Skip to main content

Showing 1–50 of 66 results for author: Siddique, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.17285  [pdf, ps, other

    cs.IR cs.LG

    A Framework for Generating Conversational Recommendation Datasets from Behavioral Interactions

    Authors: Vinaik Chhetri, Yousaf Reza, Moghis Fereidouni, Srijata Maji, Umar Farooq, AB Siddique

    Abstract: Modern recommendation systems typically follow two complementary paradigms: collaborative filtering, which models long-term user preferences from historical interactions, and conversational recommendation systems (CRS), which interact with users in natural language to uncover immediate needs. Each captures a different dimension of user intent. While CRS models lack collaborative signals, leading t… ▽ More

    Submitted 14 June, 2025; originally announced June 2025.

    Comments: 12 pages, 6 tables,4 figures

  2. arXiv:2506.12661  [pdf, ps, other

    cs.IR cs.LG

    INTERPOS: Interaction Rhythm Guided Positional Morphing for Mobile App Recommender Systems

    Authors: M. H. Maqbool, Moghis Fereidouni, Umar Farooq, A. B. Siddique, Hassan Foroosh

    Abstract: The mobile app market has expanded exponentially, offering millions of apps with diverse functionalities, yet research in mobile app recommendation remains limited. Traditional sequential recommender systems utilize the order of items in users' historical interactions to predict the next item for the users. Position embeddings, well-established in transformer-based architectures for natural langua… ▽ More

    Submitted 14 June, 2025; originally announced June 2025.

    Comments: 10 pages, 8 tables, 3 figures

    Journal ref: IEEE 19th International Conference on Semantic Computing (ICSC), 2025

  3. arXiv:2506.10785  [pdf, ps, other

    cs.SE cs.AI

    What Users Value and Critique: Large-Scale Analysis of User Feedback on AI-Powered Mobile Apps

    Authors: Vinaik Chhetri, Krishna Upadhyay, A. B. Siddique, Umar Farooq

    Abstract: Artificial Intelligence (AI)-powered features have rapidly proliferated across mobile apps in various domains, including productivity, education, entertainment, and creativity. However, how users perceive, evaluate, and critique these AI features remains largely unexplored, primarily due to the overwhelming volume of user feedback. In this work, we present the first comprehensive, large-scale stud… ▽ More

    Submitted 12 June, 2025; originally announced June 2025.

    Comments: 12 pages, 6 figures, 5 tables

  4. arXiv:2506.00790  [pdf, ps, other

    cs.CR cs.SE

    Assessing and Enhancing Quantum Readiness in Mobile Apps

    Authors: Joseph Strauss, Krishna Upadhyay, A. B. Siddique, Ibrahim Baggili, Umar Farooq

    Abstract: Quantum computers threaten widely deployed cryptographic primitives such as RSA, DSA, and ECC. While NIST has released post-quantum cryptographic (PQC) standards (e.g., Kyber, Dilithium), mobile app ecosystems remain largely unprepared for this transition. We present a large-scale binary analysis of over 4,000 Android apps to assess cryptographic readiness. Our results show widespread reliance on… ▽ More

    Submitted 31 May, 2025; originally announced June 2025.

    Comments: 2 pages, 2 figures, 1 table. 46th IEEE Symposium on Security and Privacy (Poster Track), 2025

  5. arXiv:2505.08801  [pdf, ps, other

    cs.CV cs.LG eess.IV

    OptiGait-LGBM: An Efficient Approach of Gait-based Person Re-identification in Non-Overlapping Regions

    Authors: Md. Sakib Hassan Chowdhury, Md. Hafiz Ahamed, Bishowjit Paul, Sarafat Hussain Abhi, Abu Bakar Siddique, Md. Robius Sany

    Abstract: Gait recognition, known for its ability to identify individuals from a distance, has gained significant attention in recent times due to its non-intrusive verification. While video-based gait identification systems perform well on large public datasets, their performance drops when applied to real-world, unconstrained gait data due to various factors. Among these, uncontrolled outdoor environments… ▽ More

    Submitted 10 May, 2025; originally announced May 2025.

    Comments: 12 pages, 17 figures

  6. arXiv:2504.17929  [pdf

    cs.AI cs.AR

    ApproXAI: Energy-Efficient Hardware Acceleration of Explainable AI using Approximate Computing

    Authors: Ayesha Siddique, Khurram Khalil, Khaza Anuarul Hoque

    Abstract: Explainable artificial intelligence (XAI) enhances AI system transparency by framing interpretability as an optimization problem. However, this approach often necessitates numerous iterations of computationally intensive operations, limiting its applicability in real-time scenarios. While recent research has focused on XAI hardware acceleration on FPGAs and TPU, these methods do not fully address… ▽ More

    Submitted 12 May, 2025; v1 submitted 24 April, 2025; originally announced April 2025.

