Skip to main content

Showing 1–50 of 119 results for author: Ahmed, E

.
  1. arXiv:2406.03404  [pdf, other

    cs.LG cs.AI cs.CR

    ST-DPGAN: A Privacy-preserving Framework for Spatiotemporal Data Generation

    Authors: Wei Shao, Rongyi Zhu, Cai Yang, Chandra Thapa, Muhammad Ejaz Ahmed, Seyit Camtepe, Rui Zhang, DuYong Kim, Hamid Menouar, Flora D. Salim

    Abstract: Spatiotemporal data is prevalent in a wide range of edge devices, such as those used in personal communication and financial transactions. Recent advancements have sparked a growing interest in integrating spatiotemporal analysis with large-scale language models. However, spatiotemporal data often contains sensitive information, making it unsuitable for open third-party access. To address this cha… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  2. arXiv:2404.09517  [pdf, other

    cond-mat.supr-con cond-mat.mes-hall

    Odd-frequency superconducting pairing and multiple Majorana edge modes in driven topological superconductors

    Authors: Eslam Ahmed, Shun Tamura, Yukio Tanaka, Jorge Cayao

    Abstract: Majorana zero modes have been shown to be the simplest quasiparticles exhibiting pure odd-frequency pairing, an effect that has so far been theoretically established in the static regime. In this work we investigate the formation of Majorana modes and odd-frequency pairing in $p$-wave spin-polarized superconductors under a time-dependent drive. We first show that the driven system hosts multiple M… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: 12 pages, 6 figures

  3. arXiv:2403.02913  [pdf, other

    math.NA

    Scientific machine learning for closure models in multiscale problems: a review

    Authors: Benjamin Sanderse, Panos Stinis, Romit Maulik, Shady E. Ahmed

    Abstract: Closure problems are omnipresent when simulating multiscale systems, where some quantities and processes cannot be fully prescribed despite their effects on the simulation's accuracy. Recently, scientific machine learning approaches have been proposed as a way to tackle the closure problem, combining traditional (physics-based) modeling with data-driven (machine-learned) techniques, typically thro… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

    Report number: PNNL-SA-195444 MSC Class: 65MXX; 76MXX; 68T07

  4. Malicious Package Detection using Metadata Information

    Authors: S. Halder, M. Bewong, A. Mahboubi, Y. Jiang, R. Islam, Z. Islam, R. Ip, E. Ahmed, G. Ramachandran, A. Babar

    Abstract: Protecting software supply chains from malicious packages is paramount in the evolving landscape of software development. Attacks on the software supply chain involve attackers injecting harmful software into commonly used packages or libraries in a software repository. For instance, JavaScript uses Node Package Manager (NPM), and Python uses Python Package Index (PyPi) as their respective package… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

  5. arXiv:2402.05736  [pdf, ps, other

    physics.flu-dyn

    Numerical solution of the Newtonian plane Couette flow with linear dynamic wall slip

    Authors: Muner M. A. Hasan, Ethar A. A. Ahmed, Ahmed F. Ghaleb, Moustafa S. Abou-Dina, Georgios C. Georgiou

    Abstract: An efficient numerical approach based on weighted average finite differences is used to solve the Newtonian plane Couette flow with wall slip, obeying a dynamic slip law that generalizes the Navier slip law with the inclusion of a relaxation term. Slip is exhibited only along the fixed plate, and the motion is triggered by the motion of the other plate. Three different cases are considered for the… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

    Comments: 21 pages, 15 figures

  6. arXiv:2311.07033  [pdf, other

    eess.IV cs.CV

    TTMFN: Two-stream Transformer-based Multimodal Fusion Network for Survival Prediction

    Authors: Ruiquan Ge, Xiangyang Hu, Rungen Huang, Gangyong Jia, Yaqi Wang, Renshu Gu, Changmiao Wang, Elazab Ahmed, Linyan Wang, Juan Ye, Ye Li

    Abstract: Survival prediction plays a crucial role in assisting clinicians with the development of cancer treatment protocols. Recent evidence shows that multimodal data can help in the diagnosis of cancer disease and improve survival prediction. Currently, deep learning-based approaches have experienced increasing success in survival prediction by integrating pathological images and gene expression data. H… ▽ More

    Submitted 12 November, 2023; originally announced November 2023.

