Skip to main content

Showing 1–20 of 20 results for author: Asghar, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.05718  [pdf

    cs.CY cs.LG

    Using agent-based models and EXplainable Artificial Intelligence (XAI) to simulate social behaviors and policy intervention scenarios: A case study of private well users in Ireland

    Authors: Rabia Asghar, Simon Mooney, Eoin O Neill, Paul Hynds

    Abstract: Around 50 percent of Irelands rural population relies on unregulated private wells vulnerable to agricultural runoff and untreated wastewater. High national rates of Shiga toxin-producing Escherichia coli (STEC) and other waterborne illnesses have been linked to well water exposure. Periodic well testing is essential for public health, yet the lack of government incentives places the financial bur… ▽ More

    Submitted 8 February, 2025; originally announced February 2025.

  2. arXiv:2409.13442  [pdf

    eess.IV cs.CV cs.LG

    Automatic Classification of White Blood Cell Images using Convolutional Neural Network

    Authors: Rabia Asghar, Arslan Shaukat, Usman Akram, Rimsha Tariq

    Abstract: Human immune system contains white blood cells (WBC) that are good indicator of many diseases like bacterial infections, AIDS, cancer, spleen, etc. White blood cells have been sub classified into four types: monocytes, lymphocytes, eosinophils and neutrophils on the basis of their nucleus, shape and cytoplasm. Traditionally in laboratories, pathologists and hematologists analyze these blood cells… ▽ More

    Submitted 14 October, 2024; v1 submitted 19 September, 2024; originally announced September 2024.

  3. arXiv:2407.15675  [pdf, other

    cs.CV cs.AI cs.RO

    Flow-guided Motion Prediction with Semantics and Dynamic Occupancy Grid Maps

    Authors: Rabbia Asghar, Wenqian Liu, Lukas Rummelhard, Anne Spalanzani, Christian Laugier

    Abstract: Accurate prediction of driving scenes is essential for road safety and autonomous driving. Occupancy Grid Maps (OGMs) are commonly employed for scene prediction due to their structured spatial representation, flexibility across sensor modalities and integration of uncertainty. Recent studies have successfully combined OGMs with deep learning methods to predict the evolution of scene and learn comp… ▽ More

    Submitted 22 July, 2024; originally announced July 2024.

    Comments: Accepted for publication at the 27th IEEE International Conference on Intelligent Transportation Systems (ITSC) (ITSC 2024)

  4. arXiv:2308.06300  [pdf

    eess.IV cs.CV cs.LG

    Classification of All Blood Cell Images using ML and DL Models

    Authors: Rabia Asghar, Sanjay Kumar, Paul Hynds, Abeera Mahfooz

    Abstract: Human blood primarily comprises plasma, red blood cells, white blood cells, and platelets. It plays a vital role in transporting nutrients to different organs, where it stores essential health-related data about the human body. Blood cells are utilized to defend the body against diverse infections, including fungi, viruses, and bacteria. Hence, blood analysis can help physicians assess an individu… ▽ More

    Submitted 7 October, 2024; v1 submitted 11 August, 2023; originally announced August 2023.

    Comments: 15

  5. arXiv:2308.06296  [pdf

    eess.IV cs.CV cs.LG q-bio.QM

    Classification of White Blood Cells Using Machine and Deep Learning Models: A Systematic Review

    Authors: Rabia Asghar, Sanjay Kumar, Paul Hynds, Arslan Shaukat

    Abstract: Machine learning (ML) and deep learning (DL) models have been employed to significantly improve analyses of medical imagery, with these approaches used to enhance the accuracy of prediction and classification. Model predictions and classifications assist diagnoses of various cancers and tumors. This review presents an in-depth analysis of modern techniques applied within the domain of medical imag… ▽ More

    Submitted 21 August, 2023; v1 submitted 11 August, 2023; originally announced August 2023.

