Skip to main content

Showing 51–100 of 261 results for author: Rashid, A

.
  1. arXiv:2406.15210  [pdf, other

    cs.CR

    Assessing Effectiveness of Cyber Essentials Technical Controls

    Authors: Priyanka Badva, Partha Das Chowdhury, Kopo M. Ramokapane, Barnaby Craggs, Awais Rashid

    Abstract: Cyber Essentials (CE) comprise a set of controls designed to protect organisations, irrespective of their size, against cyber attacks. The controls are firewalls, secure configuration, user access control, malware protection & security update management. In this work, we explore the extent to which CE remains robust against an ever-evolving threat landscape. To that end, we reconstruct 45 breaches… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: We have submitted this paper in ACM Digital Threats: Research and Practice (DTRAP) Journal. The paper is currently in the review process

  2. arXiv:2406.07780  [pdf, other

    cs.LG cs.CL

    A Critical Look At Tokenwise Reward-Guided Text Generation

    Authors: Ahmad Rashid, Ruotian Wu, Julia Grosse, Agustinus Kristiadi, Pascal Poupart

    Abstract: Large language models (LLMs) can be improved by aligning with human preferences through fine-tuning -- the so-called reinforcement learning from human feedback (RLHF). However, the cost of fine-tuning an LLM is prohibitive for many users. Due to their ability to bypass LLM fine-tuning, prediction-time tokenwise reward-guided text generation (RGTG) methods have recently been proposed. They use a re… ▽ More

    Submitted 14 February, 2025; v1 submitted 11 June, 2024; originally announced June 2024.

  3. arXiv:2406.03322  [pdf, other

    cs.CR

    A Framework for Mapping Organisational Workforce Knowledge Profile in Cyber Security

    Authors: Lata Nautiyal, Awais Rashid

    Abstract: A cyber security organisation needs to ensure that its workforce possesses the necessary knowledge to fulfil its cyber security business functions. Similarly, where an organisation chooses to delegate their cyber security tasks to a third party provider, they must ensure that the chosen entity possesses robust knowledge capabilities to effectively carry out the assigned tasks. Building a comprehen… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

  4. arXiv:2405.18435  [pdf, other

    eess.IV cs.CV

    QUBIQ: Uncertainty Quantification for Biomedical Image Segmentation Challenge

    Authors: Hongwei Bran Li, Fernando Navarro, Ivan Ezhov, Amirhossein Bayat, Dhritiman Das, Florian Kofler, Suprosanna Shit, Diana Waldmannstetter, Johannes C. Paetzold, Xiaobin Hu, Benedikt Wiestler, Lucas Zimmer, Tamaz Amiranashvili, Chinmay Prabhakar, Christoph Berger, Jonas Weidner, Michelle Alonso-Basant, Arif Rashid, Ujjwal Baid, Wesam Adel, Deniz Ali, Bhakti Baheti, Yingbin Bai, Ishaan Bhatt, Sabri Can Cetindag , et al. (55 additional authors not shown)

    Abstract: Uncertainty in medical image segmentation tasks, especially inter-rater variability, arising from differences in interpretations and annotations by various experts, presents a significant challenge in achieving consistent and reliable image segmentation. This variability not only reflects the inherent complexity and subjective nature of medical image interpretation but also directly impacts the de… ▽ More

    Submitted 24 June, 2024; v1 submitted 19 March, 2024; originally announced May 2024.

    Comments: initial technical report

  5. arXiv:2405.09787  [pdf, other

    eess.IV cs.CV cs.LG

    Analysis of the BraTS 2023 Intracranial Meningioma Segmentation Challenge

    Authors: Dominic LaBella, Ujjwal Baid, Omaditya Khanna, Shan McBurney-Lin, Ryan McLean, Pierre Nedelec, Arif Rashid, Nourel Hoda Tahon, Talissa Altes, Radhika Bhalerao, Yaseen Dhemesh, Devon Godfrey, Fathi Hilal, Scott Floyd, Anastasia Janas, Anahita Fathi Kazerooni, John Kirkpatrick, Collin Kent, Florian Kofler, Kevin Leu, Nazanin Maleki, Bjoern Menze, Maxence Pajot, Zachary J. Reitman, Jeffrey D. Rudie , et al. (97 additional authors not shown)

    Abstract: We describe the design and results from the BraTS 2023 Intracranial Meningioma Segmentation Challenge. The BraTS Meningioma Challenge differed from prior BraTS Glioma challenges in that it focused on meningiomas, which are typically benign extra-axial tumors with diverse radiologic and anatomical presentation and a propensity for multiplicity. Nine participating teams each developed deep-learning… ▽ More

    Submitted 7 March, 2025; v1 submitted 15 May, 2024; originally announced May 2024.

