Skip to main content

Showing 51–100 of 159 results for author: Anwar, A

.
  1. Safety Aware Autonomous Path Planning Using Model Predictive Reinforcement Learning for Inland Waterways

    Authors: Astrid Vanneste, Simon Vanneste, Olivier Vasseur, Robin Janssens, Mattias Billast, Ali Anwar, Kevin Mets, Tom De Schepper, Siegfried Mercelis, Peter Hellinckx

    Abstract: In recent years, interest in autonomous shipping in urban waterways has increased significantly due to the trend of keeping cars and trucks out of city centers. Classical approaches such as Frenet frame based planning and potential field navigation often require tuning of many configuration parameters and sometimes even require a different configuration depending on the situation. In this paper, w… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: \c{opyright} 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  2. arXiv:2311.06694  [pdf, other

    cs.CL cs.AI cs.CV cs.RO

    Which One? Leveraging Context Between Objects and Multiple Views for Language Grounding

    Authors: Chancharik Mitra, Abrar Anwar, Rodolfo Corona, Dan Klein, Trevor Darrell, Jesse Thomason

    Abstract: When connecting objects and their language referents in an embodied 3D environment, it is important to note that: (1) an object can be better characterized by leveraging comparative information between itself and other objects, and (2) an object's appearance can vary with camera position. As such, we present the Multi-view Approach to Grounding in Context (MAGiC), which selects an object referent… ▽ More

    Submitted 6 April, 2024; v1 submitted 11 November, 2023; originally announced November 2023.

    Journal ref: North American Chapter of the Association for Computational Linguistics (NAACL), 2024

  3. arXiv:2308.11817  [pdf, other

    cs.GT

    Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach

    Authors: Md Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Charles Kamhoua

    Abstract: Honeypots play a crucial role in implementing various cyber deception techniques as they possess the capability to divert attackers away from valuable assets. Careful strategic placement of honeypots in networks should consider not only network aspects but also attackers' preferences. The allocation of honeypots in tactical networks under network mobility is of great interest. To achieve this obje… ▽ More

    Submitted 18 September, 2023; v1 submitted 22 August, 2023; originally announced August 2023.

    Comments: This paper accepted in 14th International Conference on Decision and Game Theory for Security, GameSec 2023

  4. Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System

    Authors: Ziaur Rahman, Xun Yi, Ibrahim Khalil, Adnan Anwar, Shantanu Pal

    Abstract: Since the beginning of this decade, several incidents report that false data injection attacks targeting intelligent connected vehicles cause huge industrial damage and loss of lives. Data Theft, Flooding, Fuzzing, Hijacking, Malware Spoofing and Advanced Persistent Threats have been immensely growing attack that leads to end-user conflict by abolishing trust on autonomous vehicle. Looking after t… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: 11 pages, 11 figures, 4 tables AsiaCCS conference 2023

    MSC Class: 11T71; 68T05 ACM Class: E.3.1; I.2.1

    Journal ref: ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2023)

  5. arXiv:2307.13187  [pdf

    cs.HC cs.AI

    Digital Emotion Regulation on Social Media

    Authors: Akriti Verma, Shama Islam, Valeh Moghaddam, Adnan Anwar

    Abstract: Emotion regulation is the process of consciously altering one's affective state, that is the underlying emotional state such as happiness, confidence, guilt, anger etc. The ability to effectively regulate emotions is necessary for functioning efficiently in everyday life. Today, the pervasiveness of digital technology is being purposefully employed to modify our affective states, a process known a… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

  6. Cyber Deception against Zero-day Attacks: A Game Theoretic Approach

    Authors: Md Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Branislav Bosansky, Charles Kamhoua

    Abstract: Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have been used to deceive attackers by misrepresenting the true state of the network. Existing work on cyber deception does not model zero-day attacks. In this paper, we address the question of "H… ▽ More

    Submitted 25 July, 2023; v1 submitted 24 July, 2023; originally announced July 2023.

    Comments: 20 pages, 1 citation

    Journal ref: International Conference on Decision and Game Theory for Security, pp. 44-63. Cham: Springer International Publishing, 2022

  7. arXiv:2307.08672  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    FedDefender: Backdoor Attack Defense in Federated Learning

    Authors: Waris Gill, Ali Anwar, Muhammad Ali Gulzar

    Abstract: Federated Learning (FL) is a privacy-preserving distributed machine learning technique that enables individual clients (e.g., user participants, edge devices, or organizations) to train a model on their local data in a secure environment and then share the trained model with an aggregator to build a global model collaboratively. In this work, we propose FedDefender, a defense mechanism against tar… ▽ More

    Submitted 22 February, 2024; v1 submitted 1 July, 2023; originally announced July 2023.

