors not shown)

    Abstract: Pediatric central nervous system tumors are the leading cause of cancer-related deaths in children. The five-year survival rate for high-grade glioma in children is less than 20%. The development of new treatments is dependent upon multi-institutional collaborative clinical trials requiring reproducible and accurate centralized response assessment. We present the results of the BraTS-PEDs 2023 cha… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

  2. arXiv:2406.10427  [pdf, other

    cs.LG cs.CR

    Adaptive Randomized Smoothing: Certifying Multi-Step Defences against Adversarial Examples

    Authors: Saiyue Lyu, Shadab Shaikh, Frederick Shpilevskiy, Evan Shelhamer, Mathias Lécuyer

    Abstract: We propose Adaptive Randomized Smoothing (ARS) to certify the predictions of our test-time adaptive models against adversarial examples. ARS extends the analysis of randomized smoothing using f-Differential Privacy to certify the adaptive composition of multiple steps. For the first time, our theory covers the sound adaptive composition of general and high-dimensional functions of noisy input. We… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  3. arXiv:2406.00010  [pdf, other

    cs.IR cs.CL

    EnterpriseEM: Fine-tuned Embeddings for Enterprise Semantic Search

    Authors: Kamalkumar Rathinasamy, Jayarama Nettar, Amit Kumar, Vishal Manchanda, Arun Vijayakumar, Ayush Kataria, Venkateshprasanna Manjunath, Chidambaram GS, Jaskirat Singh Sodhi, Shoeb Shaikh, Wasim Akhtar Khan, Prashant Singh, Tanishq Dattatray Ige, Vipin Tiwari, Rajab Ali Mondal, Harshini K, S Reka, Chetana Amancharla, Faiz ur Rahman, Harikrishnan P A, Indraneel Saha, Bhavya Tiwary, Navin Shankar Patel, Pradeep T S, Balaji A J , et al. (2 additional authors not shown)

    Abstract: Enterprises grapple with the significant challenge of managing proprietary unstructured data, hindering efficient information retrieval. This has led to the emergence of AI-driven information retrieval solutions, designed to adeptly extract relevant insights to address employee inquiries. These solutions often leverage pre-trained embedding models and generative models as foundational components.… ▽ More

    Submitted 18 May, 2024; originally announced June 2024.

    ACM Class: I.2.7

  4. arXiv:2404.15009  [pdf, other

    cs.CV eess.IV

    The Brain Tumor Segmentation in Pediatrics (BraTS-PEDs) Challenge: Focus on Pediatrics (CBTN-CONNECT-DIPGR-ASNR-MICCAI BraTS-PEDs)

    Authors: Anahita Fathi Kazerooni, Nastaran Khalili, Xinyang Liu, Deep Gandhi, Zhifan Jiang, Syed Muhammed Anwar, Jake Albrecht, Maruf Adewole, Udunna Anazodo, Hannah Anderson, Ujjwal Baid, Timothy Bergquist, Austin J. Borja, Evan Calabrese, Verena Chung, Gian-Marco Conte, Farouk Dako, James Eddy, Ivan Ezhov, Ariana Familiar, Keyvan Farahani, Andrea Franson, Anurag Gottipati, Shuvanjan Haldar, Juan Eugenio Iglesias , et al. (46 additional authors not shown)

    Abstract: Pediatric tumors of the central nervous system are the most common cause of cancer-related death in children. The five-year survival rate for high-grade gliomas in children is less than 20%. Due to their rarity, the diagnosis of these entities is often delayed, their treatment is mainly based on historic treatment concepts, and clinical trials require multi-institutional collaborations. Here we pr… ▽ More

    Submitted 11 July, 2024; v1 submitted 23 April, 2024; originally announced April 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2305.17033

  5. arXiv:2401.08081  [pdf, other

    cs.LG cs.SI

    Predicting Next Useful Location With Context-Awareness: The State-Of-The-Art

    Authors: Alireza Nezhadettehad, Arkady Zaslavsky, Rakib Abdur, Siraj Ahmed Shaikh, Seng W. Loke, Guang-Li Huang, Alireza Hassani

    Abstract: Predicting the future location of mobile objects reinforces location-aware services with proactive intelligence and helps businesses and decision-makers with better planning and near real-time scheduling in different applications such as traffic congestion control, location-aware advertisements, and monitoring public health and well-being. The recent developments in the smartphone and location sen… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  6. arXiv:2311.13262  [pdf, other

    cs.AI

    The Rise of Creative Machines: Exploring the Impact of Generative AI

    Authors: Saad Shaikh, Rajat bendre, Sakshi Mhaske

    Abstract: This study looks at how generative artificial intelligence (AI) can revolutionize marketing, product development, and research. It discusses the latest developments in the field, easy-to-use resources, and moral and social hazards. In addition to addressing mitigating techniques for issues like prejudice and disinformation, the debate emphasizes the significance of responsible development through… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

