Skip to main content

Showing 1–18 of 18 results for author: Ahamad, M

.
  1. WavePulse: Real-time Content Analytics of Radio Livestreams

    Authors: Govind Mittal, Sarthak Gupta, Shruti Wagle, Chirag Chopra, Anthony J DeMattee, Nasir Memon, Mustaque Ahamad, Chinmay Hegde

    Abstract: Radio remains a pervasive medium for mass information dissemination, with AM/FM stations reaching more Americans than either smartphone-based social networking or live television. Increasingly, radio broadcasts are also streamed online and accessed over the Internet. We present WavePulse, a framework that records, documents, and analyzes radio content in real-time. While our framework is generally… ▽ More

    Submitted 29 January, 2025; v1 submitted 23 December, 2024; originally announced December 2024.

    Comments: To appear at The Web Conference (WWW) 2025. 20 Pages, 24 figures. Access code and dataset at https://wave-pulse.io

  2. arXiv:2411.08316  [pdf, other

    cs.CR cs.SD eess.AS

    Evaluating Synthetic Command Attacks on Smart Voice Assistants

    Authors: Zhengxian He, Ashish Kundu, Mustaque Ahamad

    Abstract: Recent advances in voice synthesis, coupled with the ease with which speech can be harvested for millions of people, introduce new threats to applications that are enabled by devices such as voice assistants (e.g., Amazon Alexa, Google Home etc.). We explore if unrelated and limited amount of speech from a target can be used to synthesize commands for a voice assistant like Amazon Alexa. More spec… ▽ More

    Submitted 14 November, 2024; v1 submitted 12 November, 2024; originally announced November 2024.

  3. arXiv:2403.16304  [pdf

    cs.CR

    SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned

    Authors: Omar Alrawi, Miuyin Yong Wong, Athanasios Avgetidis, Kevin Valakuzhy, Boladji Vinny Adjibi, Konstantinos Karakatsanis, Mustaque Ahamad, Doug Blough, Fabian Monrose, Manos Antonakakis

    Abstract: Malware sandboxes provide many benefits for security applications, but they are complex. These complexities can overwhelm new users in different research areas and make it difficult to select, configure, and use sandboxes. Even worse, incorrectly using sandboxes can have a negative impact on security applications. In this paper, we address this knowledge gap by systematizing 84 representative pape… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

  4. arXiv:2403.04852  [pdf, other

    cs.SI

    Corrective or Backfire: Characterizing and Predicting User Response to Social Correction

    Authors: Bing He, Yingchen Ma, Mustaque Ahamad, Srijan Kumar

    Abstract: Online misinformation poses a global risk with harmful implications for society. Ordinary social media users are known to actively reply to misinformation posts with counter-misinformation messages, which is shown to be effective in containing the spread of misinformation. Such a practice is defined as "social correction". Nevertheless, it remains unknown how users respond to social correction in… ▽ More

    Submitted 7 March, 2024; originally announced March 2024.

    Comments: Published at: The ACM Web Science Conference 2024 (ACM WebSci 2024). Code and data at: https://github.com/claws-lab/response-to-social-correction

  5. arXiv:2311.04500  [pdf, other

    physics.optics

    Mie-scattering controlled all-dielectric resonator-antenna for bright and directional point dipole emission

    Authors: Mohammed Ashahar Ahamad, Sughra Shaikh, Faraz Ahmed Inam

    Abstract: Designing a deterministic, bright, robust, room temperature stable, on-demand solid-state single photon source has been a major demand in the field of quantum-photonics. For this, various single-photon resonator and antenna schemes are being actively explored. Here, using the Cartesian multi-polar decomposition of the excited Mie-scattering moments, we present the design of a all-dielectric couple… ▽ More

    Submitted 10 November, 2023; v1 submitted 8 November, 2023; originally announced November 2023.

  6. arXiv:2303.06433  [pdf, other

    cs.SI cs.LG

    Reinforcement Learning-based Counter-Misinformation Response Generation: A Case Study of COVID-19 Vaccine Misinformation

    Authors: Bing He, Mustaque Ahamad, Srijan Kumar

    Abstract: The spread of online misinformation threatens public health, democracy, and the broader society. While professional fact-checkers form the first line of defense by fact-checking popular false claims, they do not engage directly in conversations with misinformation spreaders. On the other hand, non-expert ordinary users act as eyes-on-the-ground who proactively counter misinformation -- recent rese… ▽ More

    Submitted 11 March, 2023; originally announced March 2023.