    Comments: Accepted at the International Joint Conference on Neural Networks (IJCNN), June 30th - July 5th, 2025 in Rome, Italy

  7. arXiv:2503.16583  [pdf

    cs.LG cs.AI cs.AR

    Explainable AI-Guided Efficient Approximate DNN Generation for Multi-Pod Systolic Arrays

    Authors: Ayesha Siddique, Khurram Khalil, Khaza Anuarul Hoque

    Abstract: Approximate deep neural networks (AxDNNs) are promising for enhancing energy efficiency in real-world devices. One of the key contributors behind this enhanced energy efficiency in AxDNNs is the use of approximate multipliers. Unfortunately, the simulation of approximate multipliers does not usually scale well on CPUs and GPUs. As a consequence, this slows down the overall simulation of AxDNNs aim… ▽ More

    Submitted 20 March, 2025; originally announced March 2025.

    Comments: This paper has been accepted in the ISQED 2025 conference

  8. arXiv:2503.11893  [pdf, ps, other

    cs.CV eess.IV

    UStyle: Waterbody Style Transfer of Underwater Scenes by Depth-Guided Feature Synthesis

    Authors: Md Abu Bakr Siddique, Vaishnav Ramesh, Junliang Liu, Piyush Singh, Md Jahidul Islam

    Abstract: The concept of waterbody style transfer remains largely unexplored in the underwater imaging and vision literature. Traditional image style transfer (STx) methods primarily focus on artistic and photorealistic blending, often failing to preserve object and scene geometry in images captured in high-scattering mediums such as underwater. The wavelength-dependent nonlinear attenuation and depth-depen… ▽ More

    Submitted 7 June, 2025; v1 submitted 14 March, 2025; originally announced March 2025.

  9. arXiv:2502.13310  [pdf, other

    cs.CL

    Evaluating and Enhancing Out-of-Domain Generalization of Task-Oriented Dialog Systems for Task Completion without Turn-level Dialog Annotations

    Authors: Adib Mosharrof, Moghis Fereidouni, A. B. Siddique

    Abstract: Traditional task-oriented dialog (ToD) systems rely heavily on labor-intensive turn-level annotations, such as dialogue states and policy labels, for training. This work explores whether large language models (LLMs) can be fine-tuned solely on natural language dialogs to perform ToD tasks, without requiring such annotations. We evaluate their ability to generalize to unseen domains and compare the… ▽ More

    Submitted 18 February, 2025; originally announced February 2025.

    Comments: 8 pages

  10. arXiv:2502.13298  [pdf, other

    cs.CL

    Improving Multi-turn Task Completion in Task-Oriented Dialog Systems via Prompt Chaining and Fine-Grained Feedback

    Authors: Moghis Fereidouni, Md Sajid Ahmed, Adib Mosharrof, A. B. Siddique

    Abstract: Task-oriented dialog (TOD) systems facilitate users in accomplishing complex, multi-turn tasks through natural language. While traditional approaches rely on extensive fine-tuning and annotated data for each domain, instruction-tuned large language models (LLMs) offer a more flexible alternative. However, LLMs struggle to reliably handle multi-turn task completion, particularly with accurately gen… ▽ More

    Submitted 18 February, 2025; originally announced February 2025.

    Comments: 8 pages

  11. arXiv:2502.06809  [pdf, other

    cs.LG cs.AI cs.CL

    Neurons Speak in Ranges: Breaking Free from Discrete Neuronal Attribution

    Authors: Muhammad Umair Haider, Hammad Rizwan, Hassan Sajjad, Peizhong Ju, A. B. Siddique

    Abstract: Interpreting the internal mechanisms of large language models (LLMs) is crucial for improving their trustworthiness and utility. Prior work has primarily focused on mapping individual neurons to discrete semantic concepts. However, such mappings struggle to handle the inherent polysemanticity in LLMs, where individual neurons encode multiple, distinct concepts. Through a comprehensive analysis of… ▽ More

    Submitted 20 May, 2025; v1 submitted 3 February, 2025; originally announced February 2025.

  12. arXiv:2501.06894  [pdf, ps, other

    cs.SE

    Analyzing the Evolution and Maintenance of Quantum Software Repositories

    Authors: Krishna Upadhyay, Vinaik Chhetri, A. B. Siddique, Umar Farooq

    Abstract: Quantum computing is rapidly advancing, but quantum software development faces significant challenges, including a steep learning curve, high hardware error rates, and a lack of mature engineering practices. This study conducts a large-scale mining analysis of over 21,000 GitHub repositories, containing 1.2 million commits from more than 10,000 developers, to examine the evolution and maintenance… ▽ More

    Submitted 5 June, 2025; v1 submitted 12 January, 2025; originally announced January 2025.