    Comments: The impact of generative AI on research, product creation, ethical concerns etc is examined in this six-page article. Figures 1, 2, and 3, which are essential to the analysis, are included in the discussion along with opportunities, hazards, and ethical considerations

    ACM Class: I.2.7

  7. arXiv:2309.00637  [pdf

    cs.LG eess.SP

    Finite Element Analysis and Machine Learning Guided Design of Carbon Fiber Organosheet-based Battery Enclosures for Crashworthiness

    Authors: Shadab Anwar Shaikh, M. F. N. Taufique, Kranthi, Balusu, Shank S. Kulkarni, Forrest Hale, Jonathan Oleson, Ram Devanathan, Ayoub Soulami

    Abstract: Carbon fiber composite can be a potential candidate for replacing metal-based battery enclosures of current electric vehicles (E.V.s) owing to its better strength-to-weight ratio and corrosion resistance. However, the strength of carbon fiber-based structures depends on several parameters that should be carefully chosen. In this work, we implemented high throughput finite element analysis (FEA) ba… ▽ More

    Submitted 22 August, 2023; originally announced September 2023.

  8. arXiv:2306.13050  [pdf, other

    cs.IR cs.LG

    Data augmentation and refinement for recommender system: A semi-supervised approach using maximum margin matrix factorization

    Authors: Shamal Shaikh, Venkateswara Rao Kagita, Vikas Kumar, Arun K Pujari

    Abstract: Collaborative filtering (CF) has become a popular method for developing recommender systems (RSs) where ratings of a user for new items are predicted based on her past preferences and available preference information of other users. Despite the popularity of CF-based methods, their performance is often greatly limited by the sparsity of observed entries. In this study, we explore the data augmenta… ▽ More

    Submitted 30 September, 2023; v1 submitted 22 June, 2023; originally announced June 2023.

    Comments: 21 pages

  9. arXiv:2305.17033  [pdf, other

    eess.IV cs.CV cs.LG q-bio.QM

    The Brain Tumor Segmentation (BraTS) Challenge 2023: Focus on Pediatrics (CBTN-CONNECT-DIPGR-ASNR-MICCAI BraTS-PEDs)

    Authors: Anahita Fathi Kazerooni, Nastaran Khalili, Xinyang Liu, Debanjan Haldar, Zhifan Jiang, Syed Muhammed Anwar, Jake Albrecht, Maruf Adewole, Udunna Anazodo, Hannah Anderson, Sina Bagheri, Ujjwal Baid, Timothy Bergquist, Austin J. Borja, Evan Calabrese, Verena Chung, Gian-Marco Conte, Farouk Dako, James Eddy, Ivan Ezhov, Ariana Familiar, Keyvan Farahani, Shuvanjan Haldar, Juan Eugenio Iglesias, Anastasia Janas , et al. (48 additional authors not shown)

    Abstract: Pediatric tumors of the central nervous system are the most common cause of cancer-related death in children. The five-year survival rate for high-grade gliomas in children is less than 20\%. Due to their rarity, the diagnosis of these entities is often delayed, their treatment is mainly based on historic treatment concepts, and clinical trials require multi-institutional collaborations. The MICCA… ▽ More

    Submitted 23 May, 2024; v1 submitted 26 May, 2023; originally announced May 2023.

  10. arXiv:2211.02266  [pdf, other

    cs.CR cs.OS

    Rescuing the End-user systems from Vulnerable Applications using Virtualization Techniques

    Authors: Vinayak Trivedi, Tushar Gurjar, Sumaiya Shaikh, Saketh Maddamsetty, Debadatta Mishra

    Abstract: In systems owned by normal end-users, many times security attacks are mounted by sneaking in malicious applications or exploiting existing software vulnerabilities through security non-conforming actions of users. Virtualization approaches can address this problem by providing a quarantine environment for applications, malicious devices, and device drivers, which are mostly used as entry points fo… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

    Comments: 14 pages, 9 figures

  11. arXiv:2205.01039  [pdf

    cs.CY

    Big Tech Companies Impact on Research at the Faculty of Information Technology and Electrical Engineering

    Authors: Ahmad Hassanpour, An Thi Nguyen, Anshul Rani, Sarang Shaikh, Ying Xu, Haoyu Zhang

    Abstract: Artificial intelligence is gaining momentum, ongoing pandemic is fuel to that with more opportunities in every sector specially in health and education sector. But with the growth in technology, challenges associated with ethics also grow (Katharine Schwab, 2021). Whenever a new AI product is developed, companies publicize that their systems are transparent, fair, and are in accordance with the ex… ▽ More

    Submitted 10 April, 2022; originally announced May 2022.