    Comments: Accepted for publication at the Journal of Machine Learning for Biomedical Imaging (MELBA) https://melba-journal.org/2025:003 22 pages, 6 tables, 12 figures, MICCAI, MELBA

    Journal ref: Machine.Learning.for.Biomedical.Imaging. 3 (2025)

  6. Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns

    Authors: Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr., Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl

    Abstract: Following the recent release of AI assistants, such as OpenAI's ChatGPT and GitHub Copilot, the software industry quickly utilized these tools for software development tasks, e.g., generating code or consulting AI for advice. While recent research has demonstrated that AI-generated code can contain security issues, how software professionals balance AI assistant usage and security remains unclear.… ▽ More

    Submitted 14 October, 2024; v1 submitted 10 May, 2024; originally announced May 2024.

    Comments: Extended version of the paper that appeared at ACM CCS 2024. 21 pages, 2 figures, 3 tables

  7. arXiv:2405.02975  [pdf, other

    cond-mat.mes-hall cond-mat.supr-con

    Nonequilibrium Andreev resonances in ballistic graphene Andreev interferometers

    Authors: Asmaul Smitha Rashid, Le Yi, Takashi Taniguchi, Kenji Watanabe, Nitin Samarth, Régis Mélin, Morteza Kayyalha

    Abstract: We study nonequilibrium Andreev resonances in a voltage-biased graphene three-terminal Josephson junction (JJ). We observe periodic oscillations of resistance with maxima at multiples of the magnetic flux quantum (noninversion regime). As we increase the bias voltage, we further observe a transition point beyond which oscillations exhibit a $π$ phase shift (inversion regime) with maxima of resista… ▽ More

    Submitted 5 May, 2025; v1 submitted 5 May, 2024; originally announced May 2024.

    Journal ref: Phys. Rev. B 111, L180504 (2025)

  8. arXiv:2405.01612  [pdf

    cs.SE

    Effective Delegation and Leadership in Software Management

    Authors: Star Dawood Mirkhan, Skala Kamaran Omer, Hussein Mohammed Ali, Mahmood Yashar Hamza, Tarik Ahmed Rashid, Poornima Nedunchezhian

    Abstract: Delegation and leadership are critical components of software management, as they play a crucial role in determining the success of the software development process. This study examined the relationship between delegation and leadership in software management and the impact of these factors on project outcomes. Results showed that effective delegation and transformational leadership styles can imp… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 9 pages

  9. arXiv:2405.01608  [pdf

    cs.SE

    A Comprehensive Study on Automated Testing with the Software Lifecycle

    Authors: Hussein Mohammed Ali, Mahmood Yashar Hamza, Tarik Ahmed Rashid

    Abstract: The software development lifecycle depends heavily on the testing process, which is an essential part of finding issues and reviewing the quality of software. Software testing can be done in two ways: manually and automatically. With an emphasis on its primary function within the software lifecycle, the relevance of testing in general, and the advantages that come with it, this article aims to giv… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 9

  10. arXiv:2405.00006  [pdf

    cs.NE

    Steel Plate Fault Detection using the Fitness Dependent Optimizer and Neural Networks

    Authors: Salar Farahmand-Tabar, Tarik A. Rashid

    Abstract: Detecting faults in steel plates is crucial for ensuring the safety and reliability of the structures and industrial equipment. Early detection of faults can prevent further damage and costly repairs. This chapter aims at diagnosing and predicting the likelihood of steel plates developing faults using experimental text data. Various machine learning methods such as GWO-based and FDO-based MLP and… ▽ More

    Submitted 26 January, 2024; originally announced May 2024.

    Comments: 19 pages

  11. arXiv:2404.08112  [pdf

    cond-mat.mes-hall

    Understanding Disorder in Monolayer Graphene Devices with Gate-Defined Superlattices

    Authors: Vinay Kammarchedu, Derrick Butler, Asmaul Smitha Rashid, Aida Ebrahimi, Morteza Kayyalha

    Abstract: Engineering superlattices (SLs) - which are spatially periodic potential landscapes for electrons - is an emerging approach for the realization of exotic properties, including superconductivity and correlated insulators, in two-dimensional materials. While moiré SL engineering has been a popular approach, nanopatterning is an attractive alternative offering control over the pattern and wavelength… ▽ More

    Submitted 16 August, 2024; v1 submitted 11 April, 2024; originally announced April 2024.

    Journal ref: Nanotechnology 35, 495701, 2024

  12. arXiv:2404.02907  [pdf

    cs.NE

    Artificial Cardiac Conduction System: Simulating Heart Function for Advanced Computational Problem Solving

    Authors: Rebaz Mohammed Dler Omer, Nawzad K. Al-Salihi, Tarik A. Rashid, Aso M. Aladdin, Mokhtar Mohammadi, Jafar Majidpour

    Abstract: This work proposes a novel bio-inspired metaheuristic called Artificial Cardiac Conduction System (ACCS) inspired by the human cardiac conduction system. The ACCS algorithm imitates the functional behaviour of the human heart that generates and sends signals to the heart muscle, initiating it to contract. Four nodes in the myocardium layer participate in generating and controlling heart rate, such… ▽ More

    Submitted 18 May, 2024; v1 submitted 12 January, 2024; originally announced April 2024.

