Skip to main content

Showing 1–25 of 25 results for author: Mehmood, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.16398  [pdf, ps, other

    cs.CR

    Consistent and Compatible Modelling of Cyber Intrusions and Incident Response Demonstrated in the Context of Malware Attacks on Critical Infrastructure

    Authors: Peter Maynard, Yulia Cherdantseva, Avi Shaked, Pete Burnap, Arif Mehmood

    Abstract: Cyber Security Incident Response (IR) Playbooks are used to capture the steps required to recover from a cyber intrusion. Individual IR playbooks should focus on a specific type of incident and be aligned with the architecture of a system under attack. Intrusion modelling focuses on a specific potential cyber intrusion and is used to identify where and what countermeasures are needed, and the resu… ▽ More

    Submitted 22 May, 2025; originally announced May 2025.

  2. arXiv:2503.15008  [pdf

    eess.IV cs.AI cs.CV cs.LG

    A Novel Channel Boosted Residual CNN-Transformer with Regional-Boundary Learning for Breast Cancer Detection

    Authors: Aamir Mehmood, Yue Hu, Saddam Hussain Khan

    Abstract: Recent advancements in detecting tumors using deep learning on breast ultrasound images (BUSI) have demonstrated significant success. Deep CNNs and vision-transformers (ViTs) have demonstrated individually promising initial performance. However, challenges related to model complexity and contrast, texture, and tumor morphology variations introduce uncertainties that hinder the effectiveness of cur… ▽ More

    Submitted 19 March, 2025; originally announced March 2025.

    Comments: 12 pages, 10 Figures, 2 Tables. arXiv admin note: substantial text overlap with arXiv:2405.12986

  3. arXiv:2411.18260  [pdf, other

    cs.CL

    MetaphorShare: A Dynamic Collaborative Repository of Open Metaphor Datasets

    Authors: Joanne Boisson, Arif Mehmood, Jose Camacho-Collados

    Abstract: The metaphor studies community has developed numerous valuable labelled corpora in various languages over the years. Many of these resources are not only unknown to the NLP community, but are also often not easily shared among the researchers. Both in human sciences and in NLP, researchers could benefit from a centralised database of labelled resources, easily accessible and unified under an ident… ▽ More

    Submitted 10 March, 2025; v1 submitted 27 November, 2024; originally announced November 2024.

    Comments: Accepted in NAACL 2025 system demonstration track

  4. arXiv:2405.00903  [pdf, other

    cs.CL

    A Named Entity Recognition and Topic Modeling-based Solution for Locating and Better Assessment of Natural Disasters in Social Media

    Authors: Ayaz Mehmood, Muhammad Tayyab Zamir, Muhammad Asif Ayub, Nasir Ahmad, Kashif Ahmad

    Abstract: Over the last decade, similar to other application domains, social media content has been proven very effective in disaster informatics. However, due to the unstructured nature of the data, several challenges are associated with disaster analysis in social media content. To fully explore the potential of social media content in disaster informatics, access to relevant content and the correct geo-l… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: 15 pages; 4 tables; 4 figures

  5. arXiv:2404.05735  [pdf, ps, other

    cs.AI

    A Python Framework for Neutrosophic Sets and Mappings

    Authors: Giorgio Nordo, Saeid Jafari, Arif Mehmood, Bhimraj Basumatary

    Abstract: In this paper we present an open source framework developed in Python and consisting of three distinct classes designed to manipulate in a simple and intuitive way both symbolic representations of neutrosophic sets over universes of various types as well as mappings between them. The capabilities offered by this framework extend and generalize previous attempts to provide software solutions to the… ▽ More

    Submitted 24 March, 2024; originally announced April 2024.