  12. arXiv:2204.03738  [pdf, other

    cs.CV cs.HC cs.LG

    BankNote-Net: Open dataset for assistive universal currency recognition

    Authors: Felipe Oviedo, Srinivas Vinnakota, Eugene Seleznev, Hemant Malhotra, Saqib Shaikh, Juan Lavista Ferres

    Abstract: Millions of people around the world have low or no vision. Assistive software applications have been developed for a variety of day-to-day tasks, including optical character recognition, scene identification, person recognition, and currency recognition. This last task, the recognition of banknotes from different denominations, has been addressed by the use of computer vision models for image reco… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

    Comments: Pre-print

  13. arXiv:2203.10012  [pdf, ps, other

    cs.CL cs.AI cs.LG

    Report from the NSF Future Directions Workshop on Automatic Evaluation of Dialog: Research Directions and Challenges

    Authors: Shikib Mehri, Jinho Choi, Luis Fernando D'Haro, Jan Deriu, Maxine Eskenazi, Milica Gasic, Kallirroi Georgila, Dilek Hakkani-Tur, Zekang Li, Verena Rieser, Samira Shaikh, David Traum, Yi-Ting Yeh, Zhou Yu, Yizhe Zhang, Chen Zhang

    Abstract: This is a report on the NSF Future Directions Workshop on Automatic Evaluation of Dialog. The workshop explored the current state of the art along with its limitations and suggested promising directions for future work in this important and very rapidly changing area of research.

    Submitted 18 March, 2022; originally announced March 2022.

    Comments: Report from the NSF AED Workshop (http://dialrc.org/AED/)

  14. arXiv:2202.04847  [pdf, other

    cs.CL cs.CY cs.LG cs.SE

    A Survey on Artificial Intelligence for Source Code: A Dialogue Systems Perspective

    Authors: Erfan Al-Hossami, Samira Shaikh

    Abstract: In this survey paper, we overview major deep learning methods used in Natural Language Processing (NLP) and source code over the last 35 years. Next, we present a survey of the applications of Artificial Intelligence (AI) for source code, also known as Code Intelligence (CI) and Programming Language Processing (PLP). We survey over 287 publications and present a software-engineering centered taxon… ▽ More

    Submitted 10 February, 2022; originally announced February 2022.

    Comments: 55 pages, 16 Figures, 4 Tables

    ACM Class: I.2.2; I.2.7; K.3.1

  15. Can We Generate Shellcodes via Natural Language? An Empirical Study

    Authors: Pietro Liguori, Erfan Al-Hossami, Domenico Cotroneo, Roberto Natella, Bojan Cukic, Samira Shaikh

    Abstract: Writing software exploits is an important practice for offensive security analysts to investigate and prevent attacks. In particular, shellcodes are especially time-consuming and a technical challenge, as they are written in assembly language. In this work, we address the task of automatically generating shellcodes, starting purely from descriptions in natural language, by proposing an approach ba… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

    Comments: 33 pages, 5 figures, 9 tables. To be published in Automated Software Engineering journal

  16. arXiv:2201.02344  [pdf

    cs.CY

    The Study of Peer Assessment Impact on Group Learning Activities

    Authors: Zhiyuan Chen, Soon Boon Lee, Shazia Paras Shaikh, Mirza Rayana Sanzana

    Abstract: Comparing with lecturer marked assessments, peer assessment is a more comprehensive learning process and many of the associated problems have occurred. In this research work, we study the peer-assessment impact on group learning activities in order to provide a complete and systematic review, increase the practice and quality of the peer assessment process. Pilot studies were conducted and took th… ▽ More

    Submitted 7 January, 2022; originally announced January 2022.

    Comments: Regular Research Paper Accepted by FECS'21 (The 17th Int'l Conf on Frontiers in Education: Computer Science and Computer Engineering)

  17. EVIL: Exploiting Software via Natural Language

    Authors: Pietro Liguori, Erfan Al-Hossami, Vittorio Orbinato, Roberto Natella, Samira Shaikh, Domenico Cotroneo, Bojan Cukic

    Abstract: Writing exploits for security assessment is a challenging task. The writer needs to master programming and obfuscation techniques to develop a successful exploit. To make the task easier, we propose an approach (EVIL) to automatically generate exploits in assembly/Python language from descriptions in natural language. The approach leverages Neural Machine Translation (NMT) techniques and a dataset… ▽ More

    Submitted 1 September, 2021; originally announced September 2021.

