Skip to main content

Showing 1–50 of 1,313 results for author: Syed

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.19445  [pdf, ps, other

    cs.CV

    Deblurring in the Wild: A Real-World Dataset from Smartphone High-Speed Videos

    Authors: Mahdi Mohd Hossain Noki, Syed Mumtahin Mahmud, Prothito Shovon Majumder, Abdul Mohaimen Al Radi, Md. Haider Ali, Md. Mosaddek Khan

    Abstract: We introduce the largest real-world image deblurring dataset constructed from smartphone slow-motion videos. Using 240 frames captured over one second, we simulate realistic long-exposure blur by averaging frames to produce blurry images, while using the temporally centered frame as the sharp reference. Our dataset contains over 42,000 high-resolution blur-sharp image pairs, making it approximatel… ▽ More

    Submitted 30 June, 2025; v1 submitted 24 June, 2025; originally announced June 2025.

    Comments: 8 pages (without references), 3 figures. Dataset https://huggingface.co/datasets/masterda/SloMoBlur

  2. arXiv:2506.19113  [pdf, ps, other

    cs.CL

    Human-Aligned Faithfulness in Toxicity Explanations of LLMs

    Authors: Ramaravind K. Mothilal, Joanna Roy, Syed Ishtiaque Ahmed, Shion Guha

    Abstract: The discourse around toxicity and LLMs in NLP largely revolves around detection tasks. This work shifts the focus to evaluating LLMs' reasoning about toxicity -- from their explanations that justify a stance -- to enhance their trustworthiness in downstream tasks. Despite extensive research on explainability, it is not straightforward to adopt existing methods to evaluate free-form toxicity explan… ▽ More

    Submitted 23 June, 2025; originally announced June 2025.

    Comments: 21 pages, 5 figures, 7 tables

  3. arXiv:2506.18927  [pdf, ps, other

    cs.LG

    From Tiny Machine Learning to Tiny Deep Learning: A Survey

    Authors: Shriyank Somvanshi, Md Monzurul Islam, Gaurab Chhetri, Rohit Chakraborty, Mahmuda Sultana Mimi, Sawgat Ahmed Shuvo, Kazi Sifatul Islam, Syed Aaqib Javed, Sharif Ahmed Rafat, Anandi Dutta, Subasish Das

    Abstract: The rapid growth of edge devices has driven the demand for deploying artificial intelligence (AI) at the edge, giving rise to Tiny Machine Learning (TinyML) and its evolving counterpart, Tiny Deep Learning (TinyDL). While TinyML initially focused on enabling simple inference tasks on microcontrollers, the emergence of TinyDL marks a paradigm shift toward deploying deep learning models on severely… ▽ More

    Submitted 25 June, 2025; v1 submitted 21 June, 2025; originally announced June 2025.

  4. arXiv:2506.18337  [pdf, ps, other

    cs.CL

    TranslationCorrect: A Unified Framework for Machine Translation Post-Editing with Predictive Error Assistance

    Authors: Syed Mekael Wasti, Shou-Yi Hung, Christopher Collins, En-Shiun Annie Lee

    Abstract: Machine translation (MT) post-editing and research data collection often rely on inefficient, disconnected workflows. We introduce TranslationCorrect, an integrated framework designed to streamline these tasks. TranslationCorrect combines MT generation using models like NLLB, automated error prediction using models like XCOMET or LLM APIs (providing detailed reasoning), and an intuitive post-editi… ▽ More

    Submitted 23 June, 2025; originally announced June 2025.

    Comments: Preprint

  5. arXiv:2506.17934  [pdf, ps, other

    cs.IR cs.AI

    A GenAI System for Improved FAIR Independent Biological Database Integration

    Authors: Syed N. Sakib, Kallol Naha, Sajratul Y. Rubaiat, Hasan M. Jamil

    Abstract: Life sciences research increasingly requires identifying, accessing, and effectively processing data from an ever-evolving array of information sources on the Linked Open Data (LOD) network. This dynamic landscape places a significant burden on researchers, as the quality of query responses depends heavily on the selection and semantic integration of data sources --processes that are often labor-i… ▽ More

    Submitted 22 June, 2025; originally announced June 2025.

  6. arXiv:2506.17803  [pdf, ps, other

    cs.IT

    Virtual Teleportation of CSIT via Non-Signaling Assistance

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: Non-signaling correlations, which (strictly) include quantum correlations, provide a tractable path to explore the potential impact of quantum nonlocality on the capacity of classical communication networks. Motivated by a recent discovery that certain wireless network settings benefit significantly from non-signaling (NS) correlations, various generalizations are considered. First, it is shown th… ▽ More

    Submitted 21 June, 2025; originally announced June 2025.

