Skip to main content

Showing 1–29 of 29 results for author: Alqahtani, S

.
  1. arXiv:2407.04069  [pdf, other

    cs.CL cs.AI cs.LG

    A Systematic Survey and Critical Review on Evaluating Large Language Models: Challenges, Limitations, and Recommendations

    Authors: Md Tahmid Rahman Laskar, Sawsan Alqahtani, M Saiful Bari, Mizanur Rahman, Mohammad Abdullah Matin Khan, Haidar Khan, Israt Jahan, Amran Bhuiyan, Chee Wei Tan, Md Rizwan Parvez, Enamul Hoque, Shafiq Joty, Jimmy Huang

    Abstract: Large Language Models (LLMs) have recently gained significant attention due to their remarkable capabilities in performing diverse tasks across various domains. However, a thorough evaluation of these models is crucial before deploying them in real-world applications to ensure they produce reliable performance. Despite the well-established importance of evaluating LLMs in the community, the comple… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  2. arXiv:2403.03161  [pdf, other

    cs.CV cs.LG

    PalmProbNet: A Probabilistic Approach to Understanding Palm Distributions in Ecuadorian Tropical Forest via Transfer Learning

    Authors: Kangning Cui, Zishan Shao, Gregory Larsen, Victor Pauca, Sarra Alqahtani, David Segurado, João Pinheiro, Manqi Wang, David Lutz, Robert Plemmons, Miles Silman

    Abstract: Palms play an outsized role in tropical forests and are important resources for humans and wildlife. A central question in tropical ecosystems is understanding palm distribution and abundance. However, accurately identifying and localizing palms in geospatial imagery presents significant challenges due to dense vegetation, overlap** canopies, and variable lighting conditions in mixed-forest land… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

    Comments: 11 pages, 6 figures, and 1 table, to appear in ACMSE 2024

    ACM Class: I.4.9

  3. arXiv:2401.13584  [pdf

    cs.CR

    Securing the Invisible Thread: A Comprehensive Analysis of BLE Tracker Security in Apple AirTags and Samsung SmartTags

    Authors: Hosam Alamleh, Michael Gogarty, David Ruddell, Ali Abdullah S. AlQahtani

    Abstract: This study presents an in-depth analysis of the security landscape in Bluetooth Low Energy (BLE) tracking systems, with a particular emphasis on Apple AirTags and Samsung SmartTags, including their cryptographic frameworks. Our investigation traverses a wide spectrum of attack vectors such as physical tampering, firmware exploitation, signal spoofing, eavesdrop**, jamming, app security flaws, Bl… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

  4. arXiv:2401.11326  [pdf

    cs.CR

    Navigating Cybersecurity Training: A Comprehensive Review

    Authors: Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan

    Abstract: In the dynamic realm of cybersecurity, awareness training is crucial for strengthening defenses against cyber threats. This survey examines a spectrum of cybersecurity awareness training methods, analyzing traditional, technology-based, and innovative strategies. It evaluates the principles, efficacy, and constraints of each method, presenting a comparative analysis that highlights their pros and… ▽ More

    Submitted 20 January, 2024; originally announced January 2024.

  5. arXiv:2401.06612  [pdf

    cs.CR

    Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication

    Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, Ahmad Patooghy

    Abstract: The traditional two-factor authentication (2FA) methods primarily rely on the user manually entering a code or token during the authentication process. This can be burdensome and time-consuming, particularly for users who must be authenticated frequently. To tackle this challenge, we present a novel 2FA approach replacing the user's input with decisions made by Machine Learning (ML) that continuou… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

  6. arXiv:2311.13416  [pdf

    cs.CR

    Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion

    Authors: Reem Alrawili, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan

    Abstract: This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as security, convenience, and robustness, and potential countermeasures against cyberattacks, and (3) factors affecting biometric system accuracy and po-tent… ▽ More

    Submitted 20 January, 2024; v1 submitted 7 July, 2023; originally announced November 2023.

