Skip to main content

Showing 1–11 of 11 results for author: Bashir, A K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.15044  [pdf, other

    cs.LG cs.AI

    From Overfitting to Robustness: Quantity, Quality, and Variety Oriented Negative Sample Selection in Graph Contrastive Learning

    Authors: Adnan Ali, Jinlong Li, Huanhuan Chen, Ali Kashif Bashir

    Abstract: Graph contrastive learning (GCL) aims to contrast positive-negative counterparts to learn the node embeddings, whereas graph data augmentation methods are employed to generate these positive-negative samples. The variation, quantity, and quality of negative samples compared to positive samples play crucial roles in learning meaningful embeddings for node classification downstream tasks. Less varia… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  2. arXiv:2310.13483  [pdf

    cs.CV cs.AI

    Application of deep learning for livestock behaviour recognition: A systematic literature review

    Authors: Ali Rohan, Muhammad Saad Rafaq, Md. Junayed Hasan, Furqan Asghar, Ali Kashif Bashir, Tania Dottorini

    Abstract: Livestock health and welfare monitoring has traditionally been a labor-intensive task performed manually. Recent advances have led to the adoption of AI and computer vision techniques, particularly deep learning models, as decision-making tools within the livestock industry. These models have been employed for tasks like animal identification, tracking, body part recognition, and species classific… ▽ More

    Submitted 20 October, 2023; originally announced October 2023.

  3. arXiv:2304.00524  [pdf, other

    cs.CY cs.AI

    A Survey on Federated Learning for the Healthcare Metaverse: Concepts, Applications, Challenges, and Future Directions

    Authors: Ali Kashif Bashir, Nancy Victor, Sweta Bhattacharya, Thien Huynh-The, Rajeswari Chengoden, Gokul Yenduri, Praveen Kumar Reddy Maddikunta, Quoc-Viet Pham, Thippa Reddy Gadekallu, Madhusanka Liyanage

    Abstract: Recent technological advancements have considerately improved healthcare systems to provide various intelligent healthcare services and improve the quality of life. Federated learning (FL), a new branch of artificial intelligence (AI), opens opportunities to deal with privacy issues in healthcare systems and exploit data and computing resources available at distributed devices. Additionally, the M… ▽ More

    Submitted 4 April, 2023; v1 submitted 2 April, 2023; originally announced April 2023.

    Comments: Submitted to peer review

  4. arXiv:2202.01966  [pdf, other

    cs.NI cs.LG eess.SP

    Predictive Closed-Loop Service Automation in O-RAN based Network Slicing

    Authors: Joseph Thaliath, Solmaz Niknam, Sukhdeep Singh, Rahul Banerji, Navrati Saxena, Harpreet S. Dhillon, Jeffrey H. Reed, Ali Kashif Bashir, Avinash Bhat, Abhishek Roy

    Abstract: Network slicing provides introduces customized and agile network deployment for managing different service types for various verticals under the same infrastructure. To cater to the dynamic service requirements of these verticals and meet the required quality-of-service (QoS) mentioned in the service-level agreement (SLA), network slices need to be isolated through dedicated elements and resources… ▽ More

    Submitted 3 February, 2022; originally announced February 2022.

    Comments: 7 pages, 3 figures, 1 table

  5. arXiv:2102.00835   

    cs.IR cs.AI

    Implicit Feedback-based Group Recommender System for Internet of Thing Applications

    Authors: Zhiwei Guo, Keping Yu, Tan Guo, Ali Kashif Bashir, Muhammad Imran, Mohsen Guizani

    Abstract: With the prevalence of Internet of Things (IoT)-based social media applications, the distance among people has been greatly shortened. As a result, recommender systems in IoT-based social media need to be developed oriented to groups of users rather than individual users. However, existing methods were highly dependent on explicit preference feedbacks, ignoring scenarios of implicit feedback. To r… ▽ More

    Submitted 23 April, 2021; v1 submitted 29 January, 2021; originally announced February 2021.

    Comments: I don't want to share this paper

  6. arXiv:2003.01519  [pdf, other

    eess.AS cs.LG cs.SD eess.SP stat.ML

    Amateur Drones Detection: A machine learning approach utilizing the acoustic signals in the presence of strong interference

    Authors: Zahoor Uddin, Muhammad Altaf, Muhammad Bilal, Lewis Nkenyereye, Ali Kashif Bashir

    Abstract: Owing to small size, sensing capabilities and autonomous nature, the Unmanned Air Vehicles (UAVs) have enormous applications in various areas, e.g., remote sensing, navigation, archaeology, journalism, environmental science, and agriculture. However, the unmonitored deployment of UAVs called the amateur drones (AmDr) can lead to serious security threats and risk to human life and infrastructure. T… ▽ More

    Submitted 28 February, 2020; originally announced March 2020.

