Skip to main content

Showing 1–19 of 19 results for author: Saqib, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.08837  [pdf

    cs.CR cs.CV cs.DC cs.LG cs.NI

    Adaptive Security Policy Management in Cloud Environments Using Reinforcement Learning

    Authors: Muhammad Saqib, Dipkumar Mehta, Fnu Yashu, Shubham Malhotra

    Abstract: The security of cloud environments, such as Amazon Web Services (AWS), is complex and dynamic. Static security policies have become inadequate as threats evolve and cloud resources exhibit elasticity [1]. This paper addresses the limitations of static policies by proposing a security policy management framework that uses reinforcement learning (RL) to adapt dynamically. Specifically, we employ dee… ▽ More

    Submitted 13 May, 2025; originally announced May 2025.

    Comments: 10 pages, 6 figures, 1 table

  2. arXiv:2505.07836  [pdf, other

    cs.DC cs.ET cs.NI cs.PF cs.SE

    Optimizing Intra-Container Communication with Memory Protection Keys: A Novel Approach to Secure and Efficient Microservice Interaction

    Authors: Fnu Yashu, Shubham Malhotra, Muhammad Saqib

    Abstract: In modern cloud-native applications, microservices are commonly deployed in containerized environments to ensure scalability and flexibility. However, inter-process communication (IPC) between co-located microservices often suffers from significant overhead, especially when traditional networking protocols are employed within containers. This paper introduces a novel approach, MPKLink, leveraging… ▽ More

    Submitted 4 May, 2025; originally announced May 2025.

    Comments: 7 pages, 3 figures, 1 table

  3. arXiv:2502.01981  [pdf, other

    cs.DC cs.ET cs.PF cs.SE

    Evaluating Fault Tolerance and Scalability in Distributed File Systems: A Case Study of GFS, HDFS, and MinIO

    Authors: Shubham Malhotra, Fnu Yashu, Muhammad Saqib, Dipkumar Mehta, Jagdish Jangid, Sachin Dixit

    Abstract: Distributed File Systems (DFS) are essential for managing vast datasets across multiple servers, offering benefits in scalability, fault tolerance, and data accessibility. This paper presents a comprehensive evaluation of three prominent DFSs - Google File System (GFS), Hadoop Distributed File System (HDFS), and MinIO - focusing on their fault tolerance mechanisms and scalability under varying dat… ▽ More

    Submitted 28 February, 2025; v1 submitted 3 February, 2025; originally announced February 2025.

    Comments: 9 pages, 3 figures, 3 tables

  4. arXiv:2502.01966  [pdf, other

    cs.CR cs.DC cs.ET cs.SE

    Optimizing Spot Instance Reliability and Security Using Cloud-Native Data and Tools

    Authors: Muhammad Saqib, Shubham Malhotra, Dipkumar Mehta, Jagdish Jangid, Fnu Yashu, Sachin Dixit

    Abstract: This paper represents "Cloudlab", a comprehensive, cloud - native laboratory designed to support network security research and training. Built on Google Cloud and adhering to GitOps methodologies, Cloudlab facilitates the the creation, testing, and deployment of secure, containerized workloads using Kubernetes and serverless architectures. The lab integrates tools like Palo Alto Networks firewalls… ▽ More

    Submitted 6 March, 2025; v1 submitted 3 February, 2025; originally announced February 2025.

    Comments: 7 pages, 5 figures

  5. arXiv:2502.01129   

    cs.DC cs.AI cs.ET cs.LG

    Deep Reinforcement Learning for Dynamic Resource Allocation in Wireless Networks

    Authors: Shubham Malhotra, Fnu Yashu, Muhammad Saqib, Dipkumar Mehta, Jagdish Jangid, Sachin Dixit

    Abstract: This report investigates the application of deep reinforcement learning (DRL) algorithms for dynamic resource allocation in wireless communication systems. An environment that includes a base station, multiple antennas, and user equipment is created. Using the RLlib library, various DRL algorithms such as Deep Q-Network (DQN) and Proximal Policy Optimization (PPO) are then applied. These algorithm… ▽ More

    Submitted 13 March, 2025; v1 submitted 3 February, 2025; originally announced February 2025.

