Skip to main content

Showing 1–15 of 15 results for author: Khan, M K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.19676  [pdf, ps, other

    cs.CR

    A Survey of LLM-Driven AI Agent Communication: Protocols, Security Risks, and Defense Countermeasures

    Authors: Dezhang Kong, Shi Lin, Zhenhua Xu, Zhebo Wang, Minghao Li, Yufeng Li, Yilun Zhang, Hujin Peng, Zeyang Sha, Yuyuan Li, Changting Lin, Xun Wang, Xuan Liu, Ningyu Zhang, Chaochao Chen, Muhammad Khurram Khan, Meng Han

    Abstract: In recent years, Large-Language-Model-driven AI agents have exhibited unprecedented intelligence and adaptability, and are rapidly changing human production and life. Nowadays, agents are undergoing a new round of evolution. They no longer act as an isolated island like LLMs. Instead, they start to communicate with diverse external entities, such as other agents and tools, to perform more complex… ▽ More

    Submitted 2 July, 2025; v1 submitted 24 June, 2025; originally announced June 2025.

    Comments: 41 pages, 13 figures, submitted to IEEE COMST

  2. arXiv:2504.17725  [pdf, other

    cs.NI

    STGen: A Novel Lightweight IoT Testbed for Generating Sensor Traffic for the Experimentation of IoT Protocol and its Application in Hybrid Network

    Authors: Hasan MA Islam, S. Nath, M. Rahman, N. Shahriar, M. K. M. Khan, R. Islam

    Abstract: A Wireless Sensor Network (WSN) is a network that does not rely on a fixed infrastructure and consists of numerous sensors, such as temperature, humidity, GPS, and cameras, equipped with onboard processors that manage and monitor the environment in a specific area. As a result, building a real sensor network testbed for verifying, validating, or experimenting with a newly designed protocol present… ▽ More

    Submitted 24 April, 2025; originally announced April 2025.

    Comments: 23 Pages, 12 Figures, Submitted to ACM Transactions on Sensor Networks

  3. arXiv:2501.16988  [pdf, other

    stat.ML cs.LG

    Marginal and Conditional Importance Measures from Machine Learning Models and Their Relationship with Conditional Average Treatment Effect

    Authors: Mohammad Kaviul Anam Khan, Olli Saarela, Rafal Kustra

    Abstract: Interpreting black-box machine learning models is challenging due to their strong dependence on data and inherently non-parametric nature. This paper reintroduces the concept of importance through "Marginal Variable Importance Metric" (MVIM), a model-agnostic measure of predictor importance based on the true conditional expectation function. MVIM evaluates predictors' influence on continuous or di… ▽ More

    Submitted 28 January, 2025; v1 submitted 28 January, 2025; originally announced January 2025.

  4. arXiv:2412.14538  [pdf, other

    cs.NI cs.AI eess.SP

    Overview of AI and Communication for 6G Network: Fundamentals, Challenges, and Future Research Opportunities

    Authors: Qimei Cui, Xiaohu You, Ni Wei, Guoshun Nan, Xuefei Zhang, Jianhua Zhang, Xinchen Lyu, Ming Ai, Xiaofeng Tao, Zhiyong Feng, Ping Zhang, Qingqing Wu, Meixia Tao, Yongming Huang, Chongwen Huang, Guangyi Liu, Chenghui Peng, Zhiwen Pan, Tao Sun, Dusit Niyato, Tao Chen, Muhammad Khurram Khan, Abbas Jamalipour, Mohsen Guizani, Chau Yuen

    Abstract: With the growing demand for seamless connectivity and intelligent communication, the integration of artificial intelligence (AI) and sixth-generation (6G) communication networks has emerged as a transformative paradigm. By embedding AI capabilities across various network layers, this integration enables optimized resource allocation, improved efficiency, and enhanced system robust performance, par… ▽ More

    Submitted 13 February, 2025; v1 submitted 19 December, 2024; originally announced December 2024.

    Journal ref: Sci China Inf Sci, 2025, 68(7): 171301

  5. arXiv:2401.11326  [pdf

    cs.CR

    Navigating Cybersecurity Training: A Comprehensive Review

    Authors: Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan

    Abstract: In the dynamic realm of cybersecurity, awareness training is crucial for strengthening defenses against cyber threats. This survey examines a spectrum of cybersecurity awareness training methods, analyzing traditional, technology-based, and innovative strategies. It evaluates the principles, efficacy, and constraints of each method, presenting a comparative analysis that highlights their pros and… ▽ More

    Submitted 20 January, 2024; originally announced January 2024.

  6. arXiv:2311.13416  [pdf

    cs.CR

    Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion

    Authors: Reem Alrawili, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan

    Abstract: This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as security, convenience, and robustness, and potential countermeasures against cyberattacks, and (3) factors affecting biometric system accuracy and po-tent… ▽ More

    Submitted 20 January, 2024; v1 submitted 7 July, 2023; originally announced November 2023.

  7. arXiv:2309.13264  [pdf, other

    cs.CV

    Randomize to Generalize: Domain Randomization for Runway FOD Detection

    Authors: Javaria Farooq, Nayyer Aafaq, M Khizer Ali Khan, Ammar Saleem, M Ibraheem Siddiqui

    Abstract: Tiny Object Detection is challenging due to small size, low resolution, occlusion, background clutter, lighting conditions and small object-to-image ratio. Further, object detection methodologies often make underlying assumption that both training and testing data remain congruent. However, this presumption often leads to decline in performance when model is applied to out-of-domain(unseen) data.… ▽ More

    Submitted 23 September, 2023; originally announced September 2023.