  7. arXiv:2311.06483  [pdf, other

    cs.LG math.NA

    Stacked networks improve physics-informed training: applications to neural networks and deep operator networks

    Authors: Amanda A Howard, Sarah H Murphy, Shady E Ahmed, Panos Stinis

    Abstract: Physics-informed neural networks and operator networks have shown promise for effectively solving equations modeling physical systems. However, these networks can be difficult or impossible to train accurately for some systems of equations. We present a novel multifidelity framework for stacking physics-informed neural networks and operator networks that facilitates training. We successively build… ▽ More

    Submitted 20 November, 2023; v1 submitted 11 November, 2023; originally announced November 2023.

  8. arXiv:2308.04115  [pdf, other

    cs.CR cs.SE

    model-based script synthesis for fuzzing

    Authors: Zian Liu, Chao Chen, Muhammad Ejaz Ahmed, Jun Zhang, Dongxi Liu

    Abstract: Kernel fuzzing is important for finding critical kernel vulnerabilities. Close-source (e.g., Windows) operating system kernel fuzzing is even more challenging due to the lack of source code. Existing approaches fuzz the kernel by modeling syscall sequences from traces or static analysis of system codes. However, a common limitation is that they do not learn and mutate the syscall sequences to reac… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

    Comments: 12 pages, conference paper

  9. arXiv:2308.01463  [pdf, other

    cs.CR

    SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs

    Authors: Zian Liu, Zhi Zhang, Siqi Ma, Dongxi Liu, Jun Zhang, Chao Chen, Shigang Liu, Muhammad Ejaz Ahmed, Yang Xiang

    Abstract: Binary similarity detection is a critical technique that has been applied in many real-world scenarios where source code is not available, e.g., bug search, malware analysis, and code plagiarism detection. Existing works are ineffective in detecting similar binaries in cases where different compiling optimizations, compilers, source code versions, or obfuscation are deployed. We observe that all… ▽ More

    Submitted 2 August, 2023; originally announced August 2023.

    Comments: 12 pages, conference paper

  10. arXiv:2308.00288  [pdf, other

    cs.CR

    VulMatch: Binary-level Vulnerability Detection Through Signature

    Authors: Zian Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Shigang Liu, Jun Zhang, Dongxi Liu

    Abstract: Similar vulnerability repeats in real-world software products because of code reuse, especially in wildly reused third-party code and libraries. Detecting repeating vulnerabilities like 1-day and N-day vulnerabilities is an important cyber security task. Unfortunately, the state-of-the-art methods suffer from poor performance because they detect patch existence instead of vulnerability existence a… ▽ More

    Submitted 17 January, 2024; v1 submitted 1 August, 2023; originally announced August 2023.

    Comments: 15 pages IEEE journal template

  11. arXiv:2306.09637  [pdf, other

    cs.NI cs.AI

    DeepMPR: Enhancing Opportunistic Routing in Wireless Networks through Multi-Agent Deep Reinforcement Learning

    Authors: Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Deokseong Kim, Jae Kim, Carrie Spiker, Blake Harnden

    Abstract: Opportunistic routing relies on the broadcast capability of wireless networks. It brings higher reliability and robustness in highly dynamic and/or severe environments such as mobile or vehicular ad-hoc networks (MANETs/VANETs). To reduce the cost of broadcast, multicast routing schemes use the connected dominating set (CDS) or multi-point relaying (MPR) set to decrease the network overhead and he… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

  12. arXiv:2306.09286  [pdf

    cs.NI eess.SP

    Open Source-based Over-The-Air 5G New Radio Sidelink Testbed

    Authors: Melissa Elkadi, Doekseong Kim, Ejaz Ahmed, Moein Sadeghi, Anh Le, Paul Russell, Bo Ryu

    Abstract: The focus of this paper is to demonstrate an over-the-air (OTA) 5G new radio (NR) sidelink communication prototype. 5G NR sidelink communications allow NR UEs to transfer data independently without the assistance of a base station (gNB), which enables V2X communications, including platooning, autonomous driving, sensor extension, industrial IoT, public safety communication and much more. Our desig… ▽ More

    Submitted 6 October, 2023; v1 submitted 15 June, 2023; originally announced June 2023.

    Comments: 8 pages, 13 figures, Accepted for MILCOM 2023

  13. arXiv:2306.07946  [pdf, other

    cs.SI cs.AI cs.IR

    STUDY: Socially Aware Temporally Causal Decoder Recommender Systems

    Authors: Eltayeb Ahmed, Diana Mincu, Lauren Harrell, Katherine Heller, Subhrajit Roy

    Abstract: Recommender systems are widely used to help people find items that are tailored to their interests. These interests are often influenced by social networks, making it important to use social network information effectively in recommender systems. This is especially true for demographic groups with interests that differ from the majority. This paper introduces STUDY, a Socially-aware Temporally caU… ▽ More

    Submitted 5 September, 2023; v1 submitted 2 June, 2023; originally announced June 2023.

