Skip to main content

Showing 1–11 of 11 results for author: Belal, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2412.00622  [pdf, other

    cs.CV cs.AI cs.LG

    Visual Modality Prompt for Adapting Vision-Language Object Detectors

    Authors: Heitor R. Medeiros, Atif Belal, Srikanth Muralidharan, Eric Granger, Marco Pedersoli

    Abstract: The zero-shot performance of object detectors degrades when tested on different modalities, such as infrared and depth. While recent work has explored image translation techniques to adapt detectors to new modalities, these methods are limited to a single modality and apply only to traditional detectors. Recently, vision-language detectors, such as YOLO-World and Grounding DINO, have shown promisi… ▽ More

    Submitted 14 March, 2025; v1 submitted 30 November, 2024; originally announced December 2024.

  2. arXiv:2403.09918  [pdf, other

    cs.CV cs.LG

    Attention-based Class-Conditioned Alignment for Multi-Source Domain Adaptation of Object Detectors

    Authors: Atif Belal, Akhil Meethal, Francisco Perdigon Romero, Marco Pedersoli, Eric Granger

    Abstract: Domain adaptation methods for object detection (OD) strive to mitigate the impact of distribution shifts by promoting feature alignment across source and target domains. Multi-source domain adaptation (MSDA) allows leveraging multiple annotated source datasets and unlabeled target data to improve the accuracy and robustness of the detection model. Most state-of-the-art MSDA methods for OD perform… ▽ More

    Submitted 11 December, 2024; v1 submitted 14 March, 2024; originally announced March 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2309.14950

  3. arXiv:2309.14950  [pdf, other

    cs.CV cs.AI

    Multi-Source Domain Adaptation for Object Detection with Prototype-based Mean-teacher

    Authors: Atif Belal, Akhil Meethal, Francisco Perdigon Romero, Marco Pedersoli, Eric Granger

    Abstract: Adapting visual object detectors to operational target domains is a challenging task, commonly achieved using unsupervised domain adaptation (UDA) methods. Recent studies have shown that when the labeled dataset comes from multiple source domains, treating them as separate domains and performing a multi-source domain adaptation (MSDA) improves the accuracy and robustness over blending these source… ▽ More

    Submitted 31 July, 2024; v1 submitted 26 September, 2023; originally announced September 2023.

  4. arXiv:2307.06979  [pdf, other

    cs.CL

    Tackling Fake News in Bengali: Unraveling the Impact of Summarization vs. Augmentation on Pre-trained Language Models

    Authors: Arman Sakif Chowdhury, G. M. Shahariar, Ahammed Tarik Aziz, Syed Mohibul Alam, Md. Azad Sheikh, Tanveer Ahmed Belal

    Abstract: With the rise of social media and online news sources, fake news has become a significant issue globally. However, the detection of fake news in low resource languages like Bengali has received limited attention in research. In this paper, we propose a methodology consisting of four distinct approaches to classify fake news articles in Bengali using summarization and augmentation techniques with f… ▽ More

    Submitted 14 May, 2024; v1 submitted 13 July, 2023; originally announced July 2023.

    Comments: Under Review

  5. Interpretable Multi Labeled Bengali Toxic Comments Classification using Deep Learning

    Authors: Tanveer Ahmed Belal, G. M. Shahariar, Md. Hasanul Kabir

    Abstract: This paper presents a deep learning-based pipeline for categorizing Bengali toxic comments, in which at first a binary classification model is used to determine whether a comment is toxic or not, and then a multi-label classifier is employed to determine which toxicity type the comment belongs to. For this purpose, we have prepared a manually labeled dataset consisting of 16,073 instances among wh… ▽ More

    Submitted 8 April, 2023; originally announced April 2023.