    Comments: Upon further review, we found inconsistencies in our analysis and decided to conduct additional research before resubmitting a revised version

  6. arXiv:2501.02822  [pdf, other

    cs.CV cs.AI cs.RO

    RDD4D: 4D Attention-Guided Road Damage Detection And Classification

    Authors: Asma Alkalbani, Muhammad Saqib, Ahmed Salim Alrawahi, Abbas Anwar, Chandarnath Adak, Saeed Anwar

    Abstract: Road damage detection and assessment are crucial components of infrastructure maintenance. However, current methods often struggle with detecting multiple types of road damage in a single image, particularly at varying scales. This is due to the lack of road datasets with various damage types having varying scales. To overcome this deficiency, first, we present a novel dataset called Diverse Road… ▽ More

    Submitted 6 January, 2025; originally announced January 2025.

  7. arXiv:2410.05771  [pdf, other

    cs.CV

    Cefdet: Cognitive Effectiveness Network Based on Fuzzy Inference for Action Detection

    Authors: Zhe Luo, Weina Fu, Shuai Liu, Saeed Anwar, Muhammad Saqib, Sambit Bakshi, Khan Muhammad

    Abstract: Action detection and understanding provide the foundation for the generation and interaction of multimedia content. However, existing methods mainly focus on constructing complex relational inference networks, overlooking the judgment of detection effectiveness. Moreover, these methods frequently generate detection results with cognitive abnormalities. To solve the above problems, this study propo… ▽ More

    Submitted 16 October, 2024; v1 submitted 8 October, 2024; originally announced October 2024.

    Comments: The paper has been accepted by ACM MM. If you find this work helpful, please consider citing our paper. Zhe Luo, Weina Fu, Shuai Liu, Saeed Anwar, Muhammad Saqib, Sambit Bakshi, Khan Muhammad (2024) Cefdet: Cognitive Effectiveness Network Based on Fuzzy Inference for Action Detection, 32nd ACM International Conference on Multimedia, online first, 10.1145/3664647.3681226

  8. HazeSpace2M: A Dataset for Haze Aware Single Image Dehazing

    Authors: Md Tanvir Islam, Nasir Rahim, Saeed Anwar, Muhammad Saqib, Sambit Bakshi, Khan Muhammad

    Abstract: Reducing the atmospheric haze and enhancing image clarity is crucial for computer vision applications. The lack of real-life hazy ground truth images necessitates synthetic datasets, which often lack diverse haze types, impeding effective haze type classification and dehazing algorithm selection. This research introduces the HazeSpace2M dataset, a collection of over 2 million images designed to en… ▽ More

    Submitted 25 September, 2024; originally announced September 2024.

    Comments: Accepted by ACM Multimedia 2024

    ACM Class: I.4.3

    Journal ref: ACM Multimedia 2024

  9. arXiv:2312.00303  [pdf, other

    cs.NI cs.DC

    A Review of the In-Network Computing and Its Role in the Edge-Cloud Continuum

    Authors: Manel Gherari, Fatemeh Aghaali Akbari, Sama Habibi, Soukaina Ouledsidi Ali, Zakaria Ait Hmitti, Youcef Kardjadja, Muhammad Saqib, Adyson Magalhaes Maia, Marsa Rayani, Ece Gelal Soyak, Halima Elbiaze, Ozgur Ercetin, Yacine Ghamri-Doudane, Roch Glitho, Wessam Ajib

    Abstract: Future networks are anticipated to enable exciting applications and industrial services ranging from Multisensory Extended Reality to Holographic and Haptic communication. These services are accompanied by high bandwidth requirements and/or require low latency and low reliability, which leads to the need for scarce and expensive resources. Cloud and edge computing offer different functionalities t… ▽ More

    Submitted 4 August, 2023; originally announced December 2023.