  7. arXiv:2311.10771  [pdf, other

    cs.CL cs.SD

    Automatic Restoration of Diacritics for Speech Data Sets

    Authors: Sara Shatnawi, Sawsan Alqahtani, Hanan Aldarmaki

    Abstract: Automatic text-based diacritic restoration models generally have high diacritic error rates when applied to speech transcripts as a result of domain and style shifts in spoken language. In this work, we explore the possibility of improving the performance of automatic diacritic restoration when applied to speech data by utilizing parallel spoken utterances. In particular, we use the pre-trained Wh… ▽ More

    Submitted 6 April, 2024; v1 submitted 15 November, 2023; originally announced November 2023.

  8. arXiv:2309.14213  [pdf

    cs.CE cs.CL

    Autonomous Vehicles an overview on system, cyber security, risks, issues, and a way forward

    Authors: Md Aminul Islam, Sarah Alqahtani

    Abstract: This chapter explores the complex realm of autonomous cars, analyzing their fundamental components and operational characteristics. The initial phase of the discussion is elucidating the internal mechanics of these automobiles, encompassing the crucial involvement of sensors, artificial intelligence (AI) identification systems, control mechanisms, and their integration with cloud-based servers wit… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

  9. arXiv:2304.09468  [pdf

    cs.CR cs.NI

    Secure Mobile Payment Architecture Enabling Multi-factor Authentication

    Authors: Hosam Alamleh, Ali Abdullah S. AlQahtani, Baker Al Smadi

    Abstract: The rise of smartphones has led to a significant increase in the usage of mobile payments. Mobile payments allow individuals to access financial resources and make transactions through their mobile devices while on the go. However, the current mobile payment systems were designed to align with traditional payment structures, which limits the full potential of smartphones, including their security… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

  10. arXiv:2303.02503  [pdf

    cs.CR cs.LG

    Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave Transmission and Machine Learning

    Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb

    Abstract: The proliferation of sensitive information being stored online highlights the pressing need for secure and efficient user authentication methods. To address this issue, this paper presents a novel zero-effort two-factor authentication (2FA) approach that combines the unique characteristics of a users environment and Machine Learning (ML) to confirm their identity. Our proposed approach utilizes Wi… ▽ More

    Submitted 4 March, 2023; originally announced March 2023.

  11. arXiv:2212.08120  [pdf, other

    cs.CL cs.AI

    Injecting Domain Knowledge in Language Models for Task-Oriented Dialogue Systems

    Authors: Denis Emelin, Daniele Bonadiman, Sawsan Alqahtani, Yi Zhang, Saab Mansour

    Abstract: Pre-trained language models (PLM) have advanced the state-of-the-art across NLP applications, but lack domain-specific knowledge that does not naturally occur in pre-training data. Previous studies augmented PLMs with symbolic knowledge for different downstream NLP tasks. However, knowledge bases (KBs) utilized in these studies are usually large-scale and static, in contrast to small, domain-speci… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

    Comments: Published at EMNLP 2022 (main conference)

  12. arXiv:2210.00270  [pdf

    cs.CR

    ML for Location Prediction Using RSSI On WiFi 2.4 GHZ Frequency Band

    Authors: Ali Abdullah S. AlQahtani, Nazim Choudhury

    Abstract: For decades, the determination of an objects location has been implemented utilizing different technologies. Despite GPS (Global Positioning System) provides a scalable efficient and cost effective location services however the satellite emitted signals cannot be exploited indoor to effectively determine the location. In contrast to GPS which is a cost effective localization technology for outdoor… ▽ More

    Submitted 1 October, 2022; originally announced October 2022.

