-
LibVulnWatch: A Deep Assessment Agent System and Leaderboard for Uncovering Hidden Vulnerabilities in Open-Source AI Libraries
Authors:
Zekun Wu,
Seonglae Cho,
Umar Mohammed,
Cristian Munoz,
Kleyton Costa,
Xin Guan,
Theo King,
Ze Wang,
Emre Kazim,
Adriano Koshiyama
Abstract:
Open-source AI libraries are foundational to modern AI systems, yet they present significant, underexamined risks spanning security, licensing, maintenance, supply chain integrity, and regulatory compliance. We introduce LibVulnWatch, a system that leverages recent advances in large language models and agentic workflows to perform deep, evidence-based evaluations of these libraries. Built on a gra…
▽ More
Open-source AI libraries are foundational to modern AI systems, yet they present significant, underexamined risks spanning security, licensing, maintenance, supply chain integrity, and regulatory compliance. We introduce LibVulnWatch, a system that leverages recent advances in large language models and agentic workflows to perform deep, evidence-based evaluations of these libraries. Built on a graph-based orchestration of specialized agents, the framework extracts, verifies, and quantifies risk using information from repositories, documentation, and vulnerability databases. LibVulnWatch produces reproducible, governance-aligned scores across five critical domains, publishing results to a public leaderboard for ongoing ecosystem monitoring. Applied to 20 widely used libraries, including ML frameworks, LLM inference engines, and agent orchestration tools, our approach covers up to 88% of OpenSSF Scorecard checks while surfacing up to 19 additional risks per library, such as critical RCE vulnerabilities, missing SBOMs, and regulatory gaps. By integrating advanced language technologies with the practical demands of software risk assessment, this work demonstrates a scalable, transparent mechanism for continuous supply chain evaluation and informed library selection.
△ Less
Submitted 30 June, 2025; v1 submitted 13 May, 2025;
originally announced May 2025.
-
Enhancing Collaboration for Software Engineers through Matching
Authors:
Nayaab Azim,
Sadath Ullah Khan Mohammed,
Evan Phaup,
Adeyemi Aina
Abstract:
In recent years, the field of software engineering has experienced a considerable increase in demand for competent experts, resulting in an increased demand for platforms that connect software engineers and facilitate collaboration. In response to this necessity, in this paper we present a project to solve the lack of a proper one-stop connection platform for software engineers and promoting colla…
▽ More
In recent years, the field of software engineering has experienced a considerable increase in demand for competent experts, resulting in an increased demand for platforms that connect software engineers and facilitate collaboration. In response to this necessity, in this paper we present a project to solve the lack of a proper one-stop connection platform for software engineers and promoting collaborative learning and upskilling. The idea of the project is to develop a web-based application (NEXAS) that would facilitate connecting and collaborating between software engineers. The application would perform algorithmic matching to suggest user connections based on their technical profiles and interests. The users can filter profiles, discover open projects, and form collaboration groups. Using this application will enable users to connect with peers having similar interests, thereby creating a community network tailored exclusively for software engineers.
△ Less
Submitted 22 February, 2025;
originally announced February 2025.
-
Uncovering Bias in Face Generation Models
Authors:
Cristian Muñoz,
Sara Zannone,
Umar Mohammed,
Adriano Koshiyama
Abstract:
Recent advancements in GANs and diffusion models have enabled the creation of high-resolution, hyper-realistic images. However, these models may misrepresent certain social groups and present bias. Understanding bias in these models remains an important research question, especially for tasks that support critical decision-making and could affect minorities. The contribution of this work is a nove…
▽ More
Recent advancements in GANs and diffusion models have enabled the creation of high-resolution, hyper-realistic images. However, these models may misrepresent certain social groups and present bias. Understanding bias in these models remains an important research question, especially for tasks that support critical decision-making and could affect minorities. The contribution of this work is a novel analysis covering architectures and embedding spaces for fine-grained understanding of bias over three approaches: generators, attribute modifier, and post-processing bias mitigators. This work shows that generators suffer from bias across all social groups with attribute preferences such as between 75%-85% for whiteness and 60%-80% for the female gender (for all trained CelebA models) and low probabilities of generating children and older men. Modifier and mitigators work as post-processor and change the generator performance. For instance, attribute channel perturbation strategies modify the embedding spaces. We quantify the influence of this change on group fairness by measuring the impact on image quality and group features. Specifically, we use the Fréchet Inception Distance (FID), the Face Matching Error and the Self-Similarity score. For Interfacegan, we analyze one and two attribute channel perturbations and examine the effect on the fairness distribution and the quality of the image. Finally, we analyzed the post-processing bias mitigators, which are the fastest and most computationally efficient way to mitigate bias. We find that these mitigation techniques show similar results on KL divergence and FID score, however, self-similarity scores show a different feature concentration on the new groups of the data distribution. The weaknesses and ongoing challenges described in this work must be considered in the pursuit of creating fair and unbiased face generation models.
