Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 73 results for author: Malik, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.06041  [pdf, other

    cs.CV cs.AI

    Block Induced Signature Generative Adversarial Network (BISGAN): Signature Spoofing Using GANs and Their Evaluation

    Authors: Haadia Amjad, Kilian Goeller, Steffen Seitz, Carsten Knoll, Naseer Bajwa, Ronald Tetzlaff, Muhammad Imran Malik

    Abstract: Deep learning is actively being used in biometrics to develop efficient identification and verification systems. Handwritten signatures are a common subset of biometric data for authentication purposes. Generative adversarial networks (GANs) learn from original and forged signatures to generate forged signatures. While most GAN techniques create a strong signature verifier, which is the discrimina… ▽ More

    Submitted 11 October, 2024; v1 submitted 8 October, 2024; originally announced October 2024.

  2. arXiv:2409.16721  [pdf

    cs.AI

    A Multi-Dataset Classification-Based Deep Learning Framework for Electronic Health Records and Predictive Analysis in Healthcare

    Authors: Syed Mohd Faisal Malik, Md Tabrez Nafis, Mohd Abdul Ahad, Safdar Tanweer

    Abstract: In contemporary healthcare, to protect patient data, electronic health records have become invaluable repositories, creating vast opportunities to leverage deep learning techniques for predictive analysis. Retinal fundus images, cirrhosis stages, and heart disease diagnostic predictions have shown promising results through the integration of deep learning techniques for classifying diverse dataset… ▽ More

    Submitted 25 September, 2024; originally announced September 2024.

  3. arXiv:2407.06133  [pdf

    cs.CV

    Hebrew letters Detection and Cuneiform tablets Classification by using the yolov8 computer vision model

    Authors: Elaf A. Saeed, Ammar D. Jasim, Munther A. Abdul Malik

    Abstract: Cuneiform writing, an old art style, allows us to see into the past. Aside from Egyptian hieroglyphs, the cuneiform script is one of the oldest writing systems. Many historians place Hebrew's origins in antiquity. For example, we used the same approach to decipher the cuneiform languages; after learning how to decipher one old language, we would visit an archaeologist to learn how to decipher any… ▽ More

    Submitted 19 May, 2024; originally announced July 2024.

    Comments: 18 pages

  4. arXiv:2406.12400  [pdf

    cs.AI cs.CR

    A Cutting-Edge Deep Learning Method For Enhancing IoT Security

    Authors: Nadia Ansar, Mohammad Sadique Ansari, Mohammad Sharique, Aamina Khatoon, Md Abdul Malik, Md Munir Siddiqui

    Abstract: There have been significant issues given the IoT, with heterogeneity of billions of devices and with a large amount of data. This paper proposed an innovative design of the Internet of Things (IoT) Environment Intrusion Detection System (or IDS) using Deep Learning-integrated Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks. Our model, based on the CICIDS2017 dataset,… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  5. A Perspective Analysis of Handwritten Signature Technology

    Authors: Moises Diaz, Miguel A. Ferrer, Donato Impedovo, Muhammad Imran Malik, Giuseppe Pirlo, Rejean Plamondon

    Abstract: Handwritten signatures are biometric traits at the center of debate in the scientific community. Over the last 40 years, the interest in signature studies has grown steadily, having as its main reference the application of automatic signature verification, as previously published reviews in 1989, 2000, and 2008 bear witness. Ever since, and over the last 10 years, the application of handwritten si… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

    Journal ref: ACM Computing Surveys (CSUR), vol.51, no 6, pp. 117:1-117:39 (2018)

  6. arXiv:2402.11194  [pdf, other

    cs.CL

    Evaluating LLMs' Mathematical Reasoning in Financial Document Question Answering

    Authors: Pragya Srivastava, Manuj Malik, Vivek Gupta, Tanuja Ganu, Dan Roth

    Abstract: Large Language Models (LLMs), excel in natural language understanding, but their capability for complex mathematical reasoning with an amalgamation of structured tables and unstructured text is uncertain. This study explores LLMs' mathematical reasoning on four financial tabular question-answering datasets: TATQA, FinQA, ConvFinQA, and Multihiertt. Through extensive experiments with various models… ▽ More

    Submitted 29 February, 2024; v1 submitted 17 February, 2024; originally announced February 2024.

