-
Energy-Efficient and Reliable Data Collection in Receiver-Initiated Wake-up Radio Enabled IoT Networks
Authors:
Syed Luqman Shah,
Ziaul Haq Abbas,
Ghulam Abbas,
Nurul Huda Mahmood
Abstract:
In unmanned aerial vehicle (UAV)-assisted wake-up radio (WuR)-enabled internet of things (IoT) networks, UAVs can instantly activate the main radios (MRs) of the sensor nodes (SNs) with a wake-up call (WuC) for efficient data collection in mission-driven data collection scenarios. However, the spontaneous response of numerous SNs to the UAV's WuC can lead to significant packet loss and collisions,…
▽ More
In unmanned aerial vehicle (UAV)-assisted wake-up radio (WuR)-enabled internet of things (IoT) networks, UAVs can instantly activate the main radios (MRs) of the sensor nodes (SNs) with a wake-up call (WuC) for efficient data collection in mission-driven data collection scenarios. However, the spontaneous response of numerous SNs to the UAV's WuC can lead to significant packet loss and collisions, as WuR does not exhibit its superiority for high-traffic loads. To address this challenge, we propose an innovative receiver-initiated WuR UAV-assisted clustering (RI-WuR-UAC) medium access control (MAC) protocol to achieve low latency and high reliability in ultra-low power consumption applications. We model the proposed protocol using the $M/G/1/2$ queuing framework and derive expressions for key performance metrics, i.e., channel busyness probability, probability of successful clustering, average SN energy consumption, and average transmission delay. The RI-WuR-UAC protocol employs three distinct data flow models, tailored to different network traffic conditions, which perform three MAC mechanisms: channel assessment (CCA) clustering for light traffic loads, backoff plus CCA clustering for dense and heavy traffic, and adaptive clustering for variable traffic loads. Simulation results demonstrate that the RI-WuR-UAC protocol significantly outperforms the benchmark sub-carrier modulation clustering protocol. By varying the network load, we capture the trade-offs among the performance metrics, showcasing the superior efficiency and reliability of the RI-WuR-UAC protocol.
△ Less
Submitted 15 May, 2025;
originally announced May 2025.
-
The Evolutionary Map of the Universe: A new radio atlas for the southern hemisphere sky
Authors:
A. M. Hopkins,
A. Kapinska,
J. Marvil,
T. Vernstrom,
J. D. Collier,
R. P. Norris,
Y. A. Gordon,
S. W. Duchesne,
L. Rudnick,
N. Gupta,
E. Carretti,
C. S. Anderson,
S. Dai,
G. Gürkan,
D. Parkinson,
I. Prandoni,
S. Riggi,
C. S. Saraf,
Y. K. Ma,
M. D. Filipović,
G. Umana,
B. Bahr-Kalus,
B. S. Koribalski,
E. Lenc,
A. Ingallinera
, et al. (48 additional authors not shown)
Abstract:
We present the Evolutionary Map of the Universe (EMU) survey conducted with the Australian Square Kilometre Array Pathfinder (ASKAP). EMU aims to deliver the touchstone radio atlas of the southern hemisphere. We introduce EMU and review its science drivers and key science goals, updated and tailored to the current ASKAP five-year survey plan. The development of the survey strategy and planned sky…
▽ More
We present the Evolutionary Map of the Universe (EMU) survey conducted with the Australian Square Kilometre Array Pathfinder (ASKAP). EMU aims to deliver the touchstone radio atlas of the southern hemisphere. We introduce EMU and review its science drivers and key science goals, updated and tailored to the current ASKAP five-year survey plan. The development of the survey strategy and planned sky coverage is presented, along with the operational aspects of the survey and associated data analysis, together with a selection of diagnostics demonstrating the imaging quality and data characteristics. We give a general description of the value-added data pipeline and data products before concluding with a discussion of links to other surveys and projects and an outline of EMU's legacy value.
△ Less
Submitted 13 May, 2025;
originally announced May 2025.
-
Sponge Attacks on Sensing AI: Energy-Latency Vulnerabilities and Defense via Model Pruning
Authors:
Syed Mhamudul Hasan,
Hussein Zangoti,
Iraklis Anagnostopoulos,
Abdur R. Shahid
Abstract:
Recent studies have shown that sponge attacks can significantly increase the energy consumption and inference latency of deep neural networks (DNNs). However, prior work has focused primarily on computer vision and natural language processing tasks, overlooking the growing use of lightweight AI models in sensing-based applications on resource-constrained devices, such as those in Internet of Thing…
▽ More
Recent studies have shown that sponge attacks can significantly increase the energy consumption and inference latency of deep neural networks (DNNs). However, prior work has focused primarily on computer vision and natural language processing tasks, overlooking the growing use of lightweight AI models in sensing-based applications on resource-constrained devices, such as those in Internet of Things (IoT) environments. These attacks pose serious threats of energy depletion and latency degradation in systems where limited battery capacity and real-time responsiveness are critical for reliable operation. This paper makes two key contributions. First, we present the first systematic exploration of energy-latency sponge attacks targeting sensing-based AI models. Using wearable sensing-based AI as a case study, we demonstrate that sponge attacks can substantially degrade performance by increasing energy consumption, leading to faster battery drain, and by prolonging inference latency. Second, to mitigate such attacks, we investigate model pruning, a widely adopted compression technique for resource-constrained AI, as a potential defense. Our experiments show that pruning-induced sparsity significantly improves model resilience against sponge poisoning. We also quantify the trade-offs between model efficiency and attack resilience, offering insights into the security implications of model compression in sensing-based AI systems deployed in IoT environments.
△ Less
Submitted 9 May, 2025;
originally announced May 2025.
-
Exploring Convolutional Neural Networks for Rice Grain Classification: An Explainable AI Approach
Authors:
Muhammad Junaid Asif,
Hamza Khan,
Rabia Tehseen,
Syed Tahir Hussain Rizvi,
Mujtaba Asad,
Shazia Saqib,
Rana Fayyaz Ahmad
Abstract:
Rice is an essential staple food worldwide that is important in promoting international trade, economic growth, and nutrition. Asian countries such as China, India, Pakistan, Thailand, Vietnam, and Indonesia are notable for their significant contribution to the cultivation and utilization of rice. These nations are also known for cultivating different rice grains, including short and long grains.…
▽ More
Rice is an essential staple food worldwide that is important in promoting international trade, economic growth, and nutrition. Asian countries such as China, India, Pakistan, Thailand, Vietnam, and Indonesia are notable for their significant contribution to the cultivation and utilization of rice. These nations are also known for cultivating different rice grains, including short and long grains. These sizes are further classified as basmati, jasmine, kainat saila, ipsala, arborio, etc., catering to diverse culinary preferences and cultural traditions. For both local and international trade, inspecting and maintaining the quality of rice grains to satisfy customers and preserve a country's reputation is necessary. Manual quality check and classification is quite a laborious and time-consuming process. It is also highly prone to mistakes. Therefore, an automatic solution must be proposed for the effective and efficient classification of different varieties of rice grains. This research paper presents an automatic framework based on a convolutional neural network (CNN) for classifying different varieties of rice grains. We evaluated the proposed model based on performance metrics such as accuracy, recall, precision, and F1-Score. The CNN model underwent rigorous training and validation, achieving a remarkable accuracy rate and a perfect area under each class's Receiver Operating Characteristic (ROC) curve. The confusion matrix analysis confirmed the model's effectiveness in distinguishing between the different rice varieties, indicating minimal misclassifications. Additionally, the integration of explainability techniques such as LIME (Local Interpretable Model-agnostic Explanations) and SHAP (SHapley Additive exPlanations) provided valuable insights into the model's decision-making process, revealing how specific features of the rice grains influenced classification outcomes.
△ Less
Submitted 15 May, 2025; v1 submitted 7 May, 2025;
originally announced May 2025.
-
Direct Image Classification from Fourier Ptychographic Microscopy Measurements without Reconstruction
Authors:
Navya Sonal Agarwal,
Jan Philipp Schneider,
Kanchana Vaishnavi Gandikota,
Syed Muhammad Kazim,
John Meshreki,
Ivo Ihrke,
Michael Moeller
Abstract:
The computational imaging technique of Fourier Ptychographic Microscopy (FPM) enables high-resolution imaging with a wide field of view and can serve as an extremely valuable tool, e.g. in the classification of cells in medical applications. However, reconstructing a high-resolution image from tens or even hundreds of measurements is computationally expensive, particularly for a wide field of view…
▽ More
The computational imaging technique of Fourier Ptychographic Microscopy (FPM) enables high-resolution imaging with a wide field of view and can serve as an extremely valuable tool, e.g. in the classification of cells in medical applications. However, reconstructing a high-resolution image from tens or even hundreds of measurements is computationally expensive, particularly for a wide field of view. Therefore, in this paper, we investigate the idea of classifying the image content in the FPM measurements directly without performing a reconstruction step first. We show that Convolutional Neural Networks (CNN) can extract meaningful information from measurement sequences, significantly outperforming the classification on a single band-limited image (up to 12 %) while being significantly more efficient than a reconstruction of a high-resolution image. Furthermore, we demonstrate that a learned multiplexing of several raw measurements allows maintaining the classification accuracy while reducing the amount of data (and consequently also the acquisition time) significantly.
△ Less
Submitted 8 May, 2025;
originally announced May 2025.
-
Advancing Remote and Continuous Cardiovascular Patient Monitoring through a Novel and Resource-efficient IoT-Driven Framework
Authors:
Sanam Nayab,
Sohail Raza Chohan,
Aqsa Jameel,
Syed Rehan Shah,
Syed Ahsan Masud Zaidi,
Aditya Nath Jha,
Kamran Siddique
Abstract:
Cardiovascular diseases are a leading cause of fatalities worldwide, often occurring suddenly with limited time for intervention. Current healthcare monitoring systems for cardiac patients rely heavily on hospitalization, which can be impractical for continuous monitoring. This paper presents a novel IoT-based solution for remote, real-time tracking of critical cardiac metrics, addressing the pres…
▽ More
Cardiovascular diseases are a leading cause of fatalities worldwide, often occurring suddenly with limited time for intervention. Current healthcare monitoring systems for cardiac patients rely heavily on hospitalization, which can be impractical for continuous monitoring. This paper presents a novel IoT-based solution for remote, real-time tracking of critical cardiac metrics, addressing the pressing need for accessible and continuous healthcare, particularly for the aging population in Pakistan. The proposed IoT kit measures essential parameters such as body temperature, heart rate (HR), blood pressure (BP), oxygen saturation (SPO2), and electrocardiography (ECG).
A key innovation of the system is its integration with a cloud-based application, enabling constant remote monitoring and incorporating an alarm mechanism to alert medical professionals for timely intervention, reducing the risk of catastrophic incidents. The system was tested in a clinical environment with 20 participants, demonstrating results closely aligned with those obtained using standard medical devices. The findings validate the system's potential for reliable remote monitoring, offering a significant step forward in proactive cardiac healthcare management. This novel approach combines IoT technology with cloud-based applications to provide a cost-effective and efficient solution for reducing unexpected fatalities among cardiac patients.
△ Less
Submitted 6 May, 2025;
originally announced May 2025.