    Comments: 12 pages, 12 figures, 6 tables,

    Journal ref: IEEE Quantum Software Development (QSW), 2025

  13. arXiv:2411.18594  [pdf

    cs.LG cs.CV cs.RO

    Biomolecular Analysis of Soil Samples and Rock Imagery for Tracing Evidence of Life Using a Mobile Robot

    Authors: Shah Md Ahasan Siddique, Ragib Tahshin Rinath, Shakil Mosharrof, Syed Tanjib Mahmud, Sakib Ahmed

    Abstract: The search for evidence of past life on Mars presents a tremendous challenge that requires the usage of very advanced robotic technologies to overcome it. Current digital microscopic imagers and spectrometers used for astrobiological examination suffer from limitations such as insufficient resolution, narrow detection range, and lack of portability. To overcome these challenges, this research stud… ▽ More

    Submitted 27 November, 2024; originally announced November 2024.

    Comments: Key Words : Mars, Rover, Phoenix, Biosignatures, Biomolecular Analysis, Microscopy, Spectroscopy, Sampling, Astrobiology

  14. arXiv:2411.15602  [pdf, other

    cs.CV cs.LG

    Enhancing Object Detection Accuracy in Autonomous Vehicles Using Synthetic Data

    Authors: Sergei Voronin, Abubakar Siddique, Muhammad Iqbal

    Abstract: The rapid progress in machine learning models has significantly boosted the potential for real-world applications such as autonomous vehicles, disease diagnoses, and recognition of emergencies. The performance of many machine learning models depends on the nature and size of the training data sets. These models often face challenges due to the scarcity, noise, and imbalance in real-world data, lim… ▽ More

    Submitted 23 November, 2024; originally announced November 2024.

    Comments: 7 Pages, 7 figures, 1 table

  15. arXiv:2411.07053  [pdf

    cs.RO cs.CG

    UAV survey coverage path planning of complex regions containing exclusion zones

    Authors: Shadman Tajwar Shahid, Shah Md. Ahasan Siddique, Md. Mahidul Alam

    Abstract: This article addresses the challenge of UAV survey coverage path planning for areas that are complex concave polygons, containing exclusion zones or obstacles. While standard drone path planners typically generate coverage paths for simple convex polygons, this study proposes a method to manage more intricate regions, including boundary splits, merges, and interior holes. To achieve this, polygona… ▽ More

    Submitted 13 November, 2024; v1 submitted 11 November, 2024; originally announced November 2024.

  16. arXiv:2411.07047  [pdf

    cs.RO physics.ins-det

    Automatic Contact-Based 3D Scanning Using Articulated Robotic Arm

    Authors: Shadman Tajwar Shahid, Shah Md. Ahasan Siddique, Md. Humayun Kabir Bhuiyan

    Abstract: This paper presents an open-loop articulated 6-degree-of-freedom (DoF) robotic system for three-dimensional (3D) scanning of objects by contact-based method. A digitizer probe was used to detect contact with the object. Inverse kinematics (IK) was used to determine the joint angles of the robot corresponding to the probe position and orientation, and straight-line trajectory planning was implement… ▽ More

    Submitted 11 November, 2024; originally announced November 2024.

  17. arXiv:2411.01119  [pdf, other

    cs.CV cs.RO

    AquaFuse: Waterbody Fusion for Physics Guided View Synthesis of Underwater Scenes

    Authors: Md Abu Bakr Siddique, Jiayi Wu, Ioannis Rekleitis, Md Jahidul Islam

    Abstract: We introduce the idea of AquaFuse, a physics-based method for synthesizing waterbody properties in underwater imagery. We formulate a closed-form solution for waterbody fusion that facilitates realistic data augmentation and geometrically consistent underwater scene rendering. AquaFuse leverages the physical characteristics of light propagation underwater to synthesize the waterbody from one scene… ▽ More

    Submitted 11 March, 2025; v1 submitted 1 November, 2024; originally announced November 2024.

  18. arXiv:2407.15055  [pdf, other

    cs.CL

    Training Zero-Shot Generalizable End-to-End Task-Oriented Dialog System Without Turn-level Dialog Annotations

    Authors: Adib Mosharrof, A. B. Siddique

    Abstract: Task-oriented dialogue (TOD) systems enable users to achieve their goals through natural language interactions. Traditionally, these systems have relied on turn-level manually annotated metadata, such as dialogue states and policy annotations, which are expensive, time-consuming, and often inconsistent or error-prone. This dependence limits the potential to leverage vast amounts of readily availab… ▽ More

    Submitted 4 November, 2024; v1 submitted 21 July, 2024; originally announced July 2024.

