Skip to main content

Showing 1–9 of 9 results for author: Youssef, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.04805  [pdf

    eess.IV cs.CV cs.LG physics.med-ph

    Improved Robustness for Deep Learning-based Segmentation of Multi-Center Myocardial Perfusion MRI Datasets Using Data Adaptive Uncertainty-guided Space-time Analysis

    Authors: Dilek M. Yalcinkaya, Khalid Youssef, Bobak Heydari, Janet Wei, Noel Bairey Merz, Robert Judd, Rohan Dharmakumar, Orlando P. Simonetti, Jonathan W. Weinsaft, Subha V. Raman, Behzad Sharif

    Abstract: Background. Fully automatic analysis of myocardial perfusion MRI datasets enables rapid and objective reporting of stress/rest studies in patients with suspected ischemic heart disease. Developing deep learning techniques that can analyze multi-center datasets despite limited training data and variations in software and hardware is an ongoing challenge. Methods. Datasets from 3 medical centers a… ▽ More

    Submitted 8 August, 2024; originally announced August 2024.

    Comments: Accepted for publication in JCMR, 2024

  2. arXiv:2308.13488  [pdf, other

    eess.IV cs.AI cs.CV physics.med-ph

    Temporal Uncertainty Localization to Enable Human-in-the-loop Analysis of Dynamic Contrast-enhanced Cardiac MRI Datasets

    Authors: Dilek M. Yalcinkaya, Khalid Youssef, Bobak Heydari, Orlando Simonetti, Rohan Dharmakumar, Subha Raman, Behzad Sharif

    Abstract: Dynamic contrast-enhanced (DCE) cardiac magnetic resonance imaging (CMRI) is a widely used modality for diagnosing myocardial blood flow (perfusion) abnormalities. During a typical free-breathing DCE-CMRI scan, close to 300 time-resolved images of myocardial perfusion are acquired at various contrast "wash in/out" phases. Manual segmentation of myocardial contours in each time-frame of a DCE image… ▽ More

    Submitted 13 November, 2023; v1 submitted 25 August, 2023; originally announced August 2023.

    Comments: Accepted for publication in MICCAI 2023

  3. arXiv:2201.06837  [pdf, other

    cs.LG physics.data-an physics.geo-ph

    Landslide Susceptibility Modeling by Interpretable Neural Network

    Authors: Khaled Youssef, Kevin Shao, Seulgi Moon, Louis-Serge Bouchard

    Abstract: Landslides are notoriously difficult to predict because numerous spatially and temporally varying factors contribute to slope stability. Artificial neural networks (ANN) have been shown to improve prediction accuracy but are largely uninterpretable. Here we introduce an additive ANN optimization framework to assess landslide susceptibility, as well as dataset division and outcome interpretation te… ▽ More

    Submitted 12 March, 2023; v1 submitted 18 January, 2022; originally announced January 2022.

    Comments: 79 pages (including SI section); 8 main figures; 12 supplementary figures; 9 supplementary tables

  4. A Novel Watermarking Approach for Protecting Image Integrity based on a Hybrid Security Technique

    Authors: Ahmad M. Nagm, Mohamed Torky, Khaled Y. Youssef

    Abstract: Digital Photo images are everywhere around us in journals, on walls, and over the Internet. However we have to be conscious that seeing does not always imply reality. Photo images become a rich subject of manipulations due to the advanced digital cameras as well as photo editing software. Accordingly, image forgery is becoming much easier using the existing tools in terms of time and accuracy, and… ▽ More

    Submitted 17 October, 2021; originally announced October 2021.

    Comments: 9 pages, 4 figures, 4 tables, International Journal of Computer Applications, Vol. 178, No.30, 14-22 July 2019, ISSN 0975-8887

  5. A New Approach for Image Authentication Framework for Media Forensics Purpose

    Authors: Ahmad M Nagm, Khaled Y Youssef, Mohammad I Youssef

    Abstract: With the increasing widely spread digital media become using in most fields such as medical care, Oceanography, Exploration processing, security purpose, military fields and astronomy, evidence in criminals and more vital fields and then digital Images become have different appreciation values according to what is important of carried information by digital images. Due to the easy manipulation pro… ▽ More

    Submitted 3 October, 2021; originally announced October 2021.

    Comments: 11 pages, 19 figures and one table

    Journal ref: Journal of Computer Engineering & Information Technology, 2017, 6:6

  6. arXiv:2110.01058  [pdf

    cs.CR

    Architecture of Network Camera Photo Authentication Scheme using Steganography Approach

    Authors: Ahmad M. Nagm, Khaled Y. Youssef, Mohammad I. Youssef

    Abstract: The aim of integrity protection process is not only to secure the send message, but also ensures that the original message is not modified during sending the message. In this paper, a novel proposed model is proposed to verify that the sent message was not modified. The proposed model starting with encrypting the original message and applying one of the hash functions on the message. The ciphered… ▽ More

    Submitted 3 October, 2021; originally announced October 2021.

    Comments: 6 Pages, 3 Figures. arXiv admin note: text overlap with arXiv:1401.5561 by other authors

    Journal ref: International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 ISSN 2229-5518

  7. arXiv:2108.07223  [pdf, ps, other

    cs.DC

    Metall: A Persistent Memory Allocator For Data-Centric Analytics

    Authors: Keita Iwabuchi, Karim Youssef, Kaushik Velusamy, Maya Gokhale, Roger Pearce

    Abstract: Data analytics applications transform raw input data into analytics-specific data structures before performing analytics. Unfortunately, such data ingestion step is often more expensive than analytics. In addition, various types of NVRAM devices are already used in many HPC systems today. Such devices will be useful for storing and reusing data structures beyond a single process life cycle. We d… ▽ More

    Submitted 28 February, 2022; v1 submitted 10 August, 2021; originally announced August 2021.

    ACM Class: D.4.2

  8. arXiv:2104.12103  [pdf, other

    eess.SP cs.AI cs.LG

    Scalable End-to-End RF Classification: A Case Study on Undersized Dataset Regularization by Convolutional-MST

    Authors: Khalid Youssef, Greg Schuette, Yubin Cai, Daisong Zhang, Yikun Huang, Yahya Rahmat-Samii, Louis-S. Bouchard

    Abstract: Unlike areas such as computer vision and speech recognition where convolutional and recurrent neural networks-based approaches have proven effective to the nature of the respective areas of application, deep learning (DL) still lacks a general approach suitable for the unique nature and challenges of RF systems such as radar, signals intelligence, electronic warfare, and communications. Existing a… ▽ More

    Submitted 13 May, 2021; v1 submitted 25 April, 2021; originally announced April 2021.

    Comments: 12 pages, 14 figures

  9. arXiv:1711.01559  [pdf, other

    eess.SP cs.LG cs.NE stat.ML

    Machine Learning Approach to RF Transmitter Identification

    Authors: K. Youssef, Louis-S. Bouchard, K. Z. Haigh, H. Krovi, J. Silovsky, C. P. Vander Valk

    Abstract: With the development and widespread use of wireless devices in recent years (mobile phones, Internet of Things, Wi-Fi), the electromagnetic spectrum has become extremely crowded. In order to counter security threats posed by rogue or unknown transmitters, it is important to identify RF transmitters not by the data content of the transmissions but based on the intrinsic physical characteristics of… ▽ More

    Submitted 7 November, 2017; v1 submitted 5 November, 2017; originally announced November 2017.

    Comments: 14 pages, 14 figures