-
Solar Coronal Heating: Role of Kinetic and Inertial Alfvén Waves in Heating and Charged Particle Acceleration
Authors:
Syed Ayaz,
Gary P. Zank,
Imran A. Khan,
Yeimy J. Rivera,
Andreas Shalchi,
L. -L. Zhao
Abstract:
A comprehensive understanding of solar coronal heating and charged particle acceleration remains one of the most critical challenges in space and astrophysical plasma physics. In this study, we explore the contribution of Alfvén waves, both in their kinetic (KAWs) and inertial (IAWs) regimes, to particle acceleration processes that ultimately lead to coronal heating. Using a kinetic plasma framewo…
▽ More
A comprehensive understanding of solar coronal heating and charged particle acceleration remains one of the most critical challenges in space and astrophysical plasma physics. In this study, we explore the contribution of Alfvén waves, both in their kinetic (KAWs) and inertial (IAWs) regimes, to particle acceleration processes that ultimately lead to coronal heating. Using a kinetic plasma framework based on the generalized Vlasov-Maxwell model, we analyze the dynamics of these waves with a focus on the perpendicular components of the Poynting flux vectors and the net resonance speed of the particles.
Our results show that both the magnitude and dissipation rate of the Poynting flux for KAWs and IAWs decrease with increasing electron-to-ion temperature ratio (T_e/T_i) and normalized perpendicular electron inertial length (c k_x / omega_pe). We evaluate the associated electric potentials and find that KAWs are significantly influenced in the high wavenumber (k_x rho_i) regime. IAWs, on the other hand, show a decrease in electric potential along the magnetic field and an increase across it when the perpendicular electric field (E_x) is enhanced. We also determine the net resonant speeds of particles in the perpendicular direction and show that these wave-particle interactions can efficiently heat the solar corona over large distances (R_Sun). Finally, we quantify the power transported by KAWs and IAWs through solar flux loop tubes, finding that both wave types deliver greater energy with increasing T_e/T_i and c k_x / omega_pe. These findings offer deeper insights into wave-driven heating and are relevant to solar wind and magnetospheric physics.
△ Less
Submitted 6 May, 2025;
originally announced May 2025.
-
Multi-Scale Target-Aware Representation Learning for Fundus Image Enhancement
Authors:
Haofan Wu,
Yin Huang,
Yuqing Wu,
Qiuyu Yang,
Bingfang Wang,
Li Zhang,
Muhammad Fahadullah Khan,
Ali Zia,
M. Saleh Memon,
Syed Sohail Bukhari,
Abdul Fattah Memon,
Daizong Ji,
Ya Zhang,
Ghulam Mustafa,
Yin Fang
Abstract:
High-quality fundus images provide essential anatomical information for clinical screening and ophthalmic disease diagnosis. Yet, due to hardware limitations, operational variability, and patient compliance, fundus images often suffer from low resolution and signal-to-noise ratio. Recent years have witnessed promising progress in fundus image enhancement. However, existing works usually focus on r…
▽ More
High-quality fundus images provide essential anatomical information for clinical screening and ophthalmic disease diagnosis. Yet, due to hardware limitations, operational variability, and patient compliance, fundus images often suffer from low resolution and signal-to-noise ratio. Recent years have witnessed promising progress in fundus image enhancement. However, existing works usually focus on restoring structural details or global characteristics of fundus images, lacking a unified image enhancement framework to recover comprehensive multi-scale information. Moreover, few methods pinpoint the target of image enhancement, e.g., lesions, which is crucial for medical image-based diagnosis. To address these challenges, we propose a multi-scale target-aware representation learning framework (MTRL-FIE) for efficient fundus image enhancement. Specifically, we propose a multi-scale feature encoder (MFE) that employs wavelet decomposition to embed both low-frequency structural information and high-frequency details. Next, we design a structure-preserving hierarchical decoder (SHD) to fuse multi-scale feature embeddings for real fundus image restoration. SHD integrates hierarchical fusion and group attention mechanisms to achieve adaptive feature fusion while retaining local structural smoothness. Meanwhile, a target-aware feature aggregation (TFA) module is used to enhance pathological regions and reduce artifacts. Experimental results on multiple fundus image datasets demonstrate the effectiveness and generalizability of MTRL-FIE for fundus image enhancement. Compared to state-of-the-art methods, MTRL-FIE achieves superior enhancement performance with a more lightweight architecture. Furthermore, our approach generalizes to other ophthalmic image processing tasks without supervised fine-tuning, highlighting its potential for clinical applications.
△ Less
Submitted 3 May, 2025;
originally announced May 2025.
-
Design, Integration, and Evaluation of a Dual-Arm Robotic System for High Throughput Tissue Sampling from Potato Tubers
Authors:
Divyanth L. G.,
Syed Usama Bin Sabir,
Divya Rathore,
Lav R. Khot,
Chakradhar Mattupalli,
Manoj Karkee
Abstract:
Manual tissue extraction from potato tubers for molecular pathogen detection is highly laborious. This study presents a machine-vision-guided, dual-arm coordinated inline robotic system integrating tuber grasping and tissue sampling mechanisms. Tubers are transported on a conveyor that halts when a YOLOv11-based vision system detects a tuber within the workspace of a one-prismatic-degree-of-freedo…
▽ More
Manual tissue extraction from potato tubers for molecular pathogen detection is highly laborious. This study presents a machine-vision-guided, dual-arm coordinated inline robotic system integrating tuber grasping and tissue sampling mechanisms. Tubers are transported on a conveyor that halts when a YOLOv11-based vision system detects a tuber within the workspace of a one-prismatic-degree-of-freedom (P-DoF) robotic arm. This arm, equipped with a gripping end-effector, secures and positions the tuber for sampling. The second arm, a 3-P-DoF Cartesian manipulator with a biopsy punch-based end-effector, then performs tissue extraction guided by a YOLOv10-based vision system that identifies the sampling sites on the tuber such as eyes or stolon scars. The sampling involves four stages: insertion of the punch into the tuber, punch rotation for tissue detachment, biopsy punch retraction, and deposition of the tissue core onto a collection site. The system achieved an average positional error of 1.84 mm along the tuber surface and a depth deviation of 1.79 mm from a 7.00 mm target. The success rate for core extraction and deposition was 81.5%, with an average sampling cycle of 10.4 seconds. The total cost of the system components was under $1,900, demonstrating the system's potential as a cost-effective alternative to labor-intensive manual tissue sampling. Future work will focus on optimizing for multi-site sampling from a single tuber and validation in commercial settings.
△ Less
Submitted 1 May, 2025;
originally announced May 2025.
-
Red Teaming Large Language Models for Healthcare
Authors:
Vahid Balazadeh,
Michael Cooper,
David Pellow,
Atousa Assadi,
Jennifer Bell,
Mark Coastworth,
Kaivalya Deshpande,
Jim Fackler,
Gabriel Funingana,
Spencer Gable-Cook,
Anirudh Gangadhar,
Abhishek Jaiswal,
Sumanth Kaja,
Christopher Khoury,
Amrit Krishnan,
Randy Lin,
Kaden McKeen,
Sara Naimimohasses,
Khashayar Namdar,
Aviraj Newatia,
Allan Pang,
Anshul Pattoo,
Sameer Peesapati,
Diana Prepelita,
Bogdana Rakova
, et al. (10 additional authors not shown)
Abstract:
We present the design process and findings of the pre-conference workshop at the Machine Learning for Healthcare Conference (2024) entitled Red Teaming Large Language Models for Healthcare, which took place on August 15, 2024. Conference participants, comprising a mix of computational and clinical expertise, attempted to discover vulnerabilities -- realistic clinical prompts for which a large lang…
▽ More
We present the design process and findings of the pre-conference workshop at the Machine Learning for Healthcare Conference (2024) entitled Red Teaming Large Language Models for Healthcare, which took place on August 15, 2024. Conference participants, comprising a mix of computational and clinical expertise, attempted to discover vulnerabilities -- realistic clinical prompts for which a large language model (LLM) outputs a response that could cause clinical harm. Red-teaming with clinicians enables the identification of LLM vulnerabilities that may not be recognised by LLM developers lacking clinical expertise. We report the vulnerabilities found, categorise them, and present the results of a replication study assessing the vulnerabilities across all LLMs provided.
△ Less
Submitted 1 May, 2025;
originally announced May 2025.
-
The Development of Reflective Practice on a Work-Based Software Engineering Program: A Longitudinal Study
Authors:
Matthew Barr,
Syed Waqar Nabi,
Oana Andrei
Abstract:
This study examines the development of reflective practice among students on a four-year work-based Software Engineering program. Using two established models of reflection - Boud et al.'s Model of Reflective Process and Bain et al.'s 5R Framework for Reflection - we analyse a series of reflective assignments submitted by students over four years. Our longitudinal analysis reveals clear trends in…
▽ More
This study examines the development of reflective practice among students on a four-year work-based Software Engineering program. Using two established models of reflection - Boud et al.'s Model of Reflective Process and Bain et al.'s 5R Framework for Reflection - we analyse a series of reflective assignments submitted by students over four years. Our longitudinal analysis reveals clear trends in how students' reflective abilities evolve over the course of the program. We find that more sophisticated forms of reflection, such as integration of knowledge, appropriation of skills, and reconstruction of practice, increase markedly in prevalence in later years. The complementary nature of workplace experience and university study is highlighted in students' reflections, demonstrating a key benefit of the work-based learning approach. By the final year, all students demonstrate the ability to reconstruct their experiences to inform future practice. Our findings provide insight into how reflective practice develops in Software Engineering education and suggest potential value in incorporating more structured reflection into traditional degree programs. The study also reveals instances of meta-reflection, where students reflect on the value of reflection itself, indicating a deep engagement with the reflective process. While acknowledging limitations, this work offers a unique longitudinal perspective on the development of reflective practice in work-based Software Engineering education.
△ Less
Submitted 1 May, 2025; v1 submitted 29 April, 2025;
originally announced April 2025.
-
Exploiting inter-agent coupling information for efficient reinforcement learning of cooperative LQR
Authors:
Shahbaz P Qadri Syed,
He Bai
Abstract:
Developing scalable and efficient reinforcement learning algorithms for cooperative multi-agent control has received significant attention over the past years. Existing literature has proposed inexact decompositions of local Q-functions based on empirical information structures between the agents. In this paper, we exploit inter-agent coupling information and propose a systematic approach to exact…
▽ More
Developing scalable and efficient reinforcement learning algorithms for cooperative multi-agent control has received significant attention over the past years. Existing literature has proposed inexact decompositions of local Q-functions based on empirical information structures between the agents. In this paper, we exploit inter-agent coupling information and propose a systematic approach to exactly decompose the local Q-function of each agent. We develop an approximate least square policy iteration algorithm based on the proposed decomposition and identify two architectures to learn the local Q-function for each agent. We establish that the worst-case sample complexity of the decomposition is equal to the centralized case and derive necessary and sufficient graphical conditions on the inter-agent couplings to achieve better sample efficiency. We demonstrate the improved sample efficiency and computational efficiency on numerical examples.
△ Less
Submitted 29 April, 2025;
originally announced April 2025.
