Skip to main content

Showing 1–45 of 45 results for author: Taha, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.17211  [pdf, other

    eess.SY cs.CR

    Breaking the Flow and the Bank: Stealthy Cyberattacks on Water Network Hydraulics

    Authors: Abdallah Alalem Albustami, Ahmad F. Taha

    Abstract: As water distribution networks (WDNs) become increasingly connected with digital infrastructures, they face greater exposure to cyberattacks that threaten their operational integrity. Stealthy False Data Injection Attacks (SFDIAs) are particularly concerning, as they manipulate sensor data to compromise system operations while avoiding detection. While existing studies have focused on either detec… ▽ More

    Submitted 23 April, 2025; originally announced April 2025.

  2. arXiv:2504.00189  [pdf, other

    eess.IV cs.CV cs.LG

    Detecting Glioma, Meningioma, and Pituitary Tumors, and Normal Brain Tissues based on Yolov11 and Yolov8 Deep Learning Models

    Authors: Ahmed M. Taha, Salah A. Aly, Mohamed F. Darwish

    Abstract: Accurate and quick diagnosis of normal brain tissue Glioma, Meningioma, and Pituitary Tumors is crucial for optimal treatment planning and improved medical results. Magnetic Resonance Imaging (MRI) is widely used as a non-invasive diagnostic tool for detecting brain abnormalities, including tumors. However, manual interpretation of MRI scans is often time-consuming, prone to human error, and depen… ▽ More

    Submitted 31 March, 2025; originally announced April 2025.

    Comments: 6 pages, 7 figures, 8 tables

  3. arXiv:2503.01229  [pdf, other

    cs.LG cs.CR eess.SY

    Enhancing Network Security Management in Water Systems using FM-based Attack Attribution

    Authors: Aleksandar Avdalovic, Joseph Khoury, Ahmad Taha, Elias Bou-Harb

    Abstract: Water systems are vital components of modern infrastructure, yet they are increasingly susceptible to sophisticated cyber attacks with potentially dire consequences on public health and safety. While state-of-the-art machine learning techniques effectively detect anomalies, contemporary model-agnostic attack attribution methods using LIME, SHAP, and LEMNA are deemed impractical for large-scale, in… ▽ More

    Submitted 3 March, 2025; originally announced March 2025.

  4. arXiv:2501.07905  [pdf, other

    cs.AI cs.LG

    Logarithmic Memory Networks (LMNs): Efficient Long-Range Sequence Modeling for Resource-Constrained Environments

    Authors: Mohamed A. Taha

    Abstract: Long-range sequence modeling is a crucial aspect of natural language processing and time series analysis. However, traditional models like Recurrent Neural Networks (RNNs) and Transformers suffer from computational and memory inefficiencies, especially when dealing with long sequences. This paper introduces Logarithmic Memory Networks (LMNs), a novel architecture that leverages a hierarchical loga… ▽ More

    Submitted 14 January, 2025; originally announced January 2025.

    Comments: 18 pages, 10 figures

  5. arXiv:2411.03327  [pdf, other

    cs.CR cs.CE cs.CY

    Maximal Extractable Value in Decentralized Finance: Taxonomy, Detection, and Mitigation

    Authors: Huned Materwala, Shraddha M. Naik, Aya Taha, Tala Abdulrahman Abed, Davor Svetinovic

    Abstract: Decentralized Finance (DeFi) leverages blockchain-enabled smart contracts to deliver automated and trustless financial services without the need for intermediaries. However, the public visibility of financial transactions on the blockchain can be exploited, as participants can reorder, insert, or remove transactions to extract value, often at the expense of others. This extracted value is known as… ▽ More

    Submitted 28 February, 2025; v1 submitted 22 October, 2024; originally announced November 2024.

  6. arXiv:2408.06253  [pdf, ps, other

    cs.GT eess.SY math.DS

    Learning in Time-Varying Monotone Network Games with Dynamic Populations

    Authors: Feras Al Taha, Kiran Rokade, Francesca Parise

    Abstract: In this paper, we present a framework for multi-agent learning in a nonstationary dynamic network environment. More specifically, we examine projected gradient play in smooth monotone repeated network games in which the agents' participation and connectivity vary over time. We model this changing system with a stochastic network which takes a new independent realization at each repetition. We show… ▽ More

    Submitted 12 August, 2024; originally announced August 2024.