    Comments: 28 pages

  13. arXiv:2403.13669  [pdf, other

    cond-mat.mes-hall cond-mat.supr-con

    Ballistic Andreev interferometers

    Authors: Régis Mélin, Asmaul Smitha Rashid, Morteza Kayyalha

    Abstract: A Josephson junction, formed between two phase-biased superconductors and a normal metal, hosts a discrete spectrum of Andreev bound states (ABS). In this paper, we develop a theory for long ballistic Andreev interferometers in two-dimensional metals. We consider three frameworks in our theoretical analysis: (i) perturbation theory in the tunneling amplitudes; (ii) non-perturbative transport theor… ▽ More

    Submitted 14 January, 2025; v1 submitted 20 March, 2024; originally announced March 2024.

    Comments: 32 pages, 16 figures, second revision, further physical discussion added

    Journal ref: Phys. Rev. B 110, 235419 (2024)

  14. arXiv:2403.10494  [pdf, other

    cs.RO

    Lifelong LERF: Local 3D Semantic Inventory Monitoring Using FogROS2

    Authors: Adam Rashid, Chung Min Kim, Justin Kerr, Letian Fu, Kush Hari, Ayah Ahmad, Kaiyuan Chen, Huang Huang, Marcus Gualtieri, Michael Wang, Christian Juette, Nan Tian, Liu Ren, Ken Goldberg

    Abstract: Inventory monitoring in homes, factories, and retail stores relies on maintaining data despite objects being swapped, added, removed, or moved. We introduce Lifelong LERF, a method that allows a mobile robot with minimal compute to jointly optimize a dense language and geometric representation of its surroundings. Lifelong LERF maintains this representation over time by detecting semantic changes… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

    Comments: See project webpage at: https://sites.google.com/berkeley.edu/lifelonglerf/home

  15. arXiv:2403.03828  [pdf

    cs.AI

    From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics

    Authors: Rushit Dave, Marcho Handoko, Ali Rashid, Cole Schoenbauer

    Abstract: In the realm of computer security, the importance of efficient and reliable user authentication methods has become increasingly critical. This paper examines the potential of mouse movement dynamics as a consistent metric for continuous authentication. By analyzing user mouse movement patterns in two contrasting gaming scenarios, "Team Fortress" and Poly Bridge we investigate the distinctive behav… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

  16. arXiv:2402.16562  [pdf, other

    cs.LG cs.AI cs.NE

    QF-tuner: Breaking Tradition in Reinforcement Learning

    Authors: Mahmood A. Jumaah, Yossra H. Ali, Tarik A. Rashid

    Abstract: In reinforcement learning algorithms, the hyperparameters tuning method refers to choosing the optimal parameters that may increase the overall performance. Manual or random hyperparameter tuning methods can lead to different results in the reinforcement learning algorithms. In this paper, we propose a new method called QF-tuner for automatic hyperparameter tuning in the Q learning algorithm using… ▽ More

    Submitted 17 March, 2025; v1 submitted 26 February, 2024; originally announced February 2024.

    Comments: 11 pages

  17. arXiv:2401.17317  [pdf

    q-bio.NC cs.CV cs.SD eess.AS eess.IV

    Detection of Auditory Brainstem Response Peaks Using Image Processing Techniques in Infants with Normal Hearing Sensitivity

    Authors: Amir Majidpour, Samer Kais Jameel, Jafar Majidpour, Houra Bagheri, Tarik A. Rashid, Ahmadreza Nazeri, Mahshid Moheb Aleaba

    Abstract: Introduction: The auditory brainstem response (ABR) is measured to find the brainstem-level peripheral auditory nerve system integrity in children having normal hearing. The Auditory Evoked Potential (AEP) is generated using acoustic stimuli. Interpreting these waves requires competence to avoid misdiagnosing hearing problems. Automating ABR test labeling with computer vision may reduce human erro… ▽ More

    Submitted 21 January, 2024; originally announced January 2024.

  18. arXiv:2401.09467  [pdf

    cs.CV cs.AI eess.IV

    Offline Handwriting Signature Verification: A Transfer Learning and Feature Selection Approach

    Authors: Fatih Ozyurt, Jafar Majidpour, Tarik A. Rashid, Canan Koc

    Abstract: Handwritten signature verification poses a formidable challenge in biometrics and document authenticity. The objective is to ascertain the authenticity of a provided handwritten signature, distinguishing between genuine and forged ones. This issue has many applications in sectors such as finance, legal documentation, and security. Currently, the field of computer vision and machine learning has ma… ▽ More

    Submitted 5 January, 2024; originally announced January 2024.

