Skip to main content

Showing 1–50 of 91 results for author: Hussain, M

Searching in archive cs. Search in all archives.
.
  1. Hybrid Approach for Electricity Price Forecasting using AlexNet and LSTM

    Authors: Bosubabu Sambana, Kotamsetty Geethika Devi, Bandi Rajeswara Reddy, Galeti Mohammad Hussain, Gownivalla Siddartha

    Abstract: The recent development of advanced machine learning methods for hybrid models has greatly addressed the need for the correct prediction of electrical prices. This method combines AlexNet and LSTM algorithms, which are used to introduce a new model with higher accuracy in price forecasting. Despite RNN and ANN being effective, they often fail to deal with forex time sequence data. The traditional m… ▽ More

    Submitted 30 June, 2025; originally announced June 2025.

    Comments: 6 Pages, 7 Figures

    Journal ref: IEEE IDCIoT-2025

  2. A Keyword-Based Technique to Evaluate Broad Question Answer Script

    Authors: Tamim Al Mahmud, Md Gulzar Hussain, Sumaiya Kabir, Hasnain Ahmad, Mahmudus Sobhan

    Abstract: Evaluation is the method of assessing and determining the educational system through various techniques such as verbal or viva-voice test, subjective or objective written test. This paper presents an efficient solution to evaluate the subjective answer script electronically. In this paper, we proposed and implemented an integrated system that examines and evaluates the written answer script. This… ▽ More

    Submitted 26 June, 2025; originally announced June 2025.

    Comments: ACM Conference Proceedings (9 Pages)

    Journal ref: Proceedings of the 2020 9th International Conference on Software and Computer Applications, Pages 167 - 171, 2020

  3. arXiv:2505.10273  [pdf, ps, other

    cs.CR cs.AI cs.NI

    AttentionGuard: Transformer-based Misbehavior Detection for Secure Vehicular Platoons

    Authors: Hexu Li, Konstantinos Kalogiannis, Ahmed Mohamed Hussain, Panos Papadimitratos

    Abstract: Vehicle platooning, with vehicles traveling in close formation coordinated through Vehicle-to-Everything (V2X) communications, offers significant benefits in fuel efficiency and road utilization. However, it is vulnerable to sophisticated falsification attacks by authenticated insiders that can destabilize the formation and potentially cause catastrophic collisions. This paper addresses this chall… ▽ More

    Submitted 15 May, 2025; originally announced May 2025.

    Comments: Author's version; Accepted for presentation at the ACM Workshop on Wireless Security and Machine Learning (WiseML 2025)

  4. arXiv:2504.11995  [pdf, other

    cs.CV

    A Review of YOLOv12: Attention-Based Enhancements vs. Previous Versions

    Authors: Rahima Khanam, Muhammad Hussain

    Abstract: The YOLO (You Only Look Once) series has been a leading framework in real-time object detection, consistently improving the balance between speed and accuracy. However, integrating attention mechanisms into YOLO has been challenging due to their high computational overhead. YOLOv12 introduces a novel approach that successfully incorporates attention-based enhancements while preserving real-time pe… ▽ More

    Submitted 16 April, 2025; originally announced April 2025.

  5. Privacy-Preserving Secure Neighbor Discovery for Wireless Networks

    Authors: Ahmed Mohamed Hussain, Panos Papadimitratos

    Abstract: Traditional Neighbor Discovery (ND) and Secure Neighbor Discovery (SND) are key elements for network functionality. SND is a hard problem, satisfying not only typical security properties (authentication, integrity) but also verification of direct communication, which involves distance estimation based on time measurements and device coordinates. Defeating relay attacks, also known as "wormholes",… ▽ More

    Submitted 31 March, 2025; v1 submitted 28 March, 2025; originally announced March 2025.

    Comments: 10 pages, 6 figures. Author's version; accepted and presented at the IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2024

  6. arXiv:2502.20589  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    LLMs Have Rhythm: Fingerprinting Large Language Models Using Inter-Token Times and Network Traffic Analysis

    Authors: Saeif Alhazbi, Ahmed Mohamed Hussain, Gabriele Oligeri, Panos Papadimitratos

    Abstract: As Large Language Models (LLMs) become increasingly integrated into many technological ecosystems across various domains and industries, identifying which model is deployed or being interacted with is critical for the security and trustworthiness of the systems. Current verification methods typically rely on analyzing the generated output to determine the source model. However, these techniques ar… ▽ More

    Submitted 27 February, 2025; originally announced February 2025.