  13. arXiv:2210.00175  [pdf

    cs.CR cs.LG

    Technical Report-IoT Devices Proximity Authentication In Ad Hoc Network Environment

    Authors: Ali Abdullah S. AlQahtani, Hosam Alamleh, Baker Al Smadi

    Abstract: Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices (e.g. vehicles home appliances sensors actuators etc.) known as Things to connect and exchange data more importantly without human interaction. Since IoT plays a significant role in our daily lives we must secure the IoT environment to work effectively. Among the various secur… ▽ More

    Submitted 30 September, 2022; originally announced October 2022.

  14. arXiv:2209.13073  [pdf

    cs.CR

    Preprint: Privacy-preserving IoT Data Sharing Scheme

    Authors: Ali Abdullah S. AlQahtani, Hosam Alamleh, Reem Alrawili

    Abstract: Data sharing can be granted using different factors one of which is something in a users or an IoT devices environment which is in this paper broadcast signals. Using broadcast signals to measure Received Signal Strength Indicator values and Machine Learning models this paper implements an IoT data sharing scheme based on something that is in an IoT devices environment. The proposed scheme is expe… ▽ More

    Submitted 26 September, 2022; originally announced September 2022.

  15. arXiv:2206.09365  [pdf, other

    cs.CV stat.AP

    Semi-supervised Change Detection of Small Water Bodies Using RGB and Multispectral Images in Peruvian Rainforests

    Authors: Kangning Cui, Seda Camalan, Ruoning Li, Victor P. Pauca, Sarra Alqahtani, Robert J. Plemmons, Miles Silman, Evan N. Dethier, David Lutz, Raymond H. Chan

    Abstract: Artisanal and Small-scale Gold Mining (ASGM) is an important source of income for many households, but it can have large social and environmental effects, especially in rainforests of develo** countries. The Sentinel-2 satellites collect multispectral images that can be used for the purpose of detecting changes in water extent and quality which indicates the locations of mining sites. This work… ▽ More

    Submitted 19 June, 2022; originally announced June 2022.

    Comments: 8 pages, 5 figures. Accepted to Proceedings of IEEE WHISPERS 2022

  16. arXiv:2205.10658  [pdf, other

    cs.DC

    BunchBFT: Across-Cluster Consensus Protocol

    Authors: Salem Alqahtani, Murat Demirbas

    Abstract: In this paper, we present BunchBFT Byzantine fault-tolerant state-machine replication for high performance and scalability. At the heart of BunchBFT is a novel design called the cluster-based approach that divides the replicas into clusters of replicas. By combining this cluster-based approach with hierarchical communications across clusters, piggybacking techniques for sending messages across clu… ▽ More

    Submitted 21 May, 2022; originally announced May 2022.

    Comments: 6 pages

  17. arXiv:2110.02887  [pdf, other

    cs.CL

    Using Optimal Transport as Alignment Objective for fine-tuning Multilingual Contextualized Embeddings

    Authors: Sawsan Alqahtani, Garima Lalwani, Yi Zhang, Salvatore Romeo, Saab Mansour

    Abstract: Recent studies have proposed different methods to improve multilingual word representations in contextualized settings including techniques that align between source and target embedding spaces. For contextualized embeddings, alignment becomes more complex as we additionally take context into consideration. In this work, we propose using Optimal Transport (OT) as an alignment objective during fine… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

    Journal ref: EMNLP 2021

  18. BigBFT: A Multileader Byzantine Fault Tolerance Protocol for High Throughput

    Authors: Salem Alqahtani, Murat Demirbas

    Abstract: This paper describes BigBFT, a multi-leader Byzantine fault tolerance protocol that achieves high throughput and scalable consensus in blockchain systems. BigBFT achieves this by (1) enabling every node to be a leader that can propose and order the blocks in parallel, (2) piggybacking votes within rounds, (3) pipelining blocks across rounds, and (4) using only two communication steps to order bloc… ▽ More

    Submitted 12 October, 2021; v1 submitted 26 September, 2021; originally announced September 2021.