△ Less
Submitted 22 February, 2023;
originally announced February 2023.
-
Embracing advanced AI/ML to help investors achieve success: Vanguard Reinforcement Learning for Financial Goal Planning
Authors:
Shareefuddin Mohammed,
Rusty Bealer,
Jason Cohen
Abstract:
In the world of advice and financial planning, there is seldom one right answer. While traditional algorithms have been successful in solving linear problems, its success often depends on choosing the right features from a dataset, which can be a challenge for nuanced financial planning scenarios. Reinforcement learning is a machine learning approach that can be employed with complex data sets whe…
▽ More
In the world of advice and financial planning, there is seldom one right answer. While traditional algorithms have been successful in solving linear problems, its success often depends on choosing the right features from a dataset, which can be a challenge for nuanced financial planning scenarios. Reinforcement learning is a machine learning approach that can be employed with complex data sets where picking the right features can be nearly impossible. In this paper, we will explore the use of machine learning for financial forecasting, predicting economic indicators, and creating a savings strategy. Vanguard ML algorithm for goals-based financial planning is based on deep reinforcement learning that identifies optimal savings rates across multiple goals and sources of income to help clients achieve financial success. Vanguard learning algorithms are trained to identify market indicators and behaviors too complex to capture with formulas and rules, instead, it works to model the financial success trajectory of investors and their investment outcomes as a Markov decision process. We believe that reinforcement learning can be used to create value for advisors and end-investors, creating efficiency, more personalized plans, and data to enable customized solutions.
△ Less
Submitted 18 October, 2021;
originally announced October 2021.
-
On the capacitive properties of individual microtubules and their meshworks
Authors:
Aarat Kalra,
Sahil Patel,
Asadullah Bhuiyan,
Jordane Preto,
Kyle Scheuer,
Usman Mohammed,
John Lewis,
Vahid Rezania,
Karthik Shankar,
Jack A. Tuszynski
Abstract:
Microtubules are hollow cylindrical polymers composed of the highly negatively-charged (~23e), high dipole moment (1750 D) protein a,b-tubulin. While the roles of microtubules in chromosomal segregation, macromolecular transport and cell migration are relatively well-understood, studies on the electrical properties of microtubules have only recently gained strong interest. Here, we show that while…
▽ More
Microtubules are hollow cylindrical polymers composed of the highly negatively-charged (~23e), high dipole moment (1750 D) protein a,b-tubulin. While the roles of microtubules in chromosomal segregation, macromolecular transport and cell migration are relatively well-understood, studies on the electrical properties of microtubules have only recently gained strong interest. Here, we show that while microtubules at physiological concentrations increase solution capacitance, free tubulin has no appreciable effect. For a particular microtubule concentration, we were able to quantify these effects by determining the capacitance and resistance of a single 20 um-long microtubule to be 1.86 x 10^(-12) F and 1.07 x 10^12 Ohms respectively. Further, we observed a decrease in electrical resistance of solution, with charge transport peaking between 20-60 Hz in the presence of microtubules, consistent with recent findings that microtubules exhibit electric oscillations at such low frequencies. Our results show that in addition to macromolecular transport, microtubules also act as charge-storage devices through counterionic condensation across a broad frequency spectrum. We conclude with a hypothesis of an electrically-tunable cytoskeleton where the dielectric properties of tubulin are polymerization-state dependent.
△ Less
Submitted 7 May, 2019;
originally announced May 2019.