    Comments: 25 pages, 17 figures

  7. arXiv:2310.03856  [pdf, other

    cs.SD eess.AS

    Securing Voice Biometrics: One-Shot Learning Approach for Audio Deepfake Detection

    Authors: Awais Khan, Khalid Mahmood Malik

    Abstract: The Automatic Speaker Verification (ASV) system is vulnerable to fraudulent activities using audio deepfakes, also known as logical-access voice spoofing attacks. These deepfakes pose a concerning threat to voice biometrics due to recent advancements in generative AI and speech synthesis technologies. While several deep learning models for speech synthesis detection have been developed, most of th… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  8. arXiv:2309.14662  [pdf, other

    cs.LG cs.CY cs.IR

    Transformer-based classification of user queries for medical consultancy with respect to expert specialization

    Authors: Dmitry Lyutkin, Andrey Soloviev, Dmitry Zhukov, Denis Pozdnyakov, Muhammad Shahid Iqbal Malik, Dmitry I. Ignatov

    Abstract: The need for skilled medical support is growing in the era of digital healthcare. This research presents an innovative strategy, utilizing the RuBERT model, for categorizing user inquiries in the field of medical consultation with a focus on expert specialization. By harnessing the capabilities of transformers, we fine-tuned the pre-trained RuBERT model on a varied dataset, which facilitates preci… ▽ More

    Submitted 2 October, 2023; v1 submitted 26 September, 2023; originally announced September 2023.

    Comments: 16 pages, 5 figures

  9. arXiv:2309.10560  [pdf, other

    cs.SD eess.AS

    Bridging the Spoof Gap: A Unified Parallel Aggregation Network for Voice Presentation Attacks

    Authors: Awais Khan, Khalid Mahmood Malik

    Abstract: Automatic Speaker Verification (ASV) systems are increasingly used in voice bio-metrics for user authentication but are susceptible to logical and physical spoofing attacks, posing security risks. Existing research mainly tackles logical or physical attacks separately, leading to a gap in unified spoofing detection. Moreover, when existing systems attempt to handle both types of attacks, they ofte… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

  10. arXiv:2309.09837  [pdf, other

    cs.SD cs.CY eess.AS

    Frame-to-Utterance Convergence: A Spectra-Temporal Approach for Unified Spoofing Detection

    Authors: Awais Khan, Khalid Mahmood Malik, Shah Nawaz

    Abstract: Voice spoofing attacks pose a significant threat to automated speaker verification systems. Existing anti-spoofing methods often simulate specific attack types, such as synthetic or replay attacks. However, in real-world scenarios, the countermeasures are unaware of the generation schema of the attack, necessitating a unified solution. Current unified solutions struggle to detect spoofing artifact… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

  11. arXiv:2308.16464  [pdf, other

    cs.SE cs.AI

    MaintainoMATE: A GitHub App for Intelligent Automation of Maintenance Activities

    Authors: Anas Nadeem, Muhammad Usman Sarwar, Muhammad Zubair Malik

    Abstract: Software development projects rely on issue tracking systems at the core of tracking maintenance tasks such as bug reports, and enhancement requests. Incoming issue-reports on these issue tracking systems must be managed in an effective manner. First, they must be labelled and then assigned to a particular developer with relevant expertise. This handling of issue-reports is critical and requires t… ▽ More

    Submitted 31 August, 2023; originally announced August 2023.

  12. arXiv:2308.07832  [pdf, ps, other

    cs.LG cs.AI stat.ME

    REFORMS: Reporting Standards for Machine Learning Based Science

    Authors: Sayash Kapoor, Emily Cantrell, Kenny Peng, Thanh Hien Pham, Christopher A. Bail, Odd Erik Gundersen, Jake M. Hofman, Jessica Hullman, Michael A. Lones, Momin M. Malik, Priyanka Nanayakkara, Russell A. Poldrack, Inioluwa Deborah Raji, Michael Roberts, Matthew J. Salganik, Marta Serra-Garcia, Brandon M. Stewart, Gilles Vandewiele, Arvind Narayanan

    Abstract: Machine learning (ML) methods are proliferating in scientific research. However, the adoption of these methods has been accompanied by failures of validity, reproducibility, and generalizability. These failures can hinder scientific progress, lead to false consensus around invalid claims, and undermine the credibility of ML-based science. ML methods are often applied and fail in similar ways acros… ▽ More

    Submitted 19 September, 2023; v1 submitted 15 August, 2023; originally announced August 2023.

  13. arXiv:2307.06090  [pdf, other

    cs.SD eess.AS

    Can Large Language Models Aid in Annotating Speech Emotional Data? Uncovering New Frontiers

    Authors: Siddique Latif, Muhammad Usama, Mohammad Ibrahim Malik, Björn W. Schuller

    Abstract: Despite recent advancements in speech emotion recognition (SER) models, state-of-the-art deep learning (DL) approaches face the challenge of the limited availability of annotated data. Large language models (LLMs) have revolutionised our understanding of natural language, introducing emergent properties that broaden comprehension in language, speech, and vision. This paper examines the potential o… ▽ More

    Submitted 19 June, 2024; v1 submitted 12 July, 2023; originally announced July 2023.

