Skip to main content

Showing 1–15 of 15 results for author: Shafiq, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2206.04803  [pdf, other

    cs.CR cs.DC cs.LG

    Detecting Anomalous Cryptocurrency Transactions: an AML/CFT Application of Machine Learning-based Forensics

    Authors: Nadia Pocher, Mirko Zichichi, Fabio Merizzi, Muhammad Zohaib Shafiq, Stefano Ferretti

    Abstract: In shaping the Internet of Money, the application of blockchain and distributed ledger technologies (DLTs) to the financial sector triggered regulatory concerns. Notably, while the user anonymity enabled in this field may safeguard privacy and data protection, the lack of identifiability hinders accountability and challenges the fight against money laundering and the financing of terrorism and pro… ▽ More

    Submitted 18 March, 2023; v1 submitted 7 June, 2022; originally announced June 2022.

  2. arXiv:2201.06174  [pdf, other

    cs.CV eess.IV

    A novel attention model for salient structure detection in seismic volumes

    Authors: Muhammad Amir Shafiq, Zhiling Long, Haibin Di, Ghassan AlRegib

    Abstract: A new approach to seismic interpretation is proposed to leverage visual perception and human visual system modeling. Specifically, a saliency detection algorithm based on a novel attention model is proposed for identifying subsurface structures within seismic data volumes. The algorithm employs 3D-FFT and a multi-dimensional spectral projection, which decomposes local spectra into three distinct c… ▽ More

    Submitted 16 January, 2022; originally announced January 2022.

    Comments: Published in Applied Computing and Intelligence, Nov. 2021

    Journal ref: Applied Computing and Intelligence, vol. 1, no. 1, pp. 31-45, Nov. 2021

  3. arXiv:2101.03218  [pdf, other

    cs.LG cs.AI cs.CY cs.NI

    DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning

    Authors: Olakunle Ibitoye, M. Omair Shafiq, Ashraf Matrawy

    Abstract: The need for robust, secure and private machine learning is an important goal for realizing the full potential of the Internet of Things (IoT). Federated learning has proven to help protect against privacy violations and information leakage. However, it introduces new risk vectors which make machine learning models more difficult to defend against adversarial samples. In this study, we examine the… ▽ More

    Submitted 8 January, 2021; originally announced January 2021.

  4. arXiv:2011.06725  [pdf, other

    cs.LG cs.CR cs.NI

    A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment

    Authors: Olakunle Ibitoye, Ashraf Matrawy, M. Omair Shafiq

    Abstract: The proliferation of smart, connected, always listening devices have introduced significant privacy risks to users in a smart home environment. Beyond the notable risk of eavesdropping, intruders can adopt machine learning techniques to infer sensitive information from audio recordings on these devices, resulting in a new dimension of privacy concerns and attack variables to smart home users. Tech… ▽ More

    Submitted 12 November, 2020; originally announced November 2020.

  5. arXiv:1911.02621  [pdf, other

    cs.CR cs.LG cs.NI

    The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey

    Authors: Olakunle Ibitoye, Rana Abou-Khamis, Mohamed el Shehaby, Ashraf Matrawy, M. Omair Shafiq

    Abstract: Machine learning models have made many decision support systems to be faster, more accurate, and more efficient. However, applications of machine learning in network security face a more disproportionate threat of active adversarial attacks compared to other domains. This is because machine learning applications in network security such as malware detection, intrusion detection, and spam filtering… ▽ More

    Submitted 21 March, 2023; v1 submitted 6 November, 2019; originally announced November 2019.

  6. arXiv:1901.11095  [pdf, other

    cs.CV

    Saliency detection for seismic applications using multi-dimensional spectral projections and directional comparisons

    Authors: Muhammad Amir Shafiq, Zhiling Long, Tariq Alshawi, Ghassan AlRegib

    Abstract: In this paper, we propose a novel approach for saliency detection for seismic applications using 3D-FFT local spectra and multi-dimensional plane projections. We develop a projection scheme by dividing a 3D-FFT local spectrum of a data volume into three distinct components, each depicting changes along a different dimension of the data. The saliency detection results obtained using each projected… ▽ More

    Submitted 30 January, 2019; originally announced January 2019.

    Journal ref: Proceedings of IEEE International Conference on Image Processing (ICIP), Beijing, China, Sep. 2017

  7. arXiv:1901.02937  [pdf, other

    cs.CV

    SalSi: A new seismic attribute for salt dome detection

    Authors: Muhammad Amir Shafiq, Tariq Alshawi, Zhiling Long, Ghassan AlRegib

    Abstract: In this paper, we propose a saliency-based attribute, SalSi, to detect salt dome bodies within seismic volumes. SalSi is based on the saliency theory and modeling of the human vision system (HVS). In this work, we aim to highlight the parts of the seismic volume that receive highest attention from the human interpreter, and based on the salient features of a seismic image, we detect the salt domes… ▽ More

    Submitted 9 January, 2019; originally announced January 2019.