    Comments: Published in SE4SafeML 2023 (co-located with FSE 2023). See https://dl.acm.org/doi/abs/10.1145/3617574.3617858

  8. arXiv:2307.06044  [pdf, other

    quant-ph

    Generating arbitrary non-separable states with polarization and orbital angular momentum of light

    Authors: Sarika Mishra, Ali Anwar, R. P. Singh

    Abstract: We demonstrate an experimental method to generate arbitrary non-separable states of light using polarization and orbital angular momentum (OAM) degrees of freedom. We observe the intensity distribution corresponding to OAM modes of the light beam by projecting the non-separable state into different polarization states. We further verify the presence of non-separability by measuring the degree of p… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

  9. arXiv:2305.17052  [pdf, other

    cs.LG cs.AI cs.CY cs.GT cs.MA

    A Framework for Incentivized Collaborative Learning

    Authors: Xinran Wang, Qi Le, Ahmad Faraz Khan, Jie Ding, Ali Anwar

    Abstract: Collaborations among various entities, such as companies, research labs, AI agents, and edge devices, have become increasingly crucial for achieving machine learning tasks that cannot be accomplished by a single entity alone. This is likely due to factors such as security constraints, privacy concerns, and limitations in computation resources. As a result, collaborative learning (CL) research has… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

  10. arXiv:2305.02061  [pdf, other

    cs.MA cs.AI

    Attention Based Feature Fusion For Multi-Agent Collaborative Perception

    Authors: Ahmed N. Ahmed, Siegfried Mercelis, Ali Anwar

    Abstract: In the domain of intelligent transportation systems (ITS), collaborative perception has emerged as a promising approach to overcome the limitations of individual perception by enabling multiple agents to exchange information, thus enhancing their situational awareness. Collaborative perception overcomes the limitations of individual sensors, allowing connected agents to perceive environments beyon… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

  11. arXiv:2304.07514  [pdf, other

    cs.LG cs.AI

    IP-FL: Incentivized and Personalized Federated Learning

    Authors: Ahmad Faraz Khan, Xinran Wang, Qi Le, Zain ul Abdeen, Azal Ahmad Khan, Haider Ali, Ming Jin, Jie Ding, Ali R. Butt, Ali Anwar

    Abstract: Existing incentive solutions for traditional Federated Learning (FL) focus on individual contributions to a single global objective, neglecting the nuances of clustered personalization with multiple cluster-level models and the non-monetary incentives such as personalized model appeal for clients. In this paper, we first propose to treat incentivization and personalization as interrelated challeng… ▽ More

    Submitted 11 October, 2024; v1 submitted 15 April, 2023; originally announced April 2023.

  12. arXiv:2304.07051  [pdf, other

    cs.CV cs.AI

    The Second Monocular Depth Estimation Challenge

    Authors: Jaime Spencer, C. Stella Qian, Michaela Trescakova, Chris Russell, Simon Hadfield, Erich W. Graf, Wendy J. Adams, Andrew J. Schofield, James Elder, Richard Bowden, Ali Anwar, Hao Chen, Xiaozhi Chen, Kai Cheng, Yuchao Dai, Huynh Thai Hoa, Sadat Hossain, Jianmian Huang, Mohan Jing, Bo Li, Chao Li, Baojun Li, Zhiwen Liu, Stefano Mattoccia, Siegfried Mercelis , et al. (18 additional authors not shown)

    Abstract: This paper discusses the results for the second edition of the Monocular Depth Estimation Challenge (MDEC). This edition was open to methods using any form of supervision, including fully-supervised, self-supervised, multi-task or proxy depth. The challenge was based around the SYNS-Patches dataset, which features a wide diversity of environments with high-quality dense ground-truth. This includes… ▽ More

    Submitted 26 April, 2023; v1 submitted 14 April, 2023; originally announced April 2023.

    Comments: Published at CVPRW2023

  13. arXiv:2304.03640  [pdf, other

    cs.CR cs.DC cs.LG

    FedDiSC: A Computation-efficient Federated Learning Framework for Power Systems Disturbance and Cyber Attack Discrimination

    Authors: Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss

    Abstract: With the growing concern about the security and privacy of smart grid systems, cyberattacks on critical power grid components, such as state estimation, have proven to be one of the top-priority cyber-related issues and have received significant attention in recent years. However, cyberattack detection in smart grids now faces new challenges, including privacy preservation and decentralized power… ▽ More

    Submitted 7 April, 2023; originally announced April 2023.

