Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 273 results for author: Rahman, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.03486  [pdf, other

    cs.CV

    Celeb-FBI: A Benchmark Dataset on Human Full Body Images and Age, Gender, Height and Weight Estimation using Deep Learning Approach

    Authors: Pronay Debnath, Usafa Akther Rifa, Busra Kamal Rafa, Ali Haider Talukder Akib, Md. Aminur Rahman

    Abstract: The scarcity of comprehensive datasets in surveillance, identification, image retrieval systems, and healthcare poses a significant challenge for researchers in exploring new methodologies and advancing knowledge in these respective fields. Furthermore, the need for full-body image datasets with detailed attributes like height, weight, age, and gender is particularly significant in areas such as f… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

    Comments: Accepted for publication in 3rd International Conference on Advanced Communication and Intelligent Systems

  2. Cutting through the noise to motivate people: A comprehensive analysis of COVID-19 social media posts de/motivating vaccination

    Authors: Ashiqur Rahman, Ehsan Mohammadi, Hamed Alhoori

    Abstract: The COVID-19 pandemic exposed significant weaknesses in the healthcare information system. The overwhelming volume of misinformation on social media and other socioeconomic factors created extraordinary challenges to motivate people to take proper precautions and get vaccinated. In this context, our work explored a novel direction by analyzing an extensive dataset collected over two years, identif… ▽ More

    Submitted 14 June, 2024; originally announced July 2024.

    Comments: 51 pages, 13 figures, 12 tables. Accepted at Natural Language Processing Journal

    Journal ref: Natural Language Processing Journal (June 2024), 100085

  3. arXiv:2406.17576  [pdf, other

    cs.CR cs.AI cs.LG

    Leveraging Reinforcement Learning in Red Teaming for Advanced Ransomware Attack Simulations

    Authors: Cheng Wang, Christopher Redino, Ryan Clark, Abdul Rahman, Sal Aguinaga, Sathvik Murli, Dhruv Nandakumar, Roland Rao, Lanxiao Huang, Daniel Radke, Edward Bowen

    Abstract: Ransomware presents a significant and increasing threat to individuals and organizations by encrypting their systems and not releasing them until a large fee has been extracted. To bolster preparedness against potential attacks, organizations commonly conduct red teaming exercises, which involve simulated attacks to assess existing security measures. This paper proposes a novel approach utilizing… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  4. arXiv:2406.09155  [pdf, other

    cs.CL cs.AI cs.CV cs.LG

    DefAn: Definitive Answer Dataset for LLMs Hallucination Evaluation

    Authors: A B M Ashikur Rahman, Saeed Anwar, Muhammad Usman, Ajmal Mian

    Abstract: Large Language Models (LLMs) have demonstrated remarkable capabilities, revolutionizing the integration of AI in daily life applications. However, they are prone to hallucinations, generating claims that contradict established facts, deviating from prompts, and producing inconsistent responses when the same prompt is presented multiple times. Addressing these issues is challenging due to the lack… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  5. arXiv:2406.05912  [pdf

    cs.CV cs.AI

    BD-SAT: High-resolution Land Use Land Cover Dataset & Benchmark Results for Developing Division: Dhaka, BD

    Authors: Ovi Paul, Abu Bakar Siddik Nayem, Anis Sarker, Amin Ahsan Ali, M Ashraful Amin, AKM Mahbubur Rahman

    Abstract: Land Use Land Cover (LULC) analysis on satellite images using deep learning-based methods is significantly helpful in understanding the geography, socio-economic conditions, poverty levels, and urban sprawl in developing countries. Recent works involve segmentation with LULC classes such as farmland, built-up areas, forests, meadows, water bodies, etc. Training deep learning methods on satellite i… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

    Comments: 26 pages, 15 figures and 12 tables

  6. arXiv:2405.15341  [pdf, other

    cs.AI cs.CV

    V-Zen: Efficient GUI Understanding and Precise Grounding With A Novel Multimodal LLM

    Authors: Abdur Rahman, Rajat Chawla, Muskaan Kumar, Arkajit Datta, Adarsh Jha, Mukunda NS, Ishaan Bhola

    Abstract: In the rapidly evolving landscape of AI research and application, Multimodal Large Language Models (MLLMs) have emerged as a transformative force, adept at interpreting and integrating information from diverse modalities such as text, images, and Graphical User Interfaces (GUIs). Despite these advancements, the nuanced interaction and understanding of GUIs pose a significant challenge, limiting th… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  7. arXiv:2405.12550  [pdf, other

    cs.CR

    Blockchain-based AI Methods for Managing Industrial IoT: Recent Developments, Integration Challenges and Opportunities