    Comments: 29 pages, 9 figures

    ACM Class: I.4.9; I.5.4

  8. arXiv:2306.03098  [pdf, other

    cs.HC

    Serious Games: An Updated Systematic Literature Review

    Authors: Shuja Ud Din, Muhammad Zeeshan Baig, Muhammad Khateeb Khan

    Abstract: Serious games are simulation software designed to assist people in learning the practical concepts of various application fields such as Health, wellness, Education and Culture. People improve their individual knowledge, skills and attitude through training. This study identified the changing trends with existing studied applications, approaches and methods. We collected 37 papers from Google Scho… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

  9. arXiv:2305.16473  [pdf, other

    cs.CR

    5G/6G-Enabled Metaverse Technologies: Taxonomy, Applications, and Open Security Challenges with Future Research Directions

    Authors: Muhammad Adil, Houbing Song, Muhammad Khurram Khan, Ahmed Farouk, Zhanpeng Jin

    Abstract: Internet technology has proven to be a vital contributor to many cutting-edge innovations that have given humans access to interact virtually with objects. Until now, numerous virtual systems had been developed for digital transformation to enable access to thousands of services and applications that range from virtual gaming to social networks. However, the majority of these systems lack to maint… ▽ More

    Submitted 25 May, 2023; originally announced May 2023.

  10. arXiv:2301.06027  [pdf

    astro-ph.EP astro-ph.IM cs.LG

    Pluto's Surface Mapping using Unsupervised Learning from Near-Infrared Observations of LEISA/Ralph

    Authors: A. Emran, C. M. Dalle Ore, C. J. Ahrens, M. K. H. Khan, V. F. Chevrier, D. P. Cruikshank

    Abstract: We map the surface of Pluto using an unsupervised machine learning technique using the near-infrared observations of the LEISA/Ralph instrument onboard NASA's New Horizons spacecraft. The principal component reduced Gaussian mixture model was implemented to investigate the geographic distribution of the surface units across the dwarf planet. We also present the likelihood of each surface unit at t… ▽ More

    Submitted 15 January, 2023; originally announced January 2023.

    Comments: Accepted for publication in The Planetary Science Journal. 50 pages, 17 figures including appendix

  11. arXiv:2105.06612  [pdf, other

    cs.CR

    Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies

    Authors: Christos Xenofontos, Ioannis Zografopoulos, Charalambos Konstantinou, Alireza Jolfaei, Muhammad Khurram Khan, Kim-Kwang Raymond Choo

    Abstract: Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications spanning from the consumer domain to commercial and industrial systems. The steep growth and vast adoption of IoT devices reinforce the importance of sound and robust cybersecurity practices during the device development life-cycles. IoT-related vulnerabilities, if successfully exploited can affect, not only t… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

    Comments: IEEE Internet of Things Journal

  12. arXiv:2105.02283  [pdf, other

    cs.AI cs.LO

    Operating Room (Re)Scheduling with Bed Management via ASP

    Authors: Carmine Dodaro, Giuseppe Galatà, Muhammad Kamran Khan, Marco Maratea, Ivan Porro

    Abstract: The Operating Room Scheduling (ORS) problem is the task of assigning patients to operating rooms, taking into account different specialties, lengths and priority scores of each planned surgery, operating room session durations, and the availability of beds for the entire length of stay both in the Intensive Care Unit and in the wards. A proper solution to the ORS problem is of primary importance f… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

    Comments: Under consideration in Theory and Practice of Logic Programming (TPLP)

  13. arXiv:2104.03549  [pdf

    eess.IV cs.CV cs.LG

    M-Net with Bidirectional ConvLSTM for Cup and Disc Segmentation in Fundus Images

    Authors: Maleeha Khalid Khan, Syed Muhammad Anwar

    Abstract: Glaucoma is a severe eye disease that is known to deteriorate optic never fibers, causing cup size to increase, which could result in permanent loss of vision. Glaucoma is the second leading cause of blindness after cataract, but glaucoma being more dangerous as it is not curable. Early diagnoses and treatment of glaucoma can help to slow the progression of glaucoma and its damages. For the detect… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

  14. arXiv:2004.00038  [pdf

    eess.IV cs.CV cs.LG

    Diagnosing COVID-19 Pneumonia from X-Ray and CT Images using Deep Learning and Transfer Learning Algorithms

    Authors: Halgurd S. Maghdid, Aras T. Asaad, Kayhan Zrar Ghafoor, Ali Safaa Sadiq, Muhammad Khurram Khan

    Abstract: COVID-19 (also known as 2019 Novel Coronavirus) first emerged in Wuhan, China and spread across the globe with unprecedented effect and has now become the greatest crisis of the modern era. The COVID-19 has proved much more pervasive demands for diagnosis that has driven researchers to develop more intelligent, highly responsive and efficient detection methods. In this work, we focus on proposing… ▽ More

    Submitted 31 March, 2020; originally announced April 2020.

    Comments: 8 pages, 8 figures

  15. Medical Image Analysis using Convolutional Neural Networks: A Review

    Authors: Syed Muhammad Anwar, Muhammad Majid, Adnan Qayyum, Muhammad Awais, Majdi Alnowami, Muhammad Khurram Khan

    Abstract: The science of solving clinical problems by analyzing images generated in clinical practice is known as medical image analysis. The aim is to extract information in an effective and efficient manner for improved clinical diagnosis. The recent advances in the field of biomedical engineering has made medical image analysis one of the top research and development area. One of the reason for this adva… ▽ More

    Submitted 21 May, 2019; v1 submitted 4 September, 2017; originally announced September 2017.

    Journal ref: Journal of Medical Systems (2018)