  10. arXiv:2307.06435  [pdf, other

    cs.CL

    A Comprehensive Overview of Large Language Models

    Authors: Humza Naveed, Asad Ullah Khan, Shi Qiu, Muhammad Saqib, Saeed Anwar, Muhammad Usman, Naveed Akhtar, Nick Barnes, Ajmal Mian

    Abstract: Large Language Models (LLMs) have recently demonstrated remarkable capabilities in natural language processing tasks and beyond. This success of LLMs has led to a large influx of research contributions in this direction. These works encompass diverse topics such as architectural innovations, better training strategies, context length improvements, fine-tuning, multi-modal LLMs, robotics, datasets,… ▽ More

    Submitted 16 October, 2024; v1 submitted 12 July, 2023; originally announced July 2023.

  11. Detecting Severity of Diabetic Retinopathy from Fundus Images: A Transformer Network-based Review

    Authors: Tejas Karkera, Chandranath Adak, Soumi Chattopadhyay, Muhammad Saqib

    Abstract: Diabetic Retinopathy (DR) is considered one of the significant concerns worldwide, primarily due to its impact on causing vision loss among most people with diabetes. The severity of DR is typically comprehended manually by ophthalmologists from fundus photography-based retina images. This paper deals with an automated understanding of the severity stages of DR. In the literature, researchers have… ▽ More

    Submitted 8 June, 2024; v1 submitted 3 January, 2023; originally announced January 2023.

    Journal ref: Neurocomputing, Elsevier, 2024

  12. arXiv:2207.09499  [pdf, other

    cs.CV

    Deep Analysis of Visual Product Reviews

    Authors: Chandranath Adak, Soumi Chattopadhyay, Muhammad Saqib

    Abstract: With the proliferation of the e-commerce industry, analyzing customer feedback is becoming indispensable to a service provider. In recent days, it can be noticed that customers upload the purchased product images with their review scores. In this paper, we undertake the task of analyzing such visual reviews, which is very new of its kind. In the past, the researchers worked on analyzing language f… ▽ More

    Submitted 19 July, 2022; originally announced July 2022.

    Comments: 7 pages

  13. arXiv:2107.08766  [pdf, other

    cs.CV

    VisDrone-CC2020: The Vision Meets Drone Crowd Counting Challenge Results

    Authors: Dawei Du, Longyin Wen, Pengfei Zhu, Heng Fan, Qinghua Hu, Haibin Ling, Mubarak Shah, Junwen Pan, Ali Al-Ali, Amr Mohamed, Bakour Imene, Bin Dong, Binyu Zhang, Bouchali Hadia Nesma, Chenfeng Xu, Chenzhen Duan, Ciro Castiello, Corrado Mencar, Dingkang Liang, Florian Krüger, Gennaro Vessio, Giovanna Castellano, Jieru Wang, Junyu Gao, Khalid Abualsaud , et al. (30 additional authors not shown)

    Abstract: Crowd counting on the drone platform is an interesting topic in computer vision, which brings new challenges such as small object inference, background clutter and wide viewpoint. However, there are few algorithms focusing on crowd counting on the drone-captured data due to the lack of comprehensive datasets. To this end, we collect a large-scale dataset and organize the Vision Meets Drone Crowd C… ▽ More

    Submitted 19 July, 2021; originally announced July 2021.

    Comments: The method description of A7 Mutil-Scale Aware based SFANet (M-SFANet) is updated and missing references are added

    Journal ref: European Conference on Computer Vision. Springer, Cham, 2020: 675-691

  14. arXiv:2106.16126  [pdf

    cs.CV

    Recognizing Facial Expressions in the Wild using Multi-Architectural Representations based Ensemble Learning with Distillation

    Authors: Rauf Momin, Ali Shan Momin, Khalid Rasheed, Muhammad Saqib

    Abstract: Facial expressions are the most common universal forms of body language. In the past few years, automatic facial expression recognition (FER) has been an active field of research. However, it is still a challenging task due to different uncertainties and complications. Nevertheless, efficiency and performance are yet essential aspects for building robust systems. We proposed two models, EmoXNet wh… ▽ More

    Submitted 20 August, 2021; v1 submitted 30 June, 2021; originally announced June 2021.