  7. arXiv:2502.14740  [pdf, other

    cs.CV cs.AI

    YOLOv12: A Breakdown of the Key Architectural Features

    Authors: Mujadded Al Rabbani Alif, Muhammad Hussain

    Abstract: This paper presents an architectural analysis of YOLOv12, a significant advancement in single-stage, real-time object detection building upon the strengths of its predecessors while introducing key improvements. The model incorporates an optimised backbone (R-ELAN), 7x7 separable convolutions, and FlashAttention-driven area-based attention, improving feature extraction, enhanced efficiency, and ro… ▽ More

    Submitted 20 February, 2025; originally announced February 2025.

  8. arXiv:2501.01335  [pdf, other

    cs.CR cs.AI cs.LG

    CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models

    Authors: Johan Wahréus, Ahmed Mohamed Hussain, Panos Papadimitratos

    Abstract: Numerous studies have investigated methods for jailbreaking Large Language Models (LLMs) to generate harmful content. Typically, these methods are evaluated using datasets of malicious prompts designed to bypass security policies established by LLM providers. However, the generally broad scope and open-ended nature of existing datasets can complicate the assessment of jailbreaking effectiveness, p… ▽ More

    Submitted 2 January, 2025; originally announced January 2025.

  9. Polymer/paper-based double touch mode capacitive pressure sensing element for wireless control of robotic arm

    Authors: Rishabh B. Mishra, Wedyan Babatain, Nazek El-Atab, Aftab M. Hussain, Muhammad M. Hussain

    Abstract: In this work, a large area, low cost and flexible polymer/paper-based double touch mode capacitive pressure sensor is demonstrated. Garage fabrication processes are used which only require cutting, taping and assembly of aluminum (Al) coated polyimide (PI) foil, PI tape and double-sided scotch tape. The presented pressure sensor operates in different pressure regions i.e. normal (0 to 7.5 kPa), tr… ▽ More

    Submitted 18 December, 2024; originally announced December 2024.

    Journal ref: 2020 IEEE 15th International Conference on Nano/ Micro Engineered and Molecular System (NEMS), 2020

  10. Low-cost foil/paper based touch mode pressure sensing element as artificial skin module for prosthetic hand

    Authors: Rishabh B. Mishra, Sherjeel M. Khan, Sohail F. Shaikh, Aftab M. Hussain, Muhammad M. Hussain

    Abstract: Capacitive pressure sensors have several advantages in areas such as robotics, automation, aerospace, biomedical and consumer electronics. We present mathematical modelling, finite element analysis (FEA), fabrication and experimental characterization of ultra-low cost and paper-based, touch-mode, flexible capacitive pressure sensor element using Do-It-Yourself (DIY) technology. The pressure sensin… ▽ More

    Submitted 18 December, 2024; originally announced December 2024.

  11. arXiv:2412.10553  [pdf, other

    cs.LG cs.AI cs.CR cs.NI eess.SP

    Edge AI-based Radio Frequency Fingerprinting for IoT Networks

    Authors: Ahmed Mohamed Hussain, Nada Abughanam, Panos Papadimitratos

    Abstract: The deployment of the Internet of Things (IoT) in smart cities and critical infrastructure has enhanced connectivity and real-time data exchange but introduced significant security challenges. While effective, cryptography can often be resource-intensive for small-footprint resource-constrained (i.e., IoT) devices. Radio Frequency Fingerprinting (RFF) offers a promising authentication alternative… ▽ More

    Submitted 13 December, 2024; originally announced December 2024.

    Comments: 11 pages, and 8 figures

  12. arXiv:2411.05029  [pdf, other

    cs.CV cs.AI

    Ultrasound-Based AI for COVID-19 Detection: A Comprehensive Review of Public and Private Lung Ultrasound Datasets and Studies

    Authors: Abrar Morshed, Abdulla Al Shihab, Md Abrar Jahin, Md Jaber Al Nahian, Md Murad Hossain Sarker, Md Sharjis Ibne Wadud, Mohammad Istiaq Uddin, Muntequa Imtiaz Siraji, Nafisa Anjum, Sumiya Rajjab Shristy, Tanvin Rahman, Mahmuda Khatun, Md Rubel Dewan, Mosaddeq Hossain, Razia Sultana, Ripel Chakma, Sonet Barua Emon, Towhidul Islam, Mohammad Arafat Hussain

    Abstract: The COVID-19 pandemic has affected millions of people globally, with respiratory organs being strongly affected in individuals with comorbidities. Medical imaging-based diagnosis and prognosis have become increasingly popular in clinical settings for detecting COVID-19 lung infections. Among various medical imaging modalities, ultrasound stands out as a low-cost, mobile, and radiation-safe imaging… ▽ More

    Submitted 6 November, 2024; originally announced November 2024.