  19. arXiv:2407.04868  [pdf, ps, other

    cs.AI cs.SE

    Looking into Black Box Code Language Models

    Authors: Muhammad Umair Haider, Umar Farooq, A. B. Siddique, Mark Marron

    Abstract: Language Models (LMs) have shown their application for tasks pertinent to code and several code~LMs have been proposed recently. The majority of the studies in this direction only focus on the improvements in performance of the LMs on different benchmarks, whereas LMs are considered black boxes. Besides this, a handful of works attempt to understand the role of attention layers in the code~LMs. No… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

  20. arXiv:2405.17740  [pdf, other

    cs.CL

    MobileConvRec: A Conversational Dataset for Mobile Apps Recommendations

    Authors: Srijata Maji, Moghis Fereidouni, Vinaik Chhetri, Umar Farooq, A. B. Siddique

    Abstract: Existing recommendation systems have focused on two paradigms: 1- historical user-item interaction-based recommendations and 2- conversational recommendations. Conversational recommendation systems facilitate natural language dialogues between users and the system, allowing the system to solicit users' explicit needs while enabling users to inquire about recommendations and provide feedback. Due t… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  21. Grounded Language Agent for Product Search via Intelligent Web Interactions

    Authors: Moghis Fereidouni, Adib Mosharrof, A. B. Siddique

    Abstract: The development of agents powered by large language models (LLMs) to accomplish complex high-level user intents, has attracted significant attention recently. However, employing LLMs with billions of parameters (e.g., GPT-4) may incur substantial costs on top of handcrafting extensive prompts. To address this, we introduce a Grounded Language Agent for Intelligent Web Interactions, named GLAINTEL.… ▽ More

    Submitted 26 January, 2025; v1 submitted 16 April, 2024; originally announced April 2024.

    Comments: 9 pages

    Journal ref: 2024.customnlp4u-1.7

  22. arXiv:2402.11829  [pdf

    cs.CR eess.SY

    Deployment of Advanced and Intelligent Logistics Vehicles with Enhanced Tracking and Security Features

    Authors: Iqtiar Md Siddique, Selim Molla, MD Rakib Hasan, Anamika Ahmed Siddique

    Abstract: This study focuses on the implementation of modern and intelligent logistics vehicles equipped with advanced tracking and security features. In response to the evolving landscape of logistics management, the proposed system integrates cutting edge technologies to enhance efficiency and ensure the security of the entire logistics process. The core component of this implementation is the incorporati… ▽ More

    Submitted 18 February, 2024; originally announced February 2024.

    Comments: 8 pages

    Journal ref: Journal of IoT and Machine Learning,2024

  23. arXiv:2402.10831  [pdf, other

    eess.IV cs.CE cs.LG eess.SP

    GAN-driven Electromagnetic Imaging of 2-D Dielectric Scatterers

    Authors: Ehtasham Naseer, Ali Imran Sandhu, Muhammad Adnan Siddique, Waqas W. Ahmed, Mohamed Farhat, Ying Wu

    Abstract: Inverse scattering problems are inherently challenging, given the fact they are ill-posed and nonlinear. This paper presents a powerful deep learning-based approach that relies on generative adversarial networks to accurately and efficiently reconstruct randomly-shaped two-dimensional dielectric objects from amplitudes of multi-frequency scattered electric fields. An adversarial autoencoder (AAE)… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

  24. Zero-Shot Generalizable End-to-End Task-Oriented Dialog System using Context Summarization and Domain Schema

    Authors: Adib Mosharrof, M. H. Maqbool, A. B. Siddique

    Abstract: Task-oriented dialog systems empower users to accomplish their goals by facilitating intuitive and expressive natural language interactions. State-of-the-art approaches in task-oriented dialog systems formulate the problem as a conditional sequence generation task and fine-tune pre-trained causal language models in the supervised setting. This requires labeled training data for each new domain or… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Report number: 133072

    Journal ref: The International FLAIRS Conference Proceedings, Vol. 36, 2023

  25. Toward Open-domain Slot Filling via Self-supervised Co-training

    Authors: Adib Mosharrof, Moghis Fereidouni, A. B. Siddique

    Abstract: Slot filling is one of the critical tasks in modern conversational systems. The majority of existing literature employs supervised learning methods, which require labeled training data for each new domain. Zero-shot learning and weak supervision approaches, among others, have shown promise as alternatives to manual labeling. Nonetheless, these learning paradigms are significantly inferior to super… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: 10 pages, 6 tables, 2 figures, ACM Web Conference 2023 (WWW'23)