    Comments: Accepted in IEEE Computational Intelligence Magazine

  14. arXiv:2305.18927  [pdf

    eess.IV cs.CV cs.LG

    Evaluating the feasibility of using Generative Models to generate Chest X-Ray Data

    Authors: Muhammad Danyal Malik, Danish Humair

    Abstract: In this paper, we explore the feasibility of using generative models, specifically Progressive Growing GANs (PG-GANs) and Stable Diffusion fine-tuning, to generate synthetic chest X-ray images for medical diagnosis purposes. Due to ethical concerns, obtaining sufficient medical data for machine learning is a challenge, which our approach aims to address by synthesising more data. We utilised the C… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

  15. Transfer Learning Across Heterogeneous Features For Efficient Tensor Program Generation

    Authors: Gaurav Verma, Siddhisanket Raskar, Zhen Xie, Abid M Malik, Murali Emani, Barbara Chapman

    Abstract: Tuning tensor program generation involves searching for various possible program transformation combinations for a given program on target hardware to optimize the tensor program execution. It is already a complex process because of the massive search space and exponential combinations of transformations make auto-tuning tensor program generation more challenging, especially when we have a heterog… ▽ More

    Submitted 26 December, 2023; v1 submitted 11 April, 2023; originally announced April 2023.

  16. arXiv:2304.03487  [pdf, other

    cs.DC cs.LG cs.PF

    ParaGraph: Weighted Graph Representation for Performance Optimization of HPC Kernels

    Authors: Ali TehraniJamsaz, Alok Mishra, Akash Dutta, Abid M. Malik, Barbara Chapman, Ali Jannesari

    Abstract: GPU-based HPC clusters are attracting more scientific application developers due to their extensive parallelism and energy efficiency. In order to achieve portability among a variety of multi/many core architectures, a popular choice for an application developer is to utilize directive-based parallel programming models, such as OpenMP. However, even with OpenMP, the developer must choose from amon… ▽ More

    Submitted 7 April, 2023; originally announced April 2023.

  17. arXiv:2302.01582  [pdf, other

    cs.CL

    Controlling for Stereotypes in Multimodal Language Model Evaluation

    Authors: Manuj Malik, Richard Johansson

    Abstract: We propose a methodology and design two benchmark sets for measuring to what extent language-and-vision language models use the visual signal in the presence or absence of stereotypes. The first benchmark is designed to test for stereotypical colors of common objects, while the second benchmark considers gender stereotypes. The key idea is to compare predictions when the image conforms to the ster… ▽ More

    Submitted 3 February, 2023; originally announced February 2023.

  18. arXiv:2301.04844  [pdf, other

    cs.LG

    SACDNet: Towards Early Type 2 Diabetes Prediction with Uncertainty for Electronic Health Records

    Authors: Tayyab Nasir, Muhammad Kamran Malik

    Abstract: Type 2 diabetes mellitus (T2DM) is one of the most common diseases and a leading cause of death. The problem of early diagnosis of T2DM is challenging and necessary to prevent serious complications. This study proposes a novel neural network architecture for early T2DM prediction using multi-headed self-attention and dense layers to extract features from historic diagnoses, patient vitals, and dem… ▽ More

    Submitted 18 January, 2023; v1 submitted 12 January, 2023; originally announced January 2023.

    Comments: Misspelled SACEDNet changed to SACDNet in Abstract. Related Work corrected tehcniques to techniques. Dataset rh replaced with Rh. Methodology, mod replaced with models, andrepresentation with representations. Removed bold formatting from Table 3 in Methodology. Results replaced Hence the with Hence, this

  19. arXiv:2301.03636  [pdf, other

    cs.DC

    OpenMP Advisor

    Authors: Alok Mishra, Abid M. Malik, Meifeng Lin, Barbara Chapman

    Abstract: With the increasing diversity of heterogeneous architecture in the HPC industry, porting a legacy application to run on different architectures is a tough challenge. In this paper, we present OpenMP Advisor, a first of its kind compiler tool that enables code offloading to a GPU with OpenMP using Machine Learning. Although the tool is currently limited to GPUs, it can be extended to support other… ▽ More

    Submitted 9 January, 2023; originally announced January 2023.

  20. arXiv:2211.06761  [pdf, other

    cs.CV

    Few-Shot Learning for Biometric Verification

    Authors: Saad Bin Ahmed, Umaid M. Zaffar, Marium Aslam, Muhammad Imran Malik

    Abstract: In machine learning applications, it is common practice to feed as much information as possible. In most cases, the model can handle large data sets that allow to predict more accurately. In the presence of data scarcity, a Few-Shot learning (FSL) approach aims to build more accurate algorithms with limited training data. We propose a novel end-to-end lightweight architecture that verifies biometr… ▽ More

    Submitted 3 May, 2023; v1 submitted 12 November, 2022; originally announced November 2022.