    Comments: 11 pages

  19. arXiv:2311.03683  [pdf, other

    cs.LG

    Preventing Arbitrarily High Confidence on Far-Away Data in Point-Estimated Discriminative Neural Networks

    Authors: Ahmad Rashid, Serena Hacker, Guojun Zhang, Agustinus Kristiadi, Pascal Poupart

    Abstract: Discriminatively trained, deterministic neural networks are the de facto choice for classification problems. However, even though they achieve state-of-the-art results on in-domain test sets, they tend to be overconfident on out-of-distribution (OOD) data. For instance, ReLU networks - a popular class of neural network architectures - have been shown to almost always yield high confidence predicti… ▽ More

    Submitted 27 March, 2024; v1 submitted 6 November, 2023; originally announced November 2023.

    Comments: Accepted at AISTATS 2024

  20. arXiv:2310.12155  [pdf

    cs.NE

    Balancing exploration and exploitation phases in whale optimization algorithm: an insightful and empirical analysis

    Authors: Aram M. Ahmed, Tarik A. Rashid, Bryar A. Hassan, Jaffer Majidpour, Kaniaw A. Noori, Chnoor Maheadeen Rahman, Mohmad Hussein Abdalla, Shko M. Qader, Noor Tayfor, Naufel B Mohammed

    Abstract: Agents of any metaheuristic algorithms are moving in two modes, namely exploration and exploitation. Obtaining robust results in any algorithm is strongly dependent on how to balance between these two modes. Whale optimization algorithm as a robust and well recognized metaheuristic algorithm in the literature, has proposed a novel scheme to achieve this balance. It has also shown superior results… ▽ More

    Submitted 3 September, 2023; originally announced October 2023.

    Comments: 11 pages

  21. arXiv:2310.09730  [pdf, other

    cond-mat.str-el

    Effect of next-nearest neighbor hopping on the single-particle excitations

    Authors: Harun Al Rashid, Dheeraj Kumar Singh

    Abstract: In the half-filled one-orbital Hubbard model on a square lattice, we study the effect of next-nearest neighbor hopping on the single-particle spectral function at finite temperature using an exact-diagonalization + Monte-Carlo based approach to the simulation process. We find that the pseudogap-like dip, existing in the density of states in between the Néel temperature $T_N$ and a relatively highe… ▽ More

    Submitted 15 October, 2023; originally announced October 2023.

    Comments: 7 pages, 7 figures

  22. arXiv:2310.07723  [pdf

    cs.NE

    Equitable and Fair Performance Evaluation of Whale Optimization Algorithm

    Authors: Bryar A. Hassan, Tarik A. Rashid, Aram Ahmed, Shko M. Qader, Jaffer Majidpour, Mohmad Hussein Abdalla, Noor Tayfor, Hozan K. Hamarashid, Haval Sidqi, Kaniaw A. Noori

    Abstract: It is essential that all algorithms are exhaustively, somewhat, and intelligently evaluated. Nonetheless, evaluating the effectiveness of optimization algorithms equitably and fairly is not an easy process for various reasons. Choosing and initializing essential parameters, such as the size issues of the search area for each method and the number of iterations required to reduce the issues, might… ▽ More

    Submitted 4 September, 2023; originally announced October 2023.

    Comments: 21 pages

    Journal ref: 2023

  23. Proximal Policy Optimization-Based Reinforcement Learning Approach for DC-DC Boost Converter Control: A Comparative Evaluation Against Traditional Control Techniques

    Authors: Utsab Saha, Atik Jawad, Shakib Shahria, A. B. M Harun-Ur Rashid

    Abstract: This article proposes a proximal policy optimization (PPO)-based reinforcement learning (RL) approach for DC-DC boost converter control that is compared with traditional control methods. The performance of the PPO algorithm is evaluated using MATLAB Simulink co-simulation, and the results demonstrate that the most efficient approach for achieving short settling time and stability is to combine the… ▽ More

    Submitted 31 December, 2024; v1 submitted 4 October, 2023; originally announced October 2023.

    Journal ref: Heliyon 10 (2024) e37823

  24. arXiv:2309.12663  [pdf, other

    hep-th math-ph quant-ph

    Quantization of Length in Spaces with Position-Dependent Noncommutativity

    Authors: Jishnu Aryampilly, Muthukumar Balasundaram, Aamir Rashid

    Abstract: We present a novel approach to quantizing the length in noncommutative spaces with positional-dependent noncommutativity. The method involves constructing ladder operators that change the length not only along a plane but also along the third direction due to a noncommutative parameter that is a combination of canonical/Weyl-Moyal type and Lie algebraic type. The primary quantization of length in… ▽ More

    Submitted 22 September, 2023; originally announced September 2023.