    Comments: 10 pages

  7. arXiv:2405.09787  [pdf, other

    eess.IV cs.CV cs.LG

    Analysis of the BraTS 2023 Intracranial Meningioma Segmentation Challenge

    Authors: Dominic LaBella, Ujjwal Baid, Omaditya Khanna, Shan McBurney-Lin, Ryan McLean, Pierre Nedelec, Arif Rashid, Nourel Hoda Tahon, Talissa Altes, Radhika Bhalerao, Yaseen Dhemesh, Devon Godfrey, Fathi Hilal, Scott Floyd, Anastasia Janas, Anahita Fathi Kazerooni, John Kirkpatrick, Collin Kent, Florian Kofler, Kevin Leu, Nazanin Maleki, Bjoern Menze, Maxence Pajot, Zachary J. Reitman, Jeffrey D. Rudie , et al. (97 additional authors not shown)

    Abstract: We describe the design and results from the BraTS 2023 Intracranial Meningioma Segmentation Challenge. The BraTS Meningioma Challenge differed from prior BraTS Glioma challenges in that it focused on meningiomas, which are typically benign extra-axial tumors with diverse radiologic and anatomical presentation and a propensity for multiplicity. Nine participating teams each developed deep-learning… ▽ More

    Submitted 7 March, 2025; v1 submitted 15 May, 2024; originally announced May 2024.

    Comments: Accepted for publication at the Journal of Machine Learning for Biomedical Imaging (MELBA) https://melba-journal.org/2025:003 22 pages, 6 tables, 12 figures, MICCAI, MELBA

    Journal ref: Machine.Learning.for.Biomedical.Imaging. 3 (2025)

  8. arXiv:2402.03368  [pdf

    cs.IR cs.AI

    Empirical and Experimental Perspectives on Big Data in Recommendation Systems: A Comprehensive Survey

    Authors: Kamal Taha, Paul D. Yoo, Aya Taha

    Abstract: This survey paper provides a comprehensive analysis of big data algorithms in recommendation systems, addressing the lack of depth and precision in existing literature. It proposes a two-pronged approach: a thorough analysis of current algorithms and a novel, hierarchical taxonomy for precise categorization. The taxonomy is based on a tri-level hierarchy, starting with the methodology category and… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

  9. arXiv:2402.03355  [pdf

    cs.SI cs.AI

    Unlocking Criminal Hierarchies: A Survey, Experimental, and Comparative Exploration of Techniques for Identifying Leaders within Criminal Networks

    Authors: Kamal Taha, Abdulhadi Shoufan, Aya Taha

    Abstract: This survey paper offers a thorough analysis of techniques and algorithms used in the identification of crime leaders within criminal networks. For each technique, the paper examines its effectiveness, limitations, potential for improvement, and future prospects. The main challenge faced by existing survey papers focusing on algorithms for identifying crime leaders and predicting crimes is effecti… ▽ More

    Submitted 30 March, 2024; v1 submitted 26 January, 2024; originally announced February 2024.

  10. A Comprehensive Survey of Text Classification Techniques and Their Research Applications: Observational and Experimental Insights

    Authors: Kamal Taha, Paul D. Yoo, Chan Yeun, Aya Taha

    Abstract: The exponential growth of textual data presents substantial challenges in management and analysis, notably due to high storage and processing costs. Text classification, a vital aspect of text mining, provides robust solutions by enabling efficient categorization and organization of text data. These techniques allow individuals, researchers, and businesses to derive meaningful patterns and insight… ▽ More

    Submitted 25 November, 2024; v1 submitted 11 January, 2024; originally announced January 2024.

    Report number: 100664

    Journal ref: Computer Science Review, Volume: 54, Year: 2024, ISSN: 1574-0137

  11. Internet of Mirrors for Connected Healthcare and Beauty: A Prospective Vision

    Authors: Haneen Fatima, Muhammad Ali Imran, Ahmad Taha, Lina Mohjazi

    Abstract: With the shift towards smart objects and automated services in many industries, the health and beauty industries are also becoming increasingly involved in AI-driven smart systems. There is a rising market demand for personalised services and a need for unified platforms in many sectors, specifically the cosmetics and healthcare industries. Alongside this rising demand, there are two major gaps wh… ▽ More

    Submitted 4 December, 2024; v1 submitted 21 November, 2023; originally announced November 2023.