    Authors: Anichur Rahman, Dipanjali Kundu, Tanoy Debnath, Muaz Rahman, Airin Afroj Aishi, Jahidul Islam

    Abstract: Currently, Blockchain (BC), Artificial Intelligence (AI), and smart Industrial Internet of Things (IIoT) are not only leading promising technologies in the world, but also these technologies facilitate the current society to develop the standard of living and make it easier for users. However, these technologies have been applied in various domains for different purposes. Then, these are successfu… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

  8. arXiv:2405.10543  [pdf, other

    cs.CR

    SMARD: A Cost Effective Smart Agro Development Technology for Crops Disease Classification

    Authors: Tanoy Debnath, Shadman Wadith, Anichur Rahman

    Abstract: Agriculture has a significant role in a country's economy. The "SMARD" project aims to strengthen the country's agricultural sector by giving farmers with the information and tools they need to solve common difficulties and increase productivity. The project provides farmers with information on crop care, seed selection, and disease management best practices, as well as access to tools for recogni… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

  9. arXiv:2405.07419  [pdf, other

    cs.CR

    Indoor and Outdoor Crowd Density Level Estimation with Video Analysis through Machine Learning Models

    Authors: Mahira Arefin, Md. Anwar Hussen Wadud, Anichur Rahman

    Abstract: Crowd density level estimation is an essential aspect of crowd safety since it helps to identify areas of probable overcrowding and required conditions. Nowadays, AI systems can help in various sectors. Here for safety purposes or many for public service crowd detection, tracking or estimating crowd level is essential. So we decided to build an AI project to fulfil the purpose. This project can de… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  10. arXiv:2405.06371  [pdf, other

    cs.CR cs.SE

    Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns

    Authors: Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr, Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl

    Abstract: Following the recent release of AI assistants, such as OpenAI's ChatGPT and GitHub Copilot, the software industry quickly utilized these tools for software development tasks, e.g., generating code or consulting AI for advice. While recent research has demonstrated that AI-generated code can contain security issues, how software professionals balance AI assistant usage and security remains unclear.… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: 20 pages, 2 figures, 3 tables

  11. arXiv:2404.19714  [pdf, other

    cs.CL

    ThangDLU at #SMM4H 2024: Encoder-decoder models for classifying text data on social disorders in children and adolescents

    Authors: Hoang-Thang Ta, Abu Bakar Siddiqur Rahman, Lotfollah Najjar, Alexander Gelbukh

    Abstract: This paper describes our participation in Task 3 and Task 5 of the #SMM4H (Social Media Mining for Health) 2024 Workshop, explicitly targeting the classification challenges within tweet data. Task 3 is a multi-class classification task centered on tweets discussing the impact of outdoor environments on symptoms of social anxiety. Task 5 involves a binary classification task focusing on tweets repo… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

    Comments: 4 pages

  12. arXiv:2404.10904  [pdf, other

    cs.CV

    Multi-Task Multi-Modal Self-Supervised Learning for Facial Expression Recognition

    Authors: Marah Halawa, Florian Blume, Pia Bideau, Martin Maier, Rasha Abdel Rahman, Olaf Hellwich

    Abstract: Human communication is multi-modal; e.g., face-to-face interaction involves auditory signals (speech) and visual signals (face movements and hand gestures). Hence, it is essential to exploit multiple modalities when designing machine learning-based facial expression recognition systems. In addition, given the ever-growing quantities of video data that capture human facial expressions, such systems… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: The paper will appear in the CVPR 2024 workshops proceedings

  13. arXiv:2404.10740  [pdf, other

    cs.AI

    N-Agent Ad Hoc Teamwork

    Authors: Caroline Wang, Arrasy Rahman, Ishan Durugkar, Elad Liebman, Peter Stone

    Abstract: Current approaches to learning cooperative behaviors in multi-agent settings assume relatively restrictive settings. In standard fully cooperative multi-agent reinforcement learning, the learning algorithm controls \textit{all} agents in the scenario, while in ad hoc teamwork, the learning algorithm usually assumes control over only a $\textit{single}$ agent in the scenario. However, many cooperat… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    ACM Class: I.2.11; I.2.1; I.2.6; I.2.8

  14. arXiv:2404.01501  [pdf, other

    cs.CV cs.LG

    MosquitoFusion: A Multiclass Dataset for Real-Time Detection of Mosquitoes, Swarms, and Breeding Sites Using Deep Learning