    Comments: 19 pages, 7 figures

  21. arXiv:2210.00417  [pdf, other

    eess.AS cs.CY cs.SD

    Voice Spoofing Countermeasures: Taxonomy, State-of-the-art, experimental analysis of generalizability, open challenges, and the way forward

    Authors: Awais Khan, Khalid Mahmood Malik, James Ryan, Mikul Saravanan

    Abstract: Malicious actors may seek to use different voice-spoofing attacks to fool ASV systems and even use them for spreading misinformation. Various countermeasures have been proposed to detect these spoofing attacks. Due to the extensive work done on spoofing detection in automated speaker verification (ASV) systems in the last 6-7 years, there is a need to classify the research and perform qualitative… ▽ More

    Submitted 21 November, 2022; v1 submitted 1 October, 2022; originally announced October 2022.

  22. arXiv:2209.02051  [pdf, other

    stat.ML cs.LG physics.flu-dyn

    Advancing Reacting Flow Simulations with Data-Driven Models

    Authors: Kamila Zdybał, Giuseppe D'Alessio, Gianmarco Aversano, Mohammad Rafi Malik, Axel Coussement, James C. Sutherland, Alessandro Parente

    Abstract: The use of machine learning algorithms to predict behaviors of complex systems is booming. However, the key to an effective use of machine learning tools in multi-physics problems, including combustion, is to couple them to physical and computer models. The performance of these tools is enhanced if all the prior knowledge and the physical constraints are embodied. In other words, the scientific me… ▽ More

    Submitted 5 September, 2022; originally announced September 2022.

    Comments: Chapter 15 in the book 'Data Driven Fluid Mechanics', originating from the lecture series 'Machine Learning in Fluid Mechanics' organized by the von Karman Institute in 2020

    MSC Class: 65D99; 68U99; 62H30; 68T09; 68T30; 76F25

  23. arXiv:2205.01512  [pdf, other

    cs.NE cs.CY cs.LG

    Fair Feature Subset Selection using Multiobjective Genetic Algorithm

    Authors: Ayaz Ur Rehman, Anas Nadeem, Muhammad Zubair Malik

    Abstract: The feature subset selection problem aims at selecting the relevant subset of features to improve the performance of a Machine Learning (ML) algorithm on training data. Some features in data can be inherently noisy, costly to compute, improperly scaled, or correlated to other features, and they can adversely affect the accuracy, cost, and complexity of the induced algorithm. The goal of traditiona… ▽ More

    Submitted 30 April, 2022; originally announced May 2022.

  24. A Case for Microservices Orchestration Using Workflow Engines

    Authors: Anas Nadeem, Muhammad Zubair Malik

    Abstract: Microservices have become the de-facto software architecture for cloud-native applications. A contentious architectural decision in microservices is to compose them using choreography or orchestration. In choreography, every service works independently, whereas, in orchestration, there is a controller that coordinates service interactions. This paper makes a case for orchestration. The promise of… ▽ More

    Submitted 14 April, 2022; originally announced April 2022.

    Comments: 5 pages, International Conference on Software Engineering 2022 (NIER) Track

  25. arXiv:2204.00067  [pdf, other

    q-bio.GN cs.LG

    rfPhen2Gen: A machine learning based association study of brain imaging phenotypes to genotypes

    Authors: Muhammad Ammar Malik, Alexander S. Lundervold, Tom Michoel

    Abstract: Imaging genetic studies aim to find associations between genetic variants and imaging quantitative traits. Traditional genome-wide association studies (GWAS) are based on univariate statistical tests, but when multiple traits are analyzed together they suffer from a multiple-testing problem and from not taking into account correlations among the traits. An alternative approach to multi-trait GWAS… ▽ More

    Submitted 31 March, 2022; originally announced April 2022.

  26. Automatic Issue Classifier: A Transfer Learning Framework for Classifying Issue Reports

    Authors: Anas Nadeem, Muhammad Usman Sarwar, Muhammad Zubair Malik

    Abstract: Issue tracking systems are used in the software industry for the facilitation of maintenance activities that keep the software robust and up to date with ever-changing industry requirements. Usually, users report issues that can be categorized into different labels such as bug reports, enhancement requests, and questions related to the software. Most of the issue tracking systems make the labellin… ▽ More

    Submitted 12 February, 2022; originally announced February 2022.