    Comments: 31 pages, 6 figures

    Journal ref: Internet of Things, Volume 28, 2024, 101415, ISSN 2542-6605,

  12. arXiv:2309.07871  [pdf, other

    cs.GT eess.SY math.DS

    Gradient Dynamics in Linear Quadratic Network Games with Time-Varying Connectivity and Population Fluctuation

    Authors: Feras Al Taha, Kiran Rokade, Francesca Parise

    Abstract: In this paper, we consider a learning problem among non-cooperative agents interacting in a time-varying system. Specifically, we focus on repeated linear quadratic network games, in which the network of interactions changes with time and agents may not be present at each iteration. To get tractability, we assume that at each iteration, the network of interactions is sampled from an underlying ran… ▽ More

    Submitted 20 October, 2023; v1 submitted 14 September, 2023; originally announced September 2023.

    Comments: 8 pages, 2 figures, Extended version of the original paper to appear in the proceedings of the 2023 IEEE Conference on Decision and Control (CDC). Updated numerical example

  13. arXiv:2308.06420  [pdf, other

    cs.CV

    M&M: Tackling False Positives in Mammography with a Multi-view and Multi-instance Learning Sparse Detector

    Authors: Yen Nhi Truong Vu, Dan Guo, Ahmed Taha, Jason Su, Thomas Paul Matthews

    Abstract: Deep-learning-based object detection methods show promise for improving screening mammography, but high rates of false positives can hinder their effectiveness in clinical practice. To reduce false positives, we identify three challenges: (1) unlike natural images, a malignant mammogram typically contains only one malignant finding; (2) mammography exams contain two views of each breast, and both… ▽ More

    Submitted 11 August, 2023; originally announced August 2023.

    Comments: MICCAI 2023 with supplementary materials

  14. arXiv:2304.06783  [pdf, other

    math.OC cs.LG eess.SY

    A Distributionally Robust Approach to Regret Optimal Control using the Wasserstein Distance

    Authors: Feras Al Taha, Shuhao Yan, Eilyan Bitar

    Abstract: This paper proposes a distributionally robust approach to regret optimal control of discrete-time linear dynamical systems with quadratic costs subject to a stochastic additive disturbance on the state process. The underlying probability distribution of the disturbance process is unknown, but assumed to lie in a given ball of distributions defined in terms of the type-2 Wasserstein distance. In th… ▽ More

    Submitted 16 August, 2023; v1 submitted 13 April, 2023; originally announced April 2023.

    Comments: 8 pages, 3 figures, to appear in the proceedings of the 2023 IEEE Conference on Decision and Control (CDC)

  15. arXiv:2303.16417  [pdf

    cs.CV cs.LG q-bio.QM

    Problems and shortcuts in deep learning for screening mammography

    Authors: Trevor Tsue, Brent Mombourquette, Ahmed Taha, Thomas Paul Matthews, Yen Nhi Truong Vu, Jason Su

    Abstract: This work reveals undiscovered challenges in the performance and generalizability of deep learning models. We (1) identify spurious shortcuts and evaluation issues that can inflate performance and (2) propose training and analysis methods to address them. We trained an AI model to classify cancer on a retrospective dataset of 120,112 US exams (3,467 cancers) acquired from 2008 to 2017 and 16,693… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

  16. arXiv:2303.10262  [pdf, other

    cs.GT eess.SY math.OC

    Estimation of Unknown Payoff Parameters in Large Network Games

    Authors: Feras Al Taha, Francesca Parise

    Abstract: We consider network games where a large number of agents interact according to a network sampled from a random network model, represented by a graphon. By exploiting previous results on convergence of such large network games to graphon games, we examine a procedure for estimating unknown payoff parameters, from observations of equilibrium actions, without the need for exact network information. W… ▽ More

    Submitted 17 March, 2023; originally announced March 2023.

    Comments: The extended arXiv version of the original paper accepted for publication in the 2023 American Control Conference, 9 pages, 1 figure

  17. Understanding metric-related pitfalls in image analysis validation

    Authors: Annika Reinke, Minu D. Tizabi, Michael Baumgartner, Matthias Eisenmann, Doreen Heckmann-Nötzel, A. Emre Kavur, Tim Rädsch, Carole H. Sudre, Laura Acion, Michela Antonelli, Tal Arbel, Spyridon Bakas, Arriel Benis, Matthew Blaschko, Florian Buettner, M. Jorge Cardoso, Veronika Cheplygina, Jianxu Chen, Evangelia Christodoulou, Beth A. Cimini, Gary S. Collins, Keyvan Farahani, Luciana Ferrer, Adrian Galdran, Bram van Ginneken , et al. (53 additional authors not shown)

    Abstract: Validation metrics are key for the reliable tracking of scientific progress and for bridging the current chasm between artificial intelligence (AI) research and its translation into practice. However, increasing evidence shows that particularly in image analysis, metrics are often chosen inadequately in relation to the underlying research problem. This could be attributed to a lack of accessibilit… ▽ More