  13. arXiv:2411.02745  [pdf, other

    eess.IV cs.CV

    Foundation AI Model for Medical Image Segmentation

    Authors: Rina Bao, Erfan Darzi, Sheng He, Chuan-Heng Hsiao, Mohammad Arafat Hussain, Jingpeng Li, Atle Bjornerud, Ellen Grant, Yangming Ou

    Abstract: Foundation models refer to artificial intelligence (AI) models that are trained on massive amounts of data and demonstrate broad generalizability across various tasks with high accuracy. These models offer versatile, one-for-many or one-for-all solutions, eliminating the need for developing task-specific AI models. Examples of such foundation models include the Chat Generative Pre-trained Transfor… ▽ More

    Submitted 4 November, 2024; originally announced November 2024.

  14. arXiv:2410.17725  [pdf, other

    cs.CV

    YOLOv11: An Overview of the Key Architectural Enhancements

    Authors: Rahima Khanam, Muhammad Hussain

    Abstract: This study presents an architectural analysis of YOLOv11, the latest iteration in the YOLO (You Only Look Once) series of object detection models. We examine the models architectural innovations, including the introduction of the C3k2 (Cross Stage Partial with kernel size 2) block, SPPF (Spatial Pyramid Pooling - Fast), and C2PSA (Convolutional block with Parallel Spatial Attention) components, wh… ▽ More

    Submitted 23 October, 2024; originally announced October 2024.

  15. arXiv:2410.14977  [pdf, other

    cs.CV

    3D Multi-Object Tracking Employing MS-GLMB Filter for Autonomous Driving

    Authors: Linh Van Ma, Muhammad Ishfaq Hussain, Kin-Choong Yow, Moongu Jeon

    Abstract: The MS-GLMB filter offers a robust framework for tracking multiple objects through the use of multi-sensor data. Building on this, the MV-GLMB and MV-GLMB-AB filters enhance the MS-GLMB capabilities by employing cameras for 3D multi-sensor multi-object tracking, effectively addressing occlusions. However, both filters depend on overlapping fields of view from the cameras to combine complementary i… ▽ More

    Submitted 19 October, 2024; originally announced October 2024.

    Comments: 2024 International Conference on Control, Automation and Information Sciences (ICCAIS), November 26th to 28th, 2024 in Ho Chi Minh City

  16. arXiv:2410.12848  [pdf

    cs.CL cs.AI cs.HC

    Prompt Engineering a Schizophrenia Chatbot: Utilizing a Multi-Agent Approach for Enhanced Compliance with Prompt Instructions

    Authors: Per Niklas Waaler, Musarrat Hussain, Igor Molchanov, Lars Ailo Bongo, Brita Elvevåg

    Abstract: Patients with schizophrenia often present with cognitive impairments that may hinder their ability to learn about their condition. These individuals could benefit greatly from education platforms that leverage the adaptability of Large Language Models (LLMs) such as GPT-4. While LLMs have the potential to make topical mental health information more accessible and engaging, their black-box nature r… ▽ More

    Submitted 10 October, 2024; originally announced October 2024.

  17. arXiv:2408.15178  [pdf, other

    cs.CV

    A Review of Transformer-Based Models for Computer Vision Tasks: Capturing Global Context and Spatial Relationships

    Authors: Gracile Astlin Pereira, Muhammad Hussain

    Abstract: Transformer-based models have transformed the landscape of natural language processing (NLP) and are increasingly applied to computer vision tasks with remarkable success. These models, renowned for their ability to capture long-range dependencies and contextual information, offer a promising alternative to traditional convolutional neural networks (CNNs) in computer vision. In this review paper,… ▽ More

    Submitted 27 August, 2024; originally announced August 2024.

  18. arXiv:2408.11988  [pdf, other

    cs.DC

    Distributed-Memory Parallel Algorithms for Sparse Matrix and Sparse Tall-and-Skinny Matrix Multiplication

    Authors: Isuru Ranawaka, Md Taufique Hussain, Charles Block, Gerasimos Gerogiannis, Josep Torrellas, Ariful Azad

    Abstract: We consider a sparse matrix-matrix multiplication (SpGEMM) setting where one matrix is square and the other is tall and skinny. This special variant, called TS-SpGEMM, has important applications in multi-source breadth-first search, influence maximization, sparse graph embedding, and algebraic multigrid solvers. Unfortunately, popular distributed algorithms like sparse SUMMA deliver suboptimal per… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

  19. arXiv:2408.11331  [pdf, other

    cs.IR cs.CY cs.DS cs.SI

    Parallel Algorithms for Median Consensus Clustering in Complex Networks

    Authors: Md Taufique Hussain, Mahantesh Halappanavar, Samrat Chatterjee, Filippo Radicchi, Santo Fortunato, Ariful Azad