    Comments: Paper accepted at the 32nd International Symposium on Software Reliability Engineering (ISSRE 2021)

  18. Shellcode_IA32: A Dataset for Automatic Shellcode Generation

    Authors: Pietro Liguori, Erfan Al-Hossami, Domenico Cotroneo, Roberto Natella, Bojan Cukic, Samira Shaikh

    Abstract: We take the first step to address the task of automatically generating shellcodes, i.e., small pieces of code used as a payload in the exploitation of a software vulnerability, starting from natural language comments. We assemble and release a novel dataset (Shellcode_IA32), consisting of challenging but common assembly instructions with their natural language descriptions. We experiment with stan… ▽ More

    Submitted 18 March, 2022; v1 submitted 27 April, 2021; originally announced April 2021.

    Comments: Paper accepted to NLP4Prog Workshop 2021 co-located with ACL-IJCNLP 2021. Extended journal version of this work has been published in the Automated Software Engineering journal, Volume 29, Article no. 30, March 2022, DOI: 10.1007/s10515-022-00331-3

  19. arXiv:2102.06166  [pdf, other

    cs.LG cs.AI

    Testing Framework for Black-box AI Models

    Authors: Aniya Aggarwal, Samiulla Shaikh, Sandeep Hans, Swastik Haldar, Rema Ananthanarayanan, Diptikalyan Saha

    Abstract: With widespread adoption of AI models for important decision making, ensuring reliability of such models remains an important challenge. In this paper, we present an end-to-end generic framework for testing AI Models which performs automated test generation for different modalities such as text, tabular, and time-series data and across various properties such as accuracy, fairness, and robustness.… ▽ More

    Submitted 11 February, 2021; originally announced February 2021.

    Comments: 4 pages Demonstrations track paper accepted at ICSE 2021

  20. arXiv:2102.01672  [pdf, other

    cs.CL cs.AI cs.LG

    The GEM Benchmark: Natural Language Generation, its Evaluation and Metrics

    Authors: Sebastian Gehrmann, Tosin Adewumi, Karmanya Aggarwal, Pawan Sasanka Ammanamanchi, Aremu Anuoluwapo, Antoine Bosselut, Khyathi Raghavi Chandu, Miruna Clinciu, Dipanjan Das, Kaustubh D. Dhole, Wanyu Du, Esin Durmus, Ondřej Dušek, Chris Emezue, Varun Gangal, Cristina Garbacea, Tatsunori Hashimoto, Yufang Hou, Yacine Jernite, Harsh Jhamtani, Yangfeng Ji, Shailza Jolly, Mihir Kale, Dhruv Kumar, Faisal Ladhak , et al. (31 additional authors not shown)

    Abstract: We introduce GEM, a living benchmark for natural language Generation (NLG), its Evaluation, and Metrics. Measuring progress in NLG relies on a constantly evolving ecosystem of automated metrics, datasets, and human evaluation standards. Due to this moving target, new models often still evaluate on divergent anglo-centric corpora with well-established, but flawed, metrics. This disconnect makes it… ▽ More

    Submitted 1 April, 2021; v1 submitted 2 February, 2021; originally announced February 2021.

  21. arXiv:2011.13638  [pdf

    cs.HC cs.CY cs.SE

    Human Computations in Citizen Crowds: A Knowledge Management Solution Framework

    Authors: Nadeem Kafi, Zubair Ahmed Shaikh, Muhammad Shahid Shaikh

    Abstract: KG (Knowledge Generation) and understanding have traditionally been a Human-centric activity. KE (Knowledge Engineering) and KM (Knowledge Management) have tried to augment human knowledge on two separate planes: the first deals with machine interpretation of knowledge while the later explore interactions in human networks for KG and understanding. However, both remain computer-centric. Crowdsourc… ▽ More

    Submitted 27 November, 2020; originally announced November 2020.

    Journal ref: Mehran University Research Journal of Engineering & Technology, Vol. 37, No. 3, 513-528 July 2018, p-ISSN: 0254-7821, e-ISSN: 2413-7219

  22. arXiv:2009.12506  [pdf, other

    cs.CL

    Learning to Plan and Realize Separately for Open-Ended Dialogue Systems

    Authors: Sashank Santhanam, Zhuo Cheng, Brodie Mather, Bonnie Dorr, Archna Bhatia, Bryanna Hebenstreit, Alan Zemel, Adam Dalton, Tomek Strzalkowski, Samira Shaikh

    Abstract: Achieving true human-like ability to conduct a conversation remains an elusive goal for open-ended dialogue systems. We posit this is because extant approaches towards natural language generation (NLG) are typically construed as end-to-end architectures that do not adequately model human generation processes. To investigate, we decouple generation into two separate phases: planning and realization… ▽ More

    Submitted 4 October, 2020; v1 submitted 25 September, 2020; originally announced September 2020.

