Skip to main content

Showing 1–10 of 10 results for author: Haque, S M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.00039  [pdf, other

    cs.SI cs.IT physics.soc-ph

    Accurately Estimating Unreported Infections using Information Theory

    Authors: Jiaming Cui, Bijaya Adhikari, Arash Haddadan, A S M Ahsan-Ul Haque, Jilles Vreeken, Anil Vullikanti, B. Aditya Prakash

    Abstract: One of the most significant challenges in combating against the spread of infectious diseases was the difficulty in estimating the true magnitude of infections. Unreported infections could drive up disease spread, making it very hard to accurately estimate the infectivity of the pathogen, therewith hampering our ability to react effectively. Despite the use of surveillance-based methods such as se… ▽ More

    Submitted 26 January, 2025; originally announced February 2025.

  2. Authorship Identification of Source Code Segments Written by Multiple Authors Using Stacking Ensemble Method

    Authors: Parvez Mahbub, Naz Zarreen Oishie, S M Rafizul Haque

    Abstract: Source code segment authorship identification is the task of identifying the author of a source code segment through supervised learning. It has vast importance in plagiarism detection, digital forensics, and several other law enforcement issues. However, when a source code segment is written by multiple authors, typical author identification methods no longer work. Here, an author identification… ▽ More

    Submitted 11 December, 2022; originally announced December 2022.

    Comments: 2019 22nd International Conference on Computer and Information Technology (ICCIT)

  3. Rethinking Conversational Recommendations: Is Decision Tree All You Need?

    Authors: A S M Ahsan-Ul Haque, Hongning Wang

    Abstract: Conversational recommender systems (CRS) dynamically obtain the user preferences via multi-turn questions and answers. The existing CRS solutions are widely dominated by deep reinforcement learning algorithms. However, deep reinforcement learning methods are often criticised for lacking interpretability and requiring a large amount of training data to perform. In this paper, we explore a simpler… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

    Comments: 19 pages, 5 figures

  4. arXiv:2109.02838  [pdf

    cs.HC

    Understanding the Social Determinants of Mental Health of the Undergraduate Students in Bangladesh: Interview Study

    Authors: Ananya Bhattacharjee, S M Taiabul Haque, Abdul Hady, S. M. Raihanul Alam, Mashfiqui Rabbi, Muhammad Ashad Kabir, Syed Ishtiaque Ahmed

    Abstract: Objective: This study aims to identify the social determinants of mental health among undergraduate students in Bangladesh, a developing nation in South Asia. Our goal is to identify the broader social determinants of mental health among this population, study the manifestation of these determinants in their day-to-day life, and explore the feasibility of self-monitoring tools in helping them iden… ▽ More

    Submitted 6 September, 2021; originally announced September 2021.

  5. Reinforcement Learning For Data Poisoning on Graph Neural Networks

    Authors: Jacob Dineen, A S M Ahsan-Ul Haque, Matthew Bielskas

    Abstract: Adversarial Machine Learning has emerged as a substantial subfield of Computer Science due to a lack of robustness in the models we train along with crowdsourcing practices that enable attackers to tamper with data. In the last two years, interest has surged in adversarial attacks on graphs yet the Graph Classification setting remains nearly untouched. Since a Graph Classification dataset consists… ▽ More

    Submitted 12 February, 2021; originally announced February 2021.

  6. Formal Methods for An Iterated Volunteer's Dilemma

    Authors: Jacob Dineen, A S M Ahsan-Ul Haque, Matthew Bielskas

    Abstract: Game theory provides a paradigm through which we can study the evolving communication and phenomena that occur via rational agent interaction. In this work, we design a model framework and explore The Volunteer's Dilemma with the goals of 1) modeling it as a stochastic concurrent multiplayer game, 2) constructing properties to verify model correctness and reachability, 3) constructing strategy syn… ▽ More

    Submitted 2 March, 2021; v1 submitted 28 August, 2020; originally announced August 2020.

    Comments: 9 pages, 4 figures, 5 tables

  7. arXiv:2003.01936  [pdf, other

    cs.CV

    Automatic Signboard Detection and Localization in Densely Populated Developing Cities

    Authors: Md. Sadrul Islam Toaha, Sakib Bin Asad, Chowdhury Rafeed Rahman, S. M. Shahriar Haque, Mahfuz Ara Proma, Md. Ahsan Habib Shuvo, Tashin Ahmed, Md. Amimul Basher

    Abstract: Most city establishments of developing cities are digitally unlabeled because of the lack of automatic annotation systems. Hence location and trajectory services such as Google Maps, Uber etc remain underutilized in such cities. Accurate signboard detection in natural scene images is the foremost task for error-free information retrieval from such city streets. Yet, developing accurate signboard l… ▽ More

    Submitted 22 August, 2022; v1 submitted 4 March, 2020; originally announced March 2020.

  8. arXiv:1711.08155  [pdf, other

    cs.CV

    A Face Fairness Framework for 3D Meshes

    Authors: Sk. Mohammadul Haque, Venu Madhav Govindu

    Abstract: In this paper, we present a face fairness framework for 3D meshes that preserves the regular shape of faces and is applicable to a variety of 3D mesh restoration tasks. Specifically, we present a number of desirable properties for any mesh restoration method and show that our framework satisfies them. We then apply our framework to two different tasks --- mesh-denoising and mesh-refinement, and pr… ▽ More

    Submitted 22 November, 2017; originally announced November 2017.

    Comments: 15 pages

  9. arXiv:1407.7277  [pdf, other

    cs.HC cs.CR

    Q-A: Towards the Solution of Usability-Security Tension in User Authentication

    Authors: Mahdi Nasrullah Al-Ameen, S M Taiabul Haque, Matthew Wright

    Abstract: Users often choose passwords that are easy to remember but also easy to guess by attackers. Recent studies have revealed the vulnerability of textual passwords to shoulder surfing and keystroke loggers. It remains a critical challenge in password research to develop an authentication scheme that addresses these security issues, in addition to offering good memorability. Motivated by psychology res… ▽ More

    Submitted 27 July, 2014; originally announced July 2014.

    Comments: 10 pages, 2 figures, 4 tables

  10. arXiv:1009.4992  [pdf

    cs.HC

    A System for Smart Home Control of Appliances based on Timer and Speech Interaction

    Authors: S. M. Anamul Haque, S. M. Kamruzzaman, Md. Ashraful Islam

    Abstract: The main objective of this work is to design and construct a microcomputer based system: to control electric appliances such as light, fan, heater, washing machine, motor, TV, etc. The paper discusses two major approaches to control home appliances. The first involves controlling home appliances using timer option. The second approach is to control home appliances using voice command. Moreover, it… ▽ More

    Submitted 25 September, 2010; originally announced September 2010.

    Comments: 4 Pages, International Conference

    Journal ref: Proc. 4th International Conference on Electrical Engineering, The Institution of Engineers, Dhaka, Bangladesh pp. 128-131, Jan. 2006