  26. Personalizing Task-oriented Dialog Systems via Zero-shot Generalizable Reward Function

    Authors: A. B. Siddique, M. H. Maqbool, Kshitija Taywade, Hassan Foroosh

    Abstract: Task-oriented dialog systems enable users to accomplish tasks using natural language. State-of-the-art systems respond to users in the same way regardless of their personalities, although personalizing dialogues can lead to higher levels of adoption and better user experiences. Building personalized dialog systems is an important, yet challenging endeavor and only a handful of works took on the ch… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: 11 pages, 4 tables, 31st ACM International Conference on Information and Knowledge Management (CIKM'22)

  27. arXiv:2303.06588  [pdf, other

    cs.IR cs.LG cs.SE

    MobileRec: A Large-Scale Dataset for Mobile Apps Recommendation

    Authors: M. H. Maqbool, Umar Farooq, Adib Mosharrof, A. B. Siddique, Hassan Foroosh

    Abstract: Recommender systems have become ubiquitous in our digital lives, from recommending products on e-commerce websites to suggesting movies and music on streaming platforms. Existing recommendation datasets, such as Amazon Product Reviews and MovieLens, greatly facilitated the research and development of recommender systems in their respective domains. While the number of mobile users and applications… ▽ More

    Submitted 12 March, 2023; originally announced March 2023.

    Comments: 10 pages, 4 tables, 4 figures, Under submission at SIGIR'23

  28. Proactive Prioritization of App Issues via Contrastive Learning

    Authors: Moghis Fereidouni, Adib Mosharrof, Umar Farooq, AB Siddique

    Abstract: Mobile app stores produce a tremendous amount of data in the form of user reviews, which is a huge source of user requirements and sentiments; such reviews allow app developers to proactively address issues in their apps. However, only a small number of reviews capture common issues and sentiments which creates a need for automatically identifying prominent reviews. Unfortunately, most existing wo… ▽ More

    Submitted 12 March, 2023; originally announced March 2023.

    Comments: 10 pages, 2022 IEEE International Conference on Big Data (Big Data)

  29. arXiv:2302.11027  [pdf

    cs.CV

    Analysis of Real-Time Hostile Activitiy Detection from Spatiotemporal Features Using Time Distributed Deep CNNs, RNNs and Attention-Based Mechanisms

    Authors: Labib Ahmed Siddique, Rabita Junhai, Tanzim Reza, Salman Sayeed Khan, Tanvir Rahman

    Abstract: Real-time video surveillance, through CCTV camera systems has become essential for ensuring public safety which is a priority today. Although CCTV cameras help a lot in increasing security, these systems require constant human interaction and monitoring. To eradicate this issue, intelligent surveillance systems can be built using deep learning video classification techniques that can help us autom… ▽ More

    Submitted 21 February, 2023; originally announced February 2023.

  30. arXiv:2302.01542  [pdf, other

    cs.AI

    Lateralization in Agents' Decision Making: Evidence of Benefits/Costs from Artificial Intelligence

    Authors: Abubakar Siddique, Will N. Browne, Gina M. Grimshaw

    Abstract: Lateralization is ubiquitous in vertebrate brains which, as well as its role in locomotion, is considered an important factor in biological intelligence. Lateralization has been associated with both poor and good performance. It has been hypothesized that lateralization has benefits that may counterbalance its costs. Given that lateralization is ubiquitous, it likely has advantages that can benefi… ▽ More

    Submitted 2 February, 2023; originally announced February 2023.

    Comments: 13 pages, 14 figures

  31. arXiv:2301.12637  [pdf, other

    cs.CV cs.LG

    Lateralized Learning for Multi-Class Visual Classification Tasks

    Authors: Abubakar Siddique, Will N. Browne, Gina M. Grimshaw

    Abstract: The majority of computer vision algorithms fail to find higher-order (abstract) patterns in an image so are not robust against adversarial attacks, unlike human lateralized vision. Deep learning considers each input pixel in a homogeneous manner such that different parts of a ``locality-sensitive hashing table'' are often not connected, meaning higher-order patterns are not discovered. Hence these… ▽ More

    Submitted 29 January, 2023; originally announced January 2023.