    Comments: 38 PAGES

    MSC Class: 03E72; 08A72; 03B52

    Journal ref: Neutrosophic Sets and Systems 65, 2024

  6. arXiv:2401.05452  [pdf, other

    eess.SP cs.IT cs.LG

    Cuff-less Arterial Blood Pressure Waveform Synthesis from Single-site PPG using Transformer & Frequency-domain Learning

    Authors: Muhammad Wasim Nawaz, Muhammad Ahmad Tahir, Ahsan Mehmood, Muhammad Mahboob Ur Rahman, Kashif Riaz, Qammer H. Abbasi

    Abstract: We develop and evaluate two novel purpose-built deep learning (DL) models for synthesis of the arterial blood pressure (ABP) waveform in a cuff-less manner, using a single-site photoplethysmography (PPG) signal. We train and evaluate our DL models on the data of 209 subjects from the public UCI dataset on cuff-less blood pressure (CLBP) estimation. Our transformer model consists of an encoder-deco… ▽ More

    Submitted 8 June, 2024; v1 submitted 9 January, 2024; originally announced January 2024.

    Comments: 8 pages, 3 figures, 2 tables, submitted for review and potential publication

  7. arXiv:2310.01850  [pdf, other

    cs.CR

    Multi-class Network Intrusion Detection with Class Imbalance via LSTM & SMOTE

    Authors: Muhammad Wasim Nawaz, Rashid Munawar, Ahsan Mehmood, Muhammad Mahboob Ur Rahman, Qammer H. Abbasi

    Abstract: Monitoring network traffic to maintain the quality of service (QoS) and to detect network intrusions in a timely and efficient manner is essential. As network traffic is sequential, recurrent neural networks (RNNs) such as long short-term memory (LSTM) are suitable for building network intrusion detection systems. However, in the case of a few dataset examples of the rare attack types, even these… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

    Comments: 8 pages, 7 figures, 5 tables

  8. arXiv:2308.06268  [pdf

    cs.HC

    Go Together: Bridging the Gap between Learners and Teachers

    Authors: Asim Irfan, Atif Nawaz, Muhammad Turab, Muhmmad Azeem, Mashal Adnan, Ahsan Mehmood, Sarfaraz Ahmed, Adnan Ashraf

    Abstract: After the pandemic, humanity has been facing different types of challenges. Social relationships, societal values, and academic and professional behavior have been hit the most. People are shifting their routines to social media and gadgets, and getting addicted to their isolation. This sudden change in their lives has caused an unusual social breakdown and endangered their mental health. In mid-2… ▽ More

    Submitted 23 July, 2023; originally announced August 2023.

    Journal ref: 7th International Multi-Topic ICT Conference (IMTIC) 2023

  9. arXiv:2308.04355  [pdf, other

    eess.SP cs.IT

    Evaluation of a Low-Cost Single-Lead ECG Module for Vascular Ageing Prediction and Studying Smoking-induced Changes in ECG

    Authors: S. Anas Ali, M. Saqib Niaz, Mubashir Rehman, Ahsan Mehmood, M. Mahboob Ur Rahman, Kashif Riaz, Qammer H. Abbasi

    Abstract: Vascular age is traditionally measured using invasive methods or through 12-lead electrocardiogram (ECG). This paper utilizes a low-cost single-lead (lead-I) ECG module to predict the vascular age of an apparently healthy young person. In addition, we also study the impact of smoking on ECG traces of the light-but-habitual smokers. We begin by collecting (lead-I) ECG data from 42 apparently health… ▽ More

    Submitted 25 November, 2024; v1 submitted 8 August, 2023; originally announced August 2023.

    Comments: 12 pages, 7 figures, 5 tables, submitted to a journal for review

  10. arXiv:2305.19478  [pdf, other

    cs.CV

    Permutation-Aware Action Segmentation via Unsupervised Frame-to-Segment Alignment

    Authors: Quoc-Huy Tran, Ahmed Mehmood, Muhammad Ahmed, Muhammad Naufil, Anas Zafar, Andrey Konin, M. Zeeshan Zia

    Abstract: This paper presents an unsupervised transformer-based framework for temporal activity segmentation which leverages not only frame-level cues but also segment-level cues. This is in contrast with previous methods which often rely on frame-level information only. Our approach begins with a frame-level prediction module which estimates framewise action classes via a transformer encoder. The frame-lev… ▽ More

    Submitted 26 October, 2023; v1 submitted 30 May, 2023; originally announced May 2023.