    Authors: Md. Faiyaz Abdullah Sayeedi, Fahim Hafiz, Md Ashiqur Rahman

    Abstract: In this paper, we present an integrated approach to real-time mosquito detection using our multiclass dataset (MosquitoFusion) containing 1204 diverse images and leverage cutting-edge technologies, specifically computer vision, to automate the identification of Mosquitoes, Swarms, and Breeding Sites. The pre-trained YOLOv8 model, trained on this dataset, achieved a mean Average Precision (mAP@50)… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  15. arXiv:2403.20084  [pdf

    cs.CL

    IPA Transcription of Bengali Texts

    Authors: Kanij Fatema, Fazle Dawood Haider, Nirzona Ferdousi Turpa, Tanveer Azmal, Sourav Ahmed, Navid Hasan, Mohammad Akhlaqur Rahman, Biplab Kumar Sarkar, Afrar Jahin, Md. Rezuwan Hassan, Md Foriduzzaman Zihad, Rubayet Sabbir Faruque, Asif Sushmit, Mashrur Imtiaz, Farig Sadeque, Syed Shahrier Rahman

    Abstract: The International Phonetic Alphabet (IPA) serves to systematize phonemes in language, enabling precise textual representation of pronunciation. In Bengali phonology and phonetics, ongoing scholarly deliberations persist concerning the IPA standard and core Bengali phonemes. This work examines prior research, identifies current and potential issues, and suggests a framework for a Bengali IPA standa… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

  16. arXiv:2403.19593  [pdf, other

    cs.CV

    Frame by Familiar Frame: Understanding Replication in Video Diffusion Models

    Authors: Aimon Rahman, Malsha V. Perera, Vishal M. Patel

    Abstract: Building on the momentum of image generation diffusion models, there is an increasing interest in video-based diffusion models. However, video generation poses greater challenges due to its higher-dimensional nature, the scarcity of training data, and the complex spatiotemporal relationships involved. Image generation models, due to their extensive data requirements, have already strained computat… ▽ More

    Submitted 28 March, 2024; originally announced March 2024.

  17. arXiv:2403.12553  [pdf, other

    cs.LG

    Pretraining Codomain Attention Neural Operators for Solving Multiphysics PDEs

    Authors: Md Ashiqur Rahman, Robert Joseph George, Mogab Elleithy, Daniel Leibovici, Zongyi Li, Boris Bonev, Colin White, Julius Berner, Raymond A. Yeh, Jean Kossaifi, Kamyar Azizzadenesheli, Anima Anandkumar

    Abstract: Existing neural operator architectures face challenges when solving multiphysics problems with coupled partial differential equations (PDEs), due to complex geometries, interactions between physical variables, and the lack of large amounts of high-resolution training data. To address these issues, we propose Codomain Attention Neural Operator (CoDA-NO), which tokenizes functions along the codomain… ▽ More

    Submitted 5 April, 2024; v1 submitted 19 March, 2024; originally announced March 2024.

  18. arXiv:2403.08036  [pdf, other

    cs.CR cs.AI cs.CY

    A Review of Cybersecurity Incidents in the Food and Agriculture Sector

    Authors: Ajay Kulkarni, Yingjie Wang, Munisamy Gopinath, Dan Sobien, Abdul Rahman, Feras A. Batarseh

    Abstract: The increasing utilization of emerging technologies in the Food & Agriculture (FA) sector has heightened the need for security to minimize cyber risks. Considering this aspect, this manuscript reviews disclosed and documented cybersecurity incidents in the FA sector. For this purpose, thirty cybersecurity incidents were identified, which took place between July 2011 and April 2023. The details of… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: Preprint. Submitted for journal publication

  19. arXiv:2403.07189  [pdf, ps, other

    cs.IT cond-mat.dis-nn math-ph math.ST

    A multiscale cavity method for sublinear-rank symmetric matrix factorization

    Authors: Jean Barbier, Justin Ko, Anas A. Rahman

    Abstract: We consider a statistical model for symmetric matrix factorization with additive Gaussian noise in the high-dimensional regime where the rank $M$ of the signal matrix to infer scales with its size $N$ as $M = o(N^{1/10})$. Allowing for a $N$-dependent rank offers new challenges and requires new methods. Working in the Bayesian-optimal setting, we show that whenever the signal has i.i.d. entries th… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  20. Authorship Attribution in Bangla Literature (AABL) via Transfer Learning using ULMFiT