  14. arXiv:2303.16956  [pdf, other

    cs.CR cs.DC cs.LG eess.SY

    FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination

    Authors: Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseizadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss

    Abstract: With growing security and privacy concerns in the Smart Grid domain, intrusion detection on critical energy infrastructure has become a high priority in recent years. To remedy the challenges of privacy preservation and decentralized power zones with strategic data owners, Federated Learning (FL) has contemporarily surfaced as a viable privacy-preserving alternative which enables collaborative tra… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: To appear in IEEE INFOCOM AidTSP 2023

  15. arXiv:2303.00884  [pdf

    cs.HC

    Encouraging Emotion Regulation in Social Media Conversations through Self-Reflection

    Authors: Akriti Verma, Shama Islam, Valeh Moghaddam, Adnan Anwar

    Abstract: Anonymity in social media platforms keeps users hidden behind a keyboard. This absolves users of responsibility, allowing them to engage in online rage, hate speech, and other text-based toxicity that harms online well-being. Recent research in the field of Digital Emotion Regulation (DER) has revealed that indulgence in online toxicity can be a result of ineffective emotional regulation (ER). Thi… ▽ More

    Submitted 1 March, 2023; originally announced March 2023.

  16. arXiv:2302.07796  [pdf, other

    q-fin.ST math.NA

    A Comparative Predicting Stock Prices using Heston and Geometric Brownian Motion Models

    Authors: H. T. Shehzad, M. A. Anwar, M. Razzaq

    Abstract: This paper presents a novel approach to predicting stock prices using technical analysis. By utilizing Ito's lemma and Euler-Maruyama methods, the researchers develop Heston and Geometric Brownian Motion models that take into account volatility, interest rate, and historical stock prices to generate predictions. The results of the study demonstrate that these models are effective in accurately pre… ▽ More

    Submitted 15 February, 2023; originally announced February 2023.

  17. arXiv:2301.03553  [pdf, other

    cs.SE cs.CV cs.DC cs.LG

    FedDebug: Systematic Debugging for Federated Learning Applications

    Authors: Waris Gill, Ali Anwar, Muhammad Ali Gulzar

    Abstract: In Federated Learning (FL), clients independently train local models and share them with a central aggregator to build a global model. Impermissibility to access clients' data and collaborative training make FL appealing for applications with data-privacy concerns, such as medical imaging. However, these FL characteristics pose unprecedented challenges for debugging. When a global model's performa… ▽ More

    Submitted 22 February, 2024; v1 submitted 9 January, 2023; originally announced January 2023.

    Comments: Published at ICSE 2023. Link https://ieeexplore.ieee.org/document/10172839

    Journal ref: In 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE) (pp. 456-789). IEEE (2023)

  18. arXiv:2301.03205  [pdf, other

    cond-mat.mtrl-sci physics.app-ph

    Enhanced photovoltaic effect in graphene-silicon Schottky junction under mechanical manipulation

    Authors: Dong Pu, Muhammad Abid Anwar, Jiachao Zhou, Renwei Mao, Xin Pan, Jian Chai, Feng Tian, Hua Wang, Huan Hu, Yang Xu

    Abstract: Graphene-silicon Schottky junction (GSJ) which has the potential for large-scale manufacturing and integration can bring new opportunities to Schottky solar cells for photovoltaic (PV) power conversion. However, the essential power conversion limitation for these devices lies in the small open-circuit voltage ($V_{oc}$), which depends on the Schottky barrier height (SBH). In this study, we introdu… ▽ More

    Submitted 9 January, 2023; originally announced January 2023.

    Comments: 7 pages, 4 figures. The following article has been accepted by Applied Physics Letters

  19. arXiv:2212.08779  [pdf, other

    cs.IR

    Personalized Federated Recommender Systems with Private and Partially Federated AutoEncoders

    Authors: Qi Le, Enmao Diao, Xinran Wang, Ali Anwar, Vahid Tarokh, Jie Ding

    Abstract: Recommender Systems (RSs) have become increasingly important in many application domains, such as digital marketing. Conventional RSs often need to collect users' data, centralize them on the server-side, and form a global model to generate reliable recommendations. However, they suffer from two critical limitations: the personalization problem that the RSs trained traditionally may not be customi… ▽ More

    Submitted 16 December, 2022; originally announced December 2022.