  7. arXiv:2506.17508  [pdf, ps, other

    cs.DL cs.AI cs.DB cs.ET cs.IR

    Mapping the Evolution of Research Contributions using KnoVo

    Authors: Sajratul Y. Rubaiat, Syed N. Sakib, Hasan M. Jamil

    Abstract: This paper presents KnoVo (Knowledge Evolution), an intelligent framework designed for quantifying and analyzing the evolution of research novelty in the scientific literature. Moving beyond traditional citation analysis, which primarily measures impact, KnoVo determines a paper's novelty relative to both prior and subsequent work within its multilayered citation network. Given a target paper's ab… ▽ More

    Submitted 25 June, 2025; v1 submitted 20 June, 2025; originally announced June 2025.

  8. arXiv:2506.16994  [pdf, ps, other

    cs.CV cs.LG

    Prmpt2Adpt: Prompt-Based Zero-Shot Domain Adaptation for Resource-Constrained Environments

    Authors: Yasir Ali Farrukh, Syed Wali, Irfan Khan, Nathaniel D. Bastian

    Abstract: Unsupervised Domain Adaptation (UDA) is a critical challenge in real-world vision systems, especially in resource-constrained environments like drones, where memory and computation are limited. Existing prompt-driven UDA methods typically rely on large vision-language models and require full access to source-domain data during adaptation, limiting their applicability. In this work, we propose Prmp… ▽ More

    Submitted 20 June, 2025; originally announced June 2025.

  9. arXiv:2506.15562  [pdf, ps, other

    eess.IV cs.CV

    Automated MRI Tumor Segmentation using hybrid U-Net with Transformer and Efficient Attention

    Authors: Syed Haider Ali, Asrar Ahmad, Muhammad Ali, Asifullah Khan, Muhammad Shahban, Nadeem Shaukat

    Abstract: Cancer is an abnormal growth with potential to invade locally and metastasize to distant organs. Accurate auto-segmentation of the tumor and surrounding normal tissues is required for radiotherapy treatment plan optimization. Recent AI-based segmentation models are generally trained on large public datasets, which lack the heterogeneity of local patient populations. While these studies advance AI-… ▽ More

    Submitted 18 June, 2025; originally announced June 2025.

    Comments: 16 pages, 5 figures

    ACM Class: I.4.6; I.2.6; I.4.9

  10. arXiv:2506.15514  [pdf, ps, other

    cs.SD eess.AS

    Exploiting Music Source Separation for Automatic Lyrics Transcription with Whisper

    Authors: Jaza Syed, Ivan Meresman Higgs, Ondřej Cífka, Mark Sandler

    Abstract: Automatic lyrics transcription (ALT) remains a challenging task in the field of music information retrieval, despite great advances in automatic speech recognition (ASR) brought about by transformer-based architectures in recent years. One of the major challenges in ALT is the high amplitude of interfering audio signals relative to conventional ASR due to musical accompaniment. Recent advances in… ▽ More

    Submitted 18 June, 2025; originally announced June 2025.

    Comments: Accepted at 2025 ICME Workshop AI for Music

  11. arXiv:2506.13552  [pdf, ps, other

    cs.CV

    A Comprehensive Survey on Video Scene Parsing:Advances, Challenges, and Prospects

    Authors: Guohuan Xie, Syed Ariff Syed Hesham, Wenya Guo, Bing Li, Ming-Ming Cheng, Guolei Sun, Yun Liu

    Abstract: Video Scene Parsing (VSP) has emerged as a cornerstone in computer vision, facilitating the simultaneous segmentation, recognition, and tracking of diverse visual entities in dynamic scenes. In this survey, we present a holistic review of recent advances in VSP, covering a wide array of vision tasks, including Video Semantic Segmentation (VSS), Video Instance Segmentation (VIS), Video Panoptic Seg… ▽ More

    Submitted 16 June, 2025; originally announced June 2025.

  12. arXiv:2506.13089  [pdf, ps, other

    cs.CV cs.RO

    SuperPoint-SLAM3: Augmenting ORB-SLAM3 with Deep Features, Adaptive NMS, and Learning-Based Loop Closure

    Authors: Shahram Najam Syed, Ishir Roongta, Kavin Ravie, Gangadhar Nageswar

    Abstract: Visual simultaneous localization and mapping (SLAM) must remain accurate under extreme viewpoint, scale and illumination variations. The widely adopted ORB-SLAM3 falters in these regimes because it relies on hand-crafted ORB keypoints. We introduce SuperPoint-SLAM3, a drop-in upgrade that (i) replaces ORB with the self-supervised SuperPoint detector--descriptor, (ii) enforces spatially uniform key… ▽ More

    Submitted 16 June, 2025; originally announced June 2025.