    Comments: 15 pages, 5 figures

  14. arXiv:2305.00300  [pdf, other

    math.OC eess.SY math.DS physics.data-an physics.flu-dyn

    On the dual advantage of placing observations through forward sensitivity analysis

    Authors: Shady E Ahmed, Omer San, Sivaramakrishnan Lakshmivarahan, John M Lewis

    Abstract: The four-dimensional variational data assimilation methodology for assimilating noisy observations into a deterministic model has been the workhorse of forecasting centers for over three decades. While this method provides a computationally efficient framework for dynamic data assimilation, it is largely silent on the important question concerning the minimum number and placement of observations.… ▽ More

    Submitted 29 April, 2023; originally announced May 2023.

  15. arXiv:2304.08885  [pdf

    cs.RO cs.HC

    Socially Assistive Robots as Decision Makers in the Wild: Insights from a Participatory Design Workshop

    Authors: Eshtiak Ahmed, Laura Cosio, Juho Hamari, Oğuz 'Oz' Buruk

    Abstract: Socially Assistive Robots (SARs) are becoming very popular every day because of their effectiveness in handling social situations. However, social robots are perceived as intelligent, and thus their decision-making process might have a significant effect on how they are perceived and how effective they are. In this paper, we present the findings from a participatory design study consisting of 5 de… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

    Comments: CHI Workshop on Socially Assistive Robots as Decision Makers: Transparency, Motivations, and Intentions

    Report number: SARTMI/2023/13

  16. arXiv:2304.04885  [pdf, other

    physics.flu-dyn math.DS math.OC

    Forward Sensitivity Analysis and Mode Dependent Control for Closure Modeling of Galerkin Systems

    Authors: Shady E. Ahmed, Omer San

    Abstract: Model reduction by projection-based approaches is often associated with losing some of the important features that contribute towards the dynamics of the retained scales. As a result, a mismatch occurs between the predicted trajectories of the original system and the truncated one. We put forth a framework to apply a continuous time control signal in the latent space of the reduced order model (RO… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

  17. arXiv:2303.08893  [pdf, other

    physics.comp-ph cs.LG math.NA physics.flu-dyn

    A Multifidelity deep operator network approach to closure for multiscale systems

    Authors: Shady E. Ahmed, Panos Stinis

    Abstract: Projection-based reduced order models (PROMs) have shown promise in representing the behavior of multiscale systems using a small set of generalized (or latent) variables. Despite their success, PROMs can be susceptible to inaccuracies, even instabilities, due to the improper accounting of the interaction between the resolved and unresolved scales of the multiscale system (known as the closure pro… ▽ More

    Submitted 1 June, 2023; v1 submitted 15 March, 2023; originally announced March 2023.

    Comments: 24 pages, 21 figures

    Report number: PNNL-SA-182879

  18. arXiv:2303.04028  [pdf

    cond-mat.mtrl-sci

    Response to "On the giant deformation and ferroelectricity of guanidinium nitrate" by Marek Szafrański and Andrzej Katrusiak

    Authors: Durga Prasad Karothu, Rodrigo Ferreira, Ghada Dushaq, Ejaz Ahmed, Luca Catalano, Jad Mahmoud Halabi, Zainab Alhaddad, Ibrahim Tahir, Liang Li, Sharmarke Mohamed, Mahmoud Rasras, Panče Naumov

    Abstract: Following a well-established practice of publishing commentaries to articles of other authors who work on materials that were earlier studied by them (n.b. six published comments[1-6]), Marek Szafrański(MS) and Andrzej Katrusiak (AK) have filed on the preprint server arXiv a manuscript entitled "On the giant deformation and ferroelectricity of guanidinium nitrate"[7] with comments on our article "… ▽ More

    Submitted 7 September, 2023; v1 submitted 7 March, 2023; originally announced March 2023.