    Comments: Proceedings of IEEE Intl. Conf. on Acoustics, Speech and Signal Processing (ICASSP), Shanghai, China, Mar. 2016. arXiv admin note: text overlap with arXiv:1812.11960

  8. arXiv:1812.11960  [pdf, other

    cs.CV

    The role of visual saliency in the automation of seismic interpretation

    Authors: Muhammad Amir Shafiq, Tariq Alshawi, Zhiling Long, Ghassan AlRegib

    Abstract: In this paper, we propose a workflow based on SalSi for the detection and delineation of geological structures such as salt domes. SalSi is a seismic attribute designed based on the modeling of human visual system that detects the salient features and captures the spatial correlation within seismic volumes for delineating seismic structures. Using SalSi, we can not only highlight the neighboring r… ▽ More

    Submitted 31 December, 2018; originally announced December 2018.

    Journal ref: Geophysical Prospecting, vol. 66, issue S1, pp. 132-143, Mar. 2018

  9. Subsurface structure analysis using computational interpretation and learning: A visual signal processing perspective

    Authors: G. AlRegib, M. Deriche, Z. Long, H. Di, Z. Wang, Y. Alaudah, M. Shafiq, M. Alfarraj

    Abstract: Understanding Earth's subsurface structures has been and continues to be an essential component of various applications such as environmental monitoring, carbon sequestration, and oil and gas exploration. By viewing the seismic volumes that are generated through the processing of recorded seismic traces, researchers were able to learn from applying advanced image processing and computer vision alg… ▽ More

    Submitted 20 December, 2018; originally announced December 2018.

  10. arXiv:1707.00190  [pdf, other

    cs.CR cs.SI

    Measuring, Characterizing, and Detecting Facebook Like Farms

    Authors: Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Dali Kaafar, M. Zubair Shafiq

    Abstract: Social networks offer convenient ways to seamlessly reach out to large audiences. In particular, Facebook pages are increasingly used by businesses, brands, and organizations to connect with multitudes of users worldwide. As the number of likes of a page has become a de-facto measure of its popularity and profitability, an underground market of services artificially inflating page likes, aka like… ▽ More

    Submitted 4 July, 2017; v1 submitted 1 July, 2017; originally announced July 2017.

    Comments: To appear in ACM Transactions on Privacy and Security (TOPS)

  11. AZ Model for Software Development

    Authors: Ahmed Mateen, Muhammad Azeem, Mohammad Shafiq

    Abstract: Know a days Computer system become essential and it is most commonly used in every field of life. The computer saves time and use to solve complex and extensive problem quickly in an efficient way. For this purpose software programs are develop to facilitate the works for administrator, offices, banks etc. so Quality is the most important factor as it mostly defines CUSTOMER SATISFACTION which dir… ▽ More

    Submitted 28 December, 2016; originally announced December 2016.

    Comments: 4 pages

    Journal ref: International Journal of Computer Applications Foundation of Computer Science (FCS), NY, USA Volume 151 - Number 6 Year of Publication: 2016

  12. arXiv:1506.00506  [pdf, other

    cs.SI cs.CR

    Combating Fraud in Online Social Networks: Detecting Stealthy Facebook Like Farms

    Authors: Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohammad Ali Kaafar, M. Zubair Shafiq

    Abstract: As businesses increasingly rely on social networking sites to engage with their customers, it is crucial to understand and counter reputation manipulation activities, including fraudulently boosting the number of Facebook page likes using like farms. To this end, several fraud detection algorithms have been proposed and some deployed by Facebook that use graph co-clustering to distinguish between… ▽ More

    Submitted 9 May, 2016; v1 submitted 1 June, 2015; originally announced June 2015.

  13. arXiv:1505.01637  [pdf, other

    cs.CY cs.CR

    Characterizing Key Stakeholders in an Online Black-Hat Marketplace

    Authors: Shehroze Farooqi, Muhammad Ikram, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar, M. Zubair Shafiq, Fareed Zaffar

    Abstract: Over the past few years, many black-hat marketplaces have emerged that facilitate access to reputation manipulation services such as fake Facebook likes, fraudulent search engine optimization (SEO), or bogus Amazon reviews. In order to deploy effective technical and legal countermeasures, it is important to understand how these black-hat marketplaces operate, shedding light on the services they of… ▽ More

    Submitted 4 April, 2017; v1 submitted 7 May, 2015; originally announced May 2015.

    Comments: 12th IEEE/APWG Symposium on Electronic Crime Research (eCrime 2017)

  14. arXiv:1409.2097  [pdf, other

    cs.SI cs.CR physics.soc-ph

    Paying for Likes? Understanding Facebook Like Fraud Using Honeypots

    Authors: Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar, M. Zubair Shafiq

    Abstract: Facebook pages offer an easy way to reach out to a very large audience as they can easily be promoted using Facebook's advertising platform. Recently, the number of likes of a Facebook page has become a measure of its popularity and profitability, and an underground market of services boosting page likes, aka like farms, has emerged. Some reports have suggested that like farms use a network of pro… ▽ More

    Submitted 4 October, 2014; v1 submitted 7 September, 2014; originally announced September 2014.

    Comments: To appear in IMC 2014

  15. arXiv:1302.2376  [pdf, other

    cs.SI physics.soc-ph

    Modeling Morphology of Social Network Cascades

    Authors: M. Zubair Shafiq, Alex X. Liu

    Abstract: Cascades represent an important phenomenon across various disciplines such as sociology, economy, psychology, political science, marketing, and epidemiology. An important property of cascades is their morphology, which encompasses the structure, shape, and size. However, cascade morphology has not been rigorously characterized and modeled in prior literature. In this paper, we propose a Multi-orde… ▽ More

    Submitted 10 February, 2013; originally announced February 2013.

    Comments: 12 pages, technical report