    Comments: 10 pages, 6 figures, code at https://github.com/shahram95/SuperPointSLAM3

    ACM Class: I.2.10; I.4.8; I.2.9

  13. arXiv:2506.12103  [pdf, other

    cs.AI cs.CY cs.LG

    The Amazon Nova Family of Models: Technical Report and Model Card

    Authors: Amazon AGI, Aaron Langford, Aayush Shah, Abhanshu Gupta, Abhimanyu Bhatter, Abhinav Goyal, Abhinav Mathur, Abhinav Mohanty, Abhishek Kumar, Abhishek Sethi, Abi Komma, Abner Pena, Achin Jain, Adam Kunysz, Adam Opyrchal, Adarsh Singh, Aditya Rawal, Adok Achar Budihal Prasad, Adrià de Gispert, Agnika Kumar, Aishwarya Aryamane, Ajay Nair, Akilan M, Akshaya Iyengar, Akshaya Vishnu Kudlu Shanbhogue , et al. (761 additional authors not shown)

    Abstract: We present Amazon Nova, a new generation of state-of-the-art foundation models that deliver frontier intelligence and industry-leading price performance. Amazon Nova Pro is a highly-capable multimodal model with the best combination of accuracy, speed, and cost for a wide range of tasks. Amazon Nova Lite is a low-cost multimodal model that is lightning fast for processing images, video, documents… ▽ More

    Submitted 17 March, 2025; originally announced June 2025.

    Comments: 48 pages, 10 figures

    Report number: 20250317

  14. arXiv:2506.12045  [pdf, other

    cs.LG cs.AI eess.SP

    From Proxies to Fields: Spatiotemporal Reconstruction of Global Radiation from Sparse Sensor Sequences

    Authors: Kazuma Kobayashi, Samrendra Roy, Seid Koric, Diab Abueidda, Syed Bahauddin Alam

    Abstract: Accurate reconstruction of latent environmental fields from sparse and indirect observations is a foundational challenge across scientific domains-from atmospheric science and geophysics to public health and aerospace safety. Traditional approaches rely on physics-based simulators or dense sensor networks, both constrained by high computational cost, latency, or limited spatial coverage. We presen… ▽ More

    Submitted 24 May, 2025; originally announced June 2025.

  15. arXiv:2506.11882  [pdf, ps, other

    cs.LG cs.AI

    An Explainable AI Framework for Dynamic Resource Management in Vehicular Network Slicing

    Authors: Haochen Sun, Yifan Liu, Ahmed Al-Tahmeesschi, Swarna Chetty, Syed Ali Raza Zaidi, Avishek Nag, Hamed Ahmadi

    Abstract: Effective resource management and network slicing are essential to meet the diverse service demands of vehicular networks, including Enhanced Mobile Broadband (eMBB) and Ultra-Reliable and Low-Latency Communications (URLLC). This paper introduces an Explainable Deep Reinforcement Learning (XRL) framework for dynamic network slicing and resource allocation in vehicular networks, built upon a near-r… ▽ More

    Submitted 13 June, 2025; originally announced June 2025.

    Comments: To appear in Proceedings of IEEE PIMRC 2025. 6 pages, 4 figures

  16. arXiv:2506.11022  [pdf, ps, other

    cs.SE cs.AI cs.CL cs.CR cs.LG

    Security Degradation in Iterative AI Code Generation -- A Systematic Analysis of the Paradox

    Authors: Shivani Shukla, Himanshu Joshi, Romilla Syed

    Abstract: The rapid adoption of Large Language Models(LLMs) for code generation has transformed software development, yet little attention has been given to how security vulnerabilities evolve through iterative LLM feedback. This paper analyzes security degradation in AI-generated code through a controlled experiment with 400 code samples across 40 rounds of "improvements" using four distinct prompting stra… ▽ More

    Submitted 19 May, 2025; originally announced June 2025.

    Comments: Keywords - Large Language Models, Security Vulnerabilities, AI-Generated Code, Iterative Feedback, Software Security, Secure Coding Practices, Feedback Loops, LLM Prompting Strategies

  17. Advanced fraud detection using machine learning models: enhancing financial transaction security

    Authors: Nudrat Fariha, Md Nazmuddin Moin Khan, Md Iqbal Hossain, Syed Ali Reza, Joy Chakra Bortty, Kazi Sharmin Sultana, Md Shadidur Islam Jawad, Saniah Safat, Md Abdul Ahad, Maksuda Begum

    Abstract: The rise of digital payments has accelerated the need for intelligent and scalable systems to detect fraud. This research presents an end-to-end, feature-rich machine learning framework for detecting credit card transaction anomalies and fraud using real-world data. The study begins by merging transactional, cardholder, merchant, and merchant category datasets from a relational database to create… ▽ More

    Submitted 12 June, 2025; originally announced June 2025.

  18. arXiv:2506.09375  [pdf, ps, other

    cs.CL cs.SD eess.AS

    CoLMbo: Speaker Language Model for Descriptive Profiling

    Authors: Massa Baali, Shuo Han, Syed Abdul Hannan, Purusottam Samal, Karanveer Singh, Soham Deshmukh, Rita Singh, Bhiksha Raj

    Abstract: Speaker recognition systems are often limited to classification tasks and struggle to generate detailed speaker characteristics or provide context-rich descriptions. These models primarily extract embeddings for speaker identification but fail to capture demographic attributes such as dialect, gender, and age in a structured manner. This paper introduces CoLMbo, a Speaker Language Model (SLM) that… ▽ More

    Submitted 10 June, 2025; originally announced June 2025.

