Skip to main content

Showing 1–15 of 15 results for author: Siddiqui, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.00500  [pdf, ps, other

    cs.CR

    Scaling DeFi with ZK Rollups: Design, Deployment, and Evaluation of a Real-Time Proof-of-Concept

    Authors: Krzysztof Gogol, Szczepan Gurgul, Faizan Nehal Siddiqui, David Branes, Claudio Tessone

    Abstract: Ethereum's scalability limitations pose significant challenges for the adoption of decentralized applications (dApps). Zero-Knowledge Rollups (ZK Rollups) present a promising solution, bundling transactions off-chain and submitting validity proofs on-chain to enhance throughput and efficiency. In this work, we examine the technical underpinnings of ZK Rollups and stress test their performance in r… ▽ More

    Submitted 31 May, 2025; originally announced June 2025.

  2. arXiv:2505.01563  [pdf, other

    cs.AI

    TutorGym: A Testbed for Evaluating AI Agents as Tutors and Students

    Authors: Daniel Weitekamp, Momin N. Siddiqui, Christopher J. MacLellan

    Abstract: Recent improvements in large language model (LLM) performance on academic benchmarks, such as MATH and GSM8K, have emboldened their use as standalone tutors and as simulations of human learning. However, these new applications require more than evaluations of final solution generation. We introduce TutorGym to evaluate these applications more directly. TutorGym is a standard interface for testing… ▽ More

    Submitted 2 May, 2025; originally announced May 2025.

    ACM Class: I.2

  3. arXiv:2503.22710  [pdf

    cs.CR cs.CY

    Assessing the influence of cybersecurity threats and risks on the adoption and growth of digital banking: a systematic literature review

    Authors: Md. Waliullah, Md Zahin Hossain George, Md Tarek Hasan, Md Khorshed Alam, Mosa Sumaiya Khatun Munira, Noor Alam Siddiqui

    Abstract: The rapid digitalization of banking services has significantly transformed financial transactions, offering enhanced convenience and efficiency for consumers. However, the increasing reliance on digital banking has also exposed financial institutions and users to a wide range of cybersecurity threats, including phishing, malware, ransomware, data breaches, and unauthorized access. This study syste… ▽ More

    Submitted 22 March, 2025; originally announced March 2025.

    Comments: 32 pages, 13 figures

  4. arXiv:2411.07205  [pdf, other

    cs.CV

    DLCR: A Generative Data Expansion Framework via Diffusion for Clothes-Changing Person Re-ID

    Authors: Nyle Siddiqui, Florinel Alin Croitoru, Gaurav Kumar Nayak, Radu Tudor Ionescu, Mubarak Shah

    Abstract: With the recent exhibited strength of generative diffusion models, an open research question is if images generated by these models can be used to learn better visual representations. While this generative data expansion may suffice for easier visual tasks, we explore its efficacy on a more difficult discriminative task: clothes-changing person re-identification (CC-ReID). CC-ReID aims to match pe… ▽ More

    Submitted 25 November, 2024; v1 submitted 11 November, 2024; originally announced November 2024.

    Comments: Published in WACV 2025

  5. arXiv:2405.14716  [pdf, other

    cs.AI cs.HC

    HTN-Based Tutors: A New Intelligent Tutoring Framework Based on Hierarchical Task Networks

    Authors: Momin N. Siddiqui, Adit Gupta, Jennifer M. Reddig, Christopher J. MacLellan

    Abstract: Intelligent tutors have shown success in delivering a personalized and adaptive learning experience. However, there exist challenges regarding the granularity of knowledge in existing frameworks and the resulting instructions they can provide. To address these issues, we propose HTN-based tutors, a new intelligent tutoring framework that represents expert models using Hierarchical Task Networks (H… ▽ More

    Submitted 23 May, 2024; v1 submitted 23 May, 2024; originally announced May 2024.

    Comments: Accepted for publication in Proceedings of the Eleventh ACM Conference on Learning @ Scale (L@S'24), July 18--20, 2024, Atlanta, GA, USA

  6. arXiv:2312.05719  [pdf, other

    cs.CV

    DVANet: Disentangling View and Action Features for Multi-View Action Recognition

    Authors: Nyle Siddiqui, Praveen Tirupattur, Mubarak Shah

    Abstract: In this work, we present a novel approach to multi-view action recognition where we guide learned action representations to be separated from view-relevant information in a video. When trying to classify action instances captured from multiple viewpoints, there is a higher degree of difficulty due to the difference in background, occlusion, and visibility of the captured action from different came… ▽ More

    Submitted 9 December, 2023; originally announced December 2023.