    Comments: 14 pages, 1 figure

  25. arXiv:2309.07970  [pdf, other

    cs.RO cs.CV

    Language Embedded Radiance Fields for Zero-Shot Task-Oriented Grasping

    Authors: Adam Rashid, Satvik Sharma, Chung Min Kim, Justin Kerr, Lawrence Chen, Angjoo Kanazawa, Ken Goldberg

    Abstract: Grasping objects by a specific part is often crucial for safety and for executing downstream tasks. Yet, learning-based grasp planners lack this behavior unless they are trained on specific object part data, making it a significant challenge to scale object diversity. Instead, we propose LERF-TOGO, Language Embedded Radiance Fields for Task-Oriented Grasping of Objects, which uses vision-language… ▽ More

    Submitted 18 September, 2023; v1 submitted 14 September, 2023; originally announced September 2023.

    Comments: See the project website at: lerftogo.github.io

  26. arXiv:2309.03444  [pdf

    cond-mat.mes-hall cond-mat.str-el

    Quantized Hall conductance in graphene by nonperturbative magnetic-field-containing relativistic tight-binding approximation method

    Authors: Md. Abdur Rashid, Masahiko Higuchi, Katsuhiko Higuch

    Abstract: In this study, we conducted a numerical investigation on the Hall conductance ($σ_{Hall}$) of graphene based on the magnetic energy band structure calculated using a nonperturbative magnetic-field-containing relativistic tight-binding approximation (MFRTB) method. The nonperturbative MFRTB can revisit two types of plateaus for the dependence of $σ_{Hall}$ on Fermi energy. One set is characterized… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

    Journal ref: Physical Review B 108, 125132 2023

  27. Multi-Transfer Learning Techniques for Detecting Auditory Brainstem Response

    Authors: Fatih Ozyurt, Jafar Majidpour, Tarik A. Rashid, Amir Majidpour, Canan Koc

    Abstract: The assessment of the well-being of the peripheral auditory nerve system in individuals experiencing hearing impairment is conducted through auditory brainstem response (ABR) testing. Audiologists assess and document the results of the ABR test. They interpret the findings and assign labels to them using reference-based markers like peak latency, waveform morphology, amplitude, and other relevant… ▽ More

    Submitted 29 August, 2023; originally announced August 2023.

    Comments: 19

    Journal ref: Applied Acoustics, 2023

  28. Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy

    Authors: Kopo M. Ramokapane, Anthony C. Mazeli, Awais Rashid

    Abstract: Smartphone manufacturer provided default features (e.g., default location services, iCloud, Google Assistant, ad tracking) enhance the usability and extend the functionality of these devices. Prior studies have highlighted smartphone vulnerabilities and how users' data can be harvested without their knowledge. However, little is known about manufacturer provided default features in this regard --… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

    Comments: 19 pages, 3 figures, Proceedings on Privacy Enhancing Technologies (PoPETS)

    ACM Class: J.4

  29. arXiv:2308.13326  [pdf, other

    cs.HC

    ExD: Explainable Deletion

    Authors: Kopo M. Ramokapane, Awais Rashid

    Abstract: This paper focuses on a critical yet often overlooked aspect of data in digital systems and services-deletion. Through a review of existing literature we highlight the challenges that user face when attempting to delete data from systems and services, the lack of transparency in how such requests are handled or processed and the lack of clear assurance that the data has been deleted. We highlight… ▽ More

    Submitted 25 August, 2023; originally announced August 2023.

    Comments: 16 pages, 3 figures, New Security Paradigms Workshop

    ACM Class: H.1.2; H.5

  30. arXiv:2308.01270  [pdf

    cs.NE

    BCDDO: Binary Child Drawing Development Optimization

    Authors: Abubakr S. Issa, Yossra H. Ali, Tarik A. Rashid

    Abstract: A lately created metaheuristic algorithm called Child Drawing Development Optimization (CDDO) has proven to be effective in a number of benchmark tests. A Binary Child Drawing Development Optimization (BCDDO) is suggested for choosing the wrapper features in this study. To achieve the best classification accuracy, a subset of crucial features is selected using the suggested BCDDO. The proposed fea… ▽ More

    Submitted 11 April, 2024; v1 submitted 19 July, 2023; originally announced August 2023.

    Comments: 13 pages

  31. arXiv:2308.01269  [pdf

    cs.NE

    VAPI: Vectorization of Algorithm for Performance Improvement

    Authors: Mahmood Yashar, Tarik A. Rashid

    Abstract: This study presents the vectorization of metaheuristic algorithms as the first stage of vectorized optimization implementation. Vectorization is a technique for converting an algorithm, which operates on a single value at a time to one that operates on a collection of values at a time to execute rapidly. The vectorization technique also operates by replacing multiple iterations into a single opera… ▽ More

    Submitted 21 August, 2023; v1 submitted 19 July, 2023; originally announced August 2023.