    Comments: 13 pages, 5 figures

  32. arXiv:2301.10822  [pdf

    cs.CR cs.AI cs.LG

    RobustPdM: Designing Robust Predictive Maintenance against Adversarial Attacks

    Authors: Ayesha Siddique, Ripan Kumar Kundu, Gautam Raj Mode, Khaza Anuarul Hoque

    Abstract: The state-of-the-art predictive maintenance (PdM) techniques have shown great success in reducing maintenance costs and downtime of complicated machines while increasing overall productivity through extensive utilization of Internet-of-Things (IoT) and Deep Learning (DL). Unfortunately, IoT sensors and DL algorithms are both prone to cyber-attacks. For instance, DL algorithms are known for their s… ▽ More

    Submitted 10 August, 2023; v1 submitted 25 January, 2023; originally announced January 2023.

  33. Exposing Reliability Degradation and Mitigation in Approximate DNNs under Permanent Faults

    Authors: Ayesha Siddique, Khaza Anuarul Hoque

    Abstract: Approximate computing is known for enhancing deep neural network accelerators' energy efficiency by introducing inexactness with a tolerable accuracy loss. However, small accuracy variations may increase the sensitivity of these accelerators towards undesired subtle disturbances, such as permanent faults. The impact of permanent faults in accurate deep neural network (AccDNN) accelerators has been… ▽ More

    Submitted 12 January, 2023; originally announced January 2023.

    Comments: Accepted for publication in the IEEE Transactions on Very Large Scale Integration Systems (TVLSI) journal

  34. arXiv:2301.05266  [pdf, other

    cs.NE cs.ET

    Improving Reliability of Spiking Neural Networks through Fault Aware Threshold Voltage Optimization

    Authors: Ayesha Siddique, Khaza Anuarul Hoque

    Abstract: Spiking neural networks have made breakthroughs in computer vision by lending themselves to neuromorphic hardware. However, the neuromorphic hardware lacks parallelism and hence, limits the throughput and hardware acceleration of SNNs on edge devices. To address this problem, many systolic-array SNN accelerators (systolicSNNs) have been proposed recently, but their reliability is still a major con… ▽ More

    Submitted 12 January, 2023; originally announced January 2023.

    Comments: Accepted full paper in DATE 2023

  35. arXiv:2301.05264  [pdf, other

    cs.CR cs.AI cs.ET

    Security-Aware Approximate Spiking Neural Networks

    Authors: Syed Tihaam Ahmad, Ayesha Siddique, Khaza Anuarul Hoque

    Abstract: Deep Neural Networks (DNNs) and Spiking Neural Networks (SNNs) are both known for their susceptibility to adversarial attacks. Therefore, researchers in the recent past have extensively studied the robustness and defense of DNNs and SNNs under adversarial attacks. Compared to accurate SNNs (AccSNN), approximate SNNs (AxSNNs) are known to be up to 4X more energy-efficient for ultra-low power applic… ▽ More

    Submitted 12 January, 2023; originally announced January 2023.

    Comments: Accepted full paper in DATE 2023

  36. Tracking Passengers and Baggage Items using Multiple Overhead Cameras at Security Checkpoints

    Authors: Abubakar Siddique, Henry Medeiros

    Abstract: We introduce a novel framework to track multiple objects in overhead camera videos for airport checkpoint security scenarios where targets correspond to passengers and their baggage items. We propose a Self-Supervised Learning (SSL) technique to provide the model information about instance segmentation uncertainty from overhead images. Our SSL approach improves object detection by employing a test… ▽ More

    Submitted 30 September, 2023; v1 submitted 31 December, 2022; originally announced January 2023.

    Comments: Mistaken upload. See arXiv:2007.07924 for the latest version

    Journal ref: IEEE Transactions on Systems, Man, and Cybernetics: Systems, Early Access, 14 December 2022

  37. arXiv:2212.11935  [pdf, other

    cs.DS cs.SE

    GraphTango: A Hybrid Representation Format for Efficient Streaming Graph Updates and Analysis

    Authors: Alif Ahmed, Farzana Ahmed Siddique, Kevin Skadron

    Abstract: Streaming graph processing involves performing updates and analytics on a time-evolving graph. The underlying representation format largely determines the throughputs of these updates and analytics phases. Existing formats usually employ variations of hash tables or adjacency lists. However, adjacency-list-based approaches perform poorly on heavy-tailed graphs, and the hash-based approaches suffer… ▽ More

    Submitted 22 December, 2022; originally announced December 2022.

