Skip to main content

Showing 1–3 of 3 results for author: Shahmohammadi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.05506  [pdf, other

    cs.CL

    ChartQAPro: A More Diverse and Challenging Benchmark for Chart Question Answering

    Authors: Ahmed Masry, Mohammed Saidul Islam, Mahir Ahmed, Aayush Bajaj, Firoz Kabir, Aaryaman Kartha, Md Tahmid Rahman Laskar, Mizanur Rahman, Shadikur Rahman, Mehrad Shahmohammadi, Megh Thakkar, Md Rizwan Parvez, Enamul Hoque, Shafiq Joty

    Abstract: Charts are ubiquitous, as people often use them to analyze data, answer questions, and discover critical insights. However, performing complex analytical tasks with charts requires significant perceptual and cognitive effort. Chart Question Answering (CQA) systems automate this process by enabling models to interpret and reason with visual representations of data. However, existing benchmarks like… ▽ More

    Submitted 10 April, 2025; v1 submitted 7 April, 2025; originally announced April 2025.

  2. arXiv:2403.09028  [pdf, other

    cs.CL

    ChartInstruct: Instruction Tuning for Chart Comprehension and Reasoning

    Authors: Ahmed Masry, Mehrad Shahmohammadi, Md Rizwan Parvez, Enamul Hoque, Shafiq Joty

    Abstract: Charts provide visual representations of data and are widely used for analyzing information, addressing queries, and conveying insights to others. Various chart-related downstream tasks have emerged recently, such as question-answering and summarization. A common strategy to solve these tasks is to fine-tune various models originally trained on vision tasks language. However, such task-specific mo… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

  3. Fingerprinting with Minimum Distance Decoding

    Authors: Shih-Chun Lin, Mohammad Shahmohammadi, Hesham El Gamal

    Abstract: This work adopts an information theoretic framework for the design of collusion-resistant coding/decoding schemes for digital fingerprinting. More specifically, the minimum distance decision rule is used to identify 1 out of t pirates. Achievable rates, under this detection rule, are characterized in two distinct scenarios. First, we consider the averaging attack where a random coding argument i… ▽ More

    Submitted 14 October, 2007; originally announced October 2007.

    Comments: 26 pages, 6 figures, submitted to IEEE Transactions on Information Forensics and Security

    Journal ref: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 1, MARCH 2009 pp.59-69