  20. arXiv:2211.03971  [pdf

    physics.app-ph cond-mat.mes-hall

    Charge Crowding in Graphene-Silicon Diodes

    Authors: Muhammad Abid Anwar, Munir Ali, Dong Pu, Srikrishna Chanakya Bodepudi, Xinyu Zhu, Xin Pan, Jianhang Lv, Khurram Shehzad, Xiaochen Wang, Ali Imran, Yuda Zhao, Shurong Dong, Yang Xu, Bin Yu, Huan Hu

    Abstract: The performance of nanoscale electronic devices based on a two-three dimensional (2D-3D) interface is significantly affected by the electrical contacts that interconnect these materials with external circuitry. This work investigates charge transport effects at the 2D-3D ohmic contact coupled with the thermionic injection model for graphene/Si Schottky junction. Here, w e focus on the intrinsic pr… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

  21. arXiv:2209.14547  [pdf, other

    cs.CR cs.AI cs.DC cs.LG

    A Secure Federated Learning Framework for Residential Short Term Load Forecasting

    Authors: Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss

    Abstract: Smart meter measurements, though critical for accurate demand forecasting, face several drawbacks including consumers' privacy, data breach issues, to name a few. Recent literature has explored Federated Learning (FL) as a promising privacy-preserving machine learning alternative which enables collaborative learning of a model without exposing private raw data for short term load forecasting. Desp… ▽ More

    Submitted 28 March, 2023; v1 submitted 29 September, 2022; originally announced September 2022.

  22. arXiv:2209.01496  [pdf, other

    cs.DC

    InfiniStore: Elastic Serverless Cloud Storage

    Authors: Jingyuan Zhang, Ao Wang, Xiaolong Ma, Benjamin Carver, Nicholas John Newman, Ali Anwar, Lukas Rupprecht, Dimitrios Skourtis, Vasily Tarasov, Feng Yan, Yue Cheng

    Abstract: Cloud object storage such as AWS S3 is cost-effective and highly elastic but relatively slow, while high-performance cloud storage such as AWS ElastiCache is expensive and provides limited elasticity. We present a new cloud storage service called ServerlessMemory, which stores data using the memory of serverless functions. ServerlessMemory employs a sliding-window-based memory management strategy… ▽ More

    Submitted 16 March, 2023; v1 submitted 3 September, 2022; originally announced September 2022.

    Comments: An extensive report of the paper accepted by VLDB 2023

  23. arXiv:2207.07779  [pdf, other

    cs.CR

    DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting

    Authors: Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Swanand Kadhe, Heiko Ludwig

    Abstract: Federated learning has emerged as a privacy-preserving machine learning approach where multiple parties can train a single model without sharing their raw training data. Federated learning typically requires the utilization of multi-party computation techniques to provide strong privacy guarantees by ensuring that an untrusted or curious aggregator cannot obtain isolated replies from parties invol… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

  24. arXiv:2207.03348  [pdf, other

    cs.RO cs.AI cs.HC cs.LG

    Human-Robot Commensality: Bite Timing Prediction for Robot-Assisted Feeding in Groups

    Authors: Jan Ondras, Abrar Anwar, Tong Wu, Fanjun Bu, Malte Jung, Jorge Jose Ortiz, Tapomayukh Bhattacharjee

    Abstract: We develop data-driven models to predict when a robot should feed during social dining scenarios. Being able to eat independently with friends and family is considered one of the most memorable and important activities for people with mobility limitations. While existing robotic systems for feeding people with mobility limitations focus on solitary dining, commensality, the act of eating together,… ▽ More

    Submitted 16 November, 2022; v1 submitted 7 July, 2022; originally announced July 2022.

    Comments: 6th Conference on Robot Learning (CoRL), 2022

  25. arXiv:2206.11822  [pdf, other

    cs.CY

    DeepSafety:Multi-level Audio-Text Feature Extraction and Fusion Approach for Violence Detection in Conversations

    Authors: Amna Anwar, Eiman Kanjo, Dario Ortega Anderez

    Abstract: Natural Language Processing has recently made understanding human interaction easier, leading to improved sentimental analysis and behaviour prediction. However, the choice of words and vocal cues in conversations presents an underexplored rich source of natural language data for personal safety and crime prevention. When accompanied by audio analysis, it makes it possible to understand the contex… ▽ More

    Submitted 23 June, 2022; originally announced June 2022.

    Comments: 34 pages, 6 figures

  26. arXiv:2206.06027  [pdf, ps, other

    cs.CR

    Adversarial Models Towards Data Availability and Integrity of Distributed State Estimation for Industrial IoT-Based Smart Grid

    Authors: Haftu Tasew Reda, Abdun Mahmood, Adnan Anwar, Naveen Chilamkurti

    Abstract: Security issue of distributed state estimation (DSE) is an important prospect for the rapidly growing smart grid ecosystem. Any coordinated cyberattack targeting the distributed system of state estimators can cause unrestrained estimation errors and can lead to a myriad of security risks, including failure of power system operation. This article explores the security threats of a smart grid arisin… ▽ More

    Submitted 13 June, 2022; originally announced June 2022.