  38. arXiv:2210.10077  [pdf, other

    cs.PF cs.AR cs.FL

    Deterministic vs. Non Deterministic Finite Automata in Automata Processing

    Authors: Farzana Ahmed Siddique, Tommy James Tracy II, Nathan Brunelle, Kevin Skadron

    Abstract: Linear-time pattern matching engines have seen promising results using Finite Automata (FA) as their computation model. Among different FA variants, deterministic (DFA) and non-deterministic (NFA) are the most commonly used computation models for FA-based pattern matching engines. Moreover, NFA is the prevalent model in pattern matching engines on spatial architectures. The reasons are: i) DFA siz… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

  39. Self-supervised Learning for Panoptic Segmentation of Multiple Fruit Flower Species

    Authors: Abubakar Siddique, Amy Tabb, Henry Medeiros

    Abstract: Convolutional neural networks trained using manually generated labels are commonly used for semantic or instance segmentation. In precision agriculture, automated flower detection methods use supervised models and post-processing techniques that may not perform consistently as the appearance of the flowers and the data acquisition conditions vary. We propose a self-supervised learning strategy to… ▽ More

    Submitted 10 September, 2022; originally announced September 2022.

    Comments: 8 pages, 7 figures

    Journal ref: IEEE Robotics and Automation Letters ( Volume: 7, Issue: 4, October 2022)

  40. arXiv:2204.00144  [pdf, other

    cs.LG

    Effect of Balancing Data Using Synthetic Data on the Performance of Machine Learning Classifiers for Intrusion Detection in Computer Networks

    Authors: Ayesha S. Dina, A. B. Siddique, D. Manivannan

    Abstract: Attacks on computer networks have increased significantly in recent days, due in part to the availability of sophisticated tools for launching such attacks as well as thriving underground cyber-crime economy to support it. Over the past several years, researchers in academia and industry used machine learning (ML) techniques to design and implement Intrusion Detection Systems (IDSes) for computer… ▽ More

    Submitted 31 March, 2022; originally announced April 2022.

  41. arXiv:2203.08760  [pdf

    eess.SY cs.MA

    Incorporating Multi-Agent Systems Technology in Power and Energy Systems of Bangladesh: A Feasibility Study

    Authors: Syed Redwan Md Hassan, Nazmul Hasan, Mohammad Ali Siddique, K. M Solaiman Fahim, Rummana Rahman, Lamia Iftekhar

    Abstract: The power sector of Bangladesh is presently experiencing essential changes as demand for power services is increasing with rising population and economic development. With a gradual shift from a rigidly centralized structure to a more decentralized and fluid setup, fundamentally because of the enormous advancement of distributed renewable energy sources, the future power system of the nation requi… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

  42. arXiv:2112.06331  [pdf

    cs.DB cs.CL

    Graph-based hierarchical record clustering for unsupervised entity resolution

    Authors: Islam Akef Ebeid, John R. Talburt, Md Abdus Salam Siddique

    Abstract: Here we study the problem of matched record clustering in unsupervised entity resolution. We build upon a state-of-the-art probabilistic framework named the Data Washing Machine (DWM). We introduce a graph-based hierarchical 2-step record clustering method (GDWM) that first identifies large, connected components or, as we call them, soft clusters in the matched record pairs using a graph-based tra… ▽ More

    Submitted 12 December, 2021; originally announced December 2021.

    Comments: Accepted at the 19th International Conference on Information Technology : New Generations (ITNG 2022)

  43. arXiv:2112.01555  [pdf, other

    cs.CR cs.LG

    Is Approximation Universally Defensive Against Adversarial Attacks in Deep Neural Networks?

    Authors: Ayesha Siddique, Khaza Anuarul Hoque

    Abstract: Approximate computing is known for its effectiveness in improvising the energy efficiency of deep neural network (DNN) accelerators at the cost of slight accuracy loss. Very recently, the inexact nature of approximate components, such as approximate multipliers have also been reported successful in defending adversarial attacks on DNNs models. Since the approximation errors traverse through the DN… ▽ More

    Submitted 2 December, 2021; originally announced December 2021.

    Comments: Accepted for publication in DATE 2022

  44. arXiv:2102.02925  [pdf, other

    cs.CL cs.AI

    Generalized Zero-shot Intent Detection via Commonsense Knowledge

    Authors: A. B. Siddique, Fuad Jamour, Luxun Xu, Vagelis Hristidis

    Abstract: Identifying user intents from natural language utterances is a crucial step in conversational systems that has been extensively studied as a supervised classification problem. However, in practice, new intents emerge after deploying an intent detection model. Thus, these models should seamlessly adapt and classify utterances with both seen and unseen intents -- unseen intents emerge after deployme… ▽ More

    Submitted 4 February, 2021; originally announced February 2021.