  6. arXiv:2308.04303  [pdf, other

    cs.CV cs.AI cs.RO

    Vehicle Motion Forecasting using Prior Information and Semantic-assisted Occupancy Grid Maps

    Authors: Rabbia Asghar, Manuel Diaz-Zapata, Lukas Rummelhard, Anne Spalanzani, Christian Laugier

    Abstract: Motion prediction is a challenging task for autonomous vehicles due to uncertainty in the sensor data, the non-deterministic nature of future, and complex behavior of agents. In this paper, we tackle this problem by representing the scene as dynamic occupancy grid maps (DOGMs), associating semantic labels to the occupied cells and incorporating map information. We propose a novel framework that co… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

    Comments: Accepted to the 2023 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2023)

  7. arXiv:2304.05590  [pdf, other

    cs.CR

    Zero-Knowledge Proof-based Practical Federated Learning on Blockchain

    Authors: Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar

    Abstract: Since the concern of privacy leakage extremely discourages user participation in sharing data, federated learning has gradually become a promising technique for both academia and industry for achieving collaborative learning without leaking information about the local data. Unfortunately, most federated learning solutions cannot efficiently verify the execution of each participant's local machine… ▽ More

    Submitted 24 April, 2023; v1 submitted 11 April, 2023; originally announced April 2023.

  8. arXiv:2301.04454  [pdf, other

    cs.CV cs.AI cs.RO

    Allo-centric Occupancy Grid Prediction for Urban Traffic Scene Using Video Prediction Networks

    Authors: Rabbia Asghar, Lukas Rummelhard, Anne Spalanzani, Christian Laugier

    Abstract: Prediction of dynamic environment is crucial to safe navigation of an autonomous vehicle. Urban traffic scenes are particularly challenging to forecast due to complex interactions between various dynamic agents, such as vehicles and vulnerable road users. Previous approaches have used egocentric occupancy grid maps to represent and predict dynamic environments. However, these predictions suffer fr… ▽ More

    Submitted 11 January, 2023; originally announced January 2023.

    Comments: ICARCV 2022-17th International Conference on Control, Automation, Robotics and Vision

  9. arXiv:2011.02607  [pdf, ps, other

    cs.CR

    Towards a Theory of Special-purpose Program Obfuscation

    Authors: Muhammad Rizwan Asghar, Steven Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig

    Abstract: Most recent theoretical literature on program obfuscation is based on notions like Virtual Black Box (VBB) obfuscation and indistinguishability Obfuscation (iO). These notions are very strong and are hard to satisfy. Further, they offer far more protection than is typically required in practical applications. On the other hand, the security notions introduced by software security researchers are s… ▽ More

    Submitted 4 November, 2020; originally announced November 2020.

    Comments: A full version of our TrustCom 2020 work

  10. arXiv:1909.11624  [pdf, other

    cs.CR

    Privacy-preserving Searchable Databases with Controllable Leakage

    Authors: Shujie Cui, Xiangfu Song, Muhammad Rizwan Asghar, Steven D Galbraith, Giovanni Russello

    Abstract: Searchable Encryption (SE) is a technique that allows Cloud Service Providers (CSPs) to search over encrypted datasets without learning the content of queries and records. In recent years, many SE schemes have been proposed to protect outsourced data from CSPs. Unfortunately, most of them leak sensitive information, from which the CSPs could still infer the content of queries and records by mounti… ▽ More

    Submitted 26 September, 2019; v1 submitted 25 September, 2019; originally announced September 2019.

    Comments: 16 pages, 6 figures, Journal

  11. arXiv:1905.07273  [pdf, other

    cs.CR cs.AI cs.CV

    Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection

    Authors: Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac

    Abstract: Advanced attack campaigns span across multiple stages and stay stealthy for long time periods. There is a growing trend of attackers using off-the-shelf tools and pre-installed system applications (such as \emph{powershell} and \emph{wmic}) to evade the detection because the same tools are also used by system administrators and security analysts for legitimate purposes for their routine tasks. To… ▽ More

    Submitted 20 May, 2019; v1 submitted 16 May, 2019; originally announced May 2019.

    Comments: Preprint: Modified, Extended Version will be presented at TrustCom 2019

  12. arXiv:1805.05033  [pdf, other

    cs.CR

    AuthStore: Password-based Authentication and Encrypted Data Storage in Untrusted Environments

    Authors: Clemens Zeidler, Muhammad Rizwan Asghar

    Abstract: Passwords are widely used for client to server authentication as well as for encrypting data stored in untrusted environments, such as cloud storage. Both, authentication and encrypted cloud storage, are usually discussed in isolation. In this work, we propose AuthStore, a flexible authentication framework that allows users to securely reuse passwords for authentication as well as for encrypted cl… ▽ More

    Submitted 14 May, 2018; originally announced May 2018.