    Abstract: We develop an algorithm that finds the consensus of many different clustering solutions of a graph. We formulate the problem as a median set partitioning problem and propose a greedy optimization technique. Unlike other approaches that find median set partitions, our algorithm takes graph structure into account and finds a comparable quality solution much faster than the other approaches. For grap… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

    Comments: 12 pages

  20. arXiv:2408.06305  [pdf, other

    cs.CV

    From SAM to SAM 2: Exploring Improvements in Meta's Segment Anything Model

    Authors: Athulya Sundaresan Geetha, Muhammad Hussain

    Abstract: The Segment Anything Model (SAM), introduced to the computer vision community by Meta in April 2023, is a groundbreaking tool that allows automated segmentation of objects in images based on prompts such as text, clicks, or bounding boxes. SAM excels in zero-shot performance, segmenting unseen objects without additional training, stimulated by a large dataset of over one billion image masks. SAM 2… ▽ More

    Submitted 12 August, 2024; originally announced August 2024.

  21. arXiv:2407.20892  [pdf, other

    cs.CV

    What is YOLOv5: A deep look into the internal features of the popular object detector

    Authors: Rahima Khanam, Muhammad Hussain

    Abstract: This study presents a comprehensive analysis of the YOLOv5 object detection model, examining its architecture, training methodologies, and performance. Key components, including the Cross Stage Partial backbone and Path Aggregation-Network, are explored in detail. The paper reviews the model's performance across various metrics and hardware platforms. Additionally, the study discusses the transiti… ▽ More

    Submitted 30 July, 2024; originally announced July 2024.

  22. arXiv:2407.20872  [pdf, other

    cs.CV

    A Comparative Analysis of YOLOv5, YOLOv8, and YOLOv10 in Kitchen Safety

    Authors: Athulya Sundaresan Geetha, Muhammad Hussain

    Abstract: Knife safety in the kitchen is essential for preventing accidents or injuries with an emphasis on proper handling, maintenance, and storage methods. This research presents a comparative analysis of three YOLO models, YOLOv5, YOLOv8, and YOLOv10, to detect the hazards involved in handling knife, concentrating mainly on ensuring fingers are curled while holding items to be cut and that hands should… ▽ More

    Submitted 30 July, 2024; originally announced July 2024.

  23. arXiv:2407.02988  [pdf, ps, other

    cs.CV

    YOLOv5, YOLOv8 and YOLOv10: The Go-To Detectors for Real-time Vision

    Authors: Muhammad Hussain

    Abstract: This paper presents a comprehensive review of the evolution of the YOLO (You Only Look Once) object detection algorithm, focusing on YOLOv5, YOLOv8, and YOLOv10. We analyze the architectural advancements, performance improvements, and suitability for edge deployment across these versions. YOLOv5 introduced significant innovations such as the CSPDarknet backbone and Mosaic Augmentation, balancing s… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

  24. arXiv:2406.10139  [pdf, other

    cs.CV

    YOLOv1 to YOLOv10: A comprehensive review of YOLO variants and their application in the agricultural domain

    Authors: Mujadded Al Rabbani Alif, Muhammad Hussain

    Abstract: This survey investigates the transformative potential of various YOLO variants, from YOLOv1 to the state-of-the-art YOLOv10, in the context of agricultural advancements. The primary objective is to elucidate how these cutting-edge object detection models can re-energise and optimize diverse aspects of agriculture, ranging from crop monitoring to livestock management. It aims to achieve key objecti… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    Comments: 31 pages

  25. arXiv:2405.04837  [pdf

    cs.CR eess.SY

    Enhancing Data Integrity and Traceability in Industry Cyber Physical Systems (ICPS) through Blockchain Technology: A Comprehensive Approach

    Authors: Mohammad Ikbal Hossain, Tanja Steigner, Muhammad Imam Hussain, Afroja Akther

    Abstract: Blockchain technology, heralded as a transformative innovation, has far-reaching implications beyond its initial application in cryptocurrencies. This study explores the potential of blockchain in enhancing data integrity and traceability within Industry Cyber-Physical Systems (ICPS), a crucial aspect in the era of Industry 4.0. ICPS, integrating computational and physical components, is pivotal i… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  26. arXiv:2404.06094  [pdf, ps, other

    cs.CR

    S-box Security Analysis of NIST Lightweight Cryptography Candidates: A Critical Empirical Study

    Authors: Mahnoor Naseer, Sundas Tariq, Naveed Riaz, Naveed Ahmed, Mureed Hussain

    Abstract: In the resource-constrained world of the digital landscape, lightweight cryptography plays a critical role in safeguarding information and ensuring the security of various systems, devices, and communication channels. Its efficient and resource-friendly nature makes it the ideal solution for applications where computational power is limited. In response to the growing need for platform-specific im… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