    Comments: Accepted at EMNLP 2020 (Findings)

  23. arXiv:2004.09662  [pdf, other

    cs.CL cs.CR

    The Panacea Threat Intelligence and Active Defense Platform

    Authors: Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Md Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Tomek Strzalkowski, Bonnie J. Dorr

    Abstract: We describe Panacea, a system that supports natural language processing (NLP) components for active defenses against social engineering attacks. We deploy a pipeline of human language technology, including Ask and Framing Detection, Named Entity Recognition, Dialogue Engineering, and Stylometry. Panacea processes modern message formats through a plug-in architecture to accommodate innovative appro… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    Comments: Accepted at STOC

  24. arXiv:2004.09050  [pdf, ps, other

    cs.CL

    Adaptation of a Lexical Organization for Social Engineering Detection and Response Generation

    Authors: Archna Bhatia, Adam Dalton, Brodie Mather, Sashank Santhanam, Samira Shaikh, Alan Zemel, Tomek Strzalkowski, Bonnie J. Dorr

    Abstract: We present a paradigm for extensible lexicon development based on Lexical Conceptual Structure to support social engineering detection and response generation. We leverage the central notions of ask (elicitation of behaviors such as providing access to money) and framing (risk/reward implied by the ask). We demonstrate improvements in ask/framing detection through refinements to our lexical organi… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    Comments: Accepted at STOC

  25. arXiv:2004.03352  [pdf, other

    cs.DB cs.DC

    GeoFlink: A Distributed and Scalable Framework for the Real-time Processing of Spatial Streams

    Authors: Salman Ahmed Shaikh, Komal Mariam, Hiroyuki Kitagawa, Kyoung-Sook Kim

    Abstract: Apache Flink is an open-source system for scalable processing of batch and streaming data. Flink does not natively support efficient processing of spatial data streams, which is a requirement of many applications dealing with spatial data. Besides Flink, other scalable spatial data processing platforms including GeoSpark, Spatial Hadoop, etc. do not support streaming workloads and can only handle… ▽ More

    Submitted 2 August, 2020; v1 submitted 7 April, 2020; originally announced April 2020.

    Comments: CIKM 2020 Preprint

  26. arXiv:2002.10931  [pdf, other

    cs.CL

    Detecting Asks in SE attacks: Impact of Linguistic and Structural Knowledge

    Authors: Bonnie J. Dorr, Archna Bhatia, Adam Dalton, Brodie Mather, Bryanna Hebenstreit, Sashank Santhanam, Zhuo Cheng, Samira Shaikh, Alan Zemel, Tomek Strzalkowski

    Abstract: Social engineers attempt to manipulate users into undertaking actions such as downloading malware by clicking links or providing access to money or sensitive information. Natural language processing, computational sociolinguistics, and media-specific structural clues provide a means for detecting both the ask (e.g., buy gift card) and the risk/reward implied by the ask, which we call framing (e.g.… ▽ More

    Submitted 25 February, 2020; originally announced February 2020.

    Comments: Accepted at AAAI 2020

  27. arXiv:2002.07927  [pdf, other

    cs.CL cs.HC

    Studying the Effects of Cognitive Biases in Evaluation of Conversational Agents

    Authors: Sashank Santhanam, Alireza Karduni, Samira Shaikh

    Abstract: Humans quite frequently interact with conversational agents. The rapid advancement in generative language modeling through neural networks has helped advance the creation of intelligent conversational agents. Researchers typically evaluate the output of their models through crowdsourced judgments, but there are no established best practices for conducting such studies. Moreover, it is unclear if c… ▽ More

    Submitted 26 February, 2020; v1 submitted 18 February, 2020; originally announced February 2020.

    Comments: Accepted at CHI 2020

  28. arXiv:1912.12914  [pdf

    cs.HC

    'Alexa, Do You Know Anything?' The Impact of an Intelligent Assistant on Team Interactions and Creative Performance Under Time Scarcity

    Authors: Sonia Jawaid Shaikh, Ignacio Cruz

    Abstract: Human-AI collaboration is on the rise with the deployment of AI-enabled intelligent assistants (e.g. Amazon Echo, Cortana, Siri, etc.) across organizational contexts. It is claimed that intelligent assistants can help people achieve more in less time (Personal Digital Assistant - Cortana, n.d.). However, despite the increasing presence of intelligent assistants in collaborative settings, there is… ▽ More

    Submitted 30 December, 2019; originally announced December 2019.

    Comments: 29 pages, 1 figure

  29. arXiv:1911.11404  [pdf, other

    cs.CL

    Natural Language Generation Using Reinforcement Learning with External Rewards

    Authors: Vidhushini Srinivasan, Sashank Santhanam, Samira Shaikh

    Abstract: We propose an approach towards natural language generation using a bidirectional encoder-decoder which incorporates external rewards through reinforcement learning (RL). We use attention mechanism and maximum mutual information as an initial objective function using RL. Using a two-part training scheme, we train an external reward analyzer to predict the external rewards and then use the predicted… ▽ More

    Submitted 26 November, 2019; originally announced November 2019.

