Skip to main content

Showing 1–29 of 29 results for author: Anwar, H

.
  1. arXiv:2407.07361  [pdf, other

    cs.NI cs.CR cs.LG

    Characterizing Encrypted Application Traffic through Cellular Radio Interface Protocol

    Authors: Md Ruman Islam, Raja Hasnain Anwar, Spyridon Mastorakis, Muhammad Taqi Raza

    Abstract: Modern applications are end-to-end encrypted to prevent data from being read or secretly modified. 5G tech nology provides ubiquitous access to these applications without compromising the application-specific performance and latency goals. In this paper, we empirically demonstrate that 5G radio communication becomes the side channel to precisely infer the user's applications in real-time. The key… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

    Comments: 9 pages, 8 figures, 2 tables. This paper has been accepted for publication by the 21st IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS 2024)

  2. arXiv:2402.06023  [pdf, other

    cs.LG cs.AI cs.GT

    Decision Theory-Guided Deep Reinforcement Learning for Fast Learning

    Authors: Zelin Wan, **-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles Kamhoua, Munindar P. Singh

    Abstract: This paper introduces a novel approach, Decision Theory-guided Deep Reinforcement Learning (DT-guided DRL), to address the inherent cold start problem in DRL. By integrating decision theory principles, DT-guided DRL enhances agents' initial performance and robustness in complex environments, enabling more efficient and reliable convergence during learning. Our investigation encompasses two primary… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  3. arXiv:2308.11817  [pdf, other

    cs.GT

    Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach

    Authors: Md Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Charles Kamhoua

    Abstract: Honeypots play a crucial role in implementing various cyber deception techniques as they possess the capability to divert attackers away from valuable assets. Careful strategic placement of honeypots in networks should consider not only network aspects but also attackers' preferences. The allocation of honeypots in tactical networks under network mobility is of great interest. To achieve this obje… ▽ More

    Submitted 18 September, 2023; v1 submitted 22 August, 2023; originally announced August 2023.

    Comments: This paper accepted in 14th International Conference on Decision and Game Theory for Security, GameSec 2023

  4. Cyber Deception against Zero-day Attacks: A Game Theoretic Approach

    Authors: Md Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Branislav Bosansky, Charles Kamhoua

    Abstract: Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have been used to deceive attackers by misrepresenting the true state of the network. Existing work on cyber deception does not model zero-day attacks. In this paper, we address the question of "H… ▽ More

    Submitted 25 July, 2023; v1 submitted 24 July, 2023; originally announced July 2023.

    Comments: 20 pages, 1 citation

    Journal ref: International Conference on Decision and Game Theory for Security, pp. 44-63. Cham: Springer International Publishing, 2022

  5. arXiv:2305.16091  [pdf, other

    cs.SE

    Emotions in Requirements Engineering: A Systematic Map** Study

    Authors: Tahira Iqbal, Hina Anwar, Syazwanie Filzah, Mohammad Gharib, Kerli Moose, Kuldar Taveter

    Abstract: The purpose of requirements engineering (RE) is to make sure that the expectations and needs of the stakeholders of a software system are met. Emotional needs can be captured as emotional requirements that represent how the end user should feel when using the system. Differently from functional and quality (non-functional) requirements, emotional requirements have received relatively less attentio… ▽ More

    Submitted 25 May, 2023; originally announced May 2023.

  6. arXiv:2202.05631  [pdf, other

    eess.IV cs.AI cs.CV

    Vehicle and License Plate Recognition with Novel Dataset for Toll Collection

    Authors: Muhammad Usama, Hafeez Anwar, Abbas Anwar, Saeed Anwar

    Abstract: We propose an automatic framework for toll collection, consisting of three steps: vehicle type recognition, license plate localization, and reading. However, each of the three steps becomes non-trivial due to image variations caused by several factors. The traditional vehicle decorations on the front cause variations among vehicles of the same type. These decorations make license plate localizatio… ▽ More

    Submitted 15 November, 2022; v1 submitted 11 February, 2022; originally announced February 2022.

