Skip to main content

Showing 1–14 of 14 results for author: Irfan, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.00416  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Blockchain-Enabled Privacy-Preserving Second-Order Federated Edge Learning in Personalized Healthcare

    Authors: Anum Nawaz, Muhammad Irfan, Xianjia Yu, Zhuo Zou, Tomi Westerlund

    Abstract: Federated learning (FL) has attracted increasing attention to mitigate security and privacy challenges in traditional cloud-centric machine learning models specifically in healthcare ecosystems. FL methodologies enable the training of global models through localized policies, allowing independent operations at the edge clients' level. Conventional first-order FL approaches face several challenges… ▽ More

    Submitted 31 May, 2025; originally announced June 2025.

  2. arXiv:2505.05208  [pdf, other

    eess.IV cs.CV

    Improved Brain Tumor Detection in MRI: Fuzzy Sigmoid Convolution in Deep Learning

    Authors: Muhammad Irfan, Anum Nawaz, Riku Klen, Abdulhamit Subasi, Tomi Westerlund, Wei Chen

    Abstract: Early detection and accurate diagnosis are essential to improving patient outcomes. The use of convolutional neural networks (CNNs) for tumor detection has shown promise, but existing models often suffer from overparameterization, which limits their performance gains. In this study, fuzzy sigmoid convolution (FSC) is introduced along with two additional modules: top-of-the-funnel and middle-of-the… ▽ More

    Submitted 8 May, 2025; originally announced May 2025.

    Comments: IEEE IJCNN 2025 has accepted the paper

  3. arXiv:2411.15361  [pdf

    cs.AI

    Designing Cellular Manufacturing System in Presence of Alternative Process Plans

    Authors: Md. Kutub Uddin, Md. Saiful Islam, Md Abrar Jahin, Md. Tanjid Hossen Irfan, Md. Saiful Islam Seam, M. F. Mridha

    Abstract: In the design of cellular manufacturing systems (CMS), numerous technological and managerial decisions must be made at both the design and operational stages. The first step in designing a CMS involves grouping parts and machines. In this paper, four integer programming formulations are presented for grouping parts and machines in a CMS at both the design and operational levels for a generalized g… ▽ More

    Submitted 4 December, 2024; v1 submitted 22 November, 2024; originally announced November 2024.

  4. arXiv:2408.09179  [pdf, other

    cs.CR

    On the Reliability of Radio Frequency Fingerprinting

    Authors: Muhammad Irfan, Savio Sciancalepore, Gabriele Oligeri

    Abstract: Radio Frequency Fingerprinting (RFF) offers a unique method for identifying devices at the physical (PHY) layer based on their RF emissions due to intrinsic hardware differences. Nevertheless, RFF techniques depend on the ability to extract information from the PHY layer of the radio spectrum by resorting to Software Defined Radios (SDR). Previous works have highlighted the so-called ``Day-After-T… ▽ More

    Submitted 17 August, 2024; originally announced August 2024.

  5. arXiv:2408.05580  [pdf, other

    cs.CR

    Cryptographically Secure Pseudo-Random Number Generation (CS-PRNG) Design using Robust Chaotic Tent Map (RCTM)

    Authors: Muhammad Irfan, Muhammad Asif Khan

    Abstract: Chaos, a nonlinear dynamical system, favors cryptography due to their inherent sensitive dependence on the initial condition, mixing, and ergodicity property. In recent years, the nonlinear behavior of chaotic maps has been utilized as a random source to generate pseudo-random number generation for cryptographic services. For chaotic maps having Robust chaos, dense, chaotic orbits exist for the ra… ▽ More

    Submitted 10 August, 2024; originally announced August 2024.

  6. arXiv:2407.08311  [pdf, other

    cs.CR

    Preventing Radio Fingerprinting through Low-Power Jamming

    Authors: Muhammad Irfan, Savio Sciancalepore, Gabriele Oligeri

    Abstract: Radio Frequency fingerprinting enables a passive receiver to recognize and authenticate a transmitter without the need for cryptographic tools. Authentication is achieved by isolating specific features of the transmitted signal that are unique to the transmitter's hardware. Much research has focused on improving the effectiveness and efficiency of radio frequency fingerprinting to maximize its per… ▽ More

    Submitted 2 April, 2025; v1 submitted 11 July, 2024; originally announced July 2024.

    Comments: 13 pages, 15 figures. Accepted to ACM AsiaCCS 2025

  7. arXiv:2406.03223  [pdf, other

    cs.RO

    Object Manipulation in Marine Environments using Reinforcement Learning

    Authors: Ahmed Nader, Muhayy Ud Din, Mughni Irfan, Irfan Hussain

    Abstract: Performing intervention tasks in the maritime domain is crucial for safety and operational efficiency. The unpredictable and dynamic marine environment makes the intervention tasks such as object manipulation extremely challenging. This study proposes a robust solution for object manipulation from a dock in the presence of disturbances caused by sea waves. To tackle this challenging problem, we ap… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

    Comments: 8 pages

    Journal ref: 15th IFAC Conference on Control Applications in Marine Systems, Robotics and Vehicles (CAMS 2024)

  8. arXiv:2308.10268  [pdf, other

    cs.CR eess.SP

    False Data Injection Attacks in Smart Grids: State of the Art and Way Forward

    Authors: Muhammad Irfan, Alireza Sadighian, Adeen Tanveer, Shaikha J. Al-Naimi, Gabriele Oligeri

    Abstract: In the recent years cyberattacks to smart grids are becoming more frequent Among the many malicious activities that can be launched against smart grids False Data Injection FDI attacks have raised significant concerns from both academia and industry FDI attacks can affect the internal state estimation processcritical for smart grid monitoring and controlthus being able to bypass conventional Bad D… ▽ More

    Submitted 20 August, 2023; originally announced August 2023.