    Comments: Accepted to WACV 2024

  11. arXiv:2305.12583  [pdf, other

    eess.SP cs.CV cs.HC eess.IV

    Your smartphone could act as a pulse-oximeter and as a single-lead ECG

    Authors: Ahsan Mehmood, Asma Sarauji, M. Mahboob Ur Rahman, Tareq Y. Al-Naffouri

    Abstract: In the post-covid19 era, every new wave of the pandemic causes an increased concern among the masses to learn more about their state of well-being. Therefore, it is the need of the hour to come up with ubiquitous, low-cost, non-invasive tools for rapid and continuous monitoring of body vitals that reflect the status of one's overall health. In this backdrop, this work proposes a deep learning appr… ▽ More

    Submitted 21 May, 2023; originally announced May 2023.

    Comments: 14 pages, 16 figures

  12. arXiv:2301.06549  [pdf, other

    cs.IT eess.SP

    A Deep Learning & Fast Wavelet Transform-based Hybrid Approach for Denoising of PPG Signals

    Authors: Rabia Ahmed, Ahsan Mehmood, Muhammad Mahboob Ur Rahman, Octavia A. Dobre

    Abstract: This letter presents a novel hybrid method that leverages deep learning to exploit the multi-resolution analysis capability of the wavelets, in order to denoise a photoplethysmography (PPG) signal. Under the proposed method, a noisy PPG sequence of length N is first decomposed into L detailed coefficients using the fast wavelet transform (FWT). Then, the clean PPG sequence is reconstructed as foll… ▽ More

    Submitted 16 January, 2023; originally announced January 2023.

    Comments: 4 pages, 8 figures

  13. arXiv:2301.03018  [pdf, other

    eess.SP cs.AI cs.LG

    Energy Disaggregation & Appliance Identification in a Smart Home: Transfer Learning enables Edge Computing

    Authors: M. Hashim Shahab, Hasan Mujtaba Buttar, Ahsan Mehmood, Waqas Aman, M. Mahboob Ur Rahman, M. Wasim Nawaz, Haris Pervaiz, Qammer H. Abbasi

    Abstract: Non-intrusive load monitoring (NILM) or energy disaggregation aims to extract the load profiles of individual consumer electronic appliances, given an aggregate load profile of the mains of a smart home. This work proposes a novel deep-learning and edge computing approach to solve the NILM problem and a few related problems as follows. 1) We build upon the reputed seq2-point convolutional neural n… ▽ More

    Submitted 14 March, 2024; v1 submitted 8 January, 2023; originally announced January 2023.

    Comments: 10 pages, 4 figures, 3 tables, under review with a journal

  14. arXiv:2301.00321  [pdf, other

    cs.CL

    Floods Relevancy and Identification of Location from Twitter Posts using NLP Techniques

    Authors: Muhammad Suleman, Muhammad Asif, Tayyab Zamir, Ayaz Mehmood, Jebran Khan, Nasir Ahmad, Kashif Ahmad

    Abstract: This paper presents our solutions for the MediaEval 2022 task on DisasterMM. The task is composed of two subtasks, namely (i) Relevance Classification of Twitter Posts (RCTP), and (ii) Location Extraction from Twitter Texts (LETT). The RCTP subtask aims at differentiating flood-related and non-relevant social posts while LETT is a Named Entity Recognition (NER) task and aims at the extraction of l… ▽ More

    Submitted 31 December, 2022; originally announced January 2023.

    Comments: 5 pages, 1 figure, and 4 tables

  15. arXiv:2109.14872  [pdf, other

    cs.IR

    Towards Understanding Trends Manipulation in Pakistan Twitter

    Authors: Soufia Kausar, Bilal Tahir, Muhammad Amir Mehmood

    Abstract: The rapid adoption of online social media platforms has transformed the way of communication and interaction. On these platforms, discussions in the form of trending topics provide a glimpse of events happening around the world in real-time. Also, these trends are used for political campaigns, public awareness, and brand promotions. Consequently, these trends are sensitive to manipulation by malic… ▽ More

    Submitted 30 September, 2021; originally announced September 2021.