  7. arXiv:2106.01459  [pdf, other

    eess.SY

    Comprehensive Energy Footprint Benchmarking Algorithm for Electrified Powertrains

    Authors: Hamza Anwar, Aashrith Vishwanath, Apurva Chunodkar, Qadeer Ahmed

    Abstract: Autonomy and electrification in automotive control systems have made modern-day powertrains one of the most complex cyber-physical systems. This paper presents a benchmark algorithm to quantify the performance of complex automotive systems exhibiting mechanical, electrical, and thermal interactions at various time-scales. Traditionally Dynamic Programming has been used for benchmarking the perform… ▽ More

    Submitted 2 June, 2021; originally announced June 2021.

  8. Comprehensive Energy Footprint Benchmarking of Strong Parallel Electrified Powertrain

    Authors: Hamza Anwar, Aashrith Vishwanath, Apurva Chunodkar, Qadeer Ahmed

    Abstract: This work presents comprehensive energy management and in-depth energy footprint analysis of an electrified strong parallel commercial vehicle. We use the PS3 framework, validated real-world powertrain system models, and Pareto-optimal analysis to optimize fuel consumption and harmful pollutant emissions. The approach involves dynamic optimization of 13 states and 4 control levers with complex int… ▽ More

    Submitted 24 September, 2022; v1 submitted 1 June, 2021; originally announced June 2021.

    Comments: Revised results, added energy analysis, made submission ready

  9. arXiv:2101.10121  [pdf, ps, other

    cs.CR cs.GT cs.LG

    Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey

    Authors: Mu Zhu, Ahmed H. Anwar, Zelin Wan, **-Hee Cho, Charles Kamhoua, Munindar P. Singh

    Abstract: Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources. Although defensive deception is increasingly popular in the research community, there has not been a systematic investigation of its key components, the underlying principles, and its tradeoffs in various prob… ▽ More

    Submitted 8 May, 2021; v1 submitted 21 January, 2021; originally announced January 2021.

    Comments: 37 pages, 184 citations

  10. arXiv:2101.02863  [pdf, other

    cs.GT

    Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats

    Authors: Zelin Wan, **-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles Kamhoua, Munindar P. Singh

    Abstract: Defensive deception techniques have emerged as a promising proactive defense mechanism to mislead an attacker and thereby achieve attack failure. However, most game-theoretic defensive deception approaches have assumed that players maintain consistent views under uncertainty. They do not consider players' possible, subjective beliefs formed due to asymmetric information given to them. In this work… ▽ More

    Submitted 30 January, 2021; v1 submitted 8 January, 2021; originally announced January 2021.

    Comments: Main paper: 12 pages, 8 figures. Appendix: 7 pages, 17 figures

  11. arXiv:1908.09428  [pdf, other

    cs.CV cs.LG

    Deep Ancient Roman Republican Coin Classification via Feature Fusion and Attention

    Authors: Hafeez Anwar, Saeed Anwar, Sebastian Zambanini, Fatih Porikli

    Abstract: We perform the classification of ancient Roman Republican coins via recognizing their reverse motifs where various objects, faces, scenes, animals, and buildings are minted along with legends. Most of these coins are eroded due to their age and varying degrees of preservation, thereby affecting their informative attributes for visual recognition. Changes in the positions of principal symbols on th… ▽ More

    Submitted 24 December, 2020; v1 submitted 25 August, 2019; originally announced August 2019.

    Comments: in Pattern Recognition

  12. arXiv:1908.07653  [pdf, other

    cs.NI cs.LG eess.SP stat.ML

    Understanding and Partitioning Mobile Traffic using Internet Activity Records Data -- A Spatiotemporal Approach

    Authors: Kashif Sultan, Hazrat Ali, Haris Anwaar, Kabo Poloko Nkabiti, Adeel Ahamd, Zhongshan Zhang

    Abstract: The internet activity records (IARs) of a mobile cellular network posses significant information which can be exploited to identify the network's efficacy and the mobile users' behavior. In this work, we extract useful information from the IAR data and identify a healthy predictability of spatio-temporal pattern within the network traffic. The information extracted is helpful for network operators… ▽ More

    Submitted 30 July, 2019; originally announced August 2019.