  27. arXiv:2404.00869  [pdf, other

    cs.CR

    Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training

    Authors: Daisuke Mashima, Muhammad M. Roomi, Bennet Ng, Zbigniew Kalbarczyk, S. M. Suhail Hussain, Ee-chien Chang

    Abstract: Assurance of cybersecurity is crucial to ensure dependability and resilience of smart power grid systems. In order to evaluate the impact of potential cyber attacks, to assess deployability and effectiveness of cybersecurity measures, and to enable hands-on exercise and training of personals, an interactive, virtual environment that emulates the behaviour of a smart grid system, namely smart grid… ▽ More

    Submitted 31 March, 2024; originally announced April 2024.

    Comments: Published at DSN 2023 Industry Track

  28. A Novel Technique to Parameterize Congestion Control in 6TiSCH IIoT Networks

    Authors: Kushal Chakraborty, Aritra Kumar Dutta, Mohammad Avesh Hussain, Syed Raafay Mohiuddin, Nikumani Choudhury, Rakesh Matam, Mithun Mukherjee

    Abstract: The Industrial Internet of Things (IIoT) refers to the use of interconnected smart devices, sensors, and other technologies to create a network of intelligent systems that can monitor and manage industrial processes. 6TiSCH (IPv6 over the Time Slotted Channel Hopping mode of IEEE 802.15.4e) as an enabling technology facilitates low-power and low-latency communication between IoT devices in industr… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

    Comments: The paper has been submitted, accepted, and presented at the 2023 IEEE Global Communications Conference: Next-Generation Networking and Internet, with plans for publication. It was delivered during the IEEE Global Communications Conference held on December 6th, 2023, in Kuala Lumpur, Malaysia

  29. arXiv:2402.04538  [pdf, other

    cs.LG

    Triplet Interaction Improves Graph Transformers: Accurate Molecular Graph Learning with Triplet Graph Transformers

    Authors: Md Shamim Hussain, Mohammed J. Zaki, Dharmashankar Subramanian

    Abstract: Graph transformers typically lack third-order interactions, limiting their geometric understanding which is crucial for tasks like molecular geometry prediction. We propose the Triplet Graph Transformer (TGT) that enables direct communication between pairs within a 3-tuple of nodes via novel triplet attention and aggregation mechanisms. TGT is applied to molecular property prediction by first pred… ▽ More

    Submitted 9 June, 2024; v1 submitted 6 February, 2024; originally announced February 2024.

    Comments: ICML'24 Accepted Version, 25 pages, 10 figures, 18 tables

  30. arXiv:2312.14020  [pdf

    cs.HC cs.LG cs.SD eess.AS

    BANSpEmo: A Bangla Emotional Speech Recognition Dataset

    Authors: Md Gulzar Hussain, Mahmuda Rahman, Babe Sultana, Ye Shiren

    Abstract: In the field of audio and speech analysis, the ability to identify emotions from acoustic signals is essential. Human-computer interaction (HCI) and behavioural analysis are only a few of the many areas where the capacity to distinguish emotions from speech signals has an extensive range of applications. Here, we are introducing BanSpEmo, a corpus of emotional speech that only consists of audio re… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

  31. arXiv:2312.01650  [pdf, other

    cs.CV

    Adaptive Confidence Threshold for ByteTrack in Multi-Object Tracking

    Authors: Linh Van Ma, Muhammad Ishfaq Hussain, JongHyun Park, Jeongbae Kim, Moongu Jeon

    Abstract: We investigate the application of ByteTrack in the realm of multiple object tracking. ByteTrack, a simple tracking algorithm, enables the simultaneous tracking of multiple objects by strategically incorporating detections with a low confidence threshold. Conventionally, objects are initially associated with high confidence threshold detections. When the association between objects and detections b… ▽ More

    Submitted 5 December, 2023; v1 submitted 4 December, 2023; originally announced December 2023.