    Submitted 23 February, 2024; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: Shared first authors: Annika Reinke and Minu D. Tizabi; shared senior authors: Lena Maier-Hein and Paul F. Jäger. Published in Nature Methods. arXiv admin note: text overlap with arXiv:2206.01653

    Journal ref: Nature methods, 1-13 (2024)

  18. arXiv:2211.08210  [pdf, other

    eess.SP cs.IT

    Reconfigurable Intelligent Surface Aided Wireless Sensing for Scene Depth Estimation

    Authors: Abdelrahman Taha, Hao Luo, Ahmed Alkhateeb

    Abstract: Current scene depth estimation approaches mainly rely on optical sensing, which carries privacy concerns and suffers from estimation ambiguity for distant, shiny, and transparent surfaces/objects. Reconfigurable intelligent surfaces (RISs) provide a path for employing a massive number of antennas using low-cost and energy-efficient architectures. This has the potential for realizing RIS-aided wire… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Comments: Submitted to IEEE

  19. arXiv:2210.07745  [pdf, other

    cs.CL

    Confidence estimation of classification based on the distribution of the neural network output layer

    Authors: Abdel Aziz Taha, Leonhard Hennig, Petr Knoth

    Abstract: One of the most common problems preventing the application of prediction models in the real world is lack of generalization: The accuracy of models, measured in the benchmark does repeat itself on future data, e.g. in the settings of real business. There is relatively little methods exist that estimate the confidence of prediction models. In this paper, we propose novel methods that, given a neura… ▽ More

    Submitted 18 October, 2022; v1 submitted 14 October, 2022; originally announced October 2022.

    Comments: Draft

  20. arXiv:2208.06066  [pdf, other

    cs.CV cs.LG

    Deep is a Luxury We Don't Have

    Authors: Ahmed Taha, Yen Nhi Truong Vu, Brent Mombourquette, Thomas Paul Matthews, Jason Su, Sadanand Singh

    Abstract: Medical images come in high resolutions. A high resolution is vital for finding malignant tissues at an early stage. Yet, this resolution presents a challenge in terms of modeling long range dependencies. Shallow transformers eliminate this problem, but they suffer from quadratic complexity. In this paper, we tackle this complexity by leveraging a linear self-attention approximation. Through this… ▽ More

    Submitted 11 August, 2022; originally announced August 2022.

    Comments: MICCAI 2022 + Extra Experiments

  21. Metrics reloaded: Recommendations for image analysis validation

    Authors: Lena Maier-Hein, Annika Reinke, Patrick Godau, Minu D. Tizabi, Florian Buettner, Evangelia Christodoulou, Ben Glocker, Fabian Isensee, Jens Kleesiek, Michal Kozubek, Mauricio Reyes, Michael A. Riegler, Manuel Wiesenfarth, A. Emre Kavur, Carole H. Sudre, Michael Baumgartner, Matthias Eisenmann, Doreen Heckmann-Nötzel, Tim Rädsch, Laura Acion, Michela Antonelli, Tal Arbel, Spyridon Bakas, Arriel Benis, Matthew Blaschko , et al. (49 additional authors not shown)

    Abstract: Increasing evidence shows that flaws in machine learning (ML) algorithm validation are an underestimated global problem. Particularly in automatic biomedical image analysis, chosen performance metrics often do not reflect the domain interest, thus failing to adequately measure scientific progress and hindering translation of ML techniques into practice. To overcome this, our large international ex… ▽ More

    Submitted 23 February, 2024; v1 submitted 3 June, 2022; originally announced June 2022.

    Comments: Shared first authors: Lena Maier-Hein, Annika Reinke. arXiv admin note: substantial text overlap with arXiv:2104.05642 Published in Nature Methods

    Journal ref: Nature methods, 1-18 (2024)

  22. arXiv:2104.05642  [pdf, other

    eess.IV cs.CV

    Common Limitations of Image Processing Metrics: A Picture Story

    Authors: Annika Reinke, Minu D. Tizabi, Carole H. Sudre, Matthias Eisenmann, Tim Rädsch, Michael Baumgartner, Laura Acion, Michela Antonelli, Tal Arbel, Spyridon Bakas, Peter Bankhead, Arriel Benis, Matthew Blaschko, Florian Buettner, M. Jorge Cardoso, Jianxu Chen, Veronika Cheplygina, Evangelia Christodoulou, Beth Cimini, Gary S. Collins, Sandy Engelhardt, Keyvan Farahani, Luciana Ferrer, Adrian Galdran, Bram van Ginneken , et al. (68 additional authors not shown)

    Abstract: While the importance of automatic image analysis is continuously increasing, recent meta-research revealed major flaws with respect to algorithm validation. Performance metrics are particularly key for meaningful, objective, and transparent performance assessment and validation of the used automatic algorithms, but relatively little attention has been given to the practical pitfalls when using spe… ▽ More

    Submitted 6 December, 2023; v1 submitted 12 April, 2021; originally announced April 2021.