    Comments: 2019 28th Wireless and Optical Communications Conference (WOCC)

  13. arXiv:1803.05542  [pdf, ps, other

    cs.CR cs.GT

    A Game-Theoretic Framework for the Virtual Machines Migration Timing Problem

    Authors: Ahmed H. Anwar, George Atia, Mina Guirguis

    Abstract: In a multi-tenant cloud, a number of Virtual Machines (VMs) are collocated on the same physical machine to optimize performance, power consumption and maximize profit. This, however, increases the risk of a malicious VM performing side-channel attacks and leaking sensitive information from neighboring VMs. To this end, this paper develops and analyzes a game-theoretic framework for the VM migratio… ▽ More

    Submitted 14 March, 2018; originally announced March 2018.

  14. arXiv:1802.10168  [pdf, other

    cs.LG stat.ML

    ADMM-based Networked Stochastic Variational Inference

    Authors: Hamza Anwar, Quanyan Zhu

    Abstract: Owing to the recent advances in "Big Data" modeling and prediction tasks, variational Bayesian estimation has gained popularity due to their ability to provide exact solutions to approximate posteriors. One key technique for approximate inference is stochastic variational inference (SVI). SVI poses variational inference as a stochastic optimization problem and solves it iteratively using noisy gra… ▽ More

    Submitted 27 February, 2018; originally announced February 2018.

    Comments: to be submitted for publishing

  15. Fault-tolerant quantum computation with non-deterministic entangling gates

    Authors: James M. Auger, Hussain Anwar, Mercedes Gimeno-Segovia, Thomas M. Stace, Dan E. Browne

    Abstract: Performing entangling gates between physical qubits is necessary for building a large-scale universal quantum computer, but in some physical implementations - for example, those that are based on linear optics or networks of ion traps - entangling gates can only be implemented probabilistically. In this work, we study the fault-tolerant performance of a topological cluster state scheme with local… ▽ More

    Submitted 16 March, 2018; v1 submitted 18 August, 2017; originally announced August 2017.

    Comments: 5 pages, 3 figures

    Journal ref: Phys. Rev. A 97, 030301 (2018)

  16. Minimax Game-Theoretic Approach to Multiscale H-infinity Optimal Filtering

    Authors: Hamza Anwar, Quanyan Zhu

    Abstract: Sensing in complex systems requires large-scale information exchange and on-the-go communications over heterogeneous networks and integrated processing platforms. Many networked cyber-physical systems exhibit hierarchical infrastructures of information flows, which naturally leads to a multi-level tree-like information structure in which each level corresponds to a particular scale of representati… ▽ More

    Submitted 8 August, 2017; v1 submitted 24 July, 2017; originally announced July 2017.

    Comments: IEEE GlobalSIP 2017

  17. Fault-tolerance thresholds for the surface code with fabrication errors

    Authors: James M. Auger, Hussain Anwar, Mercedes Gimeno-Segovia, Thomas M. Stace, Dan E. Browne

    Abstract: The construction of topological error correction codes requires the ability to fabricate a lattice of physical qubits embedded on a manifold with a non-trivial topology such that the quantum information is encoded in the global degrees of freedom (i.e. the topology) of the manifold. However, the manufacturing of large-scale topological devices will undoubtedly suffer from fabrication errors---perm… ▽ More

    Submitted 15 June, 2017; originally announced June 2017.

    Comments: 10 pages, 15 figures

    Journal ref: Phys. Rev. A 96, 042316 (2017)

  18. arXiv:1511.03196  [pdf, ps, other

    quant-ph

    Smallest disentangling state spaces for general entangled bipartite quantum states

    Authors: Hussain Anwar, Sania Jevtic, Oliver Rudolph, Shashank Virmani

    Abstract: Entangled quantum states can be given a separable decomposition if we relax the restriction that the local operators be quantum states. Motivated by the construction of classical simulations and local hidden variable models, we construct `smallest' local sets of operators that achieve this. In other words, given an arbitrary bipartite quantum state we construct convex sets of local operators that… ▽ More

    Submitted 10 November, 2015; originally announced November 2015.