    Comments: The 12th International Conference on Control, Automation and Information Sciences (ICCAIS 2023), November 27th to 29th, 2023 in Hanoi

    Journal ref: The 12th International Conference on Control, Automation and Information Sciences (ICCAIS 2023)

  32. Identifying Alzheimer Disease Dementia Levels Using Machine Learning Methods

    Authors: Md Gulzar Hussain, Ye Shiren

    Abstract: Dementia, a prevalent neurodegenerative condition, is a major manifestation of Alzheimer's disease (AD). As the condition progresses from mild to severe, it significantly impairs the individual's ability to perform daily tasks independently, necessitating the need for timely and accurate AD classification. Machine learning or deep learning models have emerged as effective tools for this purpose. I… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

  33. arXiv:2309.04698  [pdf, other

    cs.RO cs.AI cs.AR

    Advancements in Upper Body Exoskeleton: Implementing Active Gravity Compensation with a Feedforward Controller

    Authors: Muhammad Ayaz Hussain, Ioannis Iossifidis

    Abstract: In this study, we present a feedforward control system designed for active gravity compensation on an upper body exoskeleton. The system utilizes only positional data from internal motor sensors to calculate torque, employing analytical control equations based on Newton-Euler Inverse Dynamics. Compared to feedback control systems, the feedforward approach offers several advantages. It eliminates t… ▽ More

    Submitted 9 September, 2023; originally announced September 2023.

    ACM Class: B.m; B.1; I.6

  34. arXiv:2308.10994  [pdf, other

    eess.IV cs.CV

    Switched auxiliary loss for robust training of transformer models for histopathological image segmentation

    Authors: Mustaffa Hussain, Saharsh Barve

    Abstract: Functional tissue Units (FTUs) are cell population neighborhoods local to a particular organ performing its main function.The FTUs provide crucial information to the pathologist in understanding the disease affecting a particular organ by providing information at the cellular level.In our research, we have developed a model to segment multi-organ FTUs across 5 organs namely: the kidney, large inte… ▽ More

    Submitted 14 August, 2024; v1 submitted 21 August, 2023; originally announced August 2023.

  35. The Information Pathways Hypothesis: Transformers are Dynamic Self-Ensembles

    Authors: Md Shamim Hussain, Mohammed J. Zaki, Dharmashankar Subramanian

    Abstract: Transformers use the dense self-attention mechanism which gives a lot of flexibility for long-range connectivity. Over multiple layers of a deep transformer, the number of possible connectivity patterns increases exponentially. However, very few of these contribute to the performance of the network, and even fewer are essential. We hypothesize that there are sparsely connected sub-networks within… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

    Comments: KDD23 preprint, 12 pages, 7 figures, 10 tables

  36. arXiv:2303.05732  [pdf

    cs.SE cs.PF eess.SY

    Securing Safety in Collaborative Cyber-Physical Systems through Fault Criticality Analysis

    Authors: Manzoor Hussain, Nazakat Ali, Jang-Eui Hong

    Abstract: Collaborative Cyber-Physical Systems (CCPS) are systems that contain tightly coupled physical and cyber components, massively interconnected subsystems, and collaborate to achieve a common goal. The safety of a single Cyber-Physical System (CPS) can be achieved by following the safety standards such as ISO 26262 and IEC 61508 or by applying hazard analysis techniques. However, due to the complex,… ▽ More

    Submitted 10 March, 2023; originally announced March 2023.

    Comments: This paper is an extended version of an article submitted to KCSE-2021

    Journal ref: KIPS Transactions on Software and Data Engineering, vol. 10, no. 8, pp. 287-300, 2021

  37. arXiv:2301.06294  [pdf, other

    cs.AI cs.LG cs.SC

    Neuro-Symbolic World Models for Adapting to Open World Novelty

    Authors: Jonathan Balloch, Zhiyu Lin, Robert Wright, Xiangyu Peng, Mustafa Hussain, Aarun Srinivas, Julia Kim, Mark O. Riedl

    Abstract: Open-world novelty--a sudden change in the mechanics or properties of an environment--is a common occurrence in the real world. Novelty adaptation is an agent's ability to improve its policy performance post-novelty. Most reinforcement learning (RL) methods assume that the world is a closed, fixed process. Consequentially, RL policies adapt inefficiently to novelties. To address this, we introduce… ▽ More

    Submitted 16 January, 2023; originally announced January 2023.

    Comments: 9 pages, 8 figures, Extended Abstract accepted for presentation at AAMAS 2023

  38. arXiv:2212.08568  [pdf, other

    cs.CV cs.LG

    Biomedical image analysis competitions: The state of current participation practice

    Authors: Matthias Eisenmann, Annika Reinke, Vivienn Weru, Minu Dietlinde Tizabi, Fabian Isensee, Tim J. Adler, Patrick Godau, Veronika Cheplygina, Michal Kozubek, Sharib Ali, Anubha Gupta, Jan Kybic, Alison Noble, Carlos Ortiz de Solórzano, Samiksha Pachade, Caroline Petitjean, Daniel Sage, Donglai Wei, Elizabeth Wilden, Deepak Alapatt, Vincent Andrearczyk, Ujjwal Baid, Spyridon Bakas, Niranjan Balu, Sophia Bano , et al. (331 additional authors not shown)

    Abstract: The number of international benchmarking competitions is steadily increasing in various fields of machine learning (ML) research and practice. So far, however, little is known about the common practice as well as bottlenecks faced by the community in tackling the research questions posed. To shed light on the status quo of algorithm development in the specific field of biomedical imaging analysis,… ▽ More

    Submitted 12 September, 2023; v1 submitted 16 December, 2022; originally announced December 2022.