-
Sum-Rate Optimisation of a Multi-User STAR-RIS-Aided System with Low Complexity
Authors:
Sadaf Syed,
Wolfgang Utschick,
Michael Joham
Abstract:
Reconfigurable intelligent surface (RIS) is a promising technology for future wireless communication systems. However, the conventional RIS can only reflect the incident signal. Hence, it provides a limited coverage, as compared to a simultaneously transmitting and reflecting RIS (STAR-RIS). Prior works on the STAR-RIS address the power minimisation or the sum-rate maximisation problem by reformul…
▽ More
Reconfigurable intelligent surface (RIS) is a promising technology for future wireless communication systems. However, the conventional RIS can only reflect the incident signal. Hence, it provides a limited coverage, as compared to a simultaneously transmitting and reflecting RIS (STAR-RIS). Prior works on the STAR-RIS address the power minimisation or the sum-rate maximisation problem by reformulating the objective problem as a convex optimisation problem and then employing numerical tools like CVX to obtain the solution, which introduces significant computational complexity leading to a huge runtime, making the algorithms impractical for real-world implementation. In this paper, we propose a low complexity solution for the optimisation of a multi-user STAR-RIS system, where the non-convex optimisation problem is decomposed into multiple convex sub-problems with closed-form optimal solutions. The simulation results illustrate that our proposed algorithm achieves similar performance to CVX-based solutions in the literature while being computationally efficient.
△ Less
Submitted 28 April, 2025;
originally announced April 2025.
-
Generative AI in Education: Student Skills and Lecturer Roles
Authors:
Stefanie Krause,
Ashish Dalvi,
Syed Khubaib Zaidi
Abstract:
Generative Artificial Intelligence (GenAI) tools such as ChatGPT are emerging as a revolutionary tool in education that brings both positive aspects and challenges for educators and students, reshaping how learning and teaching are approached. This study aims to identify and evaluate the key competencies students need to effectively engage with GenAI in education and to provide strategies for lect…
▽ More
Generative Artificial Intelligence (GenAI) tools such as ChatGPT are emerging as a revolutionary tool in education that brings both positive aspects and challenges for educators and students, reshaping how learning and teaching are approached. This study aims to identify and evaluate the key competencies students need to effectively engage with GenAI in education and to provide strategies for lecturers to integrate GenAI into teaching practices. The study applied a mixed method approach with a combination of a literature review and a quantitative survey involving 130 students from South Asia and Europe to obtain its findings. The literature review identified 14 essential student skills for GenAI engagement, with AI literacy, critical thinking, and ethical AI practices emerging as the most critical. The student survey revealed gaps in prompt engineering, bias awareness, and AI output management. In our study of lecturer strategies, we identified six key areas, with GenAI Integration and Curriculum Design being the most emphasised. Our findings highlight the importance of incorporating GenAI into education. While literature prioritized ethics and policy development, students favour hands-on, project-based learning and practical AI applications. To foster inclusive and responsible GenAI adoption, institutions should ensure equitable access to GenAI tools, establish clear academic integrity policies, and advocate for global GenAI research initiatives.
△ Less
Submitted 28 April, 2025;
originally announced April 2025.
-
From Inductive to Deductive: LLMs-Based Qualitative Data Analysis in Requirements Engineering
Authors:
Syed Tauhid Ullah Shah,
Mohamad Hussein,
Ann Barcomb,
Mohammad Moshirpour
Abstract:
Requirements Engineering (RE) is essential for developing complex and regulated software projects. Given the challenges in transforming stakeholder inputs into consistent software designs, Qualitative Data Analysis (QDA) provides a systematic approach to handling free-form data. However, traditional QDA methods are time-consuming and heavily reliant on manual effort. In this paper, we explore the…
▽ More
Requirements Engineering (RE) is essential for developing complex and regulated software projects. Given the challenges in transforming stakeholder inputs into consistent software designs, Qualitative Data Analysis (QDA) provides a systematic approach to handling free-form data. However, traditional QDA methods are time-consuming and heavily reliant on manual effort. In this paper, we explore the use of Large Language Models (LLMs), including GPT-4, Mistral, and LLaMA-2, to improve QDA tasks in RE. Our study evaluates LLMs' performance in inductive (zero-shot) and deductive (one-shot, few-shot) annotation tasks, revealing that GPT-4 achieves substantial agreement with human analysts in deductive settings, with Cohen's Kappa scores exceeding 0.7, while zero-shot performance remains limited. Detailed, context-rich prompts significantly improve annotation accuracy and consistency, particularly in deductive scenarios, and GPT-4 demonstrates high reliability across repeated runs. These findings highlight the potential of LLMs to support QDA in RE by reducing manual effort while maintaining annotation quality. The structured labels automatically provide traceability of requirements and can be directly utilized as classes in domain models, facilitating systematic software design.
△ Less
Submitted 27 April, 2025;
originally announced April 2025.
-
Efficient Serverless Cold Start: Reducing Library Loading Overhead by Profile-guided Optimization
Authors:
Syed Salauddin Mohammad Tariq,
Ali Al Zein,
Soumya Sripad Vaidya,
Arati Khanolkar,
Zheng Song,
Probir Roy
Abstract:
Serverless computing abstracts away server management, enabling automatic scaling, efficient resource utilization, and cost-effective pricing models. However, despite these advantages, it faces the significant challenge of cold-start latency, adversely impacting end-to-end performance. Our study shows that many serverless functions initialize libraries that are rarely or never used under typical w…
▽ More
Serverless computing abstracts away server management, enabling automatic scaling, efficient resource utilization, and cost-effective pricing models. However, despite these advantages, it faces the significant challenge of cold-start latency, adversely impacting end-to-end performance. Our study shows that many serverless functions initialize libraries that are rarely or never used under typical workloads, thus introducing unnecessary overhead. Although existing static analysis techniques can identify unreachable libraries, they fail to address workload-dependent inefficiencies, resulting in limited performance improvements. To overcome these limitations, we present SLIMSTART, a profile-guided optimization tool designed to identify and mitigate inefficient library usage patterns in serverless applications. By leveraging statistical sampling and call-path profiling, SLIMSTART collects runtime library usage data, generates detailed optimization reports, and applies automated code transformations to reduce cold-start overhead. Furthermore, SLIMSTART integrates seamlessly into CI/CD pipelines, enabling adaptive monitoring and continuous optimizations tailored to evolving workloads. Through extensive evaluation across three benchmark suites and four real-world serverless applications, SLIMSTART achieves up to a 2.30X speedup in initialization latency, a 2.26X improvement in end-to-end latency, and a 1.51X reduction in memory usage, demonstrating its effectiveness in addressing cold-start inefficiencies and optimizing resource utilization.
△ Less
Submitted 27 April, 2025;
originally announced April 2025.
-
Redefining Hybrid Blockchains: A Balanced Architecture
Authors:
Syed Ibrahim Omer
Abstract:
Blockchain technology has completely revolutionized the field of decentralized finance with the emergence of a variety of cryptocurrencies and digital assets. However, widespread adoption of this technology by governments and enterprises has been limited by concerns regarding the technology's scalability, governance, and economic sustainability. This paper aims to introduce a novel hybrid blockcha…
▽ More
Blockchain technology has completely revolutionized the field of decentralized finance with the emergence of a variety of cryptocurrencies and digital assets. However, widespread adoption of this technology by governments and enterprises has been limited by concerns regarding the technology's scalability, governance, and economic sustainability. This paper aims to introduce a novel hybrid blockchain architecture that balances scalability, governance, and decentralization while being economically viable for all parties involved. The new semi-centralized model leverages strategies not prevalent in the field, such as resource and node isolation, containerization, separation of networking and compute layers, use of a Kafka pub-sub network instead of a peer-to-peer network, and stakes-based validator selection to possibly mitigate a variety of issues related to scalability, security, governance, and economic sustainability. Simulations conducted on Kubernetes demonstrate the architecture's ability to achieve over 1000 transactions per second, with consistent performance across scaled deployments, even on a lightweight consumer-grade laptop with resource constraints. The findings highlight the system's scalability, security, and economic viability, offering a robust framework for enterprise and government adoption.
△ Less
Submitted 26 April, 2025;
originally announced April 2025.
-
BELL: Benchmarking the Explainability of Large Language Models
Authors:
Syed Quiser Ahmed,
Bharathi Vokkaliga Ganesh,
Jagadish Babu P,
Karthick Selvaraj,
ReddySiva Naga Parvathi Devi,
Sravya Kappala
Abstract:
Large Language Models have demonstrated remarkable capabilities in natural language processing, yet their decision-making processes often lack transparency. This opaqueness raises significant concerns regarding trust, bias, and model performance. To address these issues, understanding and evaluating the interpretability of LLMs is crucial. This paper introduces a standardised benchmarking techniqu…
▽ More
Large Language Models have demonstrated remarkable capabilities in natural language processing, yet their decision-making processes often lack transparency. This opaqueness raises significant concerns regarding trust, bias, and model performance. To address these issues, understanding and evaluating the interpretability of LLMs is crucial. This paper introduces a standardised benchmarking technique, Benchmarking the Explainability of Large Language Models, designed to evaluate the explainability of large language models.
△ Less
Submitted 22 April, 2025;
originally announced April 2025.
-
Developing a Blockchain-Based Secure Digital Contents Distribution System
Authors:
Syed Mohiuddin Qadri,
Sangwhan Cha
Abstract:
As digital content distribution expands rapidly through online platforms, securing digital media and protecting intellectual property has become increasingly complex. Traditional centralized systems, while widely adopted, suffer from vulnerabilities such as single points of failure and limited traceability of unauthorized access. This paper presents a blockchain-based secure digital content distri…
▽ More
As digital content distribution expands rapidly through online platforms, securing digital media and protecting intellectual property has become increasingly complex. Traditional centralized systems, while widely adopted, suffer from vulnerabilities such as single points of failure and limited traceability of unauthorized access. This paper presents a blockchain-based secure digital content distribution system that integrates Sia, a decentralized storage network, and Skynet, a content delivery network, to enhance content protection and distribution. The proposed system employs a dual-layer architecture: off-chain for user authentication and on-chain for transaction validation using smart contracts and asymmetric encryption. By introducing a license issuance and secret block mechanism, the system ensures content authenticity, privacy, and controlled access. Experimental results demonstrate the feasibility and scalability of the system in securely distributing multimedia files. The proposed platform not only improves content security but also paves the way for future enhancements with decentralized applications and integrated royalty payment mechanisms.
△ Less
Submitted 23 April, 2025;
originally announced April 2025.
-
The Search for Stable Nickel: Investigating the Origins of Type Ia Supernovae with Late-time NIR Spectroscopy from the Carnegie Supernova Project-II
Authors:
Sahana Kumar,
Eric Y. Hsiao,
Christopher Ashall,
Peter Hoeflich,
Eddie Baron,
Mark M. Phillips,
Maryam Modjaz,
Abigail Polin,
Nidia Morrell,
Christopher R. Burns,
Jing Lu,
Melissa Shahbandeh,
Lindsey A. Kwok,
Lluis Galbany,
Maximilian D. Stritzinger,
Carlos Contreras,
James M. DerKacy,
T Hoover,
Syed Uddin,
Saurabh W. Jha,
Huangfei Xiao,
Kevin Krisciunas,
Nicholas B. Suntzeff
Abstract:
Producing stable $^{58}$Ni in Type Ia supernovae (SNe Ia) requires sufficiently high density conditions that are not predicted for all origin scenarios, so examining the distribution of $^{58}$Ni using the NIR [Ni II] 1.939 $μ$m line may observationally distinguish between possible progenitors and explosion mechanisms. We present 79 telluric-corrected NIR spectra of 22 low-redshift SNe Ia from the…
▽ More
Producing stable $^{58}$Ni in Type Ia supernovae (SNe Ia) requires sufficiently high density conditions that are not predicted for all origin scenarios, so examining the distribution of $^{58}$Ni using the NIR [Ni II] 1.939 $μ$m line may observationally distinguish between possible progenitors and explosion mechanisms. We present 79 telluric-corrected NIR spectra of 22 low-redshift SNe Ia from the Carnegie Supernova Project-II ranging from +50 to +505 days, including 31 previously unpublished spectra. We introduce the Gaussian Peak Ratio, a detection parameter that confirms the presence of the NIR [Ni II] 1.939 $μ$m line in 8 SNe in our sample. Non-detections occur at earlier phases when the NIR Ni line has not emerged yet or in low signal-to-noise spectra yielding inconclusive results. Subluminous 86G-like SNe Ia show the earliest NIR Ni features around ~+50 days, whereas normal-bright SNe Ia do not exhibit NIR Ni until ~+150 days. NIR Ni features detected in our sample have low peak velocities ($v$~1200 km/s) and narrow line widths ($\leq$ 3500 km/s), indicating stable $^{58}$Ni is centrally located. This implies high density burning conditions in the innermost regions of SNe Ia and could be due to higher mass progenitors (i.e. near-$M_{ch}$). NIR spectra of the nearly two dozen SNe Ia in our sample are compared to various model predictions and paired with early-time properties to identify ideal observation windows for future SNe Ia discovered by upcoming surveys with Rubin-LSST or the Roman Space Telescope.