    Comments: 11 pages (DC), Journal manuscript

  27. Towards cost-effective and resource-aware aggregation at Edge for Federated Learning

    Authors: Ahmad Faraz Khan, Yuze Li, Xinran Wang, Sabaat Haroon, Haider Ali, Yue Cheng, Ali R. Butt, Ali Anwar

    Abstract: Federated Learning (FL) is a machine learning approach that addresses privacy and data transfer costs by computing data at the source. It's particularly popular for Edge and IoT applications where the aggregator server of FL is in resource-capped edge data centers for reducing communication costs. Existing cloud-based aggregator solutions are resource-inefficient and expensive at the Edge, leading… ▽ More

    Submitted 26 January, 2024; v1 submitted 16 April, 2022; originally announced April 2022.

    Comments: 10 pages, 12 figures, 4 tables This paper has been accepted at the 2023 IEEE International Conference on Big Data (BigData)

  28. arXiv:2204.06788  [pdf, other

    cs.CV

    Pyramidal Attention for Saliency Detection

    Authors: Tanveer Hussain, Abbas Anwar, Saeed Anwar, Lars Petersson, Sung Wook Baik

    Abstract: Salient object detection (SOD) extracts meaningful contents from an input image. RGB-based SOD methods lack the complementary depth clues; hence, providing limited performance for complex scenarios. Similarly, RGB-D models process RGB and depth inputs, but the depth data availability during testing may hinder the model's practical applicability. This paper exploits only RGB images, estimates depth… ▽ More

    Submitted 14 April, 2022; originally announced April 2022.

    Comments: Accepted at CVPRW 2022. (2022 IEEE CVPR Workshop on Fair, Data Efficient and Trusted Computer Vision)

  29. Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach

    Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam

    Abstract: Security concerns for IoT applications have been alarming because of their widespread use in different enterprise systems. The potential threats to these applications are constantly emerging and changing, and therefore, sophisticated and dependable defense solutions are necessary against such threats. With the rapid development of IoT networks and evolving threat types, the traditional machine lea… ▽ More

    Submitted 10 April, 2022; originally announced April 2022.

    Comments: 12 pages, 13 Figures, 4 tables IEEE Transaction

    ACM Class: I.2; K.3.2

    Journal ref: IEEE Transactions on Industrial Informatics, 2022

  30. Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home

    Authors: Ziaur Rahman, Xun Yi, Mustain Billah, Mousumi Sumi, Adnan Anwar

    Abstract: The Internet of Things (IoT) has brought new ways for humans and machines to communicate with each other over the internet. Though sensor-driven devices have largely eased our everyday lives, most IoT infrastructures have been suffering from security challenges. Since the emergence of IoT, lightweight block ciphers have been a better option for intelligent and sensor-based applications. When publi… ▽ More

    Submitted 30 March, 2022; originally announced March 2022.

    Comments: 15 Pages, 7 Figures and 3 Tables

    ACM Class: E.3

    Journal ref: Electronics 2022, 11(7), 1083

  31. arXiv:2203.07276  [pdf, other

    cs.LG cs.AR

    FRL-FI: Transient Fault Analysis for Federated Reinforcement Learning-Based Navigation Systems

    Authors: Zishen Wan, Aqeel Anwar, Abdulrahman Mahmoud, Tianyu Jia, Yu-Shun Hsiao, Vijay Janapa Reddi, Arijit Raychowdhury

    Abstract: Swarm intelligence is being increasingly deployed in autonomous systems, such as drones and unmanned vehicles. Federated reinforcement learning (FRL), a key swarm intelligence paradigm where agents interact with their own environments and cooperatively learn a consensus policy while preserving privacy, has recently shown potential advantages and gained popularity. However, transient faults are inc… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

    Comments: 2022 Design Automation and Test in Europe Conference (DATE), March 14-23, 2022, Virtual

  32. arXiv:2203.06732  [pdf, other

    q-bio.QM cs.CE q-bio.MN

    BioSimulators: a central registry of simulation engines and services for recommending specific tools

