Skip to main content

Showing 1–3 of 3 results for author: Shah, P M

.
  1. arXiv:2505.10143  [pdf, ps, other

    cs.CL

    GE-Chat: A Graph Enhanced RAG Framework for Evidential Response Generation of LLMs

    Authors: Longchao Da, Parth Mitesh Shah, Kuan-Ru Liou, Jiaxing Zhang, Hua Wei

    Abstract: Large Language Models are now key assistants in human decision-making processes. However, a common note always seems to follow: "LLMs can make mistakes. Be careful with important info." This points to the reality that not all outputs from LLMs are dependable, and users must evaluate them manually. The challenge deepens as hallucinated responses, often presented with seemingly plausible explanation… ▽ More

    Submitted 15 May, 2025; originally announced May 2025.

    Comments: 5 pages, 4 figures, accepted to IJCAI2025 demo track

    MSC Class: 68T50; 68T30 ACM Class: I.2.7; I.2.4; H.3.3

  2. arXiv:2208.01637  [pdf, other

    eess.IV cs.CV

    Comparative Analysis of State-of-the-Art Deep Learning Models for Detecting COVID-19 Lung Infection from Chest X-Ray Images

    Authors: Zeba Ghaffar, Pir Masoom Shah, Hikmat Khan, Syed Farhan Alam Zaidi, Abdullah Gani, Izaz Ahmad Khan, Munam Ali Shah, Saif ul Islam

    Abstract: The ongoing COVID-19 pandemic has already taken millions of lives and damaged economies across the globe. Most COVID-19 deaths and economic losses are reported from densely crowded cities. It is comprehensible that the effective control and prevention of epidemic/pandemic infectious diseases is vital. According to WHO, testing and diagnosis is the best strategy to control pandemics. Scientists wor… ▽ More

    Submitted 30 June, 2022; originally announced August 2022.

  3. arXiv:2207.05225  [pdf, other

    cs.LG cs.CV

    Susceptibility of Continual Learning Against Adversarial Attacks

    Authors: Hikmat Khan, Pir Masoom Shah, Syed Farhan Alam Zaidi, Saif ul Islam, Qasim Zia

    Abstract: Recent continual learning approaches have primarily focused on mitigating catastrophic forgetting. Nevertheless, two critical areas have remained relatively unexplored: 1) evaluating the robustness of proposed methods and 2) ensuring the security of learned tasks. This paper investigates the susceptibility of continually learned tasks, including current and previously acquired tasks, to adversaria… ▽ More

    Submitted 8 October, 2023; v1 submitted 11 July, 2022; originally announced July 2022.

    Comments: 18 pages, 13 figures