    Authors: Aisha Khatun, Anisur Rahman, Md Saiful Islam, Hemayet Ahmed Chowdhury, Ayesha Tasnim

    Abstract: Authorship Attribution is the task of creating an appropriate characterization of text that captures the authors' writing style to identify the original author of a given piece of text. With increased anonymity on the internet, this task has become increasingly crucial in various security and plagiarism detection fields. Despite significant advancements in other languages such as English, Spanish,… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

    Comments: Accepted in ACM TALLIP August 2022

  21. An advanced data fabric architecture leveraging homomorphic encryption and federated learning

    Authors: Sakib Anwar Rieyan, Md. Raisul Kabir News, A. B. M. Muntasir Rahman, Sadia Afrin Khan, Sultan Tasneem Jawad Zaarif, Md. Golam Rabiul Alam, Mohammad Mehedi Hassan, Michele Ianni, Giancarlo Fortino

    Abstract: Data fabric is an automated and AI-driven data fusion approach to accomplish data management unification without moving data to a centralized location for solving complex data problems. In a Federated learning architecture, the global model is trained based on the learned parameters of several local models that eliminate the necessity of moving data to a centralized repository for machine learning… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

    Journal ref: Information Fusion, 102, 102004 (2024)

  22. Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning

    Authors: Cheng Wang, Christopher Redino, Abdul Rahman, Ryan Clark, Daniel Radke, Tyler Cody, Dhruv Nandakumar, Edward Bowen

    Abstract: Command and control (C2) channels are an essential component of many types of cyber attacks, as they enable attackers to remotely control their malware-infected machines and execute harmful actions, such as propagating malicious code across networks, exfiltrating confidential data, or initiating distributed denial of service (DDoS) attacks. Identifying these C2 channels is therefore crucial in hel… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  23. arXiv:2402.09095  [pdf, other

    cs.LG cs.CR

    FedSiKD: Clients Similarity and Knowledge Distillation: Addressing Non-i.i.d. and Constraints in Federated Learning

    Authors: Yousef Alsenani, Rahul Mishra, Khaled R. Ahmed, Atta Ur Rahman

    Abstract: In recent years, federated learning (FL) has emerged as a promising technique for training machine learning models in a decentralized manner while also preserving data privacy. The non-independent and identically distributed (non-i.i.d.) nature of client data, coupled with constraints on client or edge devices, presents significant challenges in FL. Furthermore, learning across a high number of co… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: 11 pages, 10 figures Under Review - IEEE Transactions on Information Forensics & Security

  24. arXiv:2401.16800  [pdf, other

    cs.LG cs.DM eess.SY

    Online Algorithm for Node Feature Forecasting in Temporal Graphs

    Authors: Aniq Ur Rahman, Justin P. Coon

    Abstract: In this paper, we propose an online algorithm mspace for forecasting node features in temporal graphs, which captures spatial cross-correlation among different nodes as well as the temporal auto-correlation within a node. The algorithm can be used for both probabilistic and deterministic multi-step forecasting, making it applicable for estimation and generation tasks. Comparative evaluations again… ▽ More

    Submitted 22 May, 2024; v1 submitted 30 January, 2024; originally announced January 2024.

    Comments: 23 pages

  25. Discovering Command and Control Channels Using Reinforcement Learning

    Authors: Cheng Wang, Akshay Kakkar, Christopher Redino, Abdul Rahman, Ajinsyam S, Ryan Clark, Daniel Radke, Tyler Cody, Lanxiao Huang, Edward Bowen

    Abstract: Command and control (C2) paths for issuing commands to malware are sometimes the only indicators of its existence within networks. Identifying potential C2 channels is often a manually driven process that involves a deep understanding of cyber tradecraft. Efforts to improve discovery of these channels through using a reinforcement learning (RL) based approach that learns to automatically carry out… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

    Comments: SoutheastCon 2023. IEEE, 2023

  26. arXiv:2401.04655  [pdf, ps, other

    cs.CL

    DepressionEmo: A novel dataset for multilabel classification of depression emotions

    Authors: Abu Bakar Siddiqur Rahman, Hoang-Thang Ta, Lotfollah Najjar, Azad Azadmanesh, Ali Saffet Gönül

    Abstract: Emotions are integral to human social interactions, with diverse responses elicited by various situational contexts. Particularly, the prevalence of negative emotional states has been correlated with negative outcomes for mental health, necessitating a comprehensive analysis of their occurrence and impact on individuals. In this paper, we introduce a novel dataset named DepressionEmo designed to d… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    Comments: 18 pages