    Comments: 13 pages, 1 figure

  19. Beamforming and Device Selection Design in Federated Learning with Over-the-air Aggregation

    Authors: Faeze Moradi Kalarde, Min Dong, Ben Liang, Yahia A. Eldemerdash Ahmed, Ho Ting Cheng

    Abstract: Federated learning (FL) with over-the-air computation can efficiently utilize the communication bandwidth but is susceptible to analog aggregation error. Excluding those devices with weak channel conditions can reduce the aggregation error, but it also limits the amount of local training data for FL, which can reduce the training convergence rate. In this work, we jointly design uplink receiver be… ▽ More

    Submitted 6 March, 2024; v1 submitted 28 February, 2023; originally announced February 2023.

    Comments: 12 pages, 8 figures

  20. arXiv:2301.08336  [pdf, other

    cs.MS

    PyOED: An Extensible Suite for Data Assimilation and Model-Constrained Optimal Design of Experiments

    Authors: Abhijit Chowdhary, Shady E. Ahmed, Ahmed Attia

    Abstract: This paper describes PyOED, a highly extensible scientific package that enables develo** and testing model-constrained optimal experimental design (OED) for inverse problems. Specifically, PyOED aims to be a comprehensive Python toolkit for model-constrained OED. The package targets scientists and researchers interested in understanding the details of OED formulations and approaches. It is also… ▽ More

    Submitted 19 December, 2023; v1 submitted 19 January, 2023; originally announced January 2023.

    Comments: 22 pages, 8 figures

    MSC Class: 68Vxx

  21. arXiv:2212.07522  [pdf, other

    physics.flu-dyn math.DS

    Nonintrusive reduced order modeling of convective Boussinesq flows

    Authors: Pedram H. Dabaghian, Shady E. Ahmed, Omer San

    Abstract: In this paper, we formulate three nonintrusive methods and systematically explore their performance in terms of the ability to reconstruct the quantities of interest and their predictive capabilities. The methods include deterministic dynamic mode decomposition (DMD), randomized DMD and nonlinear proper orthogonal decomposition (NLPOD). We apply these methods to a convection dominated fluid flow p… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

  22. arXiv:2208.12449  [pdf, other

    cs.CR cs.CY

    Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns

    Authors: Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal

    Abstract: The daily deluge of alerts is a sombre reality for Security Operations Centre (SOC) personnel worldwide. They are at the forefront of an organisation's cybersecurity infrastructure, and face the unenviable task of prioritising threats amongst a flood of abstruse alerts triggered by their Security Information and Event Management (SIEM) systems. URLs found within malicious communications form the b… ▽ More

    Submitted 26 August, 2022; originally announced August 2022.

    Comments: arXiv admin note: text overlap with arXiv:2108.12726

  23. arXiv:2205.12419  [pdf, other

    physics.flu-dyn cs.LG nlin.PS

    Physics Guided Machine Learning for Variational Multiscale Reduced Order Modeling

    Authors: Shady E. Ahmed, Omer San, Adil Rasheed, Traian Iliescu, Alessandro Veneziani

    Abstract: We propose a new physics guided machine learning (PGML) paradigm that leverages the variational multiscale (VMS) framework and available data to dramatically increase the accuracy of reduced order models (ROMs) at a modest computational cost. The hierarchical structure of the ROM basis and the VMS framework enable a natural separation of the resolved and unresolved ROM spatial scales. Modern PGML… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

  24. arXiv:2204.03214  [pdf, other

    cs.CR cs.AI cs.LG

    Transformer-Based Language Models for Software Vulnerability Detection

    Authors: Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk, Surya Nepal

    Abstract: The large transformer-based language models demonstrate excellent performance in natural language processing. By considering the transferability of the knowledge gained by these models in one domain to other related domains, and the closeness of natural languages to high-level programming languages, such as C/C++, this work studies how to leverage (large) transformer-based language models in detec… ▽ More

    Submitted 5 September, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: 16 pages

  25. arXiv:2204.00985  [pdf, other

    cs.CR cs.LG

    Towards Web Phishing Detection Limitations and Mitigation

    Authors: Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal

    Abstract: Web phishing remains a serious cyber threat responsible for most data breaches. Machine Learning (ML)-based anti-phishing detectors are seen as an effective countermeasure, and are increasingly adopted by web-browsers and software products. However, with an average of 10K phishing links reported per hour to platforms such as PhishTank and VirusTotal (VT), the deficiencies of such ML-based solution… ▽ More

    Submitted 3 April, 2022; originally announced April 2022.