  9. arXiv:2212.12242  [pdf

    cs.CY

    Towards Transportation Digital Twin Systems for Traffic Safety and Mobility Applications: A Review

    Authors: Muhammad Sami Irfan, Sagar Dasgupta, Mizanur Rahman

    Abstract: Digital twin (DT) systems aim to create virtual replicas of physical objects that are updated in real time with their physical counterparts and evolve alongside the physical assets throughout its lifecycle. Transportation systems are poised to significantly benefit from this new paradigm. In particular, DT technology can augment the capabilities of intelligent transportation systems. However, the… ▽ More

    Submitted 25 December, 2022; v1 submitted 23 December, 2022; originally announced December 2022.

    Comments: 15 pages, 2 figures; corrected issue in author(s) field

  10. arXiv:2211.01845  [pdf

    cs.CR cs.AI cs.LG

    Reinforcement Learning based Cyberattack Model for Adaptive Traffic Signal Controller in Connected Transportation Systems

    Authors: Muhammad Sami Irfan, Mizanur Rahman, Travis Atkison, Sagar Dasgupta, Alexander Hainen

    Abstract: In a connected transportation system, adaptive traffic signal controllers (ATSC) utilize real-time vehicle trajectory data received from vehicles through wireless connectivity (i.e., connected vehicles) to regulate green time. However, this wirelessly connected ATSC increases cyber-attack surfaces and increases their vulnerability to various cyber-attack modes, which can be leveraged to induce sig… ▽ More

    Submitted 31 October, 2022; originally announced November 2022.

    Comments: 18 pages, 12 figures, submitted to the Transportation Research Board 102nd Annual Meeting

  11. Assessing Mobile Learning System Performance in Indonesia: Reports of the Model Development and Its Instrument Testing

    Authors: Aang Subiyakto, Noni Erlina, Yuni Sugiarti, Nashrul Hakiem, Moh. Irfan, Abd. Rahman Ahlan

    Abstract: It is undeniable that people life patterns and technological developments are interrelated within a supply and demand cycle. In the education world, the emergence of the internet and mobile technologies has opened the learning boundaries through the use of mobile learning (m-learning). In Indonesia, the learning service industry has been begun to enliven the outside school education sector for alm… ▽ More

    Submitted 17 February, 2021; originally announced February 2021.

    Comments: 7 pages, 3 figures, SMIC2020

  12. arXiv:1602.05237  [pdf, other

    cs.GT

    FPTAS for Mixed-Strategy Nash Equilibria in Tree Graphical Games and Their Generalizations

    Authors: Luis E. Ortiz, Mohammad T. Irfan

    Abstract: We provide the first fully polynomial time approximation scheme (FPTAS) for computing an approximate mixed-strategy Nash equilibrium in tree-structured graphical multi-hypermatrix games (GMhGs). GMhGs are generalizations of normal-form games, graphical games, graphical polymatrix games, and hypergraphical games. Computing an exact mixed-strategy Nash equilibria in graphical polymatrix games is PPA… ▽ More

    Submitted 6 February, 2017; v1 submitted 16 February, 2016; originally announced February 2016.

    Comments: A shorter version of this paper (without the refinement results) appeared at AAAI 2017

  13. arXiv:1303.2147  [pdf, other

    cs.GT cs.SI physics.soc-ph

    On Influence, Stable Behavior, and the Most Influential Individuals in Networks: A Game-Theoretic Approach

    Authors: Mohammad T. Irfan, Luis E. Ortiz

    Abstract: We introduce a new approach to the study of influence in strategic settings where the action of an individual depends on that of others in a network-structured way. We propose \emph{influence games} as a \emph{game-theoretic} model of the behavior of a large but finite networked population. Influence games allow \emph{both} positive and negative \emph{influence factors}, permitting reversals in be… ▽ More

    Submitted 25 October, 2013; v1 submitted 8 March, 2013; originally announced March 2013.

    Comments: Accepted to AI Journal, subject to addressing the reviewers' points (which are addressed in this version). An earlier version of the article appeared in AAAI-11

    MSC Class: 68T01; 68W40; 68Q25 ACM Class: I.2.0; J.4; F.2.0

    Journal ref: Artificial Intelligence, Volume 215, October 2014, Pages 79-119, ISSN 0004-3702, http://dx.doi.org/10.1016/j.artint.2014.06.004. (http://www.sciencedirect.com/science/article/pii/S0004370214000812)

  14. arXiv:0911.0785  [pdf

    cs.NI

    Management of Location Based Advertisement Services using Spatial Triggers in Cellular Networks

    Authors: M. Irfan, M. M. Tahir N. Baig, Furqan H. Khan, Raheel M. Hashmi, Khurram Shehzad, Assad Ali

    Abstract: This paper discusses the advent of new technologies which have emerged under the area of Location Based Services (LBS). An innovative implementation and approach has been presented for design of applications which are inventive and attractive towards the user. Spatial Trigger is one of the most promising additions to the LBS technologies. This paper describes ways in which mobile advertisement s… ▽ More

    Submitted 4 November, 2009; originally announced November 2009.

    Comments: 5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 181-185, October 2009, USA