    Comments: 8 pages, 3 figures, 1 table

  13. arXiv:1711.00546  [pdf, other

    cs.CY

    A Review of Privacy and Consent Management in Healthcare: A Focus on Emerging Data Sources

    Authors: Muhammad Rizwan Asghar, TzeHowe Lee, Mirza Mansoor Baig, Ehsan Ullah, Giovanni Russello, Gillian Dobbie

    Abstract: The emergence of New Data Sources (NDS) in healthcare is revolutionising traditional electronic health records in terms of data availability, storage, and access. Increasingly, clinicians are using NDS to build a virtual holistic image of a patient's health condition. This research is focused on a review and analysis of the current legislation and privacy rules available for healthcare professiona… ▽ More

    Submitted 1 November, 2017; originally announced November 2017.

    Comments: 5 pages, The 13th IEEE International Conference on eScience - Safe Data Workshop

  14. arXiv:1612.01787  [pdf, ps, other

    cs.CR

    PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale

    Authors: Muhammad Rizwan Asghar, Michael Backes, Milivoj Simeonovski

    Abstract: The management of identities on the Internet has evolved from the traditional approach (where each service provider stores and manages identities) to a federated identity management system (where the identity management is delegated to a set of identity providers). On the one hand, federated identity ensures usability and provides economic benefits to service providers. On the other hand, it poses… ▽ More

    Submitted 6 December, 2016; originally announced December 2016.

  15. arXiv:1608.05538  [pdf, ps, other

    cs.CR

    A Survey on Routing in Anonymous Communication Protocols

    Authors: Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, Claudia Diaz

    Abstract: The Internet has undergone dramatic changes in the past 15 years, and now forms a global communication platform that billions of users rely on for their daily activities. While this transformation has brought tremendous benefits to society, it has also created new threats to online privacy, ranging from profiling of users for monetizing personal information to nearly omnipotent governmental survei… ▽ More

    Submitted 19 August, 2016; originally announced August 2016.

    Comments: 24 pages, 4 tables, 4 figures

  16. arXiv:1506.06033  [pdf, ps, other

    cs.CR cs.CY cs.IR

    Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

    Authors: Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel

    Abstract: Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contain personal information -- either intentionally released by the person herself, or unintentionally leaked or published by third parties, often with detrimental effects on the individual's privacy. To grant individuals the ability t… ▽ More

    Submitted 19 June, 2015; originally announced June 2015.

  17. arXiv:1312.6393  [pdf, ps, other

    cs.CR

    Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments

    Authors: Muhammad Rizwan Asghar

    Abstract: The enforcement of sensitive policies in untrusted environments is still an open challenge for policy-based systems. On the one hand, taking any appropriate security decision requires access to these policies. On the other hand, if such access is allowed in an untrusted environment then confidential information might be leaked by the policies. The key challenge is how to enforce sensitive policies… ▽ More

    Submitted 22 December, 2013; originally announced December 2013.

    Comments: Ph.D. Dissertation. http://eprints-phd.biblio.unitn.it/1124/

  18. arXiv:1309.2869  [pdf, other

    cs.CY

    ACTORS: A Goal-driven Approach for Capturing and Managing Consent in e-Health Systems

    Authors: Muhammad Rizwan Asghar, Giovanni Russello

    Abstract: The notion of patient's consent plays a major role in granting access to medical data. In typical healthcare systems, consent is captured by a form that the patient has to fill in and sign. In e-Health systems, the paper-form consent is being replaced by the integration of the notion of consent in the mechanisms that regulate the access to the medical data. This helps in empowering the patient wit… ▽ More

    Submitted 11 September, 2013; originally announced September 2013.

    Comments: The final version of this paper has been published at POLICY 2012

  19. arXiv:1308.3489  [pdf, other

    cs.CR

    ESPOON$_{ERBAC}$: Enforcing Security Policies In Outsourced Environments

    Authors: Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo

    Abstract: Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of service than in-house solutions. Despite all its benefits, data outsourcing raises serious security concerns for preserving data confidentiality. Th… ▽ More

    Submitted 15 August, 2013; originally announced August 2013.

    Comments: The final version of this paper has been accepted for publication in Elsevier Computers & Security 2013. arXiv admin note: text overlap with arXiv:1306.4828

  20. arXiv:1306.4828  [pdf, other

    cs.CR

    ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments

    Authors: Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo

    Abstract: The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies. However, if such access is allowed in an untrusted environment then confidential information might be leaked by the policies. Current solutions are based on cryptographic operations that embed… ▽ More

    Submitted 20 June, 2013; originally announced June 2013.

    Comments: The final version of this paper has been published at ARES 2011