  16. arXiv:2011.00565  [pdf, other

    cs.IR

    CURE: Collection for Urdu Information Retrieval Evaluation and Ranking

    Authors: Muntaha Iqbal, Kamran Amjad, Bilal Tahir, Muhammad Amir Mehmood

    Abstract: Urdu is a widely spoken language with 163 million speakers worldwide across the globe. Information Retrieval (IR) for Urdu entails special consideration of research community due to its rich morphological features and a large number of speakers. In general, IR evaluation task is not extensively explored for Urdu. The most important missing element is the availability of a standardized evaluation c… ▽ More

    Submitted 1 November, 2020; originally announced November 2020.

  17. arXiv:2009.00271  [pdf, other

    eess.SP cs.CR

    Preventing Identity Attacks in RFID Backscatter Communication Systems: A Physical-Layer Approach

    Authors: Ahsan Mehmood, Waqas Aman, M. Mahboob Ur Rahman, M. A. Imran, Qammer H. Abbasi

    Abstract: This work considers identity attack on a radio-frequency identification (RFID)-based backscatter communication system. Specifically, we consider a single-reader, single-tag RFID system whereby the reader and the tag undergo two-way signaling which enables the reader to extract the tag ID in order to authenticate the legitimate tag (L-tag). We then consider a scenario whereby a malicious tag (M-tag… ▽ More

    Submitted 1 September, 2020; originally announced September 2020.

    Comments: Accepted for publication in the Proc. of 5th Int. Conf. on the UK/China Emerging Technologies(UCET) 2020

  18. arXiv:1912.12355  [pdf, other

    cs.LG math.OC stat.ML

    SoftAdapt: Techniques for Adaptive Loss Weighting of Neural Networks with Multi-Part Loss Functions

    Authors: A. Ali Heydari, Craig A. Thompson, Asif Mehmood

    Abstract: Adaptive loss function formulation is an active area of research and has gained a great deal of popularity in recent years, following the success of deep learning. However, existing frameworks of adaptive loss functions often suffer from slow convergence and poor choice of weights for the loss components. Traditionally, the elements of a multi-part loss function are weighted equally or their weigh… ▽ More

    Submitted 27 December, 2019; originally announced December 2019.

    Comments: 8 pages with 2 pages of references. 6 Figures and 3 Tables

  19. Using PCA and Factor Analysis for Dimensionality Reduction of Bio-informatics Data

    Authors: M. Usman Ali, Shahzad Ahmed, Javed Ferzund, Atif Mehmood, Abbas Rehman

    Abstract: Large volume of Genomics data is produced on daily basis due to the advancement in sequencing technology. This data is of no value if it is not properly analysed. Different kinds of analytics are required to extract useful information from this raw data. Classification, Prediction, Clustering and Pattern Extraction are useful techniques of data mining. These techniques require appropriate selectio… ▽ More

    Submitted 22 July, 2017; originally announced July 2017.

    Comments: 12 pages, 11 figures, 2 tables

    Journal ref: International Journal of Advanced Computer Science and Applications(IJACSA), Volume 8 Issue 5, 2017

  20. Modern Data Formats for Big Bioinformatics Data Analytics

    Authors: Shahzad Ahmed, M. Usman Ali, Javed Ferzund, Muhammad Atif Sarwar, Abbas Rehman, Atif Mehmood

    Abstract: Next Generation Sequencing (NGS) technology has resulted in massive amounts of proteomics and genomics data. This data is of no use if it is not properly analyzed. ETL (Extraction, Transformation, Loading) is an important step in designing data analytics applications. ETL requires proper understanding of features of data. Data format plays a key role in understanding of data, representation of dat… ▽ More

    Submitted 5 May, 2017; originally announced July 2017.

    Comments: 12 Pages, 20 figures and 2 Tables

    Journal ref: International Journal of Advanced Computer Science and Applications, Issue 8, No. 4, page 366-377 (1 May 2017)

  21. arXiv:1410.3582  [pdf

    cs.SE

    An exploratory study of the suitability of UML-based aspect modeling techniques with respect to their integration into Model-Driven Engineering context

    Authors: Abid Mehmood, Dayang N. A. Jawawi

    Abstract: The integration of aspect oriented modeling approaches with model-driven engineering process achieved through their direct transformation to aspect-oriented code is expected to enhance the software development from many perspectives. However, since no aspect modeling technique has been adopted as the standard while the code generation has to be fully dependent on the input model, it becomes impera… ▽ More

    Submitted 14 October, 2014; originally announced October 2014.