-
Accurate, Data-Efficient, Unconstrained Text Recognition with Convolutional Neural Networks
Authors:
Mohamed Yousef,
Khaled F. Hussain,
Usama S. Mohammed
Abstract:
Unconstrained text recognition is an important computer vision task, featuring a wide variety of different sub-tasks, each with its own set of challenges. One of the biggest promises of deep neural networks has been the convergence and automation of feature extractors from input raw signals, allowing for the highest possible performance with minimum required domain knowledge. To this end, we propo…
▽ More
Unconstrained text recognition is an important computer vision task, featuring a wide variety of different sub-tasks, each with its own set of challenges. One of the biggest promises of deep neural networks has been the convergence and automation of feature extractors from input raw signals, allowing for the highest possible performance with minimum required domain knowledge. To this end, we propose a data-efficient, end-to-end neural network model for generic, unconstrained text recognition. In our proposed architecture we strive for simplicity and efficiency without sacrificing recognition accuracy. Our proposed architecture is a fully convolutional network without any recurrent connections trained with the CTC loss function. Thus it operates on arbitrary input sizes and produces strings of arbitrary length in a very efficient and parallelizable manner. We show the generality and superiority of our proposed text recognition architecture by achieving state of the art results on seven public benchmark datasets, covering a wide spectrum of text recognition tasks, namely: Handwriting Recognition, CAPTCHA recognition, OCR, License Plate Recognition, and Scene Text Recognition. Our proposed architecture has won the ICFHR2018 Competition on Automated Text Recognition on a READ Dataset.
△ Less
Submitted 31 December, 2018;
originally announced December 2018.
-
Analysing Membership Profile Privacy Issues in Online Social Networks
Authors:
Shafii Muhammad Abdulhamid,
Hassan Abdulazeez,
Ochoche Abraham,
Umar Mohammed
Abstract:
A social networking site is an on-line service that attracts a society of subscribers and provides such users with a multiplicity of tools for distribution personal data and creating subscribers generated content directed to a given users interest and personal life. Operators of online social networks are gradually giving out potentially sensitive information about users and their relationships wi…
▽ More
A social networking site is an on-line service that attracts a society of subscribers and provides such users with a multiplicity of tools for distribution personal data and creating subscribers generated content directed to a given users interest and personal life. Operators of online social networks are gradually giving out potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Some criminals too uses information gathered through membership profile in social networks to break peoples PINs and passwords. In this paper, we looked at the field structure of membership profiles in ten popular social networking sites. We also analysed how private information can easily be made public in such sites. At the end recommendations and countermeasures were made on how to safe guard subscribers personal data.
△ Less
Submitted 18 February, 2014;
originally announced February 2014.
-
Image transmission over OFDM channel with rate allocation scheme and minimum peak-toaverage power ratio
Authors:
Usama S. Mohammed,
H. A. Hamada
Abstract:
This paper proposes new scheme for efficient rate allocation in conjunction with reducing peak-to-average power ratio (PAPR) in orthogonal frequency-division multiplexing (OFDM) systems. Modification of the set partitioning in hierarchical trees (SPIHT) image coder is proposed to generate four different groups of bit-stream relative to its significances. The significant bits, the sign bits, the se…
▽ More
This paper proposes new scheme for efficient rate allocation in conjunction with reducing peak-to-average power ratio (PAPR) in orthogonal frequency-division multiplexing (OFDM) systems. Modification of the set partitioning in hierarchical trees (SPIHT) image coder is proposed to generate four different groups of bit-stream relative to its significances. The significant bits, the sign bits, the set bits and the refinement bits are transmitted in four different groups. The proposed method for reducing the PAPR utilizes twice the unequal error protection (UEP), using the Read-Solomon codes (RS), in conjunction with bit-rate allocation and selective interleaving to provide minimum PAPR. The output bit-stream from the source code (SPIHT) will be started by the most significant types of bits (first group of bits). The optimal unequal error protection (UEP) of the four groups is proposed based on the channel destortion. The proposed structure provides significant improvement in bit error rate (BER) performance. Performed computer simulations have shown that the proposed scheme outperform the performance of most of the recent PAPR reduction techniques in most cases. Moreover, the simulation results indicate that the proposed scheme provides significantly better PSNR performance in comparison to well-known robust coding schemes.
△ Less
Submitted 4 June, 2010;
originally announced June 2010.