    Authors: Bilal Shaikh, Lucian P. Smith, Dan Vasilescu, Gnaneswara Marupilla, Michael Wilson, Eran Agmon, Henry Agnew, Steven S. Andrews, Azraf Anwar, Moritz E. Beber, Frank T. Bergmann, David Brooks, Lutz Brusch, Laurence Calzone, Kiri Choi, Joshua Cooper, John Detloff, Brian Drawert, Michel Dumontier, G. Bard Ermentrout, James R. Faeder, Andrew P. Freiburger, Fabian Fröhlich, Akira Funahashi, Alan Garny , et al. (46 additional authors not shown)

    Abstract: Computational models have great potential to accelerate bioscience, bioengineering, and medicine. However, it remains challenging to reproduce and reuse simulations, in part, because the numerous formats and methods for simulating various subsystems and scales remain siloed by different software tools. For example, each tool must be executed through a distinct interface. To help investigators find… ▽ More

    Submitted 13 March, 2022; originally announced March 2022.

    Comments: 6 pages, 2 figures

  33. arXiv:2203.05192  [pdf, other

    cs.CR cs.AI

    A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles

    Authors: Mustain Billah, Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Rafiqul Islam

    Abstract: While the convergence of Artificial Intelligence (AI) techniques with improved information technology systems ensured enormous benefits to the Internet of Vehicles (IoVs) systems, it also introduced an increased amount of security and privacy threats. To ensure the security of IoVs data, privacy preservation methodologies have gained significant attention in the literature. However, these strategi… ▽ More

    Submitted 10 March, 2022; originally announced March 2022.

  34. FedREP: Towards Horizontal Federated Load Forecasting for Retail Energy Providers

    Authors: Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss

    Abstract: As Smart Meters are collecting and transmitting household energy consumption data to Retail Energy Providers (REP), the main challenge is to ensure the effective use of fine-grained consumer data while ensuring data privacy. In this manuscript, we tackle this challenge for energy load consumption forecasting in regards to REPs which is essential to energy demand management, load switching and infr… ▽ More

    Submitted 28 March, 2023; v1 submitted 28 February, 2022; originally announced March 2022.

    Comments: Appeared at 14th IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC 2022)

  35. arXiv:2202.12443  [pdf, other

    cs.AI cs.LG

    Towards an Accountable and Reproducible Federated Learning: A FactSheets Approach

    Authors: Nathalie Baracaldo, Ali Anwar, Mark Purcell, Ambrish Rawat, Mathieu Sinn, Bashar Altakrouri, Dian Balta, Mahdi Sellami, Peter Kuhn, Ulrich Schopp, Matthias Buchinger

    Abstract: Federated Learning (FL) is a novel paradigm for the shared training of models based on decentralized and private data. With respect to ethical guidelines, FL is promising regarding privacy, but needs to excel vis-à-vis transparency and trustworthiness. In particular, FL has to address the accountability of the parties involved and their adherence to rules, law and principles. We introduce AF^2 Fra… ▽ More

    Submitted 24 February, 2022; originally announced February 2022.

    Comments: 16 pages, 4 figures, 2 tables

  36. arXiv:2202.05631  [pdf, other

    eess.IV cs.AI cs.CV

    Vehicle and License Plate Recognition with Novel Dataset for Toll Collection

    Authors: Muhammad Usama, Hafeez Anwar, Abbas Anwar, Saeed Anwar

    Abstract: We propose an automatic framework for toll collection, consisting of three steps: vehicle type recognition, license plate localization, and reading. However, each of the three steps becomes non-trivial due to image variations caused by several factors. The traditional vehicle decorations on the front cause variations among vehicles of the same type. These decorations make license plate localizatio… ▽ More

    Submitted 15 November, 2022; v1 submitted 11 February, 2022; originally announced February 2022.

  37. arXiv:2111.14345  [pdf, other

    cs.LG

    SPATL: Salient Parameter Aggregation and Transfer Learning for Heterogeneous Clients in Federated Learning

    Authors: Sixing Yu, Phuong Nguyen, Waqwoya Abebe, Wei Qian, Ali Anwar, Ali Jannesari

    Abstract: Federated learning~(FL) facilitates the training and deploying AI models on edge devices. Preserving user data privacy in FL introduces several challenges, including expensive communication costs, limited resources, and data heterogeneity. In this paper, we propose SPATL, an FL method that addresses these issues by: (a) introducing a salient parameter selection agent and communicating selected par… ▽ More

    Submitted 26 August, 2022; v1 submitted 29 November, 2021; originally announced November 2021.