    Comments: 6 pages, 3 figures, 4 tables

  15. arXiv:2103.11616  [pdf, other

    cs.CV

    A Survey on Image Aesthetic Assessment

    Authors: Abbas Anwar, Saira Kanwal, Muhammad Tahir, Muhammad Saqib, Muhammad Uzair, Mohammad Khalid Imam Rahmani, Habib Ullah

    Abstract: Automatic image aesthetics assessment is a computer vision problem dealing with categorizing images into different aesthetic levels. The categorization is usually done by analyzing an input image and computing some measure of the degree to which the image adheres to the fundamental principles of photography such as balance, rhythm, harmony, contrast, unity, look, feel, tone and texture. Due to its… ▽ More

    Submitted 7 February, 2022; v1 submitted 22 March, 2021; originally announced March 2021.

  16. arXiv:1709.02243  [pdf, other

    cs.CV

    Towards a Dedicated Computer Vision Tool set for Crowd Simulation Models

    Authors: Sultan Daud Khan, Muhammad Saqib, Michael Blumenstein

    Abstract: As the population of world is increasing, and even more concentrated in urban areas, ensuring public safety is becoming a taunting job for security personnel and crowd managers. Mass events like sports, festivals, concerts, political gatherings attract thousand of people in a constraint environment,therefore adequate safety measures should be adopted. Despite safety measures, crowd disasters still… ▽ More

    Submitted 1 September, 2017; originally announced September 2017.

  17. Performance Analysis of Hierarchical Routing Protocols in Wireless Sensor Networks

    Authors: K. Latif, M. Jaffar, N. Javaid, M. N. Saqib, U. Qasim, Z. A. Khan

    Abstract: This work focusses on analyzing the optimization strategies of routing protocols with respect to energy utilization of sensor nodes in Wireless Sensor Network (WSNs). Different routing mechanisms have been proposed to address energy optimization problem in sensor nodes. Clustering mechanism is one of the popular WSNs routing mechanisms. In this paper, we first address energy limitation constraints… ▽ More

    Submitted 12 August, 2012; originally announced August 2012.

    Comments: NGWMN with 7th IEEE International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2012), Victoria, Canada, 2012

  18. arXiv:1002.3996  [pdf

    cs.SE

    Improvement in RUP Project Management via Service Monitoring: Best Practice of SOA

    Authors: Sheikh Muhammad Saqib, Shakeel Ahmad, Shahid Hussain, Bashir Ahmad, Arjamand Bano

    Abstract: Management of project planning, monitoring, scheduling, estimation and risk management are critical issues faced by a project manager during development life cycle of software. In RUP, project management is considered as core discipline whose activities are carried in all phases during development of software products. On other side service monitoring is considered as best practice of SOA which… ▽ More

    Submitted 29 March, 2010; v1 submitted 21 February, 2010; originally announced February 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 2, February 2010, https://sites.google.com/site/journalofcomputing/

  19. arXiv:1001.3497  [pdf

    cs.SE

    Mapping of SOA and RUP: DOA as Case Study

    Authors: Shahid Hussain, Sheikh Muhammad Saqib, Bashir Ahmad, Shakeel Ahmad

    Abstract: SOA (Service Oriented Architecture) is a new trend towards increasing the profit margins in an organization due to incorporating business services to business practices. Rational Unified Process (RUP) is a unified method planning form for large business applications that provides a language for describing method content and processes. The well defined mapping of SOA and RUP leads to successful c… ▽ More

    Submitted 29 March, 2010; v1 submitted 20 January, 2010; originally announced January 2010.

    Comments: Journal of Computing, Vol. 2, Issue 1, January 2010, https://sites.google.com/site/journalofcomputing/

    Journal ref: Journal of Computing, Vol. 2, Issue 1, January 2010, https://sites.google.com/site/journalofcomputing/