  27. arXiv:2401.03988  [pdf, ps, other

    cs.LG cs.AI cs.DM cs.SI eess.SP

    A Primer on Temporal Graph Learning

    Authors: Aniq Ur Rahman, Justin P. Coon

    Abstract: This document aims to familiarize readers with temporal graph learning (TGL) through a concept-first approach. We have systematically presented vital concepts essential for understanding the workings of a TGL framework. In addition to qualitative explanations, we have incorporated mathematical formulations where applicable, enhancing the clarity of the text. Since TGL involves temporal and spatial… ▽ More

    Submitted 9 January, 2024; v1 submitted 8 January, 2024; originally announced January 2024.

    Comments: 19 pages, 47 equations

  28. arXiv:2312.04587  [pdf

    cs.CR cs.LG

    FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks

    Authors: Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen

    Abstract: Federated learning has created a decentralized method to train a machine learning model without needing direct access to client data. The main goal of a federated learning architecture is to protect the privacy of each client while still contributing to the training of the global model. However, the main advantage of privacy in federated learning is also the easiest aspect to exploit. Without bein… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

    Comments: Accepted to IEEE CCWC 2024

  29. arXiv:2312.00051  [pdf, other

    cs.CR cs.AI cs.LG

    MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning

    Authors: Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty

    Abstract: The membership inference attack (MIA) is a popular paradigm for compromising the privacy of a machine learning (ML) model. MIA exploits the natural inclination of ML models to overfit upon the training data. MIAs are trained to distinguish between training and testing prediction confidence to infer membership information. Federated Learning (FL) is a privacy-preserving ML paradigm that enables mul… ▽ More

    Submitted 28 November, 2023; originally announced December 2023.

    Comments: 6 pages, 5 figures, Accepted to be published in ICNC 23

  30. arXiv:2311.16944  [pdf

    cs.CR

    Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python

    Authors: Mst Shapna Akter, Juanjose Rodriguez-Cardenas, Md Mostafizur Rahman, Hossain Shahriar, Akond Rahman, Fan Wu

    Abstract: The field of DevOps security education necessitates innovative approaches to effectively address the ever-evolving challenges of cybersecurity. In adopting a student-centered ap-proach, there is the need for the design and development of a comprehensive set of hands-on learning modules. In this paper, we introduce hands-on learning modules that enable learners to be familiar with identifying known… ▽ More

    Submitted 3 April, 2024; v1 submitted 14 August, 2023; originally announced November 2023.

  31. arXiv:2311.12869  [pdf

    cs.CR cs.AI cs.LG

    Progression and Challenges of IoT in Healthcare: A Short Review

    Authors: S M Atikur Rahman, Sifat Ibtisum, Priya Podder, S. M. Saokat Hossain

    Abstract: Smart healthcare, an integral element of connected living, plays a pivotal role in fulfilling a fundamental human need. The burgeoning field of smart healthcare is poised to generate substantial revenue in the foreseeable future. Its multifaceted framework encompasses vital components such as the Internet of Things (IoT), medical sensors, artificial intelligence (AI), edge and cloud computing, as… ▽ More

    Submitted 11 November, 2023; originally announced November 2023.

    Comments: 7 pages

    Journal ref: International Journal of Computer Applications, Vol. 185, No. 37, pp. 9-15, October 2023

  32. EWasteNet: A Two-Stream Data Efficient Image Transformer Approach for E-Waste Classification

    Authors: Niful Islam, Md. Mehedi Hasan Jony, Emam Hasan, Sunny Sutradhar, Atikur Rahman, Md. Motaharul Islam

    Abstract: Improper disposal of e-waste poses global environmental and health risks, raising serious concerns. The accurate classification of e-waste images is critical for efficient management and recycling. In this paper, we have presented a comprehensive dataset comprised of eight different classes of images of electronic devices named the E-Waste Vision Dataset. We have also presented EWasteNet, a novel… ▽ More

    Submitted 28 September, 2023; originally announced November 2023.