    Comments: 6 pages, International Symposium on Software Reliability Engineering (ISSRE 2021) Industry Track

  27. arXiv:2202.03903  [pdf, other

    cs.LG cs.AI

    KENN: Enhancing Deep Neural Networks by Leveraging Knowledge for Time Series Forecasting

    Authors: Muhammad Ali Chattha, Ludger van Elst, Muhammad Imran Malik, Andreas Dengel, Sheraz Ahmed

    Abstract: End-to-end data-driven machine learning methods often have exuberant requirements in terms of quality and quantity of training data which are often impractical to fulfill in real-world applications. This is specifically true in time series domain where problems like disaster prediction, anomaly detection, and demand prediction often do not have a large amount of historical data. Moreover, relying… ▽ More

    Submitted 16 February, 2022; v1 submitted 8 February, 2022; originally announced February 2022.

  28. arXiv:2201.13064  [pdf, other

    cs.SI

    Glowing Experience or Bad Trip? A Quantitative Analysis of User Reported Drug Experiences on Erowid.org

    Authors: Angelina Mooseder, Momin M. Malik, Hemank Lamba, Earth Erowid, Sylvia Thyssen, Juergen Pfeffer

    Abstract: Erowid.org is a website dedicated to documenting information about psychoactive substances, with over 36,000 user-submitted drug Experience Reports. We study the potential of these reports to provide information about characteristic experiences with drugs. First, we assess different kinds of drug experiences, such as 'addiction' or 'bad trips'. We quantitatively analyze how such experiences are re… ▽ More

    Submitted 31 January, 2022; originally announced January 2022.

  29. arXiv:2201.06958  [pdf, other

    cs.CE physics.comp-ph

    Scalable In Situ Compression of Transient Simulation Data Using Time-Dependent Bases

    Authors: Shaghayegh Zamani Ashtiani, Mujeeb R. Malik, Hessam Babaee

    Abstract: Large-scale simulations of time-dependent problems generate a massive amount of data and with the explosive increase in computational resources the size of the data generated by these simulations has increased significantly. This has imposed severe limitations on the amount of data that can be stored and has elevated the issue of input/output (I/O) into one of the major bottlenecks of high-perform… ▽ More

    Submitted 10 January, 2022; originally announced January 2022.

    Comments: 22 pages, 12 figures

  30. arXiv:2201.01249  [pdf, ps, other

    cs.AI cs.LG eess.IV

    ExAID: A Multimodal Explanation Framework for Computer-Aided Diagnosis of Skin Lesions

    Authors: Adriano Lucieri, Muhammad Naseer Bajwa, Stephan Alexander Braun, Muhammad Imran Malik, Andreas Dengel, Sheraz Ahmed

    Abstract: One principal impediment in the successful deployment of AI-based Computer-Aided Diagnosis (CAD) systems in clinical workflows is their lack of transparent decision making. Although commonly used eXplainable AI methods provide some insight into opaque algorithms, such explanations are usually convoluted and not readily comprehensible except by highly trained experts. The explanation of decisions r… ▽ More

    Submitted 4 January, 2022; originally announced January 2022.

    Comments: Accepted for publication in Computer Methods and Programs in Biomedicine

  31. arXiv:2111.00108  [pdf, other

    q-bio.GN cs.LG q-bio.QM stat.ME

    High-dimensional multi-trait GWAS by reverse prediction of genotypes

    Authors: Muhammad Ammar Malik, Adriaan-Alexander Ludl, Tom Michoel

    Abstract: Multi-trait genome-wide association studies (GWAS) use multi-variate statistical methods to identify associations between genetic variants and multiple correlated traits simultaneously, and have higher statistical power than independent univariate analyses of traits. Reverse regression, where genotypes of genetic variants are regressed on multiple traits simultaneously, has emerged as a promising… ▽ More

    Submitted 9 February, 2022; v1 submitted 29 October, 2021; originally announced November 2021.

  32. arXiv:2105.12651  [pdf, other

    cs.HC

    The Usability and Trustworthiness of Medical Eye Images

    Authors: Daniel Diethei, Ashley Colley, Lisa Dannenberg, Muhammad Fawad Jawaid Malik, Johannes Schöning

    Abstract: The majority of blindness is preventable, and is located in developing countries. While mHealth applications for retinal imaging in combination with affordable smartphone lens adaptors are a step towards better eye care access, the expert knowledge and additional hardware needed are often unavailable in developing countries. Eye screening apps without lens adaptors exist, but we do not know much a… ▽ More

    Submitted 26 May, 2021; originally announced May 2021.