    Comments: 12 pages

  26. arXiv:2201.04084  [pdf, other

    math.NA math.DS physics.ao-ph physics.data-an physics.flu-dyn

    Sketching Methods for Dynamic Mode Decomposition in Spherical Shallow Water Equations

    Authors: Shady E. Ahmed, Omer San, Diana A. Bistrian, Ionel M. Navon

    Abstract: Dynamic mode decomposition (DMD) is an emerging methodology that has recently attracted computational scientists working on nonintrusive reduced order modeling. One of the major strengths that DMD possesses is having ground theoretical roots from the Koopman approximation theory. Indeed, DMD may be viewed as the data-driven realization of the famous Koopman operator. Nonetheless, the stable implem… ▽ More

    Submitted 11 January, 2022; originally announced January 2022.

    Journal ref: AIAA SciTech 2022 Forum

  27. arXiv:2111.15013  [pdf, other

    cs.NI cs.AI cs.LG

    DeepCQ+: Robust and Scalable Routing with Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks

    Authors: Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Kevin Larson, Anh Le, Alex Yahja, Jae H. Kim

    Abstract: Highly dynamic mobile ad-hoc networks (MANETs) remain as one of the most challenging environments to develop and deploy robust, efficient, and scalable routing protocols. In this paper, we present DeepCQ+ routing protocol which, in a novel manner integrates emerging multi-agent deep reinforcement learning (MADRL) techniques into existing Q-learning-based routing protocols and their variants and ac… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2101.03273

  28. arXiv:2111.13887  [pdf, ps, other

    stat.ME stat.AP

    Ridge-Type Shrinkage Estimators in Low and High Dimensional Beta Regression Model with Application in Econometrics and Medicine

    Authors: Ejaz Ahmed, Reza Arabi Belaghi, Yasin Asar, Abdulkhadir Hussein

    Abstract: Beta regression model is useful in the analysis of bounded continuous outcomes such as proportions. It is well known that for any regression model, the presence of multicollinearity leads to poor performance of the maximum likelihood estimators. The ridge type estimators have been proposed to alleviate the adverse effects of the multicollinearity. Furthermore, when some of the predictors have insi… ▽ More

    Submitted 27 November, 2021; originally announced November 2021.

  29. arXiv:2111.08217  [pdf, other

    cs.CR

    NatiDroid: Cross-Language Android Permission Specification

    Authors: Chaoran Li, Xiao Chen, Ruoxi Sun, Jason Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang

    Abstract: The Android system manages access to sensitive APIs by permission enforcement. An application (app) must declare proper permissions before invoking specific Android APIs. However, there is no official documentation providing the complete list of permission-protected APIs and the corresponding permissions to date. Researchers have spent significant efforts extracting such API protection map** fro… ▽ More

    Submitted 15 November, 2021; originally announced November 2021.

  30. arXiv:2110.08295  [pdf, other

    physics.flu-dyn cs.LG math.DS

    Nonlinear proper orthogonal decomposition for convection-dominated flows

    Authors: Shady E. Ahmed, Omer San, Adil Rasheed, Traian Iliescu

    Abstract: Autoencoder techniques find increasingly common use in reduced order modeling as a means to create a latent space. This reduced order representation offers a modular data-driven modeling approach for nonlinear dynamical systems when integrated with a time series predictive model. In this letter, we put forth a nonlinear proper orthogonal decomposition (POD) framework, which is an end-to-end Galerk… ▽ More

    Submitted 5 November, 2021; v1 submitted 15 October, 2021; originally announced October 2021.

  31. arXiv:2109.12952  [pdf, other

    cs.NI cs.PF

    A Tutorial on Trace-based Simulations of Mobile Ad-hoc Networks on the Example of Aeronautical Communications

    Authors: Musab Ahmed Eltayeb Ahmed, Konrad Fuger, Sebastian Lindner, Fatema Khan, Andreas Timm-Giel

    Abstract: The OMNeT++ simulator is well-suited for the simulation of randomized user behavior in communication networks. However, there are scenarios, where such a random model is unsuited to evaluate a communication system, and this paper attempts to highlight such a case. Using this example of ad-hoc communication between aircraft mid-flight, a tutorial-style description is attempted that shall show how t… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

    Comments: Published in: M. Marek, G. Nardini, V. Vesely (Eds.), Proceedings of the 8th OMNeT++ Community Summit, Virtual Summit, September 8-10, 2021

    Report number: OMNET/2021/04

  32. arXiv:2108.12726  [pdf, other

    cs.CR cs.CY cs.LG cs.NI

    Characterizing Malicious URL Campaigns

    Authors: Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal

    Abstract: URLs are central to a myriad of cyber-security threats, from phishing to the distribution of malware. Their inherent ease of use and familiarity is continuously abused by attackers to evade defences and deceive end-users. Seemingly dissimilar URLs are being used in an organized way to perform phishing attacks and distribute malware. We refer to such behaviours as campaigns, with the hypothesis bei… ▽ More

    Submitted 28 August, 2021; originally announced August 2021.