    Comments: Accepted at The International Conference for High Performance Computing, Networking, Storage, and Analysis (SC 22)

  38. arXiv:2111.14251  [pdf, other

    cs.CR cs.AI cs.DC cs.LG

    False Data Injection Threats in Active Distribution Systems: A Comprehensive Survey

    Authors: Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss

    Abstract: With the proliferation of smart devices and revolutions in communications, electrical distribution systems are gradually shifting from passive, manually-operated and inflexible ones, to a massively interconnected cyber-physical smart grid to address the energy challenges of the future. However, the integration of several cutting-edge technologies has introduced several security and privacy vulnera… ▽ More

    Submitted 29 September, 2022; v1 submitted 28 November, 2021; originally announced November 2021.

  39. arXiv:2111.04957  [pdf, other

    cs.RO

    Analyzing and Improving Fault Tolerance of Learning-Based Navigation Systems

    Authors: Zishen Wan, Aqeel Anwar, Yu-Shun Hsiao, Tianyu Jia, Vijay Janapa Reddi, Arijit Raychowdhury

    Abstract: Learning-based navigation systems are widely used in autonomous applications, such as robotics, unmanned vehicles and drones. Specialized hardware accelerators have been proposed for high-performance and energy-efficiency for such navigational tasks. However, transient and permanent faults are increasing in hardware systems and can catastrophically violate tasks safety. Meanwhile, traditional redu… ▽ More

    Submitted 9 November, 2021; originally announced November 2021.

    Comments: Accepted in 58th ACM/IEEE Design Automation Conference (DAC), 2021

  40. arXiv:2110.03149  [pdf, other

    cs.LG eess.SP

    Data-driven behavioural biometrics for continuous and adaptive user verification using Smartphone and Smartwatch

    Authors: Akriti Verma, Valeh Moghaddam, Adnan Anwar

    Abstract: Recent studies have shown how motion-based biometrics can be used as a form of user authentication and identification without requiring any human cooperation. This category of behavioural biometrics deals with the features we learn in our life as a result of our interaction with the environment and nature. This modality is related to change in human behaviour over time. The developments in these m… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

    Comments: 11 pages, 7 figures, 2 tables

  41. arXiv:2110.00773  [pdf, other

    cs.CR

    Emerging Trends of Recently Published Datasets for Intrusion Detection Systems (IDS): A Survey

    Authors: Rishabh Jindal, Adnan Anwar

    Abstract: With the ubiquitous nature of information technology solutions that facilitate communication in the modern world, cyber attacks are increasing in volume and becoming more sophisticated in nature. From classic network-based Denial of Service (DoS) attacks to the more recent concerns of privacy compromises, Intrusion Detection Systems (IDS) are becoming an urgent need to safeguard the modern informa… ▽ More

    Submitted 2 October, 2021; originally announced October 2021.

    Comments: 18 pages, 3 figures

  42. arXiv:2109.08231  [pdf, other

    cs.LG

    RAPID-RL: A Reconfigurable Architecture with Preemptive-Exits for Efficient Deep-Reinforcement Learning

    Authors: Adarsh Kumar Kosta, Malik Aqeel Anwar, Priyadarshini Panda, Arijit Raychowdhury, Kaushik Roy

    Abstract: Present-day Deep Reinforcement Learning (RL) systems show great promise towards building intelligent agents surpassing human-level performance. However, the computational complexity associated with the underlying deep neural networks (DNNs) leads to power-hungry implementations. This makes deep RL systems unsuitable for deployment on resource-constrained edge devices. To address this challenge, we… ▽ More

    Submitted 16 September, 2021; originally announced September 2021.

  43. arXiv:2108.13373  [pdf, other

    cs.CR cs.LG

    ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation

    Authors: Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, Daehun Nyang, David Mohaisen

    Abstract: The rapid growth of the Internet of Things (IoT) devices is paralleled by them being on the front-line of malicious attacks. This has led to an explosion in the number of IoT malware, with continued mutations, evolution, and sophistication. These malicious software are detected using machine learning (ML) algorithms alongside the traditional signature-based methods. Although ML-based detectors imp… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Comments: 11 pages

  44. arXiv:2107.12490  [pdf, other

    cs.LG cs.CR cs.DC

    LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning

    Authors: Kamala Varma, Yi Zhou, Nathalie Baracaldo, Ali Anwar

    Abstract: Federated learning has arisen as a mechanism to allow multiple participants to collaboratively train a model without sharing their data. In these settings, participants (workers) may not trust each other fully; for instance, a set of competitors may collaboratively train a machine learning model to detect fraud. The workers provide local gradients that a central server uses to update a global mode… ▽ More

    Submitted 26 July, 2021; originally announced July 2021.