    Journal ref: 2021 IEEE International Conference on Healthcare Informatics (ICHI)

  33. arXiv:2104.03702  [pdf, other

    cs.SI cs.CY

    Media Cloud: Massive Open Source Collection of Global News on the Open Web

    Authors: Hal Roberts, Rahul Bhargava, Linas Valiukas, Dennis Jen, Momin M. Malik, Cindy Bishop, Emily Ndulue, Aashka Dave, Justin Clark, Bruce Etling, Rob Faris, Anushka Shah, Jasmin Rubinovitz, Alexis Hope, Catherine D'Ignazio, Fernando Bermejo, Yochai Benkler, Ethan Zuckerman

    Abstract: We present the first full description of Media Cloud, an open source platform based on crawling hyperlink structure in operation for over 10 years, that for many uses will be the best way to collect data for studying the media ecosystem on the open web. We document the key choices behind what data Media Cloud collects and stores, how it processes and organizes these data, and its open API access a… ▽ More

    Submitted 1 May, 2021; v1 submitted 8 April, 2021; originally announced April 2021.

    Comments: 15 pages, 9 figures, accepted (minus the 3-page, 3-image appendix given here) for publication and forthcoming in Proceedings of the Fifteenth International AAAI Conference on Web and Social Media (ICWSM-2021)

    ACM Class: J.4; H.3.5; J.7; J.5; K.4.1

  34. arXiv:2103.00484  [pdf

    cs.CR cs.LG cs.SD eess.AS eess.IV

    Deepfakes Generation and Detection: State-of-the-art, open challenges, countermeasures, and way forward

    Authors: Momina Masood, Marriam Nawaz, Khalid Mahmood Malik, Ali Javed, Aun Irtaza

    Abstract: Easy access to audio-visual content on social media, combined with the availability of modern tools such as Tensorflow or Keras, open-source trained models, and economical computing infrastructure, and the rapid evolution of deep-learning (DL) methods, especially Generative Adversarial Networks (GAN), have made it possible to generate deepfakes to disseminate disinformation, revenge porn, financia… ▽ More

    Submitted 22 November, 2021; v1 submitted 25 February, 2021; originally announced March 2021.

  35. arXiv:2008.02919  [pdf, other

    cs.SI cs.HC cs.LG

    Can Smartphone Co-locations Detect Friendship? It Depends How You Model It

    Authors: Momin M. Malik, Afsaneh Doryab, Michael Merrill, Jürgen Pfeffer, Anind K. Dey

    Abstract: We present a study to detect friendship, its strength, and its change from smartphone location data collectedamong members of a fraternity. We extract a rich set of co-location features and build classifiers that detectfriendships and close friendship at 30% above a random baseline. We design cross-validation schema to testour model performance in specific application settings, finding it robust t… ▽ More

    Submitted 30 August, 2020; v1 submitted 6 August, 2020; originally announced August 2020.

  36. arXiv:2006.09158  [pdf, other

    eess.IV cs.CV cs.LG

    G1020: A Benchmark Retinal Fundus Image Dataset for Computer-Aided Glaucoma Detection

    Authors: Muhammad Naseer Bajwa, Gur Amrit Pal Singh, Wolfgang Neumeier, Muhammad Imran Malik, Andreas Dengel, Sheraz Ahmed

    Abstract: Scarcity of large publicly available retinal fundus image datasets for automated glaucoma detection has been the bottleneck for successful application of artificial intelligence towards practical Computer-Aided Diagnosis (CAD). A few small datasets that are available for research community usually suffer from impractical image capturing conditions and stringent inclusion criteria. These shortcomin… ▽ More

    Submitted 28 May, 2020; originally announced June 2020.

    Comments: Accepted in IJCNN-2020, 7 pages, 5 figures

  37. Combining Fine- and Coarse-Grained Classifiers for Diabetic Retinopathy Detection

    Authors: Muhammad Naseer Bajwa, Yoshinobu Taniguchi, Muhammad Imran Malik, Wolfgang Neumeier, Andreas Dengel, Sheraz Ahmed

    Abstract: Visual artefacts of early diabetic retinopathy in retinal fundus images are usually small in size, inconspicuous, and scattered all over retina. Detecting diabetic retinopathy requires physicians to look at the whole image and fixate on some specific regions to locate potential biomarkers of the disease. Therefore, getting inspiration from ophthalmologist, we propose to combine coarse-grained clas… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

    Comments: Pages 12, Figures 5

  38. arXiv:2005.14284  [pdf

    cs.CV cs.LG eess.IV

    Two-stage framework for optic disc localization and glaucoma classification in retinal fundus images using deep learning

    Authors: Muhammad Naseer Bajwa, Muhammad Imran Malik, Shoaib Ahmed Siddiqui, Andreas Dengel, Faisal Shafait, Wolfgang Neumeier, Sheraz Ahmed