    Comments: 18 pages

  32. arXiv:2308.01268  [pdf

    cs.NE

    Current Studies and Applications of Krill Herd and Gravitational Search Algorithms in Healthcare

    Authors: Rebwar Khalid Hamad, Tarik A. Rashid

    Abstract: Nature-Inspired Computing or NIC for short is a relatively young field that tries to discover fresh methods of computing by researching how natural phenomena function to find solutions to complicated issues in many contexts. As a consequence of this, ground-breaking research has been conducted in a variety of domains, including synthetic immune functions, neural networks, the intelligence of swarm… ▽ More

    Submitted 17 July, 2023; originally announced August 2023.

    Comments: 35 pages

  33. arXiv:2308.00004  [pdf, other

    cs.CR

    Towards Equitable Privacy

    Authors: Kopo M. Ramokapane, Lizzie Coles-Kemp, Nikhil Patnaik, Rui Huan, Nirav Ajmeri, Genevieve Liveley, Awais Rashid

    Abstract: Ensuring equitable privacy experiences remains a challenge, especially for marginalised and vulnerable populations (MVPs) who often hesitate to participate or use digital services due to concerns about the privacy of their sensitive information. In response, security research has emphasised the importance of inclusive security and privacy practices to facilitate meaningful engagement of MVPs onlin… ▽ More

    Submitted 28 July, 2023; originally announced August 2023.

    Comments: 4 Pages, SOUPS Workshop on Inclusive Privacy and Security (WIPS)

    ACM Class: K.4; H.4

  34. arXiv:2307.10420  [pdf

    cs.AI

    GOOSE Algorithm: A Powerful Optimization Tool for Real-World Engineering Challenges and Beyond

    Authors: Rebwar Khalid Hamad, Tarik A. Rashid

    Abstract: This study proposes the GOOSE algorithm as a novel metaheuristic algorithm based on the goose's behavior during rest and foraging. The goose stands on one leg and keeps his balance to guard and protect other individuals in the flock. The GOOSE algorithm is benchmarked on 19 well-known benchmark test functions, and the results are verified by a comparative study with genetic algorithm (GA), particl… ▽ More

    Submitted 16 October, 2024; v1 submitted 19 July, 2023; originally announced July 2023.

  35. arXiv:2307.10314  [pdf, other

    cs.IR cs.CL cs.LG cs.SD eess.AS

    Mood Classification of Bangla Songs Based on Lyrics

    Authors: Maliha Mahajebin, Mohammad Rifat Ahmmad Rashid, Nafees Mansoor

    Abstract: Music can evoke various emotions, and with the advancement of technology, it has become more accessible to people. Bangla music, which portrays different human emotions, lacks sufficient research. The authors of this article aim to analyze Bangla songs and classify their moods based on the lyrics. To achieve this, this research has compiled a dataset of 4000 Bangla song lyrics, genres, and used Na… ▽ More

    Submitted 18 July, 2023; originally announced July 2023.

    Comments: Presented at International Conference on. Inventive Communication and Computational Technologies 2023

  36. arXiv:2307.05228  [pdf, other

    cs.CL cs.LG

    Attribute Controlled Dialogue Prompting

    Authors: Runcheng Liu, Ahmad Rashid, Ivan Kobyzev, Mehdi Rezagholizadeh, Pascal Poupart

    Abstract: Prompt-tuning has become an increasingly popular parameter-efficient method for adapting large pretrained language models to downstream tasks. However, both discrete prompting and continuous prompting assume fixed prompts for all data samples within a task, neglecting the fact that inputs vary greatly in some tasks such as open-domain dialogue generation. In this paper, we present a novel, instanc… ▽ More

    Submitted 11 July, 2023; originally announced July 2023.

    Comments: Accepted at ACL 2023 In Findings

  37. arXiv:2307.02332  [pdf, other

    cs.HC cs.CY

    Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities

    Authors: Andrés Domínguez Hernández, Kopo M. Ramokapane, Partha Das Chowdhury, Ola Michalec, Emily Johnstone, Emily Godwin, Alicia G Cork, Awais Rashid

    Abstract: The phrase "online harms" has emerged in recent years out of a growing political willingness to address the ethical and social issues associated with the use of the Internet and digital technology at large. The broad landscape that surrounds online harms gathers a multitude of disciplinary, sectoral and organizational efforts while raising myriad challenges and opportunities for the crossing entre… ▽ More

    Submitted 19 July, 2023; v1 submitted 5 July, 2023; originally announced July 2023.