  33. arXiv:2108.06862  [pdf

    cs.LG cs.CR

    Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling

    Authors: Md Imran Hossen, Ashraful Islam, Farzana Anowar, Eshtiak Ahmed, Mohammad Masudur Rahman, Xiali, Hei

    Abstract: Due to the variety of cyber-attacks or threats, the cybersecurity community enhances the traditional security control mechanisms to an advanced level so that automated tools can encounter potential security threats. Very recently, Cyber Threat Intelligence (CTI) has been presented as one of the proactive and robust mechanisms because of its automated cybersecurity threat prediction. Generally, CTI… ▽ More

    Submitted 14 November, 2022; v1 submitted 15 August, 2021; originally announced August 2021.

  34. arXiv:2106.14954  [pdf, other

    physics.flu-dyn math.DS physics.comp-ph physics.data-an

    On closures for reduced order models $-$ A spectrum of first-principle to machine-learned avenues

    Authors: Shady E. Ahmed, Suraj Pawar, Omer San, Adil Rasheed, Traian Iliescu, Bernd R. Noack

    Abstract: For over a century, reduced order models (ROMs) have been a fundamental discipline of theoretical fluid mechanics. Early examples include Galerkin models inspired by the Orr-Sommerfeld stability equation and numerous vortex models, of which the von Kármán vortex street is one of the most prominent. Subsequent ROMs typically relied on first principles, like mathematical Galerkin models, weakly nonl… ▽ More

    Submitted 23 August, 2021; v1 submitted 28 June, 2021; originally announced June 2021.

  35. arXiv:2104.14827  [pdf, other

    stat.ME

    Joint Linear Trend Recovery Using L1 Regularization

    Authors: Xiaoli Gao, Ejaz Ahmed

    Abstract: This paper studies the recovery of a joint piece-wise linear trend from a time series using L1 regularization approach, called L1 trend filtering (Kim, Koh and Boyd, 2009). We provide some sufficient conditions under which a L1 trend filter can be well-behaved in terms of mean estimation and change point detection. The result is two-fold: for the mean estimation, an almost optimal consistent rate… ▽ More

    Submitted 30 April, 2021; originally announced April 2021.

  36. arXiv:2104.08492  [pdf, other

    cs.AI cs.LG

    A Self-Supervised Auxiliary Loss for Deep RL in Partially Observable Settings

    Authors: Eltayeb Ahmed, Luisa Zintgraf, Christian A. Schroeder de Witt, Nicolas Usunier

    Abstract: In this work we explore an auxiliary loss useful for reinforcement learning in environments where strong performing agents are required to be able to navigate a spatial environment. The auxiliary loss proposed is to minimize the classification error of a neural network classifier that predicts whether or not a pair of states sampled from the agents current episode trajectory are in order. The clas… ▽ More

    Submitted 17 April, 2021; originally announced April 2021.

  37. arXiv:2103.11547  [pdf, other

    cs.DL cs.SI econ.GN physics.soc-ph

    Grand challenges and emergent modes of convergence science

    Authors: Alexander M. Petersen, Mohammed E. Ahmed, Ioannis Pavlidis

    Abstract: To address complex problems, scholars are increasingly faced with challenges of integrating diverse knowledge domains. We analyzed the evolution of this convergence paradigm in the broad ecosystem of brain science, which provides a real-time testbed for evaluating two modes of cross-domain integration - subject area exploration via expansive learning and cross-disciplinary collaboration among doma… ▽ More

    Submitted 21 March, 2021; originally announced March 2021.

    Comments: 15 pages, 5 figures; Supplementary Information: 25 pages, 12 Figures and 5 Tables

    Journal ref: Humanities and Social Sciences Communications, 8, 194 (2021)

  38. arXiv:2102.10336  [pdf, other

    cs.AI cs.LG

    Physical Reasoning Using Dynamics-Aware Models

    Authors: Eltayeb Ahmed, Anton Bakhtin, Laurens van der Maaten, Rohit Girdhar

    Abstract: A common approach to solving physical reasoning tasks is to train a value learner on example tasks. A limitation of such an approach is that it requires learning about object dynamics solely from reward values assigned to the final state of a rollout of the environment. This study aims to address this limitation by augmenting the reward value with self-supervised signals about object dynamics. Spe… ▽ More

    Submitted 1 September, 2021; v1 submitted 20 February, 2021; originally announced February 2021.