    Abstract: With the advancement of powerful image processing and machine learning techniques, CAD has become ever more prevalent in all fields of medicine including ophthalmology. Since optic disc is the most important part of retinal fundus image for glaucoma detection, this paper proposes a two-stage framework that first detects and localizes optic disc and then classifies it into healthy or glaucomatous.… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

    Comments: 16 Pages, 10 Figures

    Journal ref: BMC medical informatics and decision making 19.1 (2019): 136

  39. arXiv:2005.02921  [pdf, other

    stat.ME cs.LG q-bio.GN q-bio.QM stat.ML

    Restricted maximum-likelihood method for learning latent variance components in gene expression data with known and unknown confounders

    Authors: Muhammad Ammar Malik, Tom Michoel

    Abstract: Random effect models are popular statistical models for detecting and correcting spurious sample correlations due to hidden confounders in genome-wide gene expression data. In applications where some confounding factors are known, estimating simultaneously the contribution of known and latent variance components in random effect models is a challenge that has so far relied on numerical gradient-ba… ▽ More

    Submitted 4 November, 2021; v1 submitted 6 May, 2020; originally announced May 2020.

    Comments: 15 pages, 4 figures, 3 supplementary figures, 19 pages supplementary methods; minor revision with expanded Discussion section

  40. arXiv:2005.02000  [pdf, other

    cs.LG cs.CV eess.IV stat.ML

    On Interpretability of Deep Learning based Skin Lesion Classifiers using Concept Activation Vectors

    Authors: Adriano Lucieri, Muhammad Naseer Bajwa, Stephan Alexander Braun, Muhammad Imran Malik, Andreas Dengel, Sheraz Ahmed

    Abstract: Deep learning based medical image classifiers have shown remarkable prowess in various application areas like ophthalmology, dermatology, pathology, and radiology. However, the acceptance of these Computer-Aided Diagnosis (CAD) systems in real clinical setups is severely limited primarily because their decision-making process remains largely obscure. This work aims at elucidating a deep learning b… ▽ More

    Submitted 5 May, 2020; originally announced May 2020.

    Comments: Accepted for the IEEE International Joint Conference on Neural Networks (IJCNN) 2020

    Journal ref: 2020 International Joint Conference on Neural Networks (IJCNN)

  41. arXiv:2004.12923  [pdf

    cs.HC

    Improving Usability of User Centric Decision Making of Multi-Attribute Products on E-commerce Websites

    Authors: Roquia Mushtaq, Naveed Ahmad, Aimal Rextin, Muhammad Muddassir Malik

    Abstract: The high number of products available makes it difficult for a user to find the most suitable products according to their needs. This problem is especially exacerbated when the user is trying to optimize multiple attributes during product selection, e.g. memory size and camera resolution requirements in case of smartphones. Previous studies have shown that such users search extensively to find a p… ▽ More

    Submitted 27 April, 2020; originally announced April 2020.

    Comments: 22 pages

  42. arXiv:2004.03281  [pdf, other

    cs.LG cs.CV stat.ML

    Teacher-Class Network: A Neural Network Compression Mechanism

    Authors: Shaiq Munir Malik, Muhammad Umair Haider, Mohbat Tharani, Musab Rasheed, Murtaza Taj

    Abstract: To reduce the overwhelming size of Deep Neural Networks (DNN) teacher-student methodology tries to transfer knowledge from a complex teacher network to a simple student network. We instead propose a novel method called the teacher-class network consisting of a single teacher and multiple student networks (i.e. class of students). Instead of transferring knowledge to one student only, the proposed… ▽ More

    Submitted 29 October, 2021; v1 submitted 7 April, 2020; originally announced April 2020.

    Comments: Published in BMVC 2021

  43. arXiv:2002.06713  [pdf, other

    cs.CR

    AMOUN: Asymmetric lightweight cryptographic scheme for wireless group communication

    Authors: Ahmad Mansour, Khalid M. Malik, Niko Kaso

    Abstract: Multi-recipient cryptographic schemes provide secure communication, between one sender and multiple recipients, in a multi-party group. Providing secure multi-party communication is very challenging, especially in dynamic networks. Existing multi-recipient cryptographic schemes pose a variety of limitations. These include high computational overhead for both encryption and decryption, additional c… ▽ More

    Submitted 16 February, 2020; originally announced February 2020.

  44. arXiv:2002.05193  [pdf, other

    cs.CY cs.LG econ.EM math.ST stat.ML

    A Hierarchy of Limitations in Machine Learning

    Authors: Momin M. Malik

    Abstract: "All models are wrong, but some are useful", wrote George E. P. Box (1979). Machine learning has focused on the usefulness of probability models for prediction in social systems, but is only now coming to grips with the ways in which these models are wrong---and the consequences of those shortcomings. This paper attempts a comprehensive, structured overview of the specific conceptual, procedural,… ▽ More

    Submitted 29 February, 2020; v1 submitted 12 February, 2020; originally announced February 2020.