    Comments: Published at: ACM Web Conference 2023 (WWW'23). Code and data at: https://github.com/claws-lab/MisinfoCorrect

  7. arXiv:2301.04961  [pdf, other

    physics.optics cond-mat.mes-hall

    Silicon Carbide Metasurfaces for Controlling the Spontaneous Emission of Embedded Color Centers

    Authors: Mohammed Ashahar Ahamad, Faraz Ahmed Inam, Stefania Castelletto

    Abstract: While electric and magnetic dipolar resonances in SiC have been studied in the far-infrared, they have not been studied in the near infrared. Here we show for the first time that electromagnetic Mie-scattering moments within SiC metasurfaces can control the spontaneous emission process of point defects in the near infrared. Using SiC nanopillars based metasurfaces, we theoretically demonstrate a c… ▽ More

    Submitted 12 January, 2023; originally announced January 2023.

    Comments: 10 pages, 6 figures

    Journal ref: Journal of Lightwave Technology 2024

  8. A survey, review, and future trends of skin lesion segmentation and classification

    Authors: Md. Kamrul Hasan, Md. Asif Ahamad, Choon Hwai Yap, Guang Yang

    Abstract: The Computer-aided Diagnosis or Detection (CAD) approach for skin lesion analysis is an emerging field of research that has the potential to alleviate the burden and cost of skin cancer screening. Researchers have recently indicated increasing interest in developing such CAD systems, with the intention of providing a user-friendly tool to dermatologists to reduce the challenges encountered or asso… ▽ More

    Submitted 2 February, 2023; v1 submitted 25 August, 2022; originally announced August 2022.

    Comments: This manuscript has been accepted to be published in Computers in Biology and Medicine and has a total of 106 pages (single column and double spacing), 13 figures, and 11 tables

    Journal ref: Computers in biology and medicine (2023): 106624

  9. arXiv:2109.06777  [pdf, other

    cs.LG cs.SI

    PETGEN: Personalized Text Generation Attack on Deep Sequence Embedding-based Classification Models

    Authors: Bing He, Mustaque Ahamad, Srijan Kumar

    Abstract: What should a malicious user write next to fool a detection model? Identifying malicious users is critical to ensure the safety and integrity of internet platforms. Several deep learning-based detection models have been created. However, malicious users can evade deep detection models by manipulating their behavior, rendering these models of little use. The vulnerability of such deep detection mod… ▽ More

    Submitted 19 October, 2021; v1 submitted 14 September, 2021; originally announced September 2021.

    Comments: Accepted for publication at: 2021 ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'2021). Code and data at: https://github.com/srijankr/petgen

  10. arXiv:2011.10657  [pdf, other

    q-bio.QM cs.LG

    Predicting Patient COVID-19 Disease Severity by means of Statistical and Machine Learning Analysis of Blood Cell Transcriptome Data

    Authors: Sakifa Aktar, Md. Martuza Ahamad, Md. Rashed-Al-Mahfuz, AKM Azad, Shahadat Uddin, A H M Kamal, Salem A. Alyami, Ping-I Lin, Sheikh Mohammed Shariful Islam, Julian M. W. Quinn, Valsamma Eapen, Mohammad Ali Moni

    Abstract: Introduction: For COVID-19 patients accurate prediction of disease severity and mortality risk would greatly improve care delivery and resource allocation. There are many patient-related factors, such as pre-existing comorbidities that affect disease severity. Since rapid automated profiling of peripheral blood samples is widely available, we investigated how such data from the peripheral blood of… ▽ More

    Submitted 19 November, 2020; originally announced November 2020.

    Report number: JMIR ms#25884

    Journal ref: JMIR Med Inform 2021;9(4):e25884, PMID: 33779565

  11. arXiv:2011.05773  [pdf, ps, other

    cs.SI cs.CL cs.CY

    The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic

    Authors: Nicholas Micallef, Bing He, Srijan Kumar, Mustaque Ahamad, Nasir Memon

    Abstract: Fact checking by professionals is viewed as a vital defense in the fight against misinformation.While fact checking is important and its impact has been significant, fact checks could have limited visibility and may not reach the intended audience, such as those deeply embedded in polarized communities. Concerned citizens (i.e., the crowd), who are users of the platforms where misinformation appea… ▽ More

    Submitted 11 November, 2020; v1 submitted 11 November, 2020; originally announced November 2020.

    Comments: PrePrint - IEEE BigData 2020. The code and data can be found in http://claws.cc.gatech.edu/covid_counter_misinformation.html

  12. arXiv:2009.10200  [pdf, ps, other

    cs.CR cs.SD eess.AS

    Using Inaudible Audio and Voice Assistants to Transmit Sensitive Data over Telephony

    Authors: Zhengxian He, Mohit Narayan Rajput, Mustaque Ahamad

    Abstract: New security and privacy concerns arise due to the growing popularity of voice assistant (VA) deployments in home and enterprise networks. A number of past research results have demonstrated how malicious actors can use hidden commands to get VAs to perform certain operations even when a person may be in their vicinity. However, such work has not explored how compromised computers that are close t… ▽ More

    Submitted 21 September, 2020; originally announced September 2020.