  22. arXiv:1202.4137  [pdf, ps, other

    cs.NI

    Effect of Fast Moving Object on RSSI in WSN: An Experimental Approach

    Authors: Syed Hassan Ahmed, Safdar H. Bouk, Amjad Mehmood, Nadeem Javaid, Sasase Iwao

    Abstract: In this paper, we experimentally investigate the effect of fast moving object on the RSSI in the wireless sensor networks in presence of the ground effect and antenna orientation in elevation direction. In experimental setup, MICAz mote pair was placed on the ground, where one mote acts as a transmitter and the other as a receiver. The trans- mitter mote's antenna was oriented in elevation directi… ▽ More

    Submitted 19 February, 2012; originally announced February 2012.

    Comments: IMTIC 2012 conference, published in Communications in Computer and Information Science (CCIS) series by Springer

  23. arXiv:1202.2510  [pdf

    cs.SE

    A New Teaching Model For The Subject Of Software Project Management

    Authors: M. Rizwan Jameel Qureshi, Muhammad Rafiq Asim, Muhammad Nadeem, Asif Mehmood

    Abstract: Software (SW) development is a very tough task which requires a skilled project leader for its success. If the project leader is not skilled enough then project may fail. In the real world of SW engineering 65% of the SW projects fail to meet their objectives as in [1]. The main reason is lack of training of the project mangers. This extreme ratio of failure can be reduced by teaching SW project m… ▽ More

    Submitted 12 February, 2012; originally announced February 2012.

    Comments: 9 Pages; ISSN: 1013-5316, CODEN: SINTE 8

    Journal ref: Science International-Lahore, Vol. 22/1, March 2010, pp. 295-303

  24. arXiv:cs/0504033  [pdf

    cs.DC

    Resource Management Services for a Grid Analysis Environment

    Authors: Arshad Ali, Ashiq Anjum, Tahir Azim, Julian Bunn, Atif Mehmood, Richard McClatchey, Harvey Newman, Waqas ur Rehman, Conrad Steenberg, Michael Thomas, Frank van Lingen, Ian Willers, Muhammad Adeel Zafar

    Abstract: Selecting optimal resources for submitting jobs on a computational Grid or accessing data from a data grid is one of the most important tasks of any Grid middleware. Most modern Grid software today satisfies this responsibility and gives a best-effort performance to solve this problem. Almost all decisions regarding scheduling and data access are made by the software automatically, giving users… ▽ More

    Submitted 10 April, 2005; originally announced April 2005.

    Comments: 8 pages, 7 figures. Workshop on Web and Grid Services for Scientific Data Analysis at the Int Conf on Parallel Processing (ICPP05). Norway June 2005

    ACM Class: H2.4; J.3

  25. arXiv:cs/0407012   

    cs.DC

    A Taxonomy and Survey of Grid Resource Planning and Reservation Systems for Grid Enabled Analysis Environment

    Authors: Arshad Ali, Ashiq Anjum, Atif Mehmood, Richard McClatchey, Ian Willers, Julian Bunn, Harvey Newman, Michael Thomas, Conrad Steenberg

    Abstract: The concept of coupling geographically distributed resources for solving large scale problems is becoming increasingly popular forming what is popularly called grid computing. Management of resources in the Grid environment becomes complex as the resources are geographically distributed, heterogeneous in nature and owned by different individuals and organizations each having their own resource m… ▽ More

    Submitted 14 January, 2018; v1 submitted 5 July, 2004; originally announced July 2004.

    Comments: This article was submitted in error in 2004. The author list is incorrect and the body of the paper should be attributed to another paper. We request withdrawal of the paper forthwith to avoid inconsistency in our records

    ACM Class: H2.4; J.3