△ Less
Submitted 23 April, 2025;
originally announced April 2025.
-
On Developers' Self-Declaration of AI-Generated Code: An Analysis of Practices
Authors:
Syed Mohammad Kashif,
Peng Liang,
Amjed Tahir
Abstract:
AI code generation tools have gained significant popularity among developers, who use them to assist in software development due to their capability to generate code. Existing studies mainly explored the quality, e.g., correctness and security, of AI-generated code, while in real-world software development, the prerequisite is to distinguish AI-generated code from human-written code, which emphasi…
▽ More
AI code generation tools have gained significant popularity among developers, who use them to assist in software development due to their capability to generate code. Existing studies mainly explored the quality, e.g., correctness and security, of AI-generated code, while in real-world software development, the prerequisite is to distinguish AI-generated code from human-written code, which emphasizes the need to explicitly declare AI-generated code by developers. To this end, this study intends to understand the ways developers use to self-declare AI-generated code and explore the reasons why developers choose to self-declare or not. We conducted a mixed-methods study consisting of two phases. In the first phase, we mined GitHub repositories and collected 613 instances of AI-generated code snippets. In the second phase, we conducted a follow-up industrial survey, which received 111 valid responses. Our research revealed the practices followed by developers to self-declare AI-generated code. Most practitioners (76.6%) always or sometimes self-declare AI-generated code. In contrast, other practitioners (23.4%) noted that they never self-declare AI-generated code. The reasons for self-declaring AI-generated code include the need to track and monitor the code for future review and debugging, and ethical considerations. The reasons for not self-declaring AI-generated code include extensive modifications to AI-generated code and the developers' perception that self-declaration is an unnecessary activity. We finally provided guidelines for practitioners to self-declare AI-generated code, addressing ethical and code quality concerns.
△ Less
Submitted 23 April, 2025;
originally announced April 2025.
-
DFT based insights into elastic, thermophysical, electronic and optical properties of topological insulators XTe5 (X = Zr, Hf)
Authors:
Syed Shovon Mahbub Mahin,
Suptajoy Barua,
B. Rahman Rano,
Ishtiaque M. Syed,
S. H. Naqib
Abstract:
Transition metal penta-tellurides, ZrTe5 and HfTe5 have been recently drawn a lot of attention due to their fascinating physical properties and for being prominent materials showing topological phase transitions. In this study, we investigated mechanical, thermophysical and optoelectronic properties of these materials which remained almost unexplored till now. We also studied electronic properties…
▽ More
Transition metal penta-tellurides, ZrTe5 and HfTe5 have been recently drawn a lot of attention due to their fascinating physical properties and for being prominent materials showing topological phase transitions. In this study, we investigated mechanical, thermophysical and optoelectronic properties of these materials which remained almost unexplored till now. We also studied electronic properties and compared those with previous studies. We used Density Functional Theory (DFT) based calculations to study all of these properties. This study suggests that the materials are mechanically stable, possess high mechanical and bonding anisotropy and are brittle in nature. Our study also suggests that the compounds are soft in nature and they contain a mixture of covalent and metallic bonding. Investigation of thermophysical properties, namely, Grüneisen parameter and Debye temperature indicates weak bonding strength in these compounds. Analysis of melting temperature, thermal expansion coefficient, heat capacity, radiation factor, acoustic impedance, and minimum thermal conductivity suggests their possible application in acoustic and thermoelectric devices. Examination of their optical characteristics reveals that they have a considerable reflectivity from the infrared to the ultraviolet region. The refractive indices of these materials are high at low energy so they are potential candidates for reflective coating of solar radiation. There have been debates over exact topological natures of these compounds, whether they are semi-metals or insulators. Our study of electronic band structure and density of states reveal that spin-orbit interaction is responsible for enhancing energy gaps and promoting insulating characteristics in these compounds.
△ Less
Submitted 22 April, 2025;
originally announced April 2025.
-
Carbyne: An Ultra-Lightweight DoS-Resilient Mempool for Bitcoin
Authors:
Hina Binte Haq,
Syed Taha Ali,
Asad Salman,
Patrick McCorry,
Siamak F. Shahandashti
Abstract:
The increasing adoption of cryptocurrencies has significantly amplified the resource requirements for operating full nodes, creating substantial barriers to entry. Unlike miners, who are financially incentivized through block rewards and transaction fees, full nodes lack direct economic compensation for their critical role in maintaining the network. A key resource burden is the transaction pool,…
▽ More
The increasing adoption of cryptocurrencies has significantly amplified the resource requirements for operating full nodes, creating substantial barriers to entry. Unlike miners, who are financially incentivized through block rewards and transaction fees, full nodes lack direct economic compensation for their critical role in maintaining the network. A key resource burden is the transaction pool, which is particularly memory-intensive as it temporarily stores unconfirmed transactions awaiting verification and propagation across the network. We present Neonpool, a novel optimization for transaction pool leveraging bloom filter variants to drastically reduce memory consumption by up to 200 (e.g., 400 MB to 2 MB) while maintaining over 99.99% transaction processing accuracy. Implemented in C++ and evaluated on unique Bitcoin and Ethereum datasets, Neonpool enables efficient operation on lightweight clients, such as smartphones, IoT devices, and systems-on-a-chip, without requiring a hard fork. By lowering the cost of node participation, Neonpool enhances decentralization and strengthens the overall security and robustness of cryptocurrency networks.
△ Less
Submitted 20 March, 2025;
originally announced April 2025.
-
Power Transformer Health Index and Life Span Assessment: A Comprehensive Review of Conventional and Machine Learning based Approaches
Authors:
Syeda Tahreem Zahra,
Syed Kashif Imdad,
Sohail Khan,
Sohail Khalid,
Nauman Anwar Baig
Abstract:
Power transformers play a critical role within the electrical power system, making their health assessment and the prediction of their remaining lifespan paramount for the purpose of ensuring efficient operation and facilitating effective maintenance planning. This paper undertakes a comprehensive examination of existent literature, with a primary focus on both conventional and cutting-edge techni…
▽ More
Power transformers play a critical role within the electrical power system, making their health assessment and the prediction of their remaining lifespan paramount for the purpose of ensuring efficient operation and facilitating effective maintenance planning. This paper undertakes a comprehensive examination of existent literature, with a primary focus on both conventional and cutting-edge techniques employed within this domain. The merits and demerits of recent methodologies and techniques are subjected to meticulous scrutiny and explication. Furthermore, this paper expounds upon intelligent fault diagnosis methodologies and delves into the most widely utilized intelligent algorithms for the assessment of transformer conditions. Diverse Artificial Intelligence (AI) approaches, including Artificial Neural Networks (ANN) and Convolutional Neural Network (CNN), Support Vector Machine (SVM), Random Forest (RF), Genetic Algorithm (GA), and Particle Swarm Optimization (PSO), are elucidated offering pragmatic solutions for enhancing the performance of transformer fault diagnosis. The amalgamation of multiple AI methodologies and the exploration of timeseries analysis further contribute to the augmentation of diagnostic precision and the early detection of faults in transformers. By furnishing a comprehensive panorama of AI applications in the field of transformer fault diagnosis, this study lays the groundwork for future research endeavors and the progression of this critical area of study.
△ Less
Submitted 19 April, 2025;
originally announced April 2025.
-
MILUV: A Multi-UAV Indoor Localization dataset with UWB and Vision
Authors:
Mohammed Ayman Shalaby,
Syed Shabbir Ahmed,
Nicholas Dahdah,
Charles Champagne Cossette,
Jerome Le Ny,
James Richard Forbes
Abstract:
This paper introduces MILUV, a Multi-UAV Indoor Localization dataset with UWB and Vision measurements. This dataset comprises 217 minutes of flight time over 36 experiments using three quadcopters, collecting ultra-wideband (UWB) ranging data such as the raw timestamps and channel-impulse response data, vision data from a stereo camera and a bottom-facing monocular camera, inertial measurement uni…
▽ More
This paper introduces MILUV, a Multi-UAV Indoor Localization dataset with UWB and Vision measurements. This dataset comprises 217 minutes of flight time over 36 experiments using three quadcopters, collecting ultra-wideband (UWB) ranging data such as the raw timestamps and channel-impulse response data, vision data from a stereo camera and a bottom-facing monocular camera, inertial measurement unit data, height measurements from a laser rangefinder, magnetometer data, and ground-truth poses from a motion-capture system. The UWB data is collected from up to 12 transceivers affixed to mobile robots and static tripods in both line-of-sight and non-line-of-sight conditions. The UAVs fly at a maximum speed of 4.418 m/s in an indoor environment with visual fiducial markers as features. MILUV is versatile and can be used for a wide range of applications beyond localization, but the primary purpose of MILUV is for testing and validating multi-robot UWB- and vision-based localization algorithms. The dataset can be downloaded at https://doi.org/10.25452/figshare.plus.28386041.v1. A development kit is presented alongside the MILUV dataset, which includes benchmarking algorithms such as visual-inertial odometry, UWB-based localization using an extended Kalman filter, and classification of CIR data using machine learning approaches. The development kit can be found at https://github.com/decargroup/miluv, and is supplemented with a website available at https://decargroup.github.io/miluv/.
△ Less
Submitted 19 April, 2025;
originally announced April 2025.
-
Mobile-Driven Incentive Based Exercise for Blood Glucose Control in Type 2 Diabetes
Authors:
Wasim Abbas,
Hafiz Syed Muhammad Bilal,
Asim Abbas,
Muhammad Afzal,
Je-Hoon Lee
Abstract:
We propose and create an incentive based recommendation algorithm aimed at improving the lifestyle of diabetic patients. This algorithm is integrated into a real world mobile application to provide personalized health recommendations. Initially, users enter data such as step count, calorie intake, gender, age, weight, height and blood glucose levels. When the data is preprocessed, the app identifi…
▽ More
We propose and create an incentive based recommendation algorithm aimed at improving the lifestyle of diabetic patients. This algorithm is integrated into a real world mobile application to provide personalized health recommendations. Initially, users enter data such as step count, calorie intake, gender, age, weight, height and blood glucose levels. When the data is preprocessed, the app identifies the personalized health and glucose management goals. The recommendation engine suggests exercise routines and dietary adjustments based on these goals. As users achieve their goals and follow these recommendations, they receive incentives, encouraging adherence and promoting positive health outcomes. Furthermore, the mobile application allows users to monitor their progress through descriptive analytics, which displays their daily activities and health metrics in graphical form. To evaluate the proposed methodology, the study was conducted with 10 participants, with type 2 diabetes for three weeks. The participants were recruited through advertisements and health expert references. The application was installed on the patient phone to use it for three weeks. The expert was also a part of this study by monitoring the patient health record. To assess the algorithm performance, we computed efficiency and proficiency. As a result, the algorithm showed proficiency and efficiency scores of 90% and 92%, respectively. Similarly, we computed user experience with application in terms of attractiveness, hedonic and pragmatic quality, involving 35 people in the study. As a result, it indicated an overall positive user response. The findings show a clear positive correlation between exercise and rewards, with noticeable improvements observed in user outcomes after exercise.