    Comments: Shared first authors: Annika Reinke and Minu D. Tizabi. This is a dynamic paper on limitations of commonly used metrics. It discusses metrics for image-level classification, semantic and instance segmentation, and object detection. For missing use cases, comments or questions, please contact [email protected]. Substantial contributions to this document will be acknowledged with a co-authorship

  23. arXiv:2103.05152  [pdf, other

    cs.CV cs.AI cs.LG

    Knowledge Evolution in Neural Networks

    Authors: Ahmed Taha, Abhinav Shrivastava, Larry Davis

    Abstract: Deep learning relies on the availability of a large corpus of data (labeled or unlabeled). Thus, one challenging unsettled question is: how to train a deep network on a relatively small dataset? To tackle this question, we propose an evolution-inspired training approach to boost performance on relatively small datasets. The knowledge evolution (KE) approach splits a deep network into two hypothese… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

    Comments: CVPR Oral 2021

  24. arXiv:2103.02770  [pdf, other

    cs.CV cs.LG

    SVMax: A Feature Embedding Regularizer

    Authors: Ahmed Taha, Alex Hanson, Abhinav Shrivastava, Larry Davis

    Abstract: A neural network regularizer (e.g., weight decay) boosts performance by explicitly penalizing the complexity of a network. In this paper, we penalize inferior network activations -- feature embeddings -- which in turn regularize the network's weights implicitly. We propose singular value maximization (SVMax) to learn a more uniform feature embedding. The SVMax regularizer supports both supervised… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

  25. arXiv:2102.06198  [pdf, other

    eess.SP cs.IT

    Millimeter Wave MIMO based Depth Maps for Wireless Virtual and Augmented Reality

    Authors: Abdelrahman Taha, Qi Qu, Sam Alex, Ping Wang, William L. Abbott, Ahmed Alkhateeb

    Abstract: Augmented and virtual reality systems (AR/VR) are rapidly becoming key components of the wireless landscape. For immersive AR/VR experience, these devices should be able to construct accurate depth perception of the surrounding environment. Current AR/VR devices rely heavily on using RGB-D depth cameras to achieve this goal. The performance of these depth cameras, however, has clear limitations in… ▽ More

    Submitted 13 February, 2021; v1 submitted 11 February, 2021; originally announced February 2021.

    Comments: Submitted to IEEE, 43 pages, 24 figures

  26. arXiv:2009.00215  [pdf, other

    eess.IV cs.CV

    On The Usage Of Average Hausdorff Distance For Segmentation Performance Assessment: Hidden Bias When Used For Ranking

    Authors: Orhun Utku Aydin, Abdel Aziz Taha, Adam Hilbert, Ahmed A. Khalil, Ivana Galinovic, Jochen B. Fiebach, Dietmar Frey, Vince Istvan Madai

    Abstract: Average Hausdorff Distance (AVD) is a widely used performance measure to calculate the distance between two point sets. In medical image segmentation, AVD is used to compare ground truth images with segmentation results allowing their ranking. We identified, however, a ranking bias of AVD making it less suitable for segmentation ranking. To mitigate this bias, we present a modified calculation of… ▽ More

    Submitted 13 September, 2020; v1 submitted 31 August, 2020; originally announced September 2020.

    Comments: Added Disclosures, changed typo in Discussion

  27. arXiv:2007.09748  [pdf, other

    cs.CV

    A Generic Visualization Approach for Convolutional Neural Networks

    Authors: Ahmed Taha, Xitong Yang, Abhinav Shrivastava, Larry Davis

    Abstract: Retrieval networks are essential for searching and indexing. Compared to classification networks, attention visualization for retrieval networks is hardly studied. We formulate attention visualization as a constrained optimization problem. We leverage the unit L2-Norm constraint as an attention filter (L2-CAF) to localize attention in both classification and retrieval networks. Unlike recent liter… ▽ More

    Submitted 19 July, 2020; originally announced July 2020.