    Comments: 14 pages, 16 figures, arXiv:1808.05665, arXiv:1908.01551

  13. Machine Learning and Meta-Analysis Approach to Identify Patient Comorbidities and Symptoms that Increased Risk of Mortality in COVID-19

    Authors: Sakifa Aktar, Ashis Talukder, Md. Martuza Ahamad, A. H. M. Kamal, Jahidur Rahman Khan, Md. Protikuzzaman, Nasif Hossain, Julian M. W. Quinn, Mathew A. Summers, Teng Liaw, Valsamma Eapen, Mohammad Ali Moni

    Abstract: Background: Providing appropriate care for people suffering from COVID-19, the disease caused by the pandemic SARS-CoV-2 virus is a significant global challenge. Many individuals who become infected have pre-existing conditions that may interact with COVID-19 to increase symptom severity and mortality risk. COVID-19 patient comorbidities are likely to be informative about individual risk of severe… ▽ More

    Submitted 21 August, 2020; originally announced August 2020.

    Report number: 2008.12683

    Journal ref: Diagnostics 2021

  14. arXiv:2008.03554  [pdf, other

    cs.CR

    Fighting Voice Spam with a Virtual Assistant Prototype

    Authors: Sharbani Pandit, Jienan Liu, Roberto Perdisci, Mustaque Ahamad

    Abstract: Mass robocalls affect millions of people on a daily basis. Unfortunately, most current defenses against robocalls rely on phone blocklists and are ineffective against caller ID spoofing. To enable the detection of spoofed robocalls, we propose a {\em virtual assistant} application that could be integrated on smartphones to automatically vet incoming calls. Similar to a human assistant, the virtual… ▽ More

    Submitted 8 August, 2020; originally announced August 2020.

  15. Building a Collaborative Phone Blacklisting System with Local Differential Privacy

    Authors: Daniele Ucci, Roberto Perdisci, Jaewoo Lee, Mustaque Ahamad

    Abstract: Spam phone calls have been rapidly growing from nuisance to an increasingly effective scam delivery tool. To counter this increasingly successful attack vector, a number of commercial smartphone apps that promise to block spam phone calls have appeared on app stores, and are now used by hundreds of thousands or even millions of users. However, following a business model similar to some online soci… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

    Comments: 15 pages, 10 figures, 7 algorithms

  16. arXiv:1804.00451  [pdf, other

    cs.CY cs.SI

    Under the Shadow of Sunshine: Characterizing Spam Campaigns Abusing Phone Numbers Across Online Social Networks

    Authors: Srishti Gupta, Dhruv Kuchhal, Payas Gupta, Mustaque Ahamad, Manish Gupta, Ponnurangam Kumaraguru

    Abstract: Cybercriminals abuse Online Social Networks (OSNs) to lure victims into a variety of spam. Among different spam types, a less explored area is OSN abuse that leverages the telephony channel to defraud users. Phone numbers are advertized via OSNs, and users are tricked into calling these numbers. To expand the reach of such scam / spam campaigns, phone numbers are advertised across multiple platfor… ▽ More

    Submitted 2 April, 2018; originally announced April 2018.

    Comments: To appear in WebScience 2018

  17. arXiv:1709.08331  [pdf, ps, other

    cs.CR

    By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers

    Authors: Bharat Srinivasan, Athanasios Kountouras, Najmeh Miramirkhani, Monjur Alam, Nick Nikiforakis, Manos Antonakakis, Mustaque Ahamad

    Abstract: Technical Support Scams (TSS), which combine online abuse with social engineering over the phone channel, have persisted despite several law enforcement actions. The tactics used by these scammers have evolved over time and they have targeted an ever increasing number of technology brands. Although recent research has provided insights into TSS, these scams have now evolved to exploit ubiquitously… ▽ More

    Submitted 25 September, 2017; originally announced September 2017.

    Comments: Under Submission

  18. arXiv:1512.07330  [pdf, other

    cs.SI cs.CR

    Abusing Phone Numbers and Cross-Application Features for Crafting Targeted Attacks

    Authors: Srishti Gupta, Payas Gupta, Mustaque Ahamad, Ponnurangam Kumaraguru

    Abstract: With the convergence of Internet and telephony, new applications (e.g., WhatsApp) have emerged as an important means of communication for billions of users. These applications are becoming an attractive medium for attackers to deliver spam and carry out more targeted attacks. Since such applications rely on phone numbers, we explore the feasibility, automation, and scalability of phishing attacks… ▽ More

    Submitted 22 December, 2015; originally announced December 2015.

    Comments: Submitted to AsiaCCS 2016