△ Less
Submitted 10 April, 2025;
originally announced April 2025.
-
Near-optimal algorithms for private estimation and sequential testing of collision probability
Authors:
Robert Busa-Fekete,
Umar Syed
Abstract:
We present new algorithms for estimating and testing \emph{collision probability}, a fundamental measure of the spread of a discrete distribution that is widely used in many scientific fields. We describe an algorithm that satisfies $(α, β)$-local differential privacy and estimates collision probability with error at most $ε$ using $\tilde{O}\left(\frac{\log(1/β)}{α^2 ε^2}\right)$ samples for…
▽ More
We present new algorithms for estimating and testing \emph{collision probability}, a fundamental measure of the spread of a discrete distribution that is widely used in many scientific fields. We describe an algorithm that satisfies $(α, β)$-local differential privacy and estimates collision probability with error at most $ε$ using $\tilde{O}\left(\frac{\log(1/β)}{α^2 ε^2}\right)$ samples for $α\le 1$, which improves over previous work by a factor of $\frac{1}{α^2}$. We also present a sequential testing algorithm for collision probability, which can distinguish between collision probability values that are separated by $ε$ using $\tilde{O}(\frac{1}{ε^2})$ samples, even when $ε$ is unknown. Our algorithms have nearly the optimal sample complexity, and in experiments we show that they require significantly fewer samples than previous methods.
△ Less
Submitted 18 April, 2025;
originally announced April 2025.
-
Analysing the Robustness of Vision-Language-Models to Common Corruptions
Authors:
Muhammad Usama,
Syeda Aishah Asim,
Syed Bilal Ali,
Syed Talal Wasim,
Umair Bin Mansoor
Abstract:
Vision-language models (VLMs) have demonstrated impressive capabilities in understanding and reasoning about visual and textual content. However, their robustness to common image corruptions remains under-explored. In this work, we present the first comprehensive analysis of VLM robustness across 19 corruption types from the ImageNet-C benchmark, spanning four categories: noise, blur, weather, and…
▽ More
Vision-language models (VLMs) have demonstrated impressive capabilities in understanding and reasoning about visual and textual content. However, their robustness to common image corruptions remains under-explored. In this work, we present the first comprehensive analysis of VLM robustness across 19 corruption types from the ImageNet-C benchmark, spanning four categories: noise, blur, weather, and digital distortions. We introduce two new benchmarks, TextVQA-C and GQA-C, to systematically evaluate how corruptions affect scene text understanding and object-based reasoning, respectively. Our analysis reveals that transformer-based VLMs exhibit distinct vulnerability patterns across tasks: text recognition deteriorates most severely under blur and snow corruptions, while object reasoning shows higher sensitivity to corruptions such as frost and impulse noise. We connect these observations to the frequency-domain characteristics of different corruptions, revealing how transformers' inherent bias toward low-frequency processing explains their differential robustness patterns. Our findings provide valuable insights for developing more corruption-robust vision-language models for real-world applications.
△ Less
Submitted 21 April, 2025; v1 submitted 18 April, 2025;
originally announced April 2025.
-
Enhancing Quantum Dense Coding Robustness Using Information Entropy-Based Metrics
Authors:
Syed Emad Uddin Shubha,
Tasnuva Farheen
Abstract:
Superdense Coding is a cornerstone in secure quantum communication, exploiting pre-shared entanglement to encode two classical bits within a single qubit. However, noise and decoherence deteriorate entanglement quality, restricting both fidelity and channel capacity in practical settings. Traditional methods, such as error correcting codes or entanglement distillation, are generally inadequate for…
▽ More
Superdense Coding is a cornerstone in secure quantum communication, exploiting pre-shared entanglement to encode two classical bits within a single qubit. However, noise and decoherence deteriorate entanglement quality, restricting both fidelity and channel capacity in practical settings. Traditional methods, such as error correcting codes or entanglement distillation, are generally inadequate for dynamically varying noise conditions. Moreover, reliance on fidelity alone may fail to capture more subtle noise effects. This work introduces an adaptive protocol that integrates the five-qubit perfect code with a novel global adaptive purification that avoids discarding entangled pairs. By monitoring two information entropy-based metrics, quantum discord (QD) and entanglement of formation (EoF) from pilot pairs, we dynamically tune a global unitary to counteract noise. Our simulations, under both amplitude and phase damping, indicate that this integrated strategy could significantly enhance superdense coding robustness while preserving high throughput, thereby offering a scalable pathway toward a high-capacity quantum internet.
△ Less
Submitted 16 April, 2025;
originally announced April 2025.
-
"It's not approved, but many, like myself, ignore the rule": Investigating the Landscape and Consequences of Unsanctioned Technology Use in Educational Institutes
Authors:
Easton Kelso,
Ananta Soneji,
Syed Zami-Ul-Haque Navid,
Yan Soshitaishvili,
Sazzadur Rahaman,
Rakibul Hasan
Abstract:
Educators regularly use unsanctioned technologies (apps not formally approved by their institutions) for teaching, grading, and other academic tasks. While these tools often support instructional needs, they raise significant privacy, security, and regulatory compliance concerns. Despite its importance, understanding the adoptions and risks from the perspective of educators, who serve as de facto…
▽ More
Educators regularly use unsanctioned technologies (apps not formally approved by their institutions) for teaching, grading, and other academic tasks. While these tools often support instructional needs, they raise significant privacy, security, and regulatory compliance concerns. Despite its importance, understanding the adoptions and risks from the perspective of educators, who serve as de facto decision makers behind unsanctioned technology use, is largely understudied in existing literature.To address this gap, we conducted two surveys: one with 375 educators who listed 1,373 unsanctioned apps, and another with 21 administrators who either often help educators to set up educational technologies (EdTechs) or observe their security or privacy incidents. Our study identified 494 unique applications used by educators, primarily for pedagogical utility (n=213) and functional convenience (n=155), and the associated risks were often ignored. In fact, despite security and privacy concerns, many educators continued using the same apps (n = 62), citing a lack of alternatives or heavy dependence as barriers to discontinuation. We also found that fewer than a third of educators were aware of any institutional policy on unsanctioned technology use (K12: 30.3%, HEI: 24.8%), and 22 knowingly violated such policies. While 107 received formal warnings, only 33 adjusted their behavior. Finally, we conclude by discussing the implications of our findings and future recommendations to minimize the risks.
△ Less
Submitted 16 April, 2025;
originally announced April 2025.
-
Analysis of the MICCAI Brain Tumor Segmentation -- Metastases (BraTS-METS) 2025 Lighthouse Challenge: Brain Metastasis Segmentation on Pre- and Post-treatment MRI
Authors:
Nazanin Maleki,
Raisa Amiruddin,
Ahmed W. Moawad,
Nikolay Yordanov,
Athanasios Gkampenis,
Pascal Fehringer,
Fabian Umeh,
Crystal Chukwurah,
Fatima Memon,
Bojan Petrovic,
Justin Cramer,
Mark Krycia,
Elizabeth B. Shrickel,
Ichiro Ikuta,
Gerard Thompson,
Lorenna Vidal,
Vilma Kosovic,
Adam E. Goldman-Yassen,
Virginia Hill,
Tiffany So,
Sedra Mhana,
Albara Alotaibi,
Nathan Page,
Prisha Bhatia,
Yasaman Sharifi
, et al. (218 additional authors not shown)
Abstract:
Despite continuous advancements in cancer treatment, brain metastatic disease remains a significant complication of primary cancer and is associated with an unfavorable prognosis. One approach for improving diagnosis, management, and outcomes is to implement algorithms based on artificial intelligence for the automated segmentation of both pre- and post-treatment MRI brain images. Such algorithms…
▽ More
Despite continuous advancements in cancer treatment, brain metastatic disease remains a significant complication of primary cancer and is associated with an unfavorable prognosis. One approach for improving diagnosis, management, and outcomes is to implement algorithms based on artificial intelligence for the automated segmentation of both pre- and post-treatment MRI brain images. Such algorithms rely on volumetric criteria for lesion identification and treatment response assessment, which are still not available in clinical practice. Therefore, it is critical to establish tools for rapid volumetric segmentations methods that can be translated to clinical practice and that are trained on high quality annotated data. The BraTS-METS 2025 Lighthouse Challenge aims to address this critical need by establishing inter-rater and intra-rater variability in dataset annotation by generating high quality annotated datasets from four individual instances of segmentation by neuroradiologists while being recorded on video (two instances doing "from scratch" and two instances after AI pre-segmentation). This high-quality annotated dataset will be used for testing phase in 2025 Lighthouse challenge and will be publicly released at the completion of the challenge. The 2025 Lighthouse challenge will also release the 2023 and 2024 segmented datasets that were annotated using an established pipeline of pre-segmentation, student annotation, two neuroradiologists checking, and one neuroradiologist finalizing the process. It builds upon its previous edition by including post-treatment cases in the dataset. Using these high-quality annotated datasets, the 2025 Lighthouse challenge plans to test benchmark algorithms for automated segmentation of pre-and post-treatment brain metastases (BM), trained on diverse and multi-institutional datasets of MRI images obtained from patients with brain metastases.
△ Less
Submitted 6 May, 2025; v1 submitted 16 April, 2025;
originally announced April 2025.
-
Advancing Arabic Speech Recognition Through Large-Scale Weakly Supervised Learning
Authors:
Mahmoud Salhab,
Marwan Elghitany,
Shameed Sait,
Syed Sibghat Ullah,
Mohammad Abusheikh,
Hasan Abusheikh
Abstract:
Automatic speech recognition (ASR) is crucial for human-machine interaction in diverse applications like conversational agents, industrial robotics, call center automation, and automated subtitling. However, developing high-performance ASR models remains challenging, particularly for low-resource languages like Arabic, due to the scarcity of large, labeled speech datasets, which are costly and lab…
▽ More
Automatic speech recognition (ASR) is crucial for human-machine interaction in diverse applications like conversational agents, industrial robotics, call center automation, and automated subtitling. However, developing high-performance ASR models remains challenging, particularly for low-resource languages like Arabic, due to the scarcity of large, labeled speech datasets, which are costly and labor-intensive to produce. In this work, we employ weakly supervised learning to train an Arabic ASR model using the Conformer architecture. Our model is trained from scratch on 15,000 hours of weakly annotated speech data covering both Modern Standard Arabic (MSA) and Dialectal Arabic (DA), eliminating the need for costly manual transcriptions. Despite the absence of human-verified labels, our approach achieves state-of-the-art (SOTA) results in Arabic ASR, surpassing both open and closed-source models on standard benchmarks. By demonstrating the effectiveness of weak supervision as a scalable, cost-efficient alternative to traditional supervised approaches, paving the way for improved ASR systems in low resource settings.