  19. arXiv:2506.08221  [pdf

    cs.CL

    "I Wrote, I Paused, I Rewrote" Teaching LLMs to Read Between the Lines of Student Writing

    Authors: Samra Zafar, Shaheer Minhas, Syed Ali Hassan Zaidi, Arfa Naeem, Zahra Ali

    Abstract: Large language models(LLMs) like Gemini are becoming common tools for supporting student writing. But most of their feedback is based only on the final essay missing important context about how that text was written. In this paper, we explore whether using writing process data, collected through keystroke logging and periodic snapshots, can help LLMs give feedback that better reflects how learners… ▽ More

    Submitted 9 June, 2025; originally announced June 2025.

    Comments: 7 pages, 6 figures, 2 tables

  20. arXiv:2506.07524  [pdf, ps, other

    cs.SE cs.AI cs.CY

    IntenTest: Stress Testing for Intent Integrity in API-Calling LLM Agents

    Authors: Shiwei Feng, Xiangzhe Xu, Xuan Chen, Kaiyuan Zhang, Syed Yusuf Ahmed, Zian Su, Mingwei Zheng, Xiangyu Zhang

    Abstract: LLM agents are increasingly deployed to automate real-world tasks by invoking APIs through natural language instructions. While powerful, they often suffer from misinterpretation of user intent, leading to the agent's actions that diverge from the user's intended goal, especially as external toolkits evolve. Traditional software testing assumes structured inputs and thus falls short in handling th… ▽ More

    Submitted 9 June, 2025; originally announced June 2025.

  21. arXiv:2506.06813  [pdf

    cs.CL cs.CY cs.HC

    BTPD: A Multilingual Hand-curated Dataset of Bengali Transnational Political Discourse Across Online Communities

    Authors: Dipto Das, Syed Ishtiaque Ahmed, Shion Guha

    Abstract: Understanding political discourse in online spaces is crucial for analyzing public opinion and ideological polarization. While social computing and computational linguistics have explored such discussions in English, such research efforts are significantly limited in major yet under-resourced languages like Bengali due to the unavailability of datasets. In this paper, we present a multilingual dat… ▽ More

    Submitted 7 June, 2025; originally announced June 2025.

  22. arXiv:2506.06522  [pdf, ps, other

    cs.CL cs.AI

    Fixing It in Post: A Comparative Study of LLM Post-Training Data Quality and Model Performance

    Authors: Aladin Djuhera, Swanand Ravindra Kadhe, Syed Zawad, Farhan Ahmed, Heiko Ludwig, Holger Boche

    Abstract: Recent work on large language models (LLMs) has increasingly focused on post-training and alignment with datasets curated to enhance instruction following, world knowledge, and specialized skills. However, most post-training datasets used in leading open- and closed-source LLMs remain inaccessible to the public, with limited information about their construction process. This lack of transparency h… ▽ More

    Submitted 6 June, 2025; originally announced June 2025.

  23. arXiv:2506.06281  [pdf, other

    cs.CV

    TerraFM: A Scalable Foundation Model for Unified Multisensor Earth Observation

    Authors: Muhammad Sohail Danish, Muhammad Akhtar Munir, Syed Roshaan Ali Shah, Muhammad Haris Khan, Rao Muhammad Anwer, Jorma Laaksonen, Fahad Shahbaz Khan, Salman Khan

    Abstract: Modern Earth observation (EO) increasingly leverages deep learning to harness the scale and diversity of satellite imagery across sensors and regions. While recent foundation models have demonstrated promising generalization across EO tasks, many remain limited by the scale, geographical coverage, and spectral diversity of their training data, factors critical for learning globally transferable re… ▽ More

    Submitted 6 June, 2025; originally announced June 2025.

  24. arXiv:2506.04566  [pdf, ps, other

    cs.LG cs.AI cs.CL cs.CR

    Clustering and Median Aggregation Improve Differentially Private Inference

    Authors: Kareem Amin, Salman Avestimehr, Sara Babakniya, Alex Bie, Weiwei Kong, Natalia Ponomareva, Umar Syed

    Abstract: Differentially private (DP) language model inference is an approach for generating private synthetic text. A sensitive input example is used to prompt an off-the-shelf large language model (LLM) to produce a similar example. Multiple examples can be aggregated together to formally satisfy the DP guarantee. Prior work creates inference batches by sampling sensitive inputs uniformly at random. We… ▽ More

    Submitted 4 June, 2025; originally announced June 2025.

  25. arXiv:2506.04238  [pdf, other

    cs.NE cs.LG

    A Comprehensive Survey on Bio-Inspired Algorithms: Taxonomy, Applications, and Future Directions

    Authors: Shriyank Somvanshi, Md Monzurul Islam, Syed Aaqib Javed, Gaurab Chhetri, Kazi Sifatul Islam, Tausif Islam Chowdhury, Sazzad Bin Bashar Polock, Anandi Dutta, Subasish Das

    Abstract: Bio-inspired algorithms (BIAs) utilize natural processes such as evolution, swarm behavior, foraging, and plant growth to solve complex, nonlinear, high-dimensional optimization problems. This survey categorizes BIAs into eight groups: evolutionary, swarm intelligence, physics-inspired, ecosystem and plant-based, predator-prey, neural-inspired, human-inspired, and hybrid approaches, and reviews th… ▽ More

    Submitted 25 May, 2025; originally announced June 2025.