    Comments: 21 pages, 8 figures, to appear in The 26th ACM Conference On Computer-Supported Cooperative Work And Social Computing. October 13-18, 2023. Minneapolis, MN USA

  38. arXiv:2306.12168  [pdf, other

    cs.CR

    Decisions & Disruptions 2: Decide Harder

    Authors: Benjamin Shreeve, Joseph Gardiner, Joseph Hallett, David Humphries, Awais Rashid

    Abstract: Cyber incident response is critical to business continuity -- we describe a new exercise that challenges professionals to play the role of Chief Information Security Officer (CISO) for a major financial organisation. Teams must decide how organisational team and budget resources should be deployed across Enterprise Architecture (EA) upgrades and cyber incidents. Every choice made has an impact --… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

    Comments: DGASP-57

    MSC Class: 68M25

  39. CDDO-HS:Child Drawing Development Optimization Harmony Search Algorithm

    Authors: Azad A. Ameen, Tarik A. Rashid, Shavan Askar

    Abstract: Child drawing development optimization (CDDO) is a recent example of a metaheuristic algorithm. The motive for inventing this method is children's learning behavior and cognitive development, with the golden ratio employed to optimize their artwork's aesthetic value. Unfortunately, CDDO suffers from low performance in the exploration phase, and the local best solution stagnates. Harmony search (HS… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

    Comments: 21 pages

    Journal ref: Applied Sciences, 2023

  40. arXiv:2305.08992  [pdf, other

    eess.IV cs.CV cs.LG

    The Brain Tumor Segmentation (BraTS) Challenge: Local Synthesis of Healthy Brain Tissue via Inpainting

    Authors: Florian Kofler, Felix Meissen, Felix Steinbauer, Robert Graf, Stefan K Ehrlich, Annika Reinke, Eva Oswald, Diana Waldmannstetter, Florian Hoelzl, Izabela Horvath, Oezguen Turgut, Suprosanna Shit, Christina Bukas, Kaiyuan Yang, Johannes C. Paetzold, Ezequiel de da Rosa, Isra Mekki, Shankeeth Vinayahalingam, Hasan Kassem, Juexin Zhang, Ke Chen, Ying Weng, Alicia Durrer, Philippe C. Cattin, Julia Wolleb , et al. (81 additional authors not shown)

    Abstract: A myriad of algorithms for the automatic analysis of brain MR images is available to support clinicians in their decision-making. For brain tumor patients, the image acquisition time series typically starts with an already pathological scan. This poses problems, as many algorithms are designed to analyze healthy brains and provide no guarantee for images featuring lesions. Examples include, but ar… ▽ More

    Submitted 22 September, 2024; v1 submitted 15 May, 2023; originally announced May 2023.

    Comments: 14 pages, 6 figures

  41. Bardeen Compact Stars in Modified $f(R)$ Gravity with Conformal Motion

    Authors: M. Farasat Shamir, Aisha Rashid

    Abstract: The main emphasis of this paper is to find the viable solutions of Einstein Maxwell fields equations of compact star in context of modified $f(R)$ theory of gravity. Two different models of modified $f(R)$ gravity are considered. In particular, we choose isotropic matter distribution and Bardeen's model for compact star to find the boundary conditions as an exterior space-time geometry. We use the… ▽ More

    Submitted 15 May, 2023; originally announced May 2023.

    Comments: 13 pages, 11 figures

    Journal ref: Int. J. Geom. Methods Mod. Phys. 20 (2023) 2350026

  42. arXiv:2305.07642  [pdf, other

    cs.CV cs.AI cs.LG stat.ML

    The ASNR-MICCAI Brain Tumor Segmentation (BraTS) Challenge 2023: Intracranial Meningioma

    Authors: Dominic LaBella, Maruf Adewole, Michelle Alonso-Basanta, Talissa Altes, Syed Muhammad Anwar, Ujjwal Baid, Timothy Bergquist, Radhika Bhalerao, Sully Chen, Verena Chung, Gian-Marco Conte, Farouk Dako, James Eddy, Ivan Ezhov, Devon Godfrey, Fathi Hilal, Ariana Familiar, Keyvan Farahani, Juan Eugenio Iglesias, Zhifan Jiang, Elaine Johanson, Anahita Fathi Kazerooni, Collin Kent, John Kirkpatrick, Florian Kofler , et al. (35 additional authors not shown)

    Abstract: Meningiomas are the most common primary intracranial tumor in adults and can be associated with significant morbidity and mortality. Radiologists, neurosurgeons, neuro-oncologists, and radiation oncologists rely on multiparametric MRI (mpMRI) for diagnosis, treatment planning, and longitudinal treatment monitoring; yet automated, objective, and quantitative tools for non-invasive assessment of men… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

  43. arXiv:2305.04971  [pdf, other

    cs.LG cs.CL

    LABO: Towards Learning Optimal Label Regularization via Bi-level Optimization

    Authors: Peng Lu, Ahmad Rashid, Ivan Kobyzev, Mehdi Rezagholizadeh, Philippe Langlais

    Abstract: Regularization techniques are crucial to improving the generalization performance and training efficiency of deep neural networks. Many deep learning algorithms rely on weight decay, dropout, batch/layer normalization to converge faster and generalize. Label Smoothing (LS) is another simple, versatile and efficient regularization which can be applied to various supervised classification tasks. Con… ▽ More

    Submitted 21 May, 2025; v1 submitted 8 May, 2023; originally announced May 2023.