    Comments: 11

  19. arXiv:2105.01606  [pdf, other

    cs.LG

    Deep Reinforcement Learning for Adaptive Exploration of Unknown Environments

    Authors: Ashley Peake, Joe McCalmon, Yixin Zhang, Daniel Myers, Sarra Alqahtani, Paul Pauca

    Abstract: Performing autonomous exploration is essential for unmanned aerial vehicles (UAVs) operating in unknown environments. Often, these missions start with building a map for the environment via pure exploration and subsequently using (i.e. exploiting) the generated map for downstream navigation tasks. Accomplishing these navigation tasks in two separate steps is not always possible or even disadvantag… ▽ More

    Submitted 4 May, 2021; originally announced May 2021.

    Journal ref: The 2021 International Conference On Unmanned Aircraft System (ICUAS '21)

  20. Bottlenecks in Blockchain Consensus Protocols

    Authors: Salem Alqahtani, Murat Demirbas

    Abstract: Most of the Blockchain permissioned systems employ Byzantine fault-tolerance (BFT) consensus protocols to ensure that honest validators agree on the order for appending entries to their ledgers. In this paper, we study the performance and the scalability of prominent consensus protocols, namely PBFT, Tendermint, HotStuff, and Streamlet, both analytically via load formulas and practically via imple… ▽ More

    Submitted 11 October, 2021; v1 submitted 6 March, 2021; originally announced March 2021.

    Comments: 8 pages

  21. arXiv:2101.00269  [pdf, other

    cond-mat.mtrl-sci physics.comp-ph

    Extending Shannon's Ionic Radii Database Using Machine Learning

    Authors: Ahmer A. B. Baloch, Saad M. Alqahtani, Faisal Mumtaz, Ali H. Muqaibel, Sergey N. Rashkeev, Fahhad H. Alharbi

    Abstract: In computational material design, ionic radius is one of the most important physical parameters used to predict material properties. Motivated by the progress in computational materials science and material informatics, we extend the renowned Shannon's table from 475 ions to 987 ions. Accordingly, a rigorous Machine Learning (ML) approach is employed to extend the ionic radii table using all possi… ▽ More

    Submitted 1 January, 2021; originally announced January 2021.

    Comments: 11 pages , 4 figures

    Journal ref: Phys. Rev. Materials 5, 043804 (2021)

  22. arXiv:2006.04016  [pdf, other

    cs.CL cs.LG

    A Multitask Learning Approach for Diacritic Restoration

    Authors: Sawsan Alqahtani, Ajay Mishra, Mona Diab

    Abstract: In many languages like Arabic, diacritics are used to specify pronunciations as well as meanings. Such diacritics are often omitted in written text, increasing the number of possible pronunciations and meanings for a word. This results in a more ambiguous text making computational processing on such text more difficult. Diacritic restoration is the task of restoring missing diacritics in the writt… ▽ More

    Submitted 6 June, 2020; originally announced June 2020.

    Journal ref: ACL 2020

  23. Efficient Convolutional Neural Networks for Diacritic Restoration

    Authors: Sawsan Alqahtani, Ajay Mishra, Mona Diab

    Abstract: Diacritic restoration has gained importance with the growing need for machines to understand written texts. The task is typically modeled as a sequence labeling problem and currently Bidirectional Long Short Term Memory (BiLSTM) models provide state-of-the-art results. Recently, Bai et al. (2018) show the advantages of Temporal Convolutional Neural Networks (TCN) over Recurrent Neural Networks (RN… ▽ More

    Submitted 14 December, 2019; originally announced December 2019.

    Comments: accepted in EMNLP 2019

    Journal ref: EMNLP 2019

  24. Homograph Disambiguation Through Selective Diacritic Restoration

    Authors: Sawsan Alqahtani, Hanan Aldarmaki, Mona Diab

    Abstract: Lexical ambiguity, a challenging phenomenon in all natural languages, is particularly prevalent for languages with diacritics that tend to be omitted in writing, such as Arabic. Omitting diacritics leads to an increase in the number of homographs: different words with the same spelling. Diacritic restoration could theoretically help disambiguate these words, but in practice, the increase in overal… ▽ More

    Submitted 9 December, 2019; originally announced December 2019.