  26. arXiv:2506.04062  [pdf, ps, other

    cs.DC

    Energy-Aware Workflow Execution: An Overview of Techniques for Saving Energy and Emissions in Scientific Compute Clusters

    Authors: Lauritz Thamsen, Yehia Elkhatib, Paul Harvey, Syed Waqar Nabi, Jeremy Singer, Wim Vanderbauwhede

    Abstract: Scientific research in many fields routinely requires the analysis of large datasets, and scientists often employ workflow systems to leverage clusters of computers for their data analysis. However, due to their size and scale, these workflow applications can have a considerable environmental footprint in terms of compute resource use, energy consumption, and carbon emissions. Mitigating this is c… ▽ More

    Submitted 4 June, 2025; originally announced June 2025.

    Comments: Partially supported by the Engineering and Physical Sciences Research Council under grant number UKRI154

  27. arXiv:2506.03870  [pdf, ps, other

    cs.LG cs.CR

    Evaluating Apple Intelligence's Writing Tools for Privacy Against Large Language Model-Based Inference Attacks: Insights from Early Datasets

    Authors: Mohd. Farhan Israk Soumik, Syed Mhamudul Hasan, Abdur R. Shahid

    Abstract: The misuse of Large Language Models (LLMs) to infer emotions from text for malicious purposes, known as emotion inference attacks, poses a significant threat to user privacy. In this paper, we investigate the potential of Apple Intelligence's writing tools, integrated across iPhone, iPad, and MacBook, to mitigate these risks through text modifications such as rewriting and tone adjustment. By deve… ▽ More

    Submitted 4 June, 2025; originally announced June 2025.

  28. arXiv:2506.00062  [pdf, other

    cs.CY cs.CL cs.CR cs.LG

    SafeCOMM: What about Safety Alignment in Fine-Tuned Telecom Large Language Models?

    Authors: Aladin Djuhera, Swanand Ravindra Kadhe, Farhan Ahmed, Syed Zawad, Holger Boche, Walid Saad

    Abstract: Fine-tuning large language models (LLMs) for telecom tasks and datasets is a common practice to adapt general-purpose models to the telecom domain. However, little attention has been paid to how this process may compromise model safety. Recent research has shown that even benign fine-tuning can degrade the safety alignment of LLMs, causing them to respond to harmful or unethical user queries. In t… ▽ More

    Submitted 29 May, 2025; originally announced June 2025.

  29. arXiv:2505.23938  [pdf, other

    cs.CR

    Digital Forensic Investigation of the ChatGPT Windows Application

    Authors: Malithi Wanniarachchi Kankanamge, Nick McKenna, Santiago Carmona, Syed Mhamudul Hasan, Abdur R. Shahid, Ahmed Imteaj

    Abstract: The ChatGPT Windows application offers better user interaction in the Windows operating system (OS) by enhancing productivity and streamlining the workflow of ChatGPT's utilization. However, there are potential misuses associated with this application that require rigorous forensic analysis. This study presents a holistic forensic analysis of the ChatGPT Windows application, focusing on identifyin… ▽ More

    Submitted 29 May, 2025; originally announced May 2025.

  30. arXiv:2505.23792  [pdf, ps, other

    cs.CR cs.AI

    Zero-Trust Foundation Models: A New Paradigm for Secure and Collaborative Artificial Intelligence for Internet of Things

    Authors: Kai Li, Conggai Li, Xin Yuan, Shenghong Li, Sai Zou, Syed Sohail Ahmed, Wei Ni, Dusit Niyato, Abbas Jamalipour, Falko Dressler, Ozgur B. Akan

    Abstract: This paper focuses on Zero-Trust Foundation Models (ZTFMs), a novel paradigm that embeds zero-trust security principles into the lifecycle of foundation models (FMs) for Internet of Things (IoT) systems. By integrating core tenets, such as continuous verification, least privilege access (LPA), data confidentiality, and behavioral analytics into the design, training, and deployment of FMs, ZTFMs ca… ▽ More

    Submitted 26 May, 2025; originally announced May 2025.

  31. arXiv:2505.23710  [pdf, ps, other

    eess.SY cs.AI cs.DC cs.ET

    From Connectivity to Autonomy: The Dawn of Self-Evolving Communication Systems

    Authors: Zeinab Nezami, Syed Danial Ali Shah, Maryam Hafeez, Karim Djemame, Syed Ali Raza Zaidi

    Abstract: This paper envisions 6G as a self-evolving telecom ecosystem, where AI-driven intelligence enables dynamic adaptation beyond static connectivity. We explore the key enablers of autonomous communication systems, spanning reconfigurable infrastructure, adaptive middleware, and intelligent network functions, alongside multi-agent collaboration for distributed decision-making. We explore how these met… ▽ More

    Submitted 29 May, 2025; originally announced May 2025.