    Comments: ECCV'2020

  28. arXiv:2002.11101  [pdf, other

    cs.IT eess.SP

    Deep Reinforcement Learning for Intelligent Reflecting Surfaces: Towards Standalone Operation

    Authors: Abdelrahman Taha, Yu Zhang, Faris B. Mismar, Ahmed Alkhateeb

    Abstract: The promising coverage and spectral efficiency gains of intelligent reflecting surfaces (IRSs) are attracting increasing interest. In order to realize these surfaces in practice, however, several challenges need to be addressed. One of these main challenges is how to configure the reflecting coefficients on these passive surfaces without requiring massive channel estimation or beam training overhe… ▽ More

    Submitted 25 February, 2020; originally announced February 2020.

    Comments: Submitted to IEEE SPAWC 2020

  29. arXiv:1911.01867  [pdf

    cs.LG cs.DB

    A Model for Spatial Outlier Detection Based on Weighted Neighborhood Relationship

    Authors: Ayman Taha, Hoda M. Onsi, Mohammed Nour El din, Osman M. Hegazy

    Abstract: Spatial outliers are used to discover inconsistent objects producing implicit, hidden, and interesting knowledge, which has an effective role in decision-making process. In this paper, we propose a model to redefine the spatial neighborhood relationship by considering weights of the most effective parameters of neighboring objects in a given spatial data set. The spatial parameters, which are take… ▽ More

    Submitted 4 November, 2019; originally announced November 2019.

    Comments: Geographic Information Systems (GIS), Spatial Data Mining (SDM), Spatial Data Computing (SDC), Spatial Outlier Detection (SOD), Spatial Autocorrelation, Neighborhood relationship. arXiv admin note: substantial text overlap with arXiv:1601.07241

    Journal ref: Egyptian Informatics Journal 2, 2005

  30. arXiv:1910.00178  [pdf, ps, other

    cs.LG cs.DC cs.PF

    NGEMM: Optimizing GEMM for Deep Learning via Compiler-based Techniques

    Authors: Wenlei Bao, Li-Wen Chang, Yang Chen, Ke Deng, Amit Agarwal, Emad Barsoum, Abe Taha

    Abstract: Quantization has emerged to be an effective way to significantly boost the performance of deep neural networks (DNNs) by utilizing low-bit computations. Despite having lower numerical precision, quantized DNNs are able to reduce both memory bandwidth and computation cycles with little losses of accuracy. Integer GEMM (General Matrix Multiplication) is critical to running quantized DNN models effic… ▽ More

    Submitted 13 November, 2019; v1 submitted 30 September, 2019; originally announced October 2019.

    Comments: Comments: performance figure updated, experiments added, formula corrected, references added

  31. arXiv:1904.10136  [pdf, other

    cs.IT eess.SP

    Enabling Large Intelligent Surfaces with Compressive Sensing and Deep Learning

    Authors: Abdelrahman Taha, Muhammad Alrabeiah, Ahmed Alkhateeb

    Abstract: Employing large intelligent surfaces (LISs) is a promising solution for improving the coverage and rate of future wireless systems. These surfaces comprise a massive number of nearly-passive elements that interact with the incident signals, for example by reflecting them, in a smart way that improves the wireless system performance. Prior work focused on the design of the LIS reflection matrices a… ▽ More

    Submitted 30 April, 2019; v1 submitted 22 April, 2019; originally announced April 2019.

    Comments: Submitted to IEEE Access. The code will be available soon

  32. arXiv:1902.02586  [pdf, other

    cs.CV

    Unsupervised Data Uncertainty Learning in Visual Retrieval Systems

    Authors: Ahmed Taha, Yi-Ting Chen, Teruhisa Misu, Abhinav Shrivastava, Larry Davis

    Abstract: We introduce an unsupervised formulation to estimate heteroscedastic uncertainty in retrieval systems. We propose an extension to triplet loss that models data uncertainty for each input. Besides improving performance, our formulation models local noise in the embedding space. It quantifies input uncertainty and thus enhances interpretability of the system. This helps identify noisy observations i… ▽ More

    Submitted 7 February, 2019; originally announced February 2019.

  33. arXiv:1901.08616  [pdf, other

    cs.CV

    Boosting Standard Classification Architectures Through a Ranking Regularizer

    Authors: Ahmed Taha, Yi-Ting Chen, Teruhisa Misu, Abhinav Shrivastava, Larry Davis

    Abstract: We employ triplet loss as a feature embedding regularizer to boost classification performance. Standard architectures, like ResNet and Inception, are extended to support both losses with minimal hyper-parameter tuning. This promotes generality while fine-tuning pretrained networks. Triplet loss is a powerful surrogate for recently proposed embedding regularizers. Yet, it is avoided due to large ba… ▽ More

    Submitted 2 March, 2020; v1 submitted 24 January, 2019; originally announced January 2019.