  39. arXiv:2203.12117  [pdf, other

    cs.AI cs.LG

    NovGrid: A Flexible Grid World for Evaluating Agent Response to Novelty

    Authors: Jonathan Balloch, Zhiyu Lin, Mustafa Hussain, Aarun Srinivas, Robert Wright, Xiangyu Peng, Julia Kim, Mark Riedl

    Abstract: A robust body of reinforcement learning techniques have been developed to solve complex sequential decision making problems. However, these methods assume that train and evaluation tasks come from similarly or identically distributed environments. This assumption does not hold in real life where small novel changes to the environment can make a previously learned policy fail or introduce simpler s… ▽ More

    Submitted 22 March, 2022; originally announced March 2022.

    Comments: 7 pages, 4 figures, AAAI Spring Symposium 2022 on Designing Artificial Intelligence for Open Worlds (Long Oral)

  40. arXiv:2112.10223  [pdf, other

    cs.DC

    Parallel Algorithms for Adding a Collection of Sparse Matrices

    Authors: Md Taufique Hussain, Guttu Sai Abhishek, Aydin Buluç, Ariful Azad

    Abstract: We develop a family of parallel algorithms for the SpKAdd operation that adds a collection of k sparse matrices. SpKAdd is a much needed operation in many applications including distributed memory sparse matrix-matrix multiplication (SpGEMM), streaming accumulations of graphs, and algorithmic sparsification of the gradient updates in deep learning. While adding two sparse matrices is a common oper… ▽ More

    Submitted 19 December, 2021; originally announced December 2021.

  41. arXiv:2111.09533  [pdf

    cs.LG cs.AI

    DeepGuard: A Framework for Safeguarding Autonomous Driving Systems from Inconsistent Behavior

    Authors: Manzoor Hussain, Nazakat Ali, Jang-Eui Hong

    Abstract: The deep neural networks (DNNs)based autonomous driving systems (ADSs) are expected to reduce road accidents and improve safety in the transportation domain as it removes the factor of human error from driving tasks. The DNN based ADS sometimes may exhibit erroneous or unexpected behaviors due to unexpected driving conditions which may cause accidents. It is not possible to generalize the DNN mode… ▽ More

    Submitted 5 April, 2022; v1 submitted 18 November, 2021; originally announced November 2021.

    Comments: 22 pages

  42. arXiv:2110.03877  [pdf

    eess.IV cs.AI cs.CV

    Designing the Architecture of a Convolutional Neural Network Automatically for Diabetic Retinopathy Diagnosis

    Authors: Fahman Saeed, Muhammad Hussain, Hatim A Aboalsamh, Fadwa Al Adel, Adi Mohammed Al Owaifeer

    Abstract: The prevalence of diabetic retinopathy (DR) has reached 34.6% worldwide and is a major cause of blindness among middle-aged diabetic patients. Regular DR screening using fundus photography helps detect its complications and prevent its progression to advanced levels. As manual screening is time-consuming and subjective, machine learning (ML) and deep learning (DL) have been employed to aid graders… ▽ More

    Submitted 7 November, 2022; v1 submitted 7 October, 2021; originally announced October 2021.

    Comments: 20 pages, 6 figures

  43. arXiv:2109.15092  [pdf, other

    eess.IV cs.CV

    Robust Multi-Domain Mitosis Detection

    Authors: Mustaffa Hussain, Ritesh Gangnani, Sasidhar Kadiyala

    Abstract: Domain variability is a common bottle neck in developing generalisable algorithms for various medical applications. Motivated by the observation that the domain variability of the medical images is to some extent compact, we propose to learn a target representative feature space through unpaired image to image translation (CycleGAN). We comprehensively evaluate the performanceand usefulness by uti… ▽ More

    Submitted 13 September, 2021; originally announced September 2021.

    Comments: 3 pages, 2 figures

  44. arXiv:2109.11627  [pdf, other

    cs.CR eess.SY

    Home Energy Management Systems: Operation and Resilience of Heuristics against Cyberattacks

    Authors: Hafiz Majid Hussain, Arun Narayanan, Subham Sahoo, Yongheng Yang, Pedro H. J. Nardelli, Frede Blaabjerg

    Abstract: Internet of Things (IoT) and advanced communication technologies have demonstrated great potential to manage residential energy resources by enabling demand-side management (DSM). Home energy management systems (HEMSs) can automatically control electricity production and usage inside homes using DSM techniques. These HEMSs will wirelessly collect information from hardware installed in the power sy… ▽ More

    Submitted 21 September, 2021; originally announced September 2021.