△ Less
Submitted 19 April, 2025; v1 submitted 16 April, 2025;
originally announced April 2025.
-
Analyzing type Ia supernovae near-infrared light curves with Principal Component Analysis
Authors:
T. E. Müller-Bravo,
L. Galbany,
M. D. Stritzinger,
C. Ashall,
E. Baron,
C. R. Burns,
P. Höflich,
N. Morrell,
M. Phillips,
N. B. Suntzeff,
S. A. Uddin
Abstract:
Type Ia supernovae (SNeIa), the thermonuclear explosions of C/O white dwarf stars in binary systems, are phenomena that remain poorly understood. The complexity of their progenitor systems, explosion physics and intrinsic diversity poses not only challenges for their understanding as astrophysical objects, but also for their standardization and use as cosmological probes. Near-infrared (NIR) obser…
▽ More
Type Ia supernovae (SNeIa), the thermonuclear explosions of C/O white dwarf stars in binary systems, are phenomena that remain poorly understood. The complexity of their progenitor systems, explosion physics and intrinsic diversity poses not only challenges for their understanding as astrophysical objects, but also for their standardization and use as cosmological probes. Near-infrared (NIR) observations offer a promising avenue for studying the physics of SNeIa and for reducing systematic uncertainties in distance estimations, as they exhibit lower dust extinction and smaller dispersion in peak luminosity than optical bands. Here, Principal Component Analysis (PCA) is applied to a sample of SNeIa with well-sampled NIR (YJH-band) light curves to identify the dominant components of their variability and constrain physical underlying properties. The theoretical models of Kasen2006 are used for the physical interpretation of the PCA components, where we found the 56Ni mass to describe the dominant variability. Other factors, such as mixing and metallicity, were found to contribute significantly as well. However, some differences are found between the components of the NIR bands which may be attributed to differences in the explosion aspects they each trace. Additionally, the PCA components are compared to various light-curve parameters, identifying strong correlations between some components and peak brightness in both the NIR and optical bands, particularly in the Y band. When applying PCA to NIR color curves, we found interesting correlations with the host-galaxy mass, where SNeIa with redder NIR colors are predominantly found in less massive galaxies. We also investigate the potential for improved standardization in the Y band by incorporating PCA coefficients as correction parameters, leading to a reduction in the scatter of the intrinsic luminosity of SNeIa.
△ Less
Submitted 8 April, 2025;
originally announced April 2025.
-
Towards Efficient Real-Time Video Motion Transfer via Generative Time Series Modeling
Authors:
Tasmiah Haque,
Md. Asif Bin Syed,
Byungheon Jeong,
Xue Bai,
Sumit Mohan,
Somdyuti Paul,
Imtiaz Ahmed,
Srinjoy Das
Abstract:
We propose a deep learning framework designed to significantly optimize bandwidth for motion-transfer-enabled video applications, including video conferencing, virtual reality interactions, health monitoring systems, and vision-based real-time anomaly detection. To capture complex motion effectively, we utilize the First Order Motion Model (FOMM), which encodes dynamic objects by detecting keypoin…
▽ More
We propose a deep learning framework designed to significantly optimize bandwidth for motion-transfer-enabled video applications, including video conferencing, virtual reality interactions, health monitoring systems, and vision-based real-time anomaly detection. To capture complex motion effectively, we utilize the First Order Motion Model (FOMM), which encodes dynamic objects by detecting keypoints and their associated local affine transformations. These keypoints are identified using a self-supervised keypoint detector and arranged into a time series corresponding to the successive frames. Forecasting is performed on these keypoints by integrating two advanced generative time series models into the motion transfer pipeline, namely the Variational Recurrent Neural Network (VRNN) and the Gated Recurrent Unit with Normalizing Flow (GRU-NF). The predicted keypoints are subsequently synthesized into realistic video frames using an optical flow estimator paired with a generator network, thereby facilitating accurate video forecasting and enabling efficient, low-frame-rate video transmission. We validate our results across three datasets for video animation and reconstruction using the following metrics: Mean Absolute Error, Joint Embedding Predictive Architecture Embedding Distance, Structural Similarity Index, and Average Pair-wise Displacement. Our results confirm that by utilizing the superior reconstruction property of the Variational Autoencoder, the VRNN integrated FOMM excels in applications involving multi-step ahead forecasts such as video conferencing. On the other hand, by leveraging the Normalizing Flow architecture for exact likelihood estimation, and enabling efficient latent space sampling, the GRU-NF based FOMM exhibits superior capabilities for producing diverse future samples while maintaining high visual quality for tasks like real-time video-based anomaly detection.
△ Less
Submitted 7 April, 2025;
originally announced April 2025.
-
On Synthesizing Data for Context Attribution in Question Answering
Authors:
Gorjan Radevski,
Kiril Gashteovski,
Shahbaz Syed,
Christopher Malon,
Sebastien Nicolas,
Chia-Chien Hung,
Timo Sztyler,
Verena Heußer,
Wiem Ben Rim,
Masafumi Enomoto,
Kunihiro Takeoka,
Masafumi Oyamada,
Goran Glavaš,
Carolin Lawrence
Abstract:
Question Answering (QA) accounts for a significant portion of LLM usage "in the wild". However, LLMs sometimes produce false or misleading responses, also known as "hallucinations". Therefore, grounding the generated answers in contextually provided information -- i.e., providing evidence for the generated text -- is paramount for LLMs' trustworthiness. Providing this information is the task of co…
▽ More
Question Answering (QA) accounts for a significant portion of LLM usage "in the wild". However, LLMs sometimes produce false or misleading responses, also known as "hallucinations". Therefore, grounding the generated answers in contextually provided information -- i.e., providing evidence for the generated text -- is paramount for LLMs' trustworthiness. Providing this information is the task of context attribution. In this paper, we systematically study LLM-based approaches for this task, namely we investigate (i) zero-shot inference, (ii) LLM ensembling, and (iii) fine-tuning of small LMs on synthetic data generated by larger LLMs. Our key contribution is SynQA: a novel generative strategy for synthesizing context attribution data. Given selected context sentences, an LLM generates QA pairs that are supported by these sentences. This leverages LLMs' natural strengths in text generation while ensuring clear attribution paths in the synthetic training data. We show that the attribution data synthesized via SynQA is highly effective for fine-tuning small LMs for context attribution in different QA tasks and domains. Finally, with a user study, we validate the usefulness of small LMs (fine-tuned on synthetic data from SynQA) in context attribution for QA.
△ Less
Submitted 16 June, 2025; v1 submitted 21 February, 2025;
originally announced April 2025.
-
DyCON: Dynamic Uncertainty-aware Consistency and Contrastive Learning for Semi-supervised Medical Image Segmentation
Authors:
Maregu Assefa,
Muzammal Naseer,
Iyyakutti Iyappan Ganapathi,
Syed Sadaf Ali,
Mohamed L Seghier,
Naoufel Werghi
Abstract:
Semi-supervised learning in medical image segmentation leverages unlabeled data to reduce annotation burdens through consistency learning. However, current methods struggle with class imbalance and high uncertainty from pathology variations, leading to inaccurate segmentation in 3D medical images. To address these challenges, we present DyCON, a Dynamic Uncertainty-aware Consistency and Contrastiv…
▽ More
Semi-supervised learning in medical image segmentation leverages unlabeled data to reduce annotation burdens through consistency learning. However, current methods struggle with class imbalance and high uncertainty from pathology variations, leading to inaccurate segmentation in 3D medical images. To address these challenges, we present DyCON, a Dynamic Uncertainty-aware Consistency and Contrastive Learning framework that enhances the generalization of consistency methods with two complementary losses: Uncertainty-aware Consistency Loss (UnCL) and Focal Entropy-aware Contrastive Loss (FeCL). UnCL enforces global consistency by dynamically weighting the contribution of each voxel to the consistency loss based on its uncertainty, preserving high-uncertainty regions instead of filtering them out. Initially, UnCL prioritizes learning from uncertain voxels with lower penalties, encouraging the model to explore challenging regions. As training progress, the penalty shift towards confident voxels to refine predictions and ensure global consistency. Meanwhile, FeCL enhances local feature discrimination in imbalanced regions by introducing dual focal mechanisms and adaptive confidence adjustments into the contrastive principle. These mechanisms jointly prioritizes hard positives and negatives while focusing on uncertain sample pairs, effectively capturing subtle lesion variations under class imbalance. Extensive evaluations on four diverse medical image segmentation datasets (ISLES'22, BraTS'19, LA, Pancreas) show DyCON's superior performance against SOTA methods.
△ Less
Submitted 6 April, 2025;
originally announced April 2025.
-
Machine Learning-Based Detection and Analysis of Suspicious Activities in Bitcoin Wallet Transactions in the USA
Authors:
Md Zahidul Islam,
Md Shahidul Islam,
Biswajit Chandra das,
Syed Ali Reza,
Proshanta Kumar Bhowmik,
Kanchon Kumar Bishnu,
Md Shafiqur Rahman,
Redoyan Chowdhury,
Laxmi Pant
Abstract:
The dramatic adoption of Bitcoin and other cryptocurrencies in the USA has revolutionized the financial landscape and provided unprecedented investment and transaction efficiency opportunities. The prime objective of this research project is to develop machine learning algorithms capable of effectively identifying and tracking suspicious activity in Bitcoin wallet transactions. With high-tech anal…
▽ More
The dramatic adoption of Bitcoin and other cryptocurrencies in the USA has revolutionized the financial landscape and provided unprecedented investment and transaction efficiency opportunities. The prime objective of this research project is to develop machine learning algorithms capable of effectively identifying and tracking suspicious activity in Bitcoin wallet transactions. With high-tech analysis, the study aims to create a model with a feature for identifying trends and outliers that can expose illicit activity. The current study specifically focuses on Bitcoin transaction information in America, with a strong emphasis placed on the importance of knowing about the immediate environment in and through which such transactions pass through. The dataset is composed of in-depth Bitcoin wallet transactional information, including important factors such as transaction values, timestamps, network flows, and addresses for wallets. All entries in the dataset expose information about financial transactions between wallets, including received and sent transactions, and such information is significant for analysis and trends that can represent suspicious activity. This study deployed three accredited algorithms, most notably, Logistic Regression, Random Forest, and Support Vector Machines. In retrospect, Random Forest emerged as the best model with the highest F1 Score, showcasing its ability to handle non-linear relationships in the data. Insights revealed significant patterns in wallet activity, such as the correlation between unredeemed transactions and final balances. The application of machine algorithms in tracking cryptocurrencies is a tool for creating transparent and secure U.S. markets.
△ Less
Submitted 3 April, 2025;
originally announced April 2025.