    Comments: Oral Presentation at ICMLA 2019

  30. arXiv:1911.11161  [pdf, ps, other

    cs.CL

    Emotional Neural Language Generation Grounded in Situational Contexts

    Authors: Sashank Santhanam, Samira Shaikh

    Abstract: Emotional language generation is one of the keys to human-like artificial intelligence. Humans use different type of emotions depending on the situation of the conversation. Emotions also play an important role in mediating the engagement level with conversational partners. However, current conversational agents do not effectively account for emotional content in the language generation process. T… ▽ More

    Submitted 25 November, 2019; originally announced November 2019.

    Comments: Oral Presentation at CCNLG 2019

  31. arXiv:1909.10122  [pdf, ps, other

    cs.CL

    Towards Best Experiment Design for Evaluating Dialogue System Output

    Authors: Sashank Santhanam, Samira Shaikh

    Abstract: To overcome the limitations of automated metrics (e.g. BLEU, METEOR) for evaluating dialogue systems, researchers typically use human judgments to provide convergent evidence. While it has been demonstrated that human judgments can suffer from the inconsistency of ratings, extant research has also found that the design of the evaluation task affects the consistency and quality of human judgments.… ▽ More

    Submitted 22 September, 2019; originally announced September 2019.

    Comments: Accepted at INLG 2019

  32. arXiv:1907.08326  [pdf, other

    cs.SI cs.CL

    I Stand With You: Using Emojis to Study Solidarity in Crisis Events

    Authors: Sashank Santhanam, Vidhushini Srinivasan, Shaina Glass, Samira Shaikh

    Abstract: We study how emojis are used to express solidarity in social media in the context of two major crisis events - a natural disaster, Hurricane Irma in 2017 and terrorist attacks that occurred on November 2015 in Paris. Using annotated corpora, we first train a recurrent neural network model to classify expressions of solidarity in text. Next, we use these expressions of solidarity to characterize hu… ▽ More

    Submitted 18 July, 2019; originally announced July 2019.

  33. arXiv:1906.00500  [pdf, other

    cs.CL

    A Survey of Natural Language Generation Techniques with a Focus on Dialogue Systems - Past, Present and Future Directions

    Authors: Sashank Santhanam, Samira Shaikh

    Abstract: One of the hardest problems in the area of Natural Language Processing and Artificial Intelligence is automatically generating language that is coherent and understandable to humans. Teaching machines how to converse as humans do falls under the broad umbrella of Natural Language Generation. Recent years have seen unprecedented growth in the number of research articles published on this subject in… ▽ More

    Submitted 2 June, 2019; originally announced June 2019.

  34. arXiv:1812.03991  [pdf, ps, other

    cs.ET cs.AR

    Real-time Closed Loop Neural Decoding on a Neuromorphic Chip

    Authors: Shoeb Shaikh, Rosa So, Tafadzwa Sibindi, Camilo Libedinsky, Arindam Basu

    Abstract: This paper presents for the first time a real-time closed loop neuromorphic decoder chip-driven intra-cortical brain machine interface (iBMI) in a non-human primate (NHP) based experimental setup. Decoded results show trial success rates and mean times to target comparable to those obtained by hand-controlled joystick. Neural control trial success rates of approximately 96% of those obtained by ha… ▽ More

    Submitted 10 December, 2018; originally announced December 2018.

    Comments: accepted at Neural Engineering Conference (NER), 2019

  35. arXiv:1809.04262  [pdf, ps, other

    cs.LG cs.IR stat.ML

    Extracting Fairness Policies from Legal Documents

    Authors: Rashmi Nagpal, Chetna Wadhwa, Mallika Gupta, Samiulla Shaikh, Sameep Mehta, Vikram Goyal

    Abstract: Machine Learning community is recently exploring the implications of bias and fairness with respect to the AI applications. The definition of fairness for such applications varies based on their domain of application. The policies governing the use of such machine learning system in a given context are defined by the constitutional laws of nations and regulatory policies enforced by the organizati… ▽ More

    Submitted 12 September, 2018; originally announced September 2018.

  36. arXiv:1807.09739  [pdf, other

    cs.HC cs.SI

    Vulnerable to Misinformation? Verifi!

    Authors: Alireza Karduni, Isaac Cho, Ryan Wesslen, Sashank Santhanam, Svitlana Volkova, Dustin Arendt, Samira Shaikh, Wenwen Dou

    Abstract: We present Verifi2, a visual analytic system to support the investigation of misinformation on social media. On the one hand, social media platforms empower individuals and organizations by democratizing the sharing of information. On the other hand, even well-informed and experienced social media users are vulnerable to misinformation. To address the issue, various models and studies have emerged… ▽ More

    Submitted 17 March, 2019; v1 submitted 25 July, 2018; originally announced July 2018.