    Comments: ICML 2021 Workshop on Self-Supervised Learning for Reasoning and Perception; Webpage/Code: https://facebookresearch.github.io/DynamicsAware

  39. arXiv:2102.04746  [pdf, other

    q-bio.PE math.AP

    Modeling the process of speciation using a multi-scale framework including error estimates

    Authors: Mats K. Brun, Elyes Ahmed, Jan Martin Nordbotten, Nils Christian Stenseth

    Abstract: This paper concerns the modeling and numerical simulation of the process of speciation. In particular, given conditions for which one or more speciation events within an ecosystem occur, our aim is to develop the necessary modeling and simulation tools. Care is also taken to establish a solid mathematical foundation on which our modeling framework is built. This is the subject of the first half of… ▽ More

    Submitted 7 October, 2021; v1 submitted 9 February, 2021; originally announced February 2021.

    Comments: 27 pages, 27 figures

  40. arXiv:2102.03437  [pdf, other

    nlin.PS math.OC

    Forward sensitivity analysis of the FitzHugh-Nagumo system: Parameter estimation

    Authors: Shady E. Ahmed, Omer San, Sivaramakrishnan Lakshmivarahan

    Abstract: The FitzHugh-Nagumo (FHN) model, from computational neuroscience, has attracted attention in nonlinear dynamics studies as it describes the behavior of excitable systems and exhibits interesting bifurcation properties. The accurate estimation of the model parameters is vital to understand how the solution trajectory evolves in time. To this end, we provide a forward sensitivity method (FSM) approa… ▽ More

    Submitted 5 February, 2021; originally announced February 2021.

  41. arXiv:2101.12434  [pdf, ps, other

    cs.CR

    Peeler: Profiling Kernel-Level Events to Detect Ransomware

    Authors: Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal

    Abstract: Ransomware is a growing threat that typically operates by either encrypting a victim's files or locking a victim's computer until the victim pays a ransom. However, it is still challenging to detect such malware timely with existing traditional malware detection techniques. In this paper, we present a novel ransomware detection system, called "Peeler" (Profiling kErnEl -Level Events to detect Rans… ▽ More

    Submitted 29 January, 2021; originally announced January 2021.

    Comments: 15 pages, 10 figures

  42. arXiv:2101.08331  [pdf, ps, other

    math.NA

    A posteriori error estimates for hierarchical mixed-dimensional elliptic equations

    Authors: Jhabriel Varela, Elyes Ahmed, Eirik Keilegavlen, Jan Martin Nordbotten, Florin Adrian Radu

    Abstract: Mixed-dimensional elliptic equations exhibiting a hierarchical structure are commonly used to model problems with high aspect ratio inclusions, such as flow in fractured porous media. We derive general abstract estimates based on the theory of functional a posteriori error estimates, for which guaranteed upper bounds for the primal and dual variables and two-sided bounds for the primal-dual pair a… ▽ More

    Submitted 19 April, 2022; v1 submitted 20 January, 2021; originally announced January 2021.

  43. arXiv:2101.05908  [pdf, other

    physics.comp-ph physics.flu-dyn

    Hybrid analysis and modeling for next generation of digital twins

    Authors: Suraj Pawar, Shady E. Ahmed, Omer San, Adil Rasheed

    Abstract: The physics-based modeling has been the workhorse for many decades in many scientific and engineering applications ranging from wind power, weather forecasting, and aircraft design. Recently, data-driven models are increasingly becoming popular in many branches of science and engineering due to their non-intrusive nature and online learning capability. Despite the robust performance of data-driven… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

    Comments: arXiv admin note: text overlap with arXiv:2012.13343

  44. arXiv:2101.03273  [pdf, other

    cs.NI cs.AI cs.LG cs.MA

    Robust and Scalable Routing with Multi-Agent Deep Reinforcement Learning for MANETs

    Authors: Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Kevin A. Larson, Anh Le, Alex Yahja, Jae H. Kim

    Abstract: Highly dynamic mobile ad-hoc networks (MANETs) are continuing to serve as one of the most challenging environments to develop and deploy robust, efficient, and scalable routing protocols. In this paper, we present DeepCQ+ routing which, in a novel manner, integrates emerging multi-agent deep reinforcement learning (MADRL) techniques into existing Q-learning-based routing protocols and their varian… ▽ More

    Submitted 28 March, 2021; v1 submitted 8 January, 2021; originally announced January 2021.