    Comments: 25 pages, 10 figures, accepted for the publication in future issue of "Computer Communications (2020)"

    MSC Class: 68T45; 68T10; 62H30; ACM Class: C.2; C.2.4; G.3

  7. A Quantum Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario

    Authors: Rajakumar Arul, Gunasekaran Raja, Alaa Omran Almagrabi, Mohammed Saeed Alkatheiri, Chauhdary Sajjad Hussain, Ali Kashif Bashir

    Abstract: Millions of devices are going to participate in 5G producing a huge space for security threats. The 5G specification goals require rigid and robust security protocol against such threats. Quantum cryptography is a recently emerged term in which we test the robustness of security protocols against Quantum computers. Therefore, in this paper, we propose a security protocol called Quantum Key GRID fo… ▽ More

    Submitted 2 November, 2019; originally announced November 2019.

    Comments: 9 PAGES, 9 FIGURES

  8. A Console GRID LA Console GRID Leveraged Authentication and Key Agreement Mechanism for LTE/SAE

    Authors: Rajakumar Arul, Gunasekaran Raja, Ali Kashif Bashir, Junaid Chaudry, Amjad Ali

    Abstract: The growing popularity of multimedia applications, pervasive connectivity, higher bandwidth, and euphoric technology penetration among the bulk of the human race that happens to be cellular technology users, has fueled the adaptation to Long Term Evolution (LTE)/ System Architecture Evolution (SAE). The LTE fulfills the resource demands of the next generation applications for now. We identify secu… ▽ More

    Submitted 18 May, 2019; originally announced May 2019.

    Comments: 12 pages, 11 figures,

    Journal ref: IEEE Transactions on Industrial Informatics, 2017

  9. Socially-Aware Congestion Control in Ad-Hoc Networks: Current Status and The Way Forward

    Authors: Hannan Bin Liaqat, Amjad Ali, Junaid Qadir, Ali Kashif Bashir, Muhammad Bilal, Fiaz Majeed

    Abstract: Ad-hoc social networks (ASNETs) represent a special type of traditional ad-hoc network in which a user's social properties (such as the social connections and communications metadata as well as application data) are leveraged for offering enhanced services in a distributed infrastructureless environments. However, the wireless medium, due to limited bandwidth, can easily suffer from the problem of… ▽ More

    Submitted 3 March, 2019; originally announced March 2019.

    Comments: 29 pages, 11 figures, accepted for publication in a future issue of the Future Generation Computer Systems

    MSC Class: 68M10; 68M11; 68M12; 68M15; 68M14; 94C15; 68P30; 05Cxx ACM Class: C.2.1; C.2.2; C.2.6; E.1; G.2.2; E.4; G.1.3; I.1

    Journal ref: Future Generation Computer Systems, Volume 97, August 2019, Pages 634-660

  10. arXiv:1903.00846  [pdf, other

    cs.NI cs.CR

    A survey of security and privacy issues in the Internet of Things from the layered context

    Authors: Samundra Deep, Xi Zheng, Alireza Jolfaei, Dongjin Yu, Pouya Ostovari, Ali Kashif Bashir

    Abstract: Internet of Things (IoT) is a novel paradigm, which not only facilitates a large number of devices to be ubiquitously connected over the Internet but also provides a mechanism to remotely control these devices. The IoT is pervasive and is almost an integral part of our daily life. As devices are becoming increasingly connected, privacy and security issues become more and more critical and these ne… ▽ More

    Submitted 24 February, 2020; v1 submitted 3 March, 2019; originally announced March 2019.

  11. arXiv:1706.01739  [pdf, other

    cs.CR cs.CY

    Multi Sensor-based Implicit User Identification

    Authors: Muhammad Ahmad, Ali Kashif Bashir, Adil Mehmood Khan, Manuel Mazzara, Salvatore Distefano, Shahzad Sarfraz

    Abstract: Smartphones have ubiquitously integrated into our home and work environments, however, users normally rely on explicit but inefficient identification processes in a controlled environment. Therefore, when a device is stolen, a thief can have access to the owner's personal information and services against the stored passwords. As a result of this potential scenario, this work proposes an automatic… ▽ More

    Submitted 24 September, 2020; v1 submitted 6 June, 2017; originally announced June 2017.