    Comments: 6 pages

    Journal ref: 2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS), Penang, Malaysia, 2023, pp. 435-440

  33. arXiv:2311.02922  [pdf, other

    cs.LG cs.CV

    Truly Scale-Equivariant Deep Nets with Fourier Layers

    Authors: Md Ashiqur Rahman, Raymond A. Yeh

    Abstract: In computer vision, models must be able to adapt to changes in image resolution to effectively carry out tasks such as image segmentation; This is known as scale-equivariance. Recent works have made progress in developing scale-equivariant convolutional neural networks, e.g., through weight-sharing and kernel resizing. However, these networks are not truly scale-equivariant in practice. Specifical… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

  34. arXiv:2310.18363  [pdf, other

    cs.CL cs.HC cs.LG

    A Contextualized Real-Time Multimodal Emotion Recognition for Conversational Agents using Graph Convolutional Networks in Reinforcement Learning

    Authors: Fathima Abdul Rahman, Guang Lu

    Abstract: Owing to the recent developments in Generative Artificial Intelligence (GenAI) and Large Language Models (LLM), conversational agents are becoming increasingly popular and accepted. They provide a human touch by interacting in ways familiar to us and by providing support as virtual companions. Therefore, it is important to understand the user's emotions in order to respond considerately. Compared… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

    Comments: 5 pages (4 main + 1 reference), 2 figures. Submitted to IEEE FG2024

    ACM Class: I.2.10

  35. arXiv:2310.16978  [pdf

    cs.LG cs.AI cs.CV

    The Significance of Machine Learning in Clinical Disease Diagnosis: A Review

    Authors: S M Atikur Rahman, Sifat Ibtisum, Ehsan Bazgir, Tumpa Barai

    Abstract: The global need for effective disease diagnosis remains substantial, given the complexities of various disease mechanisms and diverse patient symptoms. To tackle these challenges, researchers, physicians, and patients are turning to machine learning (ML), an artificial intelligence (AI) discipline, to develop solutions. By leveraging sophisticated ML and AI methods, healthcare stakeholders gain en… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

    Comments: 8 pages

    Journal ref: International Journal of Computer Applications 185(36):10-17, October 2023

  36. arXiv:2310.03667  [pdf, other

    cs.CR

    Enhancing Exfiltration Path Analysis Using Reinforcement Learning

    Authors: Riddam Rishu, Akshay Kakkar, Cheng Wang, Abdul Rahman, Christopher Redino, Dhruv Nandakumar, Tyler Cody, Ryan Clark, Daniel Radke, Edward Bowen

    Abstract: Building on previous work using reinforcement learning (RL) focused on identification of exfiltration paths, this work expands the methodology to include protocol and payload considerations. The former approach to exfiltration path discovery, where reward and state are associated specifically with the determination of optimal paths, are presented with these additional realistic characteristics to… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  37. arXiv:2310.00342  [pdf, other

    cs.CV

    RBF Weighted Hyper-Involution for RGB-D Object Detection

    Authors: Mehfuz A Rahman, Jiju Peethambaran, Neil London

    Abstract: A vast majority of conventional augmented reality devices are equipped with depth sensors. Depth images produced by such sensors contain complementary information for object detection when used with color images. Despite the benefits, it remains a complex task to simultaneously extract photometric and depth features in real time due to the immanent difference between depth and color images. Moreov… ▽ More

    Submitted 30 September, 2023; originally announced October 2023.

    Comments: 27 pages, 16 figures

    ACM Class: I.4.8

  38. arXiv:2309.13872  [pdf, other

    eess.IV cs.CV cs.LG

    Attention and Pooling based Sigmoid Colon Segmentation in 3D CT images

    Authors: Md Akizur Rahman, Sonit Singh, Kuruparan Shanmugalingam, Sankaran Iyer, Alan Blair, Praveen Ravindran, Arcot Sowmya

    Abstract: Segmentation of the sigmoid colon is a crucial aspect of treating diverticulitis. It enables accurate identification and localisation of inflammation, which in turn helps healthcare professionals make informed decisions about the most appropriate treatment options. This research presents a novel deep learning architecture for segmenting the sigmoid colon from Computed Tomography (CT) images using… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

    Comments: 8 Pages, 6 figures, Accepted at IEEE DICTA 2023

  39. arXiv:2309.13310  [pdf, other

    cs.LG

    An Interpretable Systematic Review of Machine Learning Models for Predictive Maintenance of Aircraft Engine

    Authors: Abdullah Al Hasib, Ashikur Rahman, Mahpara Khabir, Md. Tanvir Rouf Shawon

    Abstract: This paper presents an interpretable review of various machine learning and deep learning models to predict the maintenance of aircraft engine to avoid any kind of disaster. One of the advantages of the strategy is that it can work with modest datasets. In this study, sensor data is utilized to predict aircraft engine failure within a predetermined number of cycles using LSTM, Bi-LSTM, RNN, Bi-RNN… ▽ More

    Submitted 23 September, 2023; originally announced September 2023.