    Comments: 14 pages, 8 figures

  45. arXiv:2010.03735  [pdf, other

    cs.CV

    Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks

    Authors: Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Hyoungshick Kim, Surya Nepal

    Abstract: As an essential processing step in computer vision applications, image resizing or scaling, more specifically downsampling, has to be applied before feeding a normally large image into a convolutional neural network (CNN) model because CNN models typically take small fixed-size images as inputs. However, image scaling functions could be adversarially abused to perform a newly revealed attack calle… ▽ More

    Submitted 7 October, 2020; originally announced October 2020.

  46. arXiv:2008.04490  [pdf, other

    physics.comp-ph physics.flu-dyn

    Interface learning in fluid dynamics: statistical inference of closures within micro-macro coupling models

    Authors: Suraj Pawar, Shady E. Ahmed, Omer San

    Abstract: Many complex multiphysics systems in fluid dynamics involve using solvers with varied levels of approximations in different regions of the computational domain to resolve multiple spatiotemporal scales present in the flow. The accuracy of the solution is governed by how the information is exchanged between these solvers at the interface and several methods have been devised for such coupling probl… ▽ More

    Submitted 10 August, 2020; originally announced August 2020.

  47. arXiv:2008.03157  [pdf, other

    physics.comp-ph cs.LG

    A nudged hybrid analysis and modeling approach for realtime wake-vortex transport and decay prediction

    Authors: Shady Ahmed, Suraj Pawar, Omer San, Adil Rasheed, Mandar Tabib

    Abstract: We put forth a long short-term memory (LSTM) nudging framework for the enhancement of reduced order models (ROMs) of fluid flows utilizing noisy measurements for air traffic improvements. Toward emerging applications of digital twins in aviation, the proposed approach allows for constructing a realtime predictive tool for wake-vortex transport and decay systems. We build on the fact that in realis… ▽ More

    Submitted 5 March, 2021; v1 submitted 5 August, 2020; originally announced August 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2005.14246

  48. arXiv:2007.06179  [pdf, ps, other

    physics.flu-dyn physics.comp-ph

    Multifidelity Computing for Coupling Full and Reduced Order Models

    Authors: Shady E. Ahmed, Omer San, Kursat Kara, Rami Younis, Adil Rasheed

    Abstract: Hybrid physics-machine learning models are increasingly being used in simulations of transport processes. Many complex multiphysics systems relevant to scientific and engineering applications include multiple spatiotemporal scales and comprise a multifidelity problem sharing an interface between various formulations or heterogeneous computational entities. To this end, we present a robust hybrid a… ▽ More

    Submitted 12 February, 2021; v1 submitted 13 July, 2020; originally announced July 2020.

  49. arXiv:2006.10112  [pdf, other

    physics.comp-ph cs.LG physics.flu-dyn

    Interface learning of multiphysics and multiscale systems

    Authors: Shady E. Ahmed, Omer San, Kursat Kara, Rami Younis, Adil Rasheed

    Abstract: Complex natural or engineered systems comprise multiple characteristic scales, multiple spatiotemporal domains, and even multiple physical closure laws. To address such challenges, we introduce an interface learning paradigm and put forth a data-driven closure approach based on memory embedding to provide physically correct boundary conditions at the interface. To enable the interface learning for… ▽ More

    Submitted 31 October, 2020; v1 submitted 17 June, 2020; originally announced June 2020.

    Journal ref: Phys. Rev. E 102, 053304 (2020)

  50. arXiv:2006.00804  [pdf, other

    cs.SI cs.CL cs.IR

    COVID-19: Social Media Sentiment Analysis on Reopening

    Authors: Mohammed Emtiaz Ahmed, Md Rafiqul Islam Rabin, Farah Naz Chowdhury

    Abstract: The novel coronavirus (COVID-19) pandemic is the most talked topic in social media platforms in 2020. People are using social media such as Twitter to express their opinion and share information on a number of issues related to the COVID-19 in this stay at home order. In this paper, we investigate the sentiment and emotion of peoples in the United States on the subject of reopening. We choose the… ▽ More

    Submitted 1 June, 2020; originally announced June 2020.

    Comments: 8 pages, 4 figures, 1 table