    Journal ref: 2023 International Conference on Electrical, Computer and Communication Engineering (ECCE)

  6. Knowledge Distillation Methods for Efficient Unsupervised Adaptation Across Multiple Domains

    Authors: Le Thanh Nguyen-Meidine, Atif Belal, Madhu Kiran, Jose Dolz, Louis-Antoine Blais-Morin, Eric Granger

    Abstract: Beyond the complexity of CNNs that require training on large annotated datasets, the domain shift between design and operational data has limited the adoption of CNNs in many real-world applications. For instance, in person re-identification, videos are captured over a distributed set of cameras with non-overlapping viewpoints. The shift between the source (e.g. lab setting) and target (e.g. camer… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

    Comments: This is the extended journal version of arXiv:2005.07839

  7. arXiv:2007.07077  [pdf, other

    cs.CV

    Unsupervised Multi-Target Domain Adaptation Through Knowledge Distillation

    Authors: Le Thanh Nguyen-Meidine, Atif Belal, Madhu Kiran, Jose Dolz, Louis-Antoine Blais-Morin, Eric Granger

    Abstract: Unsupervised domain adaptation (UDA) seeks to alleviate the problem of domain shift between the distribution of unlabeled data from the target domain w.r.t. labeled data from the source domain. While the single-target UDA scenario is well studied in the literature, Multi-Target Domain Adaptation (MTDA) remains largely unexplored despite its practical importance, e.g., in multi-camera video-surveil… ▽ More

    Submitted 19 November, 2020; v1 submitted 14 July, 2020; originally announced July 2020.

    Comments: Accepted for WACV2021

  8. CBAS: context based arabic stemmer

    Authors: Mahmoud El-Defrawy, Yasser El-Sonbaty, Nahla A. Belal

    Abstract: Arabic morphology encapsulates many valuable features such as word root. Arabic roots are being utilized for many tasks; the process of extracting a word root is referred to as stemming. Stemming is an essential part of most Natural Language Processing tasks, especially for derivative languages such as Arabic. However, stemming is faced with the problem of ambiguity, where two or more roots could… ▽ More

    Submitted 28 October, 2015; originally announced November 2016.

    Journal ref: International Journal on Natural Language Computing (IJNLC) Vol. 4, No.3, June 2015

  9. arXiv:cs/0607138  [pdf

    cs.AI cs.LG

    A Foundation to Perception Computing, Logic and Automata

    Authors: Mohamed A. Belal

    Abstract: In this report, a novel approach to intelligence and learning is introduced, this approach is based on what we call 'perception logic'. Based on this logic, a computing mechanism and automata are introduced. Multi-resolution analysis of perceptual information is given, in which learning is accomplished in at most O(log(N))epochs, where N is the number of samples, and the convergence is guarnteed… ▽ More

    Submitted 30 July, 2006; originally announced July 2006.

    Comments: 39 pages, pdf format, to be published

    ACM Class: I.2.0; I.2.6

  10. arXiv:cs/0509015  [pdf, other

    cs.DS cs.IT

    Optimal Prefix Codes with Fewer Distinct Codeword Lengths are Faster to Construct

    Authors: Ahmed Belal, Amr Elmasry

    Abstract: A new method for constructing minimum-redundancy binary prefix codes is described. Our method does not explicitly build a Huffman tree; instead it uses a property of optimal prefix codes to compute the codeword lengths corresponding to the input weights. Let $n$ be the number of weights and $k$ be the number of distinct codeword lengths as produced by the algorithm for the optimum codes. The runni… ▽ More

    Submitted 29 September, 2016; v1 submitted 6 September, 2005; originally announced September 2005.

    Comments: 23 pages, a preliminary version appeared in STACS 2006

  11. arXiv:cs/0403023  [pdf

    cs.CR

    Secure Transmission of Sensitive data using multiple channels

    Authors: Ahmed A. Belal, Abdelhamid S. Abdelhamid

    Abstract: A new scheme for transmitting sensitive data is proposed, the proposed scheme depends on partitioning the output of a block encryption module using the Chinese Remainder Theorem among a set of channels. The purpose of using the Chinese Remainder Theorem is to hide the cipher text in order to increase the difficulty of attacking the cipher. The theory, implementation and the security of this sche… ▽ More

    Submitted 14 March, 2004; originally announced March 2004.

    Comments: 5 pages

    ACM Class: C.2.0