-
STING-BEE: Towards Vision-Language Model for Real-World X-ray Baggage Security Inspection
Authors:
Divya Velayudhan,
Abdelfatah Ahmed,
Mohamad Alansari,
Neha Gour,
Abderaouf Behouch,
Taimur Hassan,
Syed Talal Wasim,
Nabil Maalej,
Muzammal Naseer,
Juergen Gall,
Mohammed Bennamoun,
Ernesto Damiani,
Naoufel Werghi
Abstract:
Advancements in Computer-Aided Screening (CAS) systems are essential for improving the detection of security threats in X-ray baggage scans. However, current datasets are limited in representing real-world, sophisticated threats and concealment tactics, and existing approaches are constrained by a closed-set paradigm with predefined labels. To address these challenges, we introduce STCray, the fir…
▽ More
Advancements in Computer-Aided Screening (CAS) systems are essential for improving the detection of security threats in X-ray baggage scans. However, current datasets are limited in representing real-world, sophisticated threats and concealment tactics, and existing approaches are constrained by a closed-set paradigm with predefined labels. To address these challenges, we introduce STCray, the first multimodal X-ray baggage security dataset, comprising 46,642 image-caption paired scans across 21 threat categories, generated using an X-ray scanner for airport security. STCray is meticulously developed with our specialized protocol that ensures domain-aware, coherent captions, that lead to the multi-modal instruction following data in X-ray baggage security. This allows us to train a domain-aware visual AI assistant named STING-BEE that supports a range of vision-language tasks, including scene comprehension, referring threat localization, visual grounding, and visual question answering (VQA), establishing novel baselines for multi-modal learning in X-ray baggage security. Further, STING-BEE shows state-of-the-art generalization in cross-domain settings. Code, data, and models are available at https://divs1159.github.io/STING-BEE/.
△ Less
Submitted 3 April, 2025;
originally announced April 2025.
-
Temperature and misorientation-dependent austenite nucleation at ferrite grain boundaries in a medium manganese steel: role of misorientation-dependent grain boundary segregation
Authors:
Rama Srinivas Varanasi,
Osamu Waseda,
Faisal Waqar Syed,
Prithiv Thoudden-Sukumar,
Baptiste Gault,
Jörg Neugebauer,
Dirk Ponge
Abstract:
In the current work, we study the role of grain boundary (GB) misorientation-dependent segregation on austenite nucleation in a 50% cold rolled intercritically annealed 10Mn-0.05C-1.5Al (wt. %) medium Mn steel. During intercritical annealing at 500°C, austenite nucleates predominantly at high-angle GBs. At 600°C, austenite nucleates additionally at low-angle GBs, exhibiting a temperature dependanc…
▽ More
In the current work, we study the role of grain boundary (GB) misorientation-dependent segregation on austenite nucleation in a 50% cold rolled intercritically annealed 10Mn-0.05C-1.5Al (wt. %) medium Mn steel. During intercritical annealing at 500°C, austenite nucleates predominantly at high-angle GBs. At 600°C, austenite nucleates additionally at low-angle GBs, exhibiting a temperature dependance. Correlative transmission Kikuchi diffraction /atom probe tomography reveals a misorientation-dependent segregation. While GB segregation has been reported to assist austenite nucleation in medium manganese steels (3-12 wt.% Mn), an understanding of the temperature and misorientation dependance is lacking, which is the aim of current work. Since artifacts of atom probe can cause a broadening of the segregation width, we combined experiments with results from density functional theory (DFT) calculations that reveal that the Mn segregation is not limited to the GB plane but confined to a region in the range of approximately 1 nm. Consequently, GB segregation alters both the GB interface energy and the free energy per unit volume corresponding to the transformation. We estimate the local driving force for austenite nucleation accounting for the segregation width of ~ 1 nm. Based on classical nucleation theory, we clarify the effect of GB segregation on the critical radius and activation energy barrier for confined austenite nucleation at the GB.
△ Less
Submitted 2 April, 2025;
originally announced April 2025.
-
Resource Allocation for RIS-Assisted CoMP-NOMA Networks using Reinforcement Learning
Authors:
Muhammad Umer,
Muhammad Ahmed Mohsin,
Huma Ghafoor,
Syed Ali Hassan
Abstract:
This thesis delves into the forefront of wireless communication by exploring the synergistic integration of three transformative technologies: STAR-RIS, CoMP, and NOMA. Driven by the ever-increasing demand for higher data rates, improved spectral efficiency, and expanded coverage in the evolving landscape of 6G development, this research investigates the potential of these technologies to revoluti…
▽ More
This thesis delves into the forefront of wireless communication by exploring the synergistic integration of three transformative technologies: STAR-RIS, CoMP, and NOMA. Driven by the ever-increasing demand for higher data rates, improved spectral efficiency, and expanded coverage in the evolving landscape of 6G development, this research investigates the potential of these technologies to revolutionize future wireless networks.
The thesis analyzes the performance gains achievable through strategic deployment of STAR-RIS, focusing on mitigating inter-cell interference, enhancing signal strength, and extending coverage to cell-edge users. Resource sharing strategies for STAR-RIS elements are explored, optimizing both transmission and reflection functionalities. Analytical frameworks are developed to quantify the benefits of STAR-RIS assisted CoMP-NOMA networks under realistic channel conditions, deriving key performance metrics such as ergodic rates and outage probabilities. Additionally, the research delves into energy-efficient design approaches for CoMP-NOMA networks incorporating RIS, proposing novel RIS configurations and optimization algorithms to achieve a balance between performance and energy consumption. Furthermore, the application of Deep Reinforcement Learning (DRL) techniques for intelligent and adaptive optimization in aerial RIS-assisted CoMP-NOMA networks is explored, aiming to maximize network sum rate while meeting user quality of service requirements. Through a comprehensive investigation of these technologies and their synergistic potential, this thesis contributes valuable insights into the future of wireless communication, paving the way for the development of more efficient, reliable, and sustainable networks capable of meeting the demands of our increasingly connected world.
△ Less
Submitted 19 May, 2025; v1 submitted 1 April, 2025;
originally announced April 2025.
-
Optimizing Resource Allocation and Energy Efficiency in Federated Fog Computing for IoT
Authors:
Syed Sarmad Shah,
Anas Ali
Abstract:
Fog computing significantly enhances the efficiency of IoT applications by providing computation, storage, and networking resources at the edge of the network. In this paper, we propose a federated fog computing framework designed to optimize resource management, minimize latency, and reduce energy consumption across distributed IoT environments. Our framework incorporates predictive scheduling, e…
▽ More
Fog computing significantly enhances the efficiency of IoT applications by providing computation, storage, and networking resources at the edge of the network. In this paper, we propose a federated fog computing framework designed to optimize resource management, minimize latency, and reduce energy consumption across distributed IoT environments. Our framework incorporates predictive scheduling, energy-aware resource allocation, and adaptive mobility management strategies. Experimental results obtained from extensive simulations using the OMNeT++ environment demonstrate that our federated approach outperforms traditional non-federated architectures in terms of resource utilization, latency, energy efficiency, task execution time, and scalability. These findings underline the suitability and effectiveness of the proposed framework for supporting sustainable and high-performance IoT services.
△ Less
Submitted 14 June, 2025; v1 submitted 1 April, 2025;
originally announced April 2025.
-
detectGNN: Harnessing Graph Neural Networks for Enhanced Fraud Detection in Credit Card Transactions
Authors:
Irin Sultana,
Syed Mustavi Maheen,
Naresh Kshetri,
Md Nasim Fardous Zim
Abstract:
Credit card fraud is a major issue nowadays, costing huge money and affecting trust in financial systems. Traditional fraud detection methods often fail to detect advanced and growing fraud techniques. This study focuses on using Graph Neural Networks (GNNs) to improve fraud detection by analyzing transactions as a network of connected data points, such as accounts, traders, and devices. The propo…
▽ More
Credit card fraud is a major issue nowadays, costing huge money and affecting trust in financial systems. Traditional fraud detection methods often fail to detect advanced and growing fraud techniques. This study focuses on using Graph Neural Networks (GNNs) to improve fraud detection by analyzing transactions as a network of connected data points, such as accounts, traders, and devices. The proposed "detectGNN" model uses advanced features like time-based patterns and dynamic updates to expose hidden fraud and improve detection accuracy. Tests show that GNNs perform better than traditional methods in finding complex and multi-layered fraud. The model also addresses real-time processing, data imbalance, and privacy concerns, making it practical for real-world use. This research shows that GNNs can provide a powerful, accurate, and a scalable solution for detecting fraud. Future work will focus on making the models easier to understand, privacy-friendly, and adaptable to new types of fraud, ensuring safer financial transactions in the digital world.
△ Less
Submitted 8 February, 2025;
originally announced March 2025.
-
On the Utility of Quantum Entanglement for Joint Communication and Instantaneous Detection
Authors:
Yuhang Yao,
Syed A. Jafar
Abstract:
Entanglement is known to significantly improve the performance (separately) of communication and detection schemes that utilize quantum resources. This work explores the simultaneous utility of quantum entanglement for (joint) communication and detection schemes, over channels that are convex combinations of identity, depolarization and erasure operators, both with perfect and imperfect entangleme…
▽ More
Entanglement is known to significantly improve the performance (separately) of communication and detection schemes that utilize quantum resources. This work explores the simultaneous utility of quantum entanglement for (joint) communication and detection schemes, over channels that are convex combinations of identity, depolarization and erasure operators, both with perfect and imperfect entanglement assistance. The channel state is binary, rapidly time-varying and unknown to the transmitter. While the communication is delay-tolerant, allowing the use of arbitrarily long codewords to ensure reliable decoding, the channel state detection is required to be instantaneous. The detector is neither co-located with the transmitter, nor able to wait for the decoding in order to learn the transmitted waveform. The results of this work appear in the form of communication-rate vs instantaneous-detection-error tradeoffs, with and without quantum entanglement. Despite the challenges that place the two tasks at odds with each other, the results indicate that quantum entanglement can indeed be simultaneously and significantly beneficial for joint communication and instantaneous detection.
△ Less
Submitted 26 March, 2025;
originally announced March 2025.
-
Exploiting Temporal State Space Sharing for Video Semantic Segmentation
Authors:
Syed Ariff Syed Hesham,
Yun Liu,
Guolei Sun,
Henghui Ding,
Jing Yang,
Ender Konukoglu,
Xue Geng,
Xudong Jiang
Abstract:
Video semantic segmentation (VSS) plays a vital role in understanding the temporal evolution of scenes. Traditional methods often segment videos frame-by-frame or in a short temporal window, leading to limited temporal context, redundant computations, and heavy memory requirements. To this end, we introduce a Temporal Video State Space Sharing (TV3S) architecture to leverage Mamba state space mode…
▽ More
Video semantic segmentation (VSS) plays a vital role in understanding the temporal evolution of scenes. Traditional methods often segment videos frame-by-frame or in a short temporal window, leading to limited temporal context, redundant computations, and heavy memory requirements. To this end, we introduce a Temporal Video State Space Sharing (TV3S) architecture to leverage Mamba state space models for temporal feature sharing. Our model features a selective gating mechanism that efficiently propagates relevant information across video frames, eliminating the need for a memory-heavy feature pool. By processing spatial patches independently and incorporating shifted operation, TV3S supports highly parallel computation in both training and inference stages, which reduces the delay in sequential state space processing and improves the scalability for long video sequences. Moreover, TV3S incorporates information from prior frames during inference, achieving long-range temporal coherence and superior adaptability to extended sequences. Evaluations on the VSPW and Cityscapes datasets reveal that our approach outperforms current state-of-the-art methods, establishing a new standard for VSS with consistent results across long video sequences. By achieving a good balance between accuracy and efficiency, TV3S shows a significant advancement in spatiotemporal modeling, paving the way for efficient video analysis. The code is publicly available at https://github.com/Ashesham/TV3S.git.
△ Less
Submitted 25 March, 2025;
originally announced March 2025.