    Comments: accepted in WANLP 2019

  25. arXiv:1912.01704  [pdf

    cs.RO cs.CV

    Robustness-Driven Exploration with Probabilistic Metric Temporal Logic

    Authors: Xiaotian Liu, Pengyi Shi, Sarra Alqahtani, Victor Paúl Pauca, Miles Silman

    Abstract: The ability to perform autonomous exploration is essential for unmanned aerial vehicles (UAV) operating in unstructured or unknown environments where it is hard or even impossible to describe the environment beforehand. However, algorithms for autonomous exploration often focus on optimizing time and coverage in a greedy fashion. That type of exploration can collect irrelevant data and wastes time… ▽ More

    Submitted 3 December, 2019; originally announced December 2019.

    Comments: 10 pages, 8 figures, submitted to AAMAS 2020 for review

  26. arXiv:1909.02061  [pdf, other

    cs.DC

    Performance Analysis and Comparison of Distributed Machine Learning Systems

    Authors: Salem Alqahtani, Murat Demirbas

    Abstract: Deep learning has permeated through many aspects of computing/processing systems in recent years. While distributed training architectures/frameworks are adopted for training large deep learning models quickly, there has not been a systematic study of the communication bottlenecks of these architectures and their effects on the computation cycle time and scalability. In order to analyze this probl… ▽ More

    Submitted 4 September, 2019; originally announced September 2019.

    Comments: 11 pages

    Report number: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8846938

  27. arXiv:1902.10402  [pdf

    cs.SI cs.LG

    Social Credibility Incorporating Semantic Analysis and Machine Learning: A Survey of the State-of-the-Art and Future Research Directions

    Authors: Bilal Abu-Salih, Bushra Bremie, Pornpit Wongthongtham, Kevin Duan, Tomayess Issa, Kit Yan Chan, Mohammad Alhabashneh, Teshreen Albtoush, Sulaiman Alqahtani, Abdullah Alqahtani, Muteeb Alahmari, Naser Alshareef, Abdulaziz Albahlal

    Abstract: The wealth of Social Big Data (SBD) represents a unique opportunity for organisations to obtain the excessive use of such data abundance to increase their revenues. Hence, there is an imperative need to capture, load, store, process, analyse, transform, interpret, and visualise such manifold social datasets to develop meaningful insights that are specific to an application domain. This paper lays… ▽ More

    Submitted 27 February, 2019; originally announced February 2019.

  28. Ricci magnetic geodesic motion of vortices and lumps

    Authors: L. S. Alqahtani, J. M. Speight

    Abstract: Ricci magnetic geodesic (RMG) motion in a kähler manifold is the analogue of geodesic motion in the presence of a magnetic field proportional to the ricci form. It has been conjectured to model low-energy dynamics of vortex solitons in the presence of a Chern-Simons term, the kähler manifold in question being the $n$-vortex moduli space. This paper presents a detailed study of RMG motion in solito… ▽ More

    Submitted 17 October, 2014; originally announced October 2014.

  29. The Einstein-Hilbert action of the space of holomorphic maps from S^2 to CP^k

    Authors: L. S. Alqahtani

    Abstract: Let $\mathcal{H}_{n,k}(Σ)$ be the space of degree $n\geq 1$ holomorphic maps from a compact Riemann surface $Σ$ to $\mathbb{C}P^k$. In the case $Σ=S^2$ and $n=1$, the $L^2$ metric on $\mathcal{H}_{1,k}(S^2)$ was computed exactly by Speight. In this paper, the Ricci curvature tensor and the scalar curvature on $\mathcal{H}_{1,k}(S^2)$ are determined explicitly for $k\geq 2$. An exact direct computa… ▽ More

    Submitted 7 August, 2013; v1 submitted 8 March, 2013; originally announced March 2013.

    Comments: 12 pages - updated version