  7. arXiv:2207.13648  [pdf

    cs.HC cs.CR

    Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset

    Authors: Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala

    Abstract: As technology grows and evolves rapidly, it is increasingly clear that mobile devices are more commonly used for sensitive matters than ever before. A need to authenticate users continuously is sought after as a single-factor or multi factor authentication may only initially validate a user, which does not help if an impostor can bypass this initial validation. The field of touch dynamics emerges… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

  8. arXiv:2207.00161  [pdf

    cs.CV cs.AI

    Mitigating Presentation Attack using DCGAN and Deep CNN

    Authors: Nyle Siddiqui, Rushit Dave

    Abstract: Biometric based authentication is currently playing an essential role over conventional authentication system; however, the risk of presentation attacks subsequently rising. Our research aims at identifying the areas where presentation attack can be prevented even though adequate biometric image samples of users are limited. Our work focusses on generating photorealistic synthetic images from the… ▽ More

    Submitted 22 June, 2022; originally announced July 2022.

  9. Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

    Authors: Nyle Siddiqui, Rushit Dave, Naeem Seliya, Mounika Vanamala

    Abstract: Static authentication methods, like passwords, grow increasingly weak with advancements in technology and attack strategies. Continuous authentication has been proposed as a solution, in which users who have gained access to an account are still monitored in order to continuously verify that the user is not an imposter who had access to the user credentials. Mouse dynamics is the behavior of a use… ▽ More

    Submitted 26 May, 2022; originally announced May 2022.

    Journal ref: Mach. Learn. Knowl. Extr. 2022

  10. arXiv:2201.12705  [pdf

    cs.CV cs.CR

    A Robust Framework for Deep Learning Approaches to Facial Emotion Recognition and Evaluation

    Authors: Nyle Siddiqui, Rushit Dave, Tyler Bauer, Thomas Reither, Dylan Black, Mitchell Hanson

    Abstract: Facial emotion recognition is a vast and complex problem space within the domain of computer vision and thus requires a universally accepted baseline method with which to evaluate proposed models. While test datasets have served this purpose in the academic sphere real world application and testing of such models lacks any real comparison. Therefore we propose a framework in which models developed… ▽ More

    Submitted 29 January, 2022; originally announced January 2022.

  11. The Benefits of Edge Computing in Healthcare, Smart Cities, and IoT

    Authors: Rushit Dave, Naeem Seliya, Nyle Siddiqui

    Abstract: Recent advancements in technology now allow for the generation of massive quantities of data. There is a growing need to transmit this data faster and more securely such that it cannot be accessed by malicious individuals. Edge computing has emerged in previous research as a method capable of improving data transmission times and security before the data ends up in the cloud. Edge computing has an… ▽ More

    Submitted 22 November, 2021; originally announced December 2021.

    Journal ref: Journal of Computer Sciences and Applications. 2021, 9(1), 23-34

  12. arXiv:2110.11080  [pdf

    cs.LG cs.AI eess.SP

    Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft

    Authors: Nyle Siddiqui, Rushit Dave, Naeem Seliya

    Abstract: Mouse dynamics has grown in popularity as a novel irreproducible behavioral biometric. Datasets which contain general unrestricted mouse movements from users are sparse in the current literature. The Balabit mouse dynamics dataset produced in 2016 was made for a data science competition and despite some of its shortcomings, is considered to be the first publicly available mouse dynamics dataset. C… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

  13. arXiv:2110.07832  [pdf

    cs.CR cs.LG

    A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods

    Authors: Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya

    Abstract: Modern scientific advancements often contribute to the introduction and refinement of never-before-seen technologies. This can be quite the task for humans to maintain and monitor and as a result, our society has become reliant on machine learning to assist in this task. With new technology comes new methods and thus new ways to circumvent existing cyber security measures. This study examines the… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

  14. arXiv:2007.05597  [pdf, other

    eess.IV cs.CV cs.LG

    EMIXER: End-to-end Multimodal X-ray Generation via Self-supervision

    Authors: Siddharth Biswal, Peiye Zhuang, Ayis Pyrros, Nasir Siddiqui, Sanmi Koyejo, Jimeng Sun

    Abstract: Deep generative models have enabled the automated synthesis of high-quality data for diverse applications. However, the most effective generative models are specialized to data from a single domain (e.g., images or text). Real-world applications such as healthcare require multi-modal data from multiple domains (e.g., both images and corresponding text), which are difficult to acquire due to limite… ▽ More

    Submitted 15 January, 2021; v1 submitted 10 July, 2020; originally announced July 2020.

  15. arXiv:1904.05877  [pdf, other

    cs.LG cs.CV stat.ML

    Max-Sliced Wasserstein Distance and its use for GANs

    Authors: Ishan Deshpande, Yuan-Ting Hu, Ruoyu Sun, Ayis Pyrros, Nasir Siddiqui, Sanmi Koyejo, Zhizhen Zhao, David Forsyth, Alexander Schwing

    Abstract: Generative adversarial nets (GANs) and variational auto-encoders have significantly improved our distribution modeling capabilities, showing promise for dataset augmentation, image-to-image translation and feature learning. However, to model high-dimensional distributions, sequential training and stacked architectures are common, increasing the number of tunable hyper-parameters as well as the tra… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

    Comments: Accepted to CVPR 2019