    Comments: Accepted at ACL2023 (Findings)

  44. Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives

    Authors: Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy

    Abstract: The term "digital twin" (DT) has become a key theme of the cyber-physical systems (CPSs) area, while remaining vaguely defined as a virtual replica of an entity. This article identifies DT characteristics essential for enhancing CPS security and discusses indicators to evaluate them.

    Submitted 2 June, 2023; v1 submitted 30 April, 2023; originally announced May 2023.

    Comments: \textcopyright 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  45. Ricci Inverse Anisotropic Stellar Structures

    Authors: M. Farasat Shamir, Mushtaq Ahmad, G. Mustafa, Aisha Rashid

    Abstract: This paper offers novel quintessence compact relativistic spherically symmetrical anisotropic solutions under the recently developed Ricci inverse gravity Amendola et al., 2020), by employing Krori and Barua gravitational potentials, $Ar^2=ν(r), ~\&~Br^2+C=μ(r)$ (with A, B, and C being real constants). For this objective, a specific explicit equation of state, connecting energy density and radial… ▽ More

    Submitted 14 April, 2023; originally announced April 2023.

    Comments: 14 pages, 19 figures

    Journal ref: Chin. J. Phys. 81 (2023) 51

  46. arXiv:2304.05346  [pdf

    cs.NE

    Leo: Lagrange Elementary Optimization

    Authors: Aso M. Aladdin, Tarik A. Rashid

    Abstract: Global optimization problems are frequently solved using the practical and efficient method of evolutionary sophistication. But as the original problem becomes more complex, so does its efficacy and expandability. Thus, the purpose of this research is to introduce the Lagrange Elementary Optimization (Leo) as an evolutionary method, which is self-adaptive inspired by the remarkable accuracy of vac… ▽ More

    Submitted 24 August, 2024; v1 submitted 1 April, 2023; originally announced April 2023.

    Comments: 31 pages

  47. arXiv:2303.00922  [pdf

    cs.NE

    Evolving Deep Neural Network by Customized Moth Flame Optimization Algorithm for Underwater Targets Recognition

    Authors: Mohammad Khishe, Mokhtar Mohammadi, Tarik A. Rashid, Hoger Mahmud, Seyedali Mirjalili

    Abstract: This chapter proposes using the Moth Flame Optimization (MFO) algorithm for finetuning a Deep Neural Network to recognize different underwater sonar datasets. Same as other models evolved by metaheuristic algorithms, premature convergence, trapping in local minima, and failure to converge in a reasonable time are three defects MFO confronts in solving problems with high-dimension search space. Spi… ▽ More

    Submitted 16 February, 2023; originally announced March 2023.

    Comments: 16 pages

  48. arXiv:2302.10739  [pdf, other

    cs.LG cs.CR

    MalProtect: Stateful Defense Against Adversarial Query Attacks in ML-based Malware Detection

    Authors: Aqib Rashid, Jose Such

    Abstract: ML models are known to be vulnerable to adversarial query attacks. In these attacks, queries are iteratively perturbed towards a particular class without any knowledge of the target model besides its output. The prevalence of remotely-hosted ML classification models and Machine-Learning-as-a-Service platforms means that query attacks pose a real threat to the security of these systems. To deal wit… ▽ More

    Submitted 30 June, 2023; v1 submitted 21 February, 2023; originally announced February 2023.

  49. arXiv:2302.05519  [pdf

    cs.NE

    Multi objective Fitness Dependent Optimizer Algorithm

    Authors: Jaza M. Abdullah, Tarik A. Rashid, Bestan B. Maaroof, Seyedali Mirjalili

    Abstract: This paper proposes the multi objective variant of the recently introduced fitness dependent optimizer (FDO). The algorithm is called a Multi objective Fitness Dependent Optimizer (MOFDO) and is equipped with all five types of knowledge (situational, normative, topographical, domain, and historical knowledge) as in FDO. MOFDO is tested on two standard benchmarks for the performance-proof purpose;… ▽ More

    Submitted 26 January, 2023; originally announced February 2023.

    Comments: 29 pages

  50. Awareness requirement and performance management for adaptive systems: a survey

    Authors: Tarik A. Rashid, Bryar A. Hassan, Abeer Alsadoon, Shko Qader, S. Vimal, Amit Chhabra, Zaher Mundher Yaseen

    Abstract: Self-adaptive software can assess and modify its behavior when the assessment indicates that the program is not performing as intended or when improved functionality or performance is available. Since the mid-1960s, the subject of system adaptivity has been extensively researched, and during the last decade, many application areas and technologies involving self-adaptation have gained prominence.… ▽ More

    Submitted 22 January, 2023; originally announced February 2023.

    Report number: 20 pages

    Journal ref: J Supercomput., 2023