  45. arXiv:2109.05265  [pdf, other

    cs.RO cs.CV cs.LG

    RVMDE: Radar Validated Monocular Depth Estimation for Robotics

    Authors: Muhamamd Ishfaq Hussain, Muhammad Aasim Rafique, Moongu Jeon

    Abstract: Stereoscopy exposits a natural perception of distance in a scene, and its manifestation in 3D world understanding is an intuitive phenomenon. However, an innate rigid calibration of binocular vision sensors is crucial for accurate depth estimation. Alternatively, a monocular camera alleviates the limitation at the expense of accuracy in estimating depth, and the challenge exacerbates in harsh envi… ▽ More

    Submitted 18 April, 2022; v1 submitted 11 September, 2021; originally announced September 2021.

  46. arXiv:2109.05021  [pdf, other

    eess.IV cs.CV

    A Deep Learning-Based Unified Framework for Red Lesions Detection on Retinal Fundus Images

    Authors: Norah Asiri, Muhammad Hussain, Fadwa Al Adel

    Abstract: Red-lesions, microaneurysms (MAs) and hemorrhages (HMs), are the early signs of diabetic retinopathy (DR). The automatic detection of MAs and HMs on retinal fundus images is a challenging task. Most of the existing methods detect either only MAs or only HMs because of the difference in their texture, sizes, and morphology. Though some methods detect both MAs and HMs, they suffer from the curse of… ▽ More

    Submitted 1 May, 2025; v1 submitted 9 September, 2021; originally announced September 2021.

  47. arXiv:2109.02103  [pdf

    eess.IV cs.CV

    Recognition of COVID-19 Disease Utilizing X-Ray Imaging of the Chest Using CNN

    Authors: Md Gulzar Hussain, Ye Shiren

    Abstract: Since this COVID-19 pandemic thrives, the utilization of X-Ray images of the Chest (CXR) as a complementary screening technique to RT-PCR testing grows to its clinical use for respiratory complaints. Many new deep learning approaches have developed as a consequence. The goal of this research is to assess the convolutional neural networks (CNNs) to diagnosis COVID-19 utisizing X-ray images of chest… ▽ More

    Submitted 5 September, 2021; originally announced September 2021.

    Comments: Accepted and Presented in International Conference on Computing, Electronics & Communications Engineering (iCCECE '21)

  48. Global Self-Attention as a Replacement for Graph Convolution

    Authors: Md Shamim Hussain, Mohammed J. Zaki, Dharmashankar Subramanian

    Abstract: We propose an extension to the transformer neural network architecture for general-purpose graph learning by adding a dedicated pathway for pairwise structural information, called edge channels. The resultant framework - which we call Edge-augmented Graph Transformer (EGT) - can directly accept, process and output structural information of arbitrary form, which is important for effective learning… ▽ More

    Submitted 3 June, 2022; v1 submitted 6 August, 2021; originally announced August 2021.

    Comments: The accepted version in KDD '22

  49. arXiv:2107.05466  [pdf, other

    cs.LG eess.SP

    Learning and Adaptation for Millimeter-Wave Beam Tracking and Training: a Dual Timescale Variational Framework

    Authors: Muddassar Hussain, Nicolo Michelusi

    Abstract: Millimeter-wave vehicular networks incur enormous beam-training overhead to enable narrow-beam communications. This paper proposes a learning and adaptation framework in which the dynamics of the communication beams are learned and then exploited to design adaptive beam-tracking and training with low overhead: on a long-timescale, a deep recurrent variational autoencoder (DR-VAE) uses noisy beam-t… ▽ More

    Submitted 26 October, 2021; v1 submitted 27 June, 2021; originally announced July 2021.

    Comments: accepted for publication in IEEE Journal on Selected Areas in Communications 2021

  50. arXiv:2106.15864  [pdf, other

    cs.RO math.DS

    Biologically Inspired Model for Timed Motion in Robotic Systems

    Authors: Sebastian Doliwa, Muhammad Ayaz Hussain, Tim Sziburis, Ioannis Iossifidis

    Abstract: The goal of this work is the development of a motion model for sequentially timed movement actions in robotic systems under specific consideration of temporal stabilization, that is maintaining an approximately constant overall movement time (isochronous behavior). This is demonstrated both in simulation and on a physical robotic system for the task of intercepting a moving target in three-dimensi… ▽ More

    Submitted 29 July, 2021; v1 submitted 30 June, 2021; originally announced June 2021.