  40. arXiv:2309.08146  [pdf, other

    cs.SD cs.CV eess.AS

    Syn-Att: Synthetic Speech Attribution via Semi-Supervised Unknown Multi-Class Ensemble of CNNs

    Authors: Md Awsafur Rahman, Bishmoy Paul, Najibul Haque Sarker, Zaber Ibn Abdul Hakim, Shaikh Anowarul Fattah, Mohammad Saquib

    Abstract: With the huge technological advances introduced by deep learning in audio & speech processing, many novel synthetic speech techniques achieved incredible realistic results. As these methods generate realistic fake human voices, they can be used in malicious acts such as people imitation, fake news, spreading, spoofing, media manipulations, etc. Hence, the ability to detect synthetic or natural spe… ▽ More

    Submitted 15 September, 2023; originally announced September 2023.

    Comments: Winning Solution of IEEE SP Cup at ICASSP 2022

  41. arXiv:2309.05747  [pdf, other

    cs.CV

    Evaluating the Reliability of CNN Models on Classifying Traffic and Road Signs using LIME

    Authors: Md. Atiqur Rahman, Ahmed Saad Tanim, Sanjid Islam, Fahim Pranto, G. M. Shahariar, Md. Tanvir Rouf Shawon

    Abstract: The objective of this investigation is to evaluate and contrast the effectiveness of four state-of-the-art pre-trained models, ResNet-34, VGG-19, DenseNet-121, and Inception V3, in classifying traffic and road signs with the utilization of the GTSRB public dataset. The study focuses on evaluating the accuracy of these models' predictions as well as their ability to employ appropriate features for… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

    Comments: Accepted for publication in the 2nd International Conference on Big Data, IoT and Machine Learning (BIM 2023), 16 pages, 8 figures

  42. arXiv:2309.00700  [pdf, other

    cs.CR

    Cross-temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach

    Authors: Sathvik Murli, Dhruv Nandakumar, Prabhat Kumar Kushwaha, Cheng Wang, Christopher Redino, Abdul Rahman, Shalini Israni, Tarun Singh, Edward Bowen

    Abstract: We present a novel approach to identify ransomware campaigns derived from attack timelines representations within victim networks. Malicious activity profiles developed from multiple alert sources support the construction of alert graphs. This approach enables an effective and scalable representation of the attack timelines where individual nodes represent malicious activity detections with connec… ▽ More

    Submitted 1 September, 2023; originally announced September 2023.

    Comments: Preprint. Under Review

  43. arXiv:2308.15402  [pdf

    cs.HC

    Bornil: An open-source sign language data crowdsourcing platform for AI enabled dialect-agnostic communication

    Authors: Shahriar Elahi Dhruvo, Mohammad Akhlaqur Rahman, Manash Kumar Mandal, Md. Istiak Hossain Shihab, A. A. Noman Ansary, Kaneez Fatema Shithi, Sanjida Khanom, Rabeya Akter, Safaeid Hossain Arib, M. N. Ansary, Sazia Mehnaz, Rezwana Sultana, Sejuti Rahman, Sayma Sultana Chowdhury, Sabbir Ahmed Chowdhury, Farig Sadeque, Asif Sushmit

    Abstract: The absence of annotated sign language datasets has hindered the development of sign language recognition and translation technologies. In this paper, we introduce Bornil; a crowdsource-friendly, multilingual sign language data collection, annotation, and validation platform. Bornil allows users to record sign language gestures and lets annotators perform sentence and gloss-level annotation. It al… ▽ More

    Submitted 29 August, 2023; originally announced August 2023.

    Comments: 6 pages, 7 figures

  44. arXiv:2308.14400  [pdf, other

    cs.CV cs.LG

    Semi-Supervised Semantic Depth Estimation using Symbiotic Transformer and NearFarMix Augmentation

    Authors: Md Awsafur Rahman, Shaikh Anowarul Fattah

    Abstract: In computer vision, depth estimation is crucial for domains like robotics, autonomous vehicles, augmented reality, and virtual reality. Integrating semantics with depth enhances scene understanding through reciprocal information sharing. However, the scarcity of semantic information in datasets poses challenges. Existing convolutional approaches with limited local receptive fields hinder the full… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

    Comments: Accepted at WACV 2024

  45. arXiv:2308.14397  [pdf, other

    cs.CV

    Ensemble of Anchor-Free Models for Robust Bangla Document Layout Segmentation

    Authors: U Mong Sain Chak, Md. Asib Rahman

    Abstract: In this research paper, we introduce a novel approach designed for the purpose of segmenting the layout of Bangla documents. Our methodology involves the utilization of a sophisticated ensemble of YOLOv8 models, which were trained for the DL Sprint 2.0 - BUET CSE Fest 2023 Competition focused on Bangla document layout segmentation. Our primary emphasis lies in enhancing various aspects of the task… ▽ More

    Submitted 29 August, 2023; v1 submitted 28 August, 2023; originally announced August 2023.