  45. arXiv:2107.05172  [pdf

    cs.CR cs.AI

    Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular Networks

    Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed

    Abstract: The Controller Area Network (CAN) bus works as an important protocol in the real-time In-Vehicle Network (IVN) systems for its simple, suitable, and robust architecture. The risk of IVN devices has still been insecure and vulnerable due to the complex data-intensive architectures which greatly increase the accessibility to unauthorized networks and the possibility of various types of cyberattacks.… ▽ More

    Submitted 11 July, 2021; originally announced July 2021.

    Comments: 23 Pages, 14 Figures, 6 Tables with Appendix

    ACM Class: I.2.6; K.3.2

    Journal ref: MDPI Sensor, 2021, 21(14), 4736

  46. Bi-Level Poisoning Attack Model and Countermeasure for Appliance Consumption Data of Smart Homes

    Authors: Mustain Billah, Adnan Anwar, Ziaur Rahman, Syed Md. Galib

    Abstract: Accurate building energy prediction is useful in various applications starting from building energy automation and management to optimal storage control. However, vulnerabilities should be considered when designing building energy prediction models, as intelligent attackers can deliberately influence the model performance using sophisticated attack models. These may consequently degrade the predic… ▽ More

    Submitted 30 June, 2021; originally announced July 2021.

    Comments: 17 Pages, 7 Figures, 1 table

    ACM Class: H.1

    Journal ref: Energies 2021, 14(13), 3887

  47. Size invariant twisted optical modes for efficient generation of higher dimensional quantum states

    Authors: Ali Anwar, Shashi Prabhakar, R. P. Singh

    Abstract: Optical vortex beams are profiled as helical wavefronts with a phase singularity carrying an orbital angular momentum (OAM) associated with their spatial distribution. The transverse intensity distribution of a conventional optical vortex has a strong dependence on the carried topological charge. However, perfect optical vortex (POV) beams have their transverse intensity distribution independent o… ▽ More

    Submitted 5 July, 2021; originally announced July 2021.

    Comments: 8 pages, 9 figures

    Journal ref: Journal of the Optical Society of America B 38, 2976 (2021)

  48. arXiv:2106.06921  [pdf, other

    cs.LG cs.CV

    Heterogeneous Federated Learning using Dynamic Model Pruning and Adaptive Gradient

    Authors: Sixing Yu, Phuong Nguyen, Ali Anwar, Ali Jannesari

    Abstract: Federated Learning (FL) has emerged as a new paradigm for training machine learning models distributively without sacrificing data security and privacy. Learning models on edge devices such as mobile phones is one of the most common use cases for FL. However, Non-identical independent distributed~(non-IID) data in edge devices easily leads to training failures. Especially, over-parameterized machi… ▽ More

    Submitted 9 February, 2023; v1 submitted 13 June, 2021; originally announced June 2021.

    Comments: Preprint of the CCGrid 2023 Submission

  49. arXiv:2104.10839  [pdf, other

    quant-ph physics.ins-det

    Realizing quantum nodes in space for cost-effective, global quantum communication: in-orbit results and next steps

    Authors: Chithrabhanu Perumangatt, Tom Vergoossen, Alexander Lohrmann, Srihari Sivasankaran, Ayesha Reezwana, Ali Anwar, Subash Sachidananda, Tanvirul Islam, Alexander Ling

    Abstract: Quantum sources and receivers operating on-board satellites are an essential building block for global quantumnetworks. SpooQy-1 is a satellite developed at the Centre for Quantum Technologies, which has successfully demonstrated the operation of an entangled photon pair source on a resource-constrained CubeSat platform. This miniaturized and ruggedized photon pair source is being upgraded to be c… ▽ More

    Submitted 22 April, 2021; v1 submitted 21 April, 2021; originally announced April 2021.

    Comments: 15 pages, 13 figures and 2 tables

    Journal ref: Proceedings Volume 11699, Quantum Computing, Communication, and Simulation; 1169904 (2021)

  50. arXiv:2103.16085  [pdf, other

    cs.CR cs.CY eess.SY

    A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grid

    Authors: Haftu Tasew Reda, Adnan Anwar, Abdun Naser Mahmood, Zahir Tari

    Abstract: Modern electric power grid, known as the Smart Grid, has fast transformed the isolated and centrally controlled power system to a fast and massively connected cyber-physical system that benefits from the revolutions happening in the communications and the fast adoption of Internet of Things devices. While the synergy of a vast number of cyber-physical entities has allowed the Smart Grid to be much… ▽ More

    Submitted 30 March, 2021; originally announced March 2021.

    Comments: 35 pages, prepared using the 'acmsmall' document class. arXiv admin note: substantial text overlap with arXiv:2103.10594