    Comments: 11 pages, 7 figures

  37. arXiv:1806.02720  [pdf, other

    cs.HC

    Anchored in a Data Storm: How Anchoring Bias Can Affect User Strategy, Confidence, and Decisions in Visual Analytics

    Authors: Ryan Wesslen, Sashank Santhanam, Alireza Karduni, Isaac Cho, Samira Shaikh, Wenwen Dou

    Abstract: Cognitive biases have been shown to lead to faulty decision-making. Recent research has demonstrated that the effect of cognitive biases, anchoring bias in particular, transfers to information visualization and visual analytics. However, it is still unclear how users of visual interfaces can be anchored and the impact of anchoring on user performance and decision-making process. To investigate, we… ▽ More

    Submitted 7 June, 2018; originally announced June 2018.

  38. arXiv:1802.04845  [pdf

    cs.CY

    Using Naive Bayes Algorithm to Students' bachelor Academic Performances Analysis

    Authors: Fahad Razaque, Nareena Soomro, Shoaib Ahmed Shaikh, Safeeullah Soomro, Javed Ahmed Samo, Natesh Kumar, Huma Dharejo

    Abstract: Academic Data Mining was one of emerging field which comprise procedure of examined students details by different elements such as earlier semester marks, attendance, assignment, discussion, lab work were of used to improved bachelor academic performance of students, and overcome difficulties of low ranks of bachelor students. It was extracted useful knowledge from bachelor academic students data… ▽ More

    Submitted 5 February, 2018; originally announced February 2018.

    Comments: 2017

    Journal ref: IEEE Proceedings ICETAS 2017

  39. arXiv:1710.06876  [pdf, other

    cs.CY

    An End-To-End Machine Learning Pipeline That Ensures Fairness Policies

    Authors: Samiulla Shaikh, Harit Vishwakarma, Sameep Mehta, Kush R. Varshney, Karthikeyan Natesan Ramamurthy, Dennis Wei

    Abstract: In consequential real-world applications, machine learning (ML) based systems are expected to provide fair and non-discriminatory decisions on candidates from groups defined by protected attributes such as gender and race. These expectations are set via policies or regulations governing data usage and decision criteria (sometimes explicitly calling out decisions by automated systems). Often, the d… ▽ More

    Submitted 18 October, 2017; originally announced October 2017.

    Comments: Presented at the Data For Good Exchange 2017

  40. arXiv:1710.02404  [pdf

    cs.NI

    Towards a disaster response system based on cognitive radio ad hoc networks

    Authors: Noman Islam, Ghazala Shafi Shaikh

    Abstract: This paper presents an approach towards disaster management based on cognitive radio ad hoc network. Despite the growing interests on cognitive radio ad hoc networks, not much work has been reported on using them for disaster management. This paper discusses opportunities for disaster management based on cognitive radio ad hoc networks. In this direction, the paper presents a novel technique for d… ▽ More

    Submitted 3 October, 2017; originally announced October 2017.

  41. arXiv:1708.05464  [pdf, other

    cs.CV

    Simultaneous Detection and Quantification of Retinal Fluid with Deep Learning

    Authors: Dustin Morley, Hassan Foroosh, Saad Shaikh, Ulas Bagci

    Abstract: We propose a new deep learning approach for automatic detection and segmentation of fluid within retinal OCT images. The proposed framework utilizes both ResNet and Encoder-Decoder neural network architectures. When training the network, we apply a novel data augmentation method called myopic warping together with standard rotation-based augmentation to increase the training set size to 45 times t… ▽ More

    Submitted 17 August, 2017; originally announced August 2017.

  42. Software Model Checking: A Promising Approach to Verify Mobile App Security

    Authors: Irina Mariuca Asavoae, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh

    Abstract: In this position paper we advocate software model checking as a technique suitable for security analysis of mobile apps. Our recommendation is based on promising results that we achieved on analysing app collusion in the context of the Android operating system. Broadly speaking, app collusion appears when, in performing a threat, several apps are working together, i.e., they exchange information w… ▽ More

    Submitted 15 June, 2017; originally announced June 2017.

    Comments: 2 pages, 2 figures, FTFJP'17

  43. arXiv:1603.02308  [pdf, other

    cs.SE cs.CR

    Towards Automated Android App Collusion Detection

    Authors: Irina Mariuca Asavoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh

    Abstract: Android OS supports multiple communication methods between apps. This opens the possibility to carry out threats in a collaborative fashion, c.f. the Soundcomber example from 2011. In this paper we provide a concise definition of collusion and report on a number of automated detection approaches, developed in co-operation with Intel Security.