  45. arXiv:2101.06514  [pdf, other

    cs.CL

    Linguistically-Enriched and Context-Aware Zero-shot Slot Filling

    Authors: A. B. Siddique, Fuad Jamour, Vagelis Hristidis

    Abstract: Slot filling is identifying contiguous spans of words in an utterance that correspond to certain parameters (i.e., slots) of a user request/query. Slot filling is one of the most important challenges in modern task-oriented dialog systems. Supervised learning approaches have proven effective at tackling this challenge, but they need a significant amount of labeled training data in a given domain.… ▽ More

    Submitted 16 January, 2021; originally announced January 2021.

  46. arXiv:2101.02860  [pdf, other

    cs.LG cs.AI cs.AR

    Exploring Fault-Energy Trade-offs in Approximate DNN Hardware Accelerators

    Authors: Ayesha Siddique, Kanad Basu, Khaza Anuarul Hoque

    Abstract: Systolic array-based deep neural network (DNN) accelerators have recently gained prominence for their low computational cost. However, their high energy consumption poses a bottleneck to their deployment in energy-constrained devices. To address this problem, approximate computing can be employed at the cost of some tolerable accuracy loss. However, such small accuracy variations may increase the… ▽ More

    Submitted 8 January, 2021; originally announced January 2021.

    Comments: Accepted for publication in the The 22nd International Symposium on Quality Electronic Design (ISQED'21)

  47. arXiv:2010.11978  [pdf

    eess.IV cs.CV cs.LG cs.NE

    Deep Convolutional Neural Networks Model-based Brain Tumor Detection in Brain MRI Images

    Authors: Md. Abu Bakr Siddique, Shadman Sakib, Mohammad Mahmudur Rahman Khan, Abyaz Kader Tanzeem, Madiha Chowdhury, Nowrin Yasmin

    Abstract: Diagnosing Brain Tumor with the aid of Magnetic Resonance Imaging (MRI) has gained enormous prominence over the years, primarily in the field of medical science. Detection and/or partitioning of brain tumors solely with the aid of MR imaging is achieved at the cost of immense time and effort and demands a lot of expertise from engaged personnel. This substantiates the necessity of fabricating an a… ▽ More

    Submitted 3 October, 2020; originally announced October 2020.

    Comments: 4th International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2020), IEEE, 7-9 October 2020, TamilNadu, INDIA

    Journal ref: 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)

  48. Prediction of Temperature and Rainfall in Bangladesh using Long Short Term Memory Recurrent Neural Networks

    Authors: Mohammad Mahmudur Rahman Khan, Md. Abu Bakr Siddique, Shadman Sakib, Anas Aziz, Ihtyaz Kader Tasawar, Ziad Hossain

    Abstract: Temperature and rainfall have a significant impact on economic growth as well as the outbreak of seasonal diseases in a region. In spite of that inadequate studies have been carried out for analyzing the weather pattern of Bangladesh implementing the artificial neural network. Therefore, in this study, we are implementing a Long Short-term Memory (LSTM) model to forecast the month-wise temperature… ▽ More

    Submitted 22 October, 2020; originally announced October 2020.

    Comments: 4th International Symposium on Multidisciplinary Studies and Innovative Technologies, IEEE, 22-24 October, 2020, TURKEY

    Journal ref: 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)

  49. arXiv:2007.15793  [pdf, other

    cs.SE cs.LG

    App-Aware Response Synthesis for User Reviews

    Authors: Umar Farooq, A. B. Siddique, Fuad Jamour, Zhijia Zhao, Vagelis Hristidis

    Abstract: Responding to user reviews promptly and satisfactorily improves application ratings, which is key to application popularity and success. The proliferation of such reviews makes it virtually impossible for developers to keep up with responding manually. To address this challenge, recent work has shown the possibility of automatic response generation. However, because the training review-response pa… ▽ More

    Submitted 10 November, 2020; v1 submitted 30 July, 2020; originally announced July 2020.

    Journal ref: IEEE International Conference on Big Data (IEEE BigData) 2020

  50. Performance Evaluation of t-SNE and MDS Dimensionality Reduction Techniques with KNN, ENN and SVM Classifiers

    Authors: Shadman Sakib, Md. Abu Bakr Siddique, Md. Abdur Rahman

    Abstract: The central goal of this paper is to establish two commonly available dimensionality reduction (DR) methods i.e. t-distributed Stochastic Neighbor Embedding (t-SNE) and Multidimensional Scaling (MDS) in Matlab and to observe their application in several datasets. These DR techniques are applied to nine different datasets namely CNAE9, Segmentation, Seeds, Pima Indians diabetes, Parkinsons, Movemen… ▽ More

    Submitted 20 June, 2020; originally announced July 2020.

    Comments: 2020 IEEE Region 10 Symposium (TENSYMP), 5-7 June 2020, Dhaka, Bangladesh

    Journal ref: 2020 IEEE Region 10 Symposium (TENSYMP)