  32. arXiv:2505.23285  [pdf

    cs.LG

    Comparative Analysis of the Land Use and Land Cover Changes in Different Governorates of Oman using Spatiotemporal Multi-spectral Satellite Data

    Authors: Muhammad Shafi, Syed Mohsin Bokhari

    Abstract: Land cover and land use (LULC) changes are key applications of satellite imagery, and they have critical roles in resource management, urbanization, protection of soils and the environment, and enhancing sustainable development. The literature has heavily utilized multispectral spatiotemporal satellite data alongside advanced machine learning algorithms to monitor and predict LULC changes. This st… ▽ More

    Submitted 29 May, 2025; originally announced May 2025.

  33. arXiv:2505.22414  [pdf, ps, other

    cs.HC

    ToPSen: Task-Oriented Priming and Sensory Alignment for Comparing Coding Strategies Between Sighted and Blind Programmers

    Authors: Md Ehtesham-Ul-Haque, Syed Masum Billah

    Abstract: This paper examines how the coding strategies of sighted and blind programmers differ when working with audio feedback alone. The goal is to identify challenges in mixed-ability collaboration, particularly when sighted programmers work with blind peers or teach programming to blind students. To overcome limitations of traditional blindness simulation studies, we proposed Task-Oriented Priming and… ▽ More

    Submitted 28 May, 2025; originally announced May 2025.

    Comments: Accepted at DIS'25

  34. IKIWISI: An Interactive Visual Pattern Generator for Evaluating the Reliability of Vision-Language Models Without Ground Truth

    Authors: Md Touhidul Islam, Imran Kabir, Md Alimoor Reza, Syed Masum Billah

    Abstract: We present IKIWISI ("I Know It When I See It"), an interactive visual pattern generator for assessing vision-language models in video object recognition when ground truth is unavailable. IKIWISI transforms model outputs into a binary heatmap where green cells indicate object presence and red cells indicate object absence. This visualization leverages humans' innate pattern recognition abilities to… ▽ More

    Submitted 28 May, 2025; originally announced May 2025.

    Comments: Accepted at DIS'25 (Funchal, Portugal)

  35. arXiv:2505.20538  [pdf, ps, other

    cs.CL astro-ph.IM cs.LG

    AstroVisBench: A Code Benchmark for Scientific Computing and Visualization in Astronomy

    Authors: Sebastian Antony Joseph, Syed Murtaza Husain, Stella S. R. Offner, Stéphanie Juneau, Paul Torrey, Adam S. Bolton, Juan P. Farias, Niall Gaffney, Greg Durrett, Junyi Jessy Li

    Abstract: Large Language Models (LLMs) are being explored for applications in scientific research, including their capabilities to synthesize literature, answer research questions, generate research ideas, and even conduct computational experiments. Ultimately, our goal is for these to help scientists derive novel scientific insights. In many areas of science, such insights often arise from processing and v… ▽ More

    Submitted 3 June, 2025; v1 submitted 26 May, 2025; originally announced May 2025.

  36. arXiv:2505.18745  [pdf, ps, other

    cs.CV cs.LG q-bio.QM

    C3R: Channel Conditioned Cell Representations for unified evaluation in microscopy imaging

    Authors: Umar Marikkar, Syed Sameed Husain, Muhammad Awais, Sara Atito

    Abstract: Immunohistochemical (IHC) images reveal detailed information about structures and functions at the subcellular level. However, unlike natural images, IHC datasets pose challenges for deep learning models due to their inconsistencies in channel count and configuration, stemming from varying staining protocols across laboratories and studies. Existing approaches build channel-adaptive models, which… ▽ More

    Submitted 24 May, 2025; originally announced May 2025.

  37. arXiv:2505.13504  [pdf, other

    cs.IR cs.AI cs.MA

    An agentic system with reinforcement-learned subsystem improvements for parsing form-like documents

    Authors: Ayesha Amjad, Saurav Sthapit, Tahir Qasim Syed

    Abstract: Extracting alphanumeric data from form-like documents such as invoices, purchase orders, bills, and financial documents is often performed via vision (OCR) and learning algorithms or monolithic pipelines with limited potential for systemic improvements. We propose an agentic AI system that leverages Large Language Model (LLM) agents and a reinforcement learning (RL) driver agent to automate consis… ▽ More

    Submitted 16 May, 2025; originally announced May 2025.

  38. arXiv:2505.12616  [pdf, ps, other

    cs.CL

    Duluth at SemEval-2025 Task 7: TF-IDF with Optimized Vector Dimensions for Multilingual Fact-Checked Claim Retrieval

    Authors: Shujauddin Syed, Ted Pedersen

    Abstract: This paper presents the Duluth approach to the SemEval-2025 Task 7 on Multilingual and Crosslingual Fact-Checked Claim Retrieval. We implemented a TF-IDF-based retrieval system with experimentation on vector dimensions and tokenization strategies. Our best-performing configuration used word-level tokenization with a vocabulary size of 15,000 features, achieving an average success@10 score of 0.78… ▽ More

    Submitted 18 May, 2025; originally announced May 2025.