    Comments: 4 pages, 5 figures, 6 Tables

  46. arXiv:2308.11038  [pdf, other

    math.OC cs.AI cs.LG

    Logistics Hub Location Optimization: A K-Means and P-Median Model Hybrid Approach Using Road Network Distances

    Authors: Muhammad Abdul Rahman, Muhammad Aamir Basheer, Zubair Khalid, Muhammad Tahir, Momin Uppal

    Abstract: Logistic hubs play a pivotal role in the last-mile delivery distance; even a slight increment in distance negatively impacts the business of the e-commerce industry while also increasing its carbon footprint. The growth of this industry, particularly after Covid-19, has further intensified the need for optimized allocation of resources in an urban environment. In this study, we use a hybrid approa… ▽ More

    Submitted 4 July, 2024; v1 submitted 18 August, 2023; originally announced August 2023.

  47. arXiv:2308.09595  [pdf, other

    cs.AI

    Minimum Coverage Sets for Training Robust Ad Hoc Teamwork Agents

    Authors: Arrasy Rahman, Jiaxun Cui, Peter Stone

    Abstract: Robustly cooperating with unseen agents and human partners presents significant challenges due to the diverse cooperative conventions these partners may adopt. Existing Ad Hoc Teamwork (AHT) methods address this challenge by training an agent with a population of diverse teammate policies obtained through maximizing specific diversity metrics. However, prior heuristic-based diversity metrics do no… ▽ More

    Submitted 2 January, 2024; v1 submitted 18 August, 2023; originally announced August 2023.

    Comments: Accepted at AAAI-24 conference

  48. arXiv:2308.07467  [pdf, ps, other

    cs.IT eess.SP math.CA

    Sequences with identical autocorrelation spectra

    Authors: Daniel J. Katz, Adeebur Rahman, Michael J Ward

    Abstract: Aperiodic autocorrelation measures the similarity between a finite-length sequence of complex numbers and translates of itself. Autocorrelation is important in communications, remote sensing, and scientific instrumentation. The autocorrelation function reports the aperiodic autocorrelation at every possible translation. Knowing the autocorrelation function of a sequence is equivalent to knowing th… ▽ More

    Submitted 14 August, 2023; originally announced August 2023.

    Comments: 12 pages

    MSC Class: 94A12 42A05 42A38 42A85

  49. arXiv:2308.02433  [pdf, other

    eess.SP cs.LG

    Contrastive Self-Supervised Learning Based Approach for Patient Similarity: A Case Study on Atrial Fibrillation Detection from PPG Signal

    Authors: Subangkar Karmaker Shanto, Shoumik Saha, Atif Hasan Rahman, Mohammad Mehedy Masud, Mohammed Eunus Ali

    Abstract: In this paper, we propose a novel contrastive learning based deep learning framework for patient similarity search using physiological signals. We use a contrastive learning based approach to learn similar embeddings of patients with similar physiological signal data. We also introduce a number of neighbor selection algorithms to determine the patients with the highest similarity on the generated… ▽ More

    Submitted 22 July, 2023; originally announced August 2023.

    Comments: 10 pages, 4 figures, Preprint submitted to Journal of Computers in Biology and Medicine

  50. arXiv:2308.01604  [pdf, other

    cs.CV

    IndoHerb: Indonesia Medicinal Plants Recognition using Transfer Learning and Deep Learning

    Authors: Muhammad Salman Ikrar Musyaffa, Novanto Yudistira, Muhammad Arif Rahman, Jati Batoro

    Abstract: The rich diversity of herbal plants in Indonesia holds immense potential as alternative resources for traditional healing and ethnobotanical practices. However, the dwindling recognition of herbal plants due to modernization poses a significant challenge in preserving this valuable heritage. The accurate identification of these plants is crucial for the continuity of traditional practices and the… ▽ More

    Submitted 9 June, 2024; v1 submitted 3 August, 2023; originally announced August 2023.

    Comments: 34 pages, 27 figures