    Comments: 68 pages, 7 figures

    ACM Class: G.3; I.6.4; J.4

  45. arXiv:2001.07424  [pdf, other

    cs.CR

    Investigation of Data Deletion Vulnerabilities in NAND Flash Memory Based Storage

    Authors: Abhilash Garg, Supriya Chakraborty, Manoj Malik, Devesh Kumar, Satyajeet Singh, Manan Suri

    Abstract: Semiconductor NAND Flash based memory technology dominates the electronic Non-Volatile storage media market. Though NAND Flash offers superior performance and reliability over conventional magnetic HDDs, yet it suffers from certain data-security vulnerabilities. Such vulnerabilities can expose sensitive information stored on the media to security risks. It is thus necessary to study in detail the… ▽ More

    Submitted 21 January, 2020; originally announced January 2020.

    Comments: 8 pages, 12 figures

    MSC Class: 68P20 ACM Class: H.3.2; H.3.3; H.3.4

  46. arXiv:1912.11356  [pdf

    q-bio.GN cs.LG

    A Robust and Precise ConvNet for small non-coding RNA classification (RPC-snRC)

    Authors: Muhammad Nabeel Asima, Muhammad Imran Malik, Andreas Dengela, Sheraz Ahmed

    Abstract: Functional or non-coding RNAs are attracting more attention as they are now potentially considered valuable resources in the development of new drugs intended to cure several human diseases. The identification of drugs targeting the regulatory circuits of functional RNAs depends on knowing its family, a task which is known as RNA sequence classification. State-of-the-art small noncoding RNA classi… ▽ More

    Submitted 23 December, 2019; originally announced December 2019.

    Comments: 34 pages

  47. arXiv:1912.03028  [pdf, other

    cs.SE cs.FL cs.LO

    A Survey on Theorem Provers in Formal Methods

    Authors: M. Saqib Nawaz, Moin Malik, Yi Li, Meng Sun, M. Ikram Ullah Lali

    Abstract: Mechanical reasoning is a key area of research that lies at the crossroads of mathematical logic and artificial intelligence. The main aim to develop mechanical reasoning systems (also known as theorem provers) was to enable mathematicians to prove theorems by computer programs. However, these tools evolved with time and now play vital role in the modeling and reasoning about complex and large-sca… ▽ More

    Submitted 6 December, 2019; originally announced December 2019.

  48. arXiv:1909.05478  [pdf, other

    cs.CL cs.IR cs.LG

    A Robust Hybrid Approach for Textual Document Classification

    Authors: Muhammad Nabeel Asim, Muhammad Usman Ghani Khan, Muhammad Imran Malik, Andreas Dengel, Sheraz Ahmed

    Abstract: Text document classification is an important task for diverse natural language processing based applications. Traditional machine learning approaches mainly focused on reducing dimensionality of textual data to perform classification. This although improved the overall classification accuracy, the classifiers still faced sparsity problem due to lack of better data representation techniques. Deep l… ▽ More

    Submitted 12 September, 2019; originally announced September 2019.

    Comments: ICDAR Conference

  49. arXiv:1909.01822  [pdf

    cs.DB

    Frameworks for Querying Databases Using Natural Language: A Literature Review

    Authors: Hafsa Shareef Dar, M. Ikramullah Lali, Moin Ul Din, Khalid Mahmood Malik, Syed Ahmad Chan Bukhari

    Abstract: A Natural Language Interface (NLI) facilitates users to pose queries to retrieve information from a database without using any artificial language such as the Structured Query Language (SQL). Several applications in various domains including healthcare, customer support and search engines, require elaborating structured data having information on text. Moreover, many issues have been explored incl… ▽ More

    Submitted 3 September, 2019; originally announced September 2019.

    Comments: 5 tables, 2 figures

  50. arXiv:1909.00935  [pdf, other

    cs.SD eess.AS

    Voice Spoofing Detection Corpus for Single and Multi-order Audio Replays

    Authors: Roland Baumann, Khalid Mahmood Malik, Ali Javed, Andersen Ball, Brandon Kujawa, Hafiz Malik

    Abstract: The evolution of modern voice controlled devices (VCDs) in recent years has revolutionized the Internet of Things, and resulted in increased realization of smart homes, personalization and home automation through voice commands. The introduction of VCDs in IoT is expected to give emergence of new subfield of IoT, called Multimedia of Thing (MoT). These VCDs can be exploited in IoT driven environme… ▽ More

    Submitted 2 September, 2019; originally announced September 2019.