    Comments: SemEval-2025

    MSC Class: 68T50

  39. arXiv:2505.10122  [pdf, ps, other

    cs.NI eess.SP

    Energy-Efficient and Reliable Data Collection in Receiver-Initiated Wake-up Radio Enabled IoT Networks

    Authors: Syed Luqman Shah, Ziaul Haq Abbas, Ghulam Abbas, Nurul Huda Mahmood

    Abstract: In unmanned aerial vehicle (UAV)-assisted wake-up radio (WuR)-enabled internet of things (IoT) networks, UAVs can instantly activate the main radios (MRs) of the sensor nodes (SNs) with a wake-up call (WuC) for efficient data collection in mission-driven data collection scenarios. However, the spontaneous response of numerous SNs to the UAV's WuC can lead to significant packet loss and collisions,… ▽ More

    Submitted 15 May, 2025; originally announced May 2025.

    Comments: Already submitted for potential publication

  40. arXiv:2505.06454  [pdf, ps, other

    cs.LG cs.CR

    Sponge Attacks on Sensing AI: Energy-Latency Vulnerabilities and Defense via Model Pruning

    Authors: Syed Mhamudul Hasan, Hussein Zangoti, Iraklis Anagnostopoulos, Abdur R. Shahid

    Abstract: Recent studies have shown that sponge attacks can significantly increase the energy consumption and inference latency of deep neural networks (DNNs). However, prior work has focused primarily on computer vision and natural language processing tasks, overlooking the growing use of lightweight AI models in sensing-based applications on resource-constrained devices, such as those in Internet of Thing… ▽ More

    Submitted 9 May, 2025; originally announced May 2025.

  41. arXiv:2505.05513  [pdf

    cs.CV

    Exploring Convolutional Neural Networks for Rice Grain Classification: An Explainable AI Approach

    Authors: Muhammad Junaid Asif, Hamza Khan, Rabia Tehseen, Syed Tahir Hussain Rizvi, Mujtaba Asad, Shazia Saqib, Rana Fayyaz Ahmad

    Abstract: Rice is an essential staple food worldwide that is important in promoting international trade, economic growth, and nutrition. Asian countries such as China, India, Pakistan, Thailand, Vietnam, and Indonesia are notable for their significant contribution to the cultivation and utilization of rice. These nations are also known for cultivating different rice grains, including short and long grains.… ▽ More

    Submitted 15 May, 2025; v1 submitted 7 May, 2025; originally announced May 2025.

  42. arXiv:2505.05054  [pdf, other

    eess.IV cs.AI cs.CV

    Direct Image Classification from Fourier Ptychographic Microscopy Measurements without Reconstruction

    Authors: Navya Sonal Agarwal, Jan Philipp Schneider, Kanchana Vaishnavi Gandikota, Syed Muhammad Kazim, John Meshreki, Ivo Ihrke, Michael Moeller

    Abstract: The computational imaging technique of Fourier Ptychographic Microscopy (FPM) enables high-resolution imaging with a wide field of view and can serve as an extremely valuable tool, e.g. in the classification of cells in medical applications. However, reconstructing a high-resolution image from tens or even hundreds of measurements is computationally expensive, particularly for a wide field of view… ▽ More

    Submitted 8 May, 2025; originally announced May 2025.

    Comments: ISCS 2025

  43. arXiv:2505.03409  [pdf

    cs.NI cs.IR

    Advancing Remote and Continuous Cardiovascular Patient Monitoring through a Novel and Resource-efficient IoT-Driven Framework

    Authors: Sanam Nayab, Sohail Raza Chohan, Aqsa Jameel, Syed Rehan Shah, Syed Ahsan Masud Zaidi, Aditya Nath Jha, Kamran Siddique

    Abstract: Cardiovascular diseases are a leading cause of fatalities worldwide, often occurring suddenly with limited time for intervention. Current healthcare monitoring systems for cardiac patients rely heavily on hospitalization, which can be impractical for continuous monitoring. This paper presents a novel IoT-based solution for remote, real-time tracking of critical cardiac metrics, addressing the pres… ▽ More

    Submitted 6 May, 2025; originally announced May 2025.

    Comments: 20 pages, and 8063 words and 14 figures

  44. arXiv:2505.01831  [pdf, other

    eess.IV cs.CV

    Multi-Scale Target-Aware Representation Learning for Fundus Image Enhancement

    Authors: Haofan Wu, Yin Huang, Yuqing Wu, Qiuyu Yang, Bingfang Wang, Li Zhang, Muhammad Fahadullah Khan, Ali Zia, M. Saleh Memon, Syed Sohail Bukhari, Abdul Fattah Memon, Daizong Ji, Ya Zhang, Ghulam Mustafa, Yin Fang

    Abstract: High-quality fundus images provide essential anatomical information for clinical screening and ophthalmic disease diagnosis. Yet, due to hardware limitations, operational variability, and patient compliance, fundus images often suffer from low resolution and signal-to-noise ratio. Recent years have witnessed promising progress in fundus image enhancement. However, existing works usually focus on r… ▽ More

    Submitted 3 May, 2025; originally announced May 2025.