    Comments: WACV 2020 Camera ready + supplementary material

  34. arXiv:1901.07702  [pdf, other

    cs.CV

    Exploring Uncertainty in Conditional Multi-Modal Retrieval Systems

    Authors: Ahmed Taha, Yi-Ting Chen, Xitong Yang, Teruhisa Misu, Larry Davis

    Abstract: We cast visual retrieval as a regression problem by posing triplet loss as a regression loss. This enables epistemic uncertainty estimation using dropout as a Bayesian approximation framework in retrieval. Accordingly, Monte Carlo (MC) sampling is leveraged to boost retrieval performance. Our approach is evaluated on two applications: person re-identification and autonomous car driving. Comparable… ▽ More

    Submitted 22 January, 2019; originally announced January 2019.

  35. arXiv:1806.07383  [pdf, other

    cs.CV

    Two Stream Self-Supervised Learning for Action Recognition

    Authors: Ahmed Taha, Moustafa Meshry, Xitong Yang, Yi-Ting Chen, Larry Davis

    Abstract: We present a self-supervised approach using spatio-temporal signals between video frames for action recognition. A two-stream architecture is leveraged to tangle spatial and temporal representation learning. Our task is formulated as both a sequence verification and spatio-temporal alignment tasks. The former task requires motion temporal structure understanding while the latter couples the learne… ▽ More

    Submitted 16 June, 2018; originally announced June 2018.

  36. arXiv:1806.06769  [pdf, other

    cs.CV

    Kid-Net: Convolution Networks for Kidney Vessels Segmentation from CT-Volumes

    Authors: Ahmed Taha, Pechin Lo, Junning Li, Tao Zhao

    Abstract: Semantic image segmentation plays an important role in modeling patient-specific anatomy. We propose a convolution neural network, called Kid-Net, along with a training schema to segment kidney vessels: artery, vein and collecting system. Such segmentation is vital during the surgical planning phase in which medical decisions are made before surgical incision. Our main contribution is developing a… ▽ More

    Submitted 18 June, 2018; originally announced June 2018.

  37. Why rankings of biomedical image analysis competitions should be interpreted with care

    Authors: Lena Maier-Hein, Matthias Eisenmann, Annika Reinke, Sinan Onogur, Marko Stankovic, Patrick Scholz, Tal Arbel, Hrvoje Bogunovic, Andrew P. Bradley, Aaron Carass, Carolin Feldmann, Alejandro F. Frangi, Peter M. Full, Bram van Ginneken, Allan Hanbury, Katrin Honauer, Michal Kozubek, Bennett A. Landman, Keno März, Oskar Maier, Klaus Maier-Hein, Bjoern H. Menze, Henning Müller, Peter F. Neher, Wiro Niessen , et al. (13 additional authors not shown)

    Abstract: International challenges have become the standard for validation of biomedical image analysis methods. Given their scientific impact, it is surprising that a critical analysis of common practices related to the organization of challenges has not yet been performed. In this paper, we present a comprehensive analysis of biomedical image analysis challenges conducted up to now. We demonstrate the imp… ▽ More

    Submitted 18 September, 2019; v1 submitted 6 June, 2018; originally announced June 2018.

    Comments: Article published in Nature Communications: https://rdcu.be/bRmNr

    Journal ref: Nature communications 9.1 (2018): 5217

  38. arXiv:1804.09310  [pdf, other

    eess.SY cs.CR eess.SP

    Vulnerability Analysis of Smart Grids to GPS Spoofing

    Authors: Paresh Risbud, Nikolaos Gatsis, Ahmad Taha

    Abstract: Sensors such as phasor measurement units (PMUs) endowed with GPS receivers are ubiquitously installed providing real-time grid visibility. A number of PMUs can cooperatively enable state estimation routines. However, GPS spoofing attacks can notably alter the PMU measurements, mislead the network operator, and drastically impact subsequent corrective control actions. Leveraging a novel measurement… ▽ More

    Submitted 24 April, 2018; originally announced April 2018.