    Submitted 7 March, 2016; originally announced March 2016.

  44. arXiv:1412.1888  [pdf

    cs.IR

    Document clustering using graph based document representation with constraints

    Authors: Muhammad Rafi, Farnaz Amin, Mohammad Shahid Shaikh

    Abstract: Document clustering is an unsupervised approach in which a large collection of documents (corpus) is subdivided into smaller, meaningful, identifiable, and verifiable sub-groups (clusters). Meaningful representation of documents and implicitly identifying the patterns, on which this separation is performed, is the challenging part of document clustering. We have proposed a document clustering tech… ▽ More

    Submitted 4 December, 2014; originally announced December 2014.

  45. arXiv:1303.4087  [pdf

    cs.IR

    An improved semantic similarity measure for document clustering based on topic maps

    Authors: Muhammad Rafi, Mohammad Shahid Shaikh

    Abstract: A major computational burden, while performing document clustering, is the calculation of similarity measure between a pair of documents. Similarity measure is a function that assigns a real number between 0 and 1 to a pair of documents, depending upon the degree of similarity between them. A value of zero means that the documents are completely dissimilar whereas a value of one indicates that the… ▽ More

    Submitted 17 March, 2013; originally announced March 2013.

    Comments: 5 pages

  46. arXiv:1301.2785  [pdf

    cs.IR cs.LG

    A comparison of SVM and RVM for Document Classification

    Authors: Muhammad Rafi, Mohammad Shahid Shaikh

    Abstract: Document classification is a task of assigning a new unclassified document to one of the predefined set of classes. The content based document classification uses the content of the document with some weighting criteria to assign it to one of the predefined classes. It is a major task in library science, electronic document management systems and information sciences. This paper investigates docum… ▽ More

    Submitted 13 January, 2013; originally announced January 2013.

    Comments: ICoCSIM 2012, Medan Indonesia

  47. arXiv:1301.0043  [pdf, ps, other

    cs.HC cs.RO eess.SY

    A Framework for Analysing Driver Interactions with Semi-Autonomous Vehicles

    Authors: Siraj Shaikh, Padmanabhan Krishnan

    Abstract: Semi-autonomous vehicles are increasingly serving critical functions in various settings from mining to logistics to defence. A key characteristic of such systems is the presence of the human (drivers) in the control loop. To ensure safety, both the driver needs to be aware of the autonomous aspects of the vehicle and the automated features of the vehicle built to enable safer control. In this pap… ▽ More

    Submitted 31 December, 2012; originally announced January 2013.

    Comments: In Proceedings FTSCS 2012, arXiv:1212.6574

    ACM Class: H.1.2

    Journal ref: EPTCS 105, 2012, pp. 85-99

  48. arXiv:1208.3623  [pdf

    cs.IR cs.AI

    Content-based Text Categorization using Wikitology

    Authors: Muhammad Rafi, Sundus Hassan, Mohammad Shahid Shaikh

    Abstract: A major computational burden, while performing document clustering, is the calculation of similarity measure between a pair of documents. Similarity measure is a function that assign a real number between 0 and 1 to a pair of documents, depending upon the degree of similarity between them. A value of zero means that the documents are completely dissimilar whereas a value of one indicates that the… ▽ More

    Submitted 17 August, 2012; originally announced August 2012.

    Comments: 9 pages; IJCSI August 2012

  49. arXiv:1202.4818  [pdf

    cs.DB

    Association Rule Mining Based On Trade List

    Authors: Sanober Shaikh, Madhuri rao

    Abstract: In this paper a new mining algorithm is defined based on frequent item set. Apriori Algorithm scans the database every time when it finds the frequent item set so it is very time consuming and at each step it generates candidate item set. So for large databases it takes lots of space to store candidate item set .In undirected item set graph, it is improvement on apriori but it takes time and space… ▽ More

    Submitted 22 February, 2012; originally announced February 2012.

    Comments: 15 pages

    Journal ref: http://www.airccj.org/ijdkp/ijdkp2011.html

  50. Comparing SVM and Naive Bayes classifiers for text categorization with Wikitology as knowledge enrichment

    Authors: Sundus Hassan, Muhammad Rafi, Muhammad Shahid Shaikh

    Abstract: The activity of labeling of documents according to their content is known as text categorization. Many experiments have been carried out to enhance text categorization by adding background knowledge to the document using knowledge repositories like Word Net, Open Project Directory (OPD), Wikipedia and Wikitology. In our previous work, we have carried out intensive experiments by extracting knowled… ▽ More

    Submitted 18 February, 2012; originally announced February 2012.

    Comments: 5 pages

    Journal ref: Multitopic Conference (INMIC), 2011 IEEE 14th International