    Comments: Under review at Neural Networks

  45. arXiv:2505.00774  [pdf

    cs.RO

    Design, Integration, and Evaluation of a Dual-Arm Robotic System for High Throughput Tissue Sampling from Potato Tubers

    Authors: Divyanth L. G., Syed Usama Bin Sabir, Divya Rathore, Lav R. Khot, Chakradhar Mattupalli, Manoj Karkee

    Abstract: Manual tissue extraction from potato tubers for molecular pathogen detection is highly laborious. This study presents a machine-vision-guided, dual-arm coordinated inline robotic system integrating tuber grasping and tissue sampling mechanisms. Tubers are transported on a conveyor that halts when a YOLOv11-based vision system detects a tuber within the workspace of a one-prismatic-degree-of-freedo… ▽ More

    Submitted 1 May, 2025; originally announced May 2025.

  46. arXiv:2505.00467  [pdf, ps, other

    cs.CL cs.AI

    Red Teaming Large Language Models for Healthcare

    Authors: Vahid Balazadeh, Michael Cooper, David Pellow, Atousa Assadi, Jennifer Bell, Mark Coastworth, Kaivalya Deshpande, Jim Fackler, Gabriel Funingana, Spencer Gable-Cook, Anirudh Gangadhar, Abhishek Jaiswal, Sumanth Kaja, Christopher Khoury, Amrit Krishnan, Randy Lin, Kaden McKeen, Sara Naimimohasses, Khashayar Namdar, Aviraj Newatia, Allan Pang, Anshul Pattoo, Sameer Peesapati, Diana Prepelita, Bogdana Rakova , et al. (10 additional authors not shown)

    Abstract: We present the design process and findings of the pre-conference workshop at the Machine Learning for Healthcare Conference (2024) entitled Red Teaming Large Language Models for Healthcare, which took place on August 15, 2024. Conference participants, comprising a mix of computational and clinical expertise, attempted to discover vulnerabilities -- realistic clinical prompts for which a large lang… ▽ More

    Submitted 1 May, 2025; originally announced May 2025.

  47. arXiv:2504.20956  [pdf, other

    cs.SE

    The Development of Reflective Practice on a Work-Based Software Engineering Program: A Longitudinal Study

    Authors: Matthew Barr, Syed Waqar Nabi, Oana Andrei

    Abstract: This study examines the development of reflective practice among students on a four-year work-based Software Engineering program. Using two established models of reflection - Boud et al.'s Model of Reflective Process and Bain et al.'s 5R Framework for Reflection - we analyse a series of reflective assignments submitted by students over four years. Our longitudinal analysis reveals clear trends in… ▽ More

    Submitted 1 May, 2025; v1 submitted 29 April, 2025; originally announced April 2025.

  48. arXiv:2504.20927  [pdf, other

    eess.SY cs.LG cs.MA math.OC

    Exploiting inter-agent coupling information for efficient reinforcement learning of cooperative LQR

    Authors: Shahbaz P Qadri Syed, He Bai

    Abstract: Developing scalable and efficient reinforcement learning algorithms for cooperative multi-agent control has received significant attention over the past years. Existing literature has proposed inexact decompositions of local Q-functions based on empirical information structures between the agents. In this paper, we exploit inter-agent coupling information and propose a systematic approach to exact… ▽ More

    Submitted 29 April, 2025; originally announced April 2025.

    Comments: Accepted at Learning for Dynamics and Control (L4DC), 2025

  49. arXiv:2504.19673  [pdf

    cs.CY cs.AI

    Generative AI in Education: Student Skills and Lecturer Roles

    Authors: Stefanie Krause, Ashish Dalvi, Syed Khubaib Zaidi

    Abstract: Generative Artificial Intelligence (GenAI) tools such as ChatGPT are emerging as a revolutionary tool in education that brings both positive aspects and challenges for educators and students, reshaping how learning and teaching are approached. This study aims to identify and evaluate the key competencies students need to effectively engage with GenAI in education and to provide strategies for lect… ▽ More

    Submitted 28 April, 2025; originally announced April 2025.

  50. arXiv:2504.19384  [pdf, other

    cs.SE cs.AI

    From Inductive to Deductive: LLMs-Based Qualitative Data Analysis in Requirements Engineering

    Authors: Syed Tauhid Ullah Shah, Mohamad Hussein, Ann Barcomb, Mohammad Moshirpour

    Abstract: Requirements Engineering (RE) is essential for developing complex and regulated software projects. Given the challenges in transforming stakeholder inputs into consistent software designs, Qualitative Data Analysis (QDA) provides a systematic approach to handling free-form data. However, traditional QDA methods are time-consuming and heavily reliant on manual effort. In this paper, we explore the… ▽ More

    Submitted 27 April, 2025; originally announced April 2025.