    Comments: Accepted for publication in the IEEE Transactions on Smart Grid

  39. arXiv:1804.04426  [pdf, other

    cs.CR

    QRES: Quantitative Reasoning on Encrypted Security SLAs

    Authors: Ahmed Taha, Spyros Boukoros, Jesus Luna, Stefan Katzenbeisser, Neeraj Suri

    Abstract: While regulators advocate for higher cloud transparency, many Cloud Service Providers (CSPs) often do not provide detailed information regarding their security implementations in their Service Level Agreements (SLAs). In practice, CSPs are hesitant to release detailed information regarding their security posture for security and proprietary reasons. This lack of transparency hinders the adoption o… ▽ More

    Submitted 12 April, 2018; originally announced April 2018.

  40. arXiv:1802.01649  [pdf, other

    eess.SY cs.CR eess.SP math.OC

    Real-Time Rejection and Mitigation of Time Synchronization Attacks on the Global Positioning System

    Authors: Ali Khalajmehrabadi, Nikolaos Gatsis, David Akopian, Ahmad F. Taha

    Abstract: This paper introduces the Time Synchronization Attack Rejection and Mitigation (TSARM) technique for Time Synchronization Attacks (TSAs) over the Global Positioning System (GPS). The technique estimates the clock bias and drift of the GPS receiver along with the possible attack contrary to previous approaches. Having estimated the time instants of the attack, the clock bias and drift of the receiv… ▽ More

    Submitted 5 February, 2018; originally announced February 2018.

  41. arXiv:1712.08838  [pdf, other

    cs.CV

    Texture Synthesis with Recurrent Variational Auto-Encoder

    Authors: Rohan Chandra, Sachin Grover, Kyungjun Lee, Moustafa Meshry, Ahmed Taha

    Abstract: We propose a recurrent variational auto-encoder for texture synthesis. A novel loss function, FLTBNK, is used for training the texture synthesizer. It is rotational and partially color invariant loss function. Unlike L2 loss, FLTBNK explicitly models the correlation of color intensity between pixels. Our texture synthesizer generates neighboring tiles to expand a sample texture and is evaluated us… ▽ More

    Submitted 23 December, 2017; originally announced December 2017.

  42. arXiv:1706.04870  [pdf

    cs.CV

    Arabian Horse Identification Benchmark Dataset

    Authors: Ayat Taha, Ashraf Darwish, Aboul Ella Hassanien

    Abstract: The lack of a standard muzzle print database is a challenge for conducting researches in Arabian horse identification systems. Therefore, collecting a muzzle print images database is a crucial decision. The dataset presented in this paper is an option for the studies that need a dataset for testing and comparing the algorithms under development for Arabian horse identification. Our collected datas… ▽ More

    Submitted 15 June, 2017; originally announced June 2017.

  43. arXiv:1702.00882  [pdf, ps, other

    cs.CV

    Seeded Laplaican: An Eigenfunction Solution for Scribble Based Interactive Image Segmentation

    Authors: Ahmed Taha, Marwan Torki

    Abstract: In this paper, we cast the scribble-based interactive image segmentation as a semi-supervised learning problem. Our novel approach alleviates the need to solve an expensive generalized eigenvector problem by approximating the eigenvectors using efficiently computed eigenfunctions. The smoothness operator defined on feature densities at the limit n tends to infinity recovers the exact eigenvectors… ▽ More

    Submitted 27 August, 2017; v1 submitted 2 February, 2017; originally announced February 2017.

  44. arXiv:1601.07241  [pdf

    cs.DB

    Knowledge Discovery In GIS Data

    Authors: Ayman Taha

    Abstract: Intelligent geographic information system (IGIS) is one of the promising topics in GIS field. It aims at making GIS tools more sensitive for large volumes of data stored inside GIS systems by integrating GIS with other computer sciences such as Expert system (ES) Data Warehouse (DW), Decision Support System (DSS), or Knowledge Discovery Database (KDD). One of the main branches of IGIS is the Geogr… ▽ More

    Submitted 26 January, 2016; originally announced January 2016.

  45. arXiv:1508.07246  [pdf, other

    eess.SY cs.CR math.OC

    Risk Mitigation for Dynamic State Estimation Against Cyber Attacks and Unknown Inputs

    Authors: Ahmad F. Taha, Junjian Qi, Jianhui Wang, Jitesh H. Panchal

    Abstract: Phasor measurement units (PMUs) can be effectively utilized for the monitoring and control of the power grid. As the cyber-world becomes increasingly embedded into power grids, the risks of this inevitable evolution become serious. In this paper, we present a risk mitigation strategy, based on dynamic state estimation, to eliminate threat levels from the grid's unknown inputs and potential cyber-a… ▽ More

    Submitted 19 May, 2016; v1 submitted 28 August, 2015; originally announced August 2015.