-
A natural MSSM from a novel $\mathsf{SO(10)}$, Yukawa unification, light sparticles, and SUSY implications at LHC
Authors:
Jinzheng Li,
Pran Nath,
Raza M. Syed
Abstract:
The $\mathsf{SO(10)}$ model with a heavy Higgs spectrum consisting of $\mathsf{560+\overline{560}}$ and a light Higgs spectrum consisting of $2\mathsf{\times 10+320}$ plet representations of $\mathsf{SO(10)}$ is unique among $\mathsf{SO(10)}$ models.,It has the remarkable property that VEVs of $\mathsf{560}$ and $\mathsf{\overline{560}}$ can simultaneously reduce the rank of the gauge group and fu…
▽ More
The $\mathsf{SO(10)}$ model with a heavy Higgs spectrum consisting of $\mathsf{560+\overline{560}}$ and a light Higgs spectrum consisting of $2\mathsf{\times 10+320}$ plet representations of $\mathsf{SO(10)}$ is unique among $\mathsf{SO(10)}$ models.,It has the remarkable property that VEVs of $\mathsf{560}$ and $\mathsf{\overline{560}}$ can simultaneously reduce the rank of the gauge group and further reduce the remaining symmetry down to the standard model gauge group. Additionally, on mixing with the light fields all the Higgs fields become heavy except for one pair of light Higgs doublets just as in MSSM. This model has not been fully explored thus far because of the technical difficulty of computing the couplings of the heavy and the light Higgs sectors, specifically the interaction $(\mathsf{560\times 560)\cdot 320}$ involving the coupling of tensor-spinors with a third rank ~mixed tensor $\mathsf{320}$. An explicit analysis of such couplings is given in this paper. Spontaneous symmetry breaking of the $\mathsf{SO(10)}$ symmetry is carried out reducing the gauge group to $\mathsf{SU(3)}_c\times \mathsf{SU(2)}_L\times \mathsf{U(1)}_Y$ with just one just pair of light Higgs. Thus a natural deduction of MSSM arises from the $\mathsf{SO(10)}$ model with no fine tuning needed. Further, it is shown that the light Higgs doublet of the model is a linear combination of the Higgs doublet fields of the $2\mathsf{\times 10}$ and the $\mathsf{320}$ Higgs fields. It is shown that in this class of $\mathsf{SO(10)}$ models $b-t-τ$ unification can be achieved with $\tanβ$ as low as 5-10. An analysis of the sparticle spectrum within ${\tilde g}$SUGRA renormalization group evolution is given which leads to a bi-modal sparticle spectrum consisting of a compressed low mass spectrum for sleptons and weakinos and a high mass spectrum of gluino, squarks, and heavy Higgs.LHC.
△ Less
Submitted 25 March, 2025;
originally announced March 2025.
-
AssertionForge: Enhancing Formal Verification Assertion Generation with Structured Representation of Specifications and RTL
Authors:
Yunsheng Bai,
Ghaith Bany Hamad,
Syed Suhaib,
Haoxing Ren
Abstract:
Generating SystemVerilog Assertions (SVAs) from natural language specifications remains a major challenge in formal verification (FV) due to the inherent ambiguity and incompleteness of specifications. Existing LLM-based approaches, such as AssertLLM, focus on extracting information solely from specification documents, often failing to capture essential internal signal interactions and design deta…
▽ More
Generating SystemVerilog Assertions (SVAs) from natural language specifications remains a major challenge in formal verification (FV) due to the inherent ambiguity and incompleteness of specifications. Existing LLM-based approaches, such as AssertLLM, focus on extracting information solely from specification documents, often failing to capture essential internal signal interactions and design details present in the RTL code, leading to incomplete or incorrect assertions. We propose a novel approach that constructs a Knowledge Graph (KG) from both specifications and RTL, using a hardware-specific schema with domain-specific entity and relation types. We create an initial KG from the specification and then systematically fuse it with information extracted from the RTL code, resulting in a unified, comprehensive KG. This combined representation enables a more thorough understanding of the design and allows for a multi-resolution context synthesis process which is designed to extract diverse verification contexts from the KG. Experiments on four designs demonstrate that our method significantly enhances SVA quality over prior methods. This structured representation not only improves FV but also paves the way for future research in tasks like code generation and design understanding.
△ Less
Submitted 14 May, 2025; v1 submitted 24 March, 2025;
originally announced March 2025.
-
SafeMERGE: Preserving Safety Alignment in Fine-Tuned Large Language Models via Selective Layer-Wise Model Merging
Authors:
Aladin Djuhera,
Swanand Ravindra Kadhe,
Farhan Ahmed,
Syed Zawad,
Holger Boche
Abstract:
Fine-tuning large language models (LLMs) on downstream tasks can inadvertently erode their safety alignment, even for benign fine-tuning datasets. We address this challenge by proposing SafeMERGE, a post-fine-tuning framework that preserves safety while maintaining task utility. It achieves this by selectively merging fine-tuned and safety-aligned model layers only when those deviate from safe beh…
▽ More
Fine-tuning large language models (LLMs) on downstream tasks can inadvertently erode their safety alignment, even for benign fine-tuning datasets. We address this challenge by proposing SafeMERGE, a post-fine-tuning framework that preserves safety while maintaining task utility. It achieves this by selectively merging fine-tuned and safety-aligned model layers only when those deviate from safe behavior, measured by a cosine similarity criterion. We evaluate SafeMERGE against other fine-tuning- and post-fine-tuning-stage approaches for Llama-2-7B-Chat and Qwen-2-7B-Instruct models on GSM8K and PubMedQA tasks while exploring different merging strategies. We find that SafeMERGE consistently reduces harmful outputs compared to other baselines without significantly sacrificing performance, sometimes even enhancing it. The results suggest that our selective, subspace-guided, and per-layer merging method provides an effective safeguard against the inadvertent loss of safety in fine-tuned LLMs while outperforming simpler post-fine-tuning-stage defenses.
△ Less
Submitted 21 March, 2025;
originally announced March 2025.
-
Joint Self-Supervised Video Alignment and Action Segmentation
Authors:
Ali Shah Ali,
Syed Ahmed Mahmood,
Mubin Saeed,
Andrey Konin,
M. Zeeshan Zia,
Quoc-Huy Tran
Abstract:
We introduce a novel approach for simultaneous self-supervised video alignment and action segmentation based on a unified optimal transport framework. In particular, we first tackle self-supervised video alignment by developing a fused Gromov-Wasserstein optimal transport formulation with a structural prior, which trains efficiently on GPUs and needs only a few iterations for solving the optimal t…
▽ More
We introduce a novel approach for simultaneous self-supervised video alignment and action segmentation based on a unified optimal transport framework. In particular, we first tackle self-supervised video alignment by developing a fused Gromov-Wasserstein optimal transport formulation with a structural prior, which trains efficiently on GPUs and needs only a few iterations for solving the optimal transport problem. Our single-task method achieves the state-of-the-art performance on multiple video alignment benchmarks and outperforms VAVA, which relies on a traditional Kantorovich optimal transport formulation with an optimality prior. Furthermore, we extend our approach by proposing a unified optimal transport framework for joint self-supervised video alignment and action segmentation, which requires training and storing a single model and saves both time and memory consumption as compared to two different single-task models. Extensive evaluations on several video alignment and action segmentation datasets demonstrate that our multi-task method achieves comparable video alignment yet superior action segmentation results over previous methods in video alignment and action segmentation respectively. Finally, to the best of our knowledge, this is the first work to unify video alignment and action segmentation into a single model.
△ Less
Submitted 21 March, 2025;
originally announced March 2025.
-
CAM-Seg: A Continuous-valued Embedding Approach for Semantic Image Generation
Authors:
Masud Ahmed,
Zahid Hasan,
Syed Arefinul Haque,
Abu Zaher Md Faridee,
Sanjay Purushotham,
Suya You,
Nirmalya Roy
Abstract:
Traditional transformer-based semantic segmentation relies on quantized embeddings. However, our analysis reveals that autoencoder accuracy on segmentation mask using quantized embeddings (e.g. VQ-VAE) is 8% lower than continuous-valued embeddings (e.g. KL-VAE). Motivated by this, we propose a continuous-valued embedding framework for semantic segmentation. By reformulating semantic mask generatio…
▽ More
Traditional transformer-based semantic segmentation relies on quantized embeddings. However, our analysis reveals that autoencoder accuracy on segmentation mask using quantized embeddings (e.g. VQ-VAE) is 8% lower than continuous-valued embeddings (e.g. KL-VAE). Motivated by this, we propose a continuous-valued embedding framework for semantic segmentation. By reformulating semantic mask generation as a continuous image-to-embedding diffusion process, our approach eliminates the need for discrete latent representations while preserving fine-grained spatial and semantic details. Our key contribution includes a diffusion-guided autoregressive transformer that learns a continuous semantic embedding space by modeling long-range dependencies in image features. Our framework contains a unified architecture combining a VAE encoder for continuous feature extraction, a diffusion-guided transformer for conditioned embedding generation, and a VAE decoder for semantic mask reconstruction. Our setting facilitates zero-shot domain adaptation capabilities enabled by the continuity of the embedding space. Experiments across diverse datasets (e.g., Cityscapes and domain-shifted variants) demonstrate state-of-the-art robustness to distribution shifts, including adverse weather (e.g., fog, snow) and viewpoint variations. Our model also exhibits strong noise resilience, achieving robust performance ($\approx$ 95% AP compared to baseline) under gaussian noise, moderate motion blur, and moderate brightness/contrast variations, while experiencing only a moderate impact ($\approx$ 90% AP compared to baseline) from 50% salt and pepper noise, saturation and hue shifts. Code available: https://github.com/mahmed10/CAMSS.git
△ Less
Submitted 19 March, 2025;
originally announced March 2025.
-
AI-driven Uncertainty Quantification & Multi-Physics Approach to Evaluate Cladding Materials in a Microreactor
Authors:
Alex Foutch,
Kazuma Kobayashi,
Ayodeji Alajo,
Dinesh Kumar,
Syed Bahauddin Alam
Abstract:
The pursuit of enhanced nuclear safety has spurred the development of accident-tolerant cladding (ATC) materials for light water reactors (LWRs). This study investigates the potential of repurposing these ATCs in advanced reactor designs, aiming to expedite material development and reduce costs. The research employs a multi-physics approach, encompassing neutronics, heat transfer, thermodynamics,…
▽ More
The pursuit of enhanced nuclear safety has spurred the development of accident-tolerant cladding (ATC) materials for light water reactors (LWRs). This study investigates the potential of repurposing these ATCs in advanced reactor designs, aiming to expedite material development and reduce costs. The research employs a multi-physics approach, encompassing neutronics, heat transfer, thermodynamics, and structural mechanics, to evaluate four candidate materials (Haynes 230, Zircaloy-4, FeCrAl, and SiC-SiC) within the context of a high-temperature, sodium-cooled microreactor, exemplified by the Kilopower design. While neutronic simulations revealed negligible power profile variations among the materials, finite element analyses highlighted the superior thermal stability of SiC-SiC and the favorable stress resistance of Haynes 230. The high-temperature environment significantly impacted material performance, particularly for Zircaloy-4 and FeCrAl, while SiC-SiC's inherent properties limited its ability to withstand stress loads. Additionally, AI-driven uncertainty quantification and sensitivity analysis were conducted to assess the influence of material property variations on maximum hoop stress. The findings underscore the need for further research into high-temperature material properties to facilitate broader applicability of existing materials to advanced reactors. Haynes 230 is identified as the most promising candidate based on the evaluated criteria.
△ Less
Submitted 18 March, 2025;
originally announced March 2025.