    Comments: 16 pages, no figures, comments are welcome

  19. Qudit Colour Codes and Gauge Colour Codes in All Spatial Dimensions

    Authors: Fern H. E. Watson, Earl T. Campbell, Hussain Anwar, Dan E. Browne

    Abstract: Two-level quantum systems, qubits, are not the only basis for quantum computation. Advantages exist in using qudits, d-level quantum systems, as the basic carrier of quantum information. We show that color codes, a class of topological quantum codes with remarkable transversality properties, can be generalized to the qudit paradigm. In recent developments it was found that in three spatial dimensi… ▽ More

    Submitted 10 August, 2015; v1 submitted 30 March, 2015; originally announced March 2015.

    Comments: Authors' final copy

    Journal ref: Phys. Rev. A 92, 022312 (2015)

  20. arXiv:1412.3780  [pdf, ps, other

    quant-ph

    Families of pure PEPS with efficiently simulatable local hidden variable models for most measurements

    Authors: Hussain Anwar, Sania Jevtic, Oliver Rudolph, Shashank Virmani

    Abstract: An important problem in quantum information theory is to understand what makes entangled quantum systems non-local or hard to simulate efficiently. In this work we consider situations in which various parties have access to a restricted set of measurements on their particles, and construct entangled quantum states that are essentially classical for those measurements. In particular, given any set… ▽ More

    Submitted 17 December, 2014; v1 submitted 11 December, 2014; originally announced December 2014.

    Comments: 5 pages, all comments are welcome, updated version includes minor corrections (all results still hold)

  21. Smallest state spaces for which bipartite entangled quantum states are separable

    Authors: Hussain Anwar, Sania Jevtic, Oliver Rudolph, Shashank Virmani

    Abstract: According to usual definitions, entangled states cannot be given a separable decomposition in terms of products of local density operators. If we relax the requirement that the local density operators be positive, then an entangled quantum state may admit a separable decomposition in terms of more general sets of single-system operators. This form of separability can be used to construct classical… ▽ More

    Submitted 14 May, 2015; v1 submitted 21 November, 2014; originally announced November 2014.

    Comments: 17 pages, 2 figure, comments are welcome. v2 contain an additional figure and section with other minor changes and clarifications (in particular, emphasising the role of convex cone state spaces)

  22. A fast fault-tolerant decoder for qubit and qudit surface codes

    Authors: Fern H. E. Watson, Hussain Anwar, Dan E. Browne

    Abstract: The surface code is one of the most promising candidates for combating errors in large scale fault-tolerant quantum computation. A fault-tolerant decoder is a vital part of the error correction process---it is the algorithm which computes the operations needed to correct or compensate for the errors according to the measured syndrome, even when the measurement itself is error prone. Previously dec… ▽ More

    Submitted 14 September, 2015; v1 submitted 11 November, 2014; originally announced November 2014.

    Comments: 13 pages, 19 figures, authors' final copy

    Journal ref: Phys. Rev. A 92, 032309 (2015)

  23. arXiv:1404.1113  [pdf, ps, other

    cs.IT cs.NI

    Interference-Based Optimal Power-Efficient Access Scheme for Cognitive Radio Networks

    Authors: Ahmed H. Anwar, Ahmed El Shafie, Amr Mohamed, Tamer ElBatt, Mohsen Guizani

    Abstract: In this paper, we propose a new optimization-based access strategy of multipacket reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum opportunistically. We devise an analytical model that realizes the multipacket access strategy of SUs that maximizes the throughput of individual backlogged SUs subject to queue stability of the PU. All the network rec… ▽ More

    Submitted 8 July, 2014; v1 submitted 3 April, 2014; originally announced April 2014.

  24. Efficient Decoders for Qudit Topological Codes

    Authors: Hussain Anwar, Benjamin J. Brown, Earl T. Campbell, Dan E. Browne

    Abstract: Qudit toric codes are a natural higher-dimensional generalization of the well-studied qubit toric code. However standard methods for error correction of the qubit toric code are not applicable to them. Novel decoders are needed. In this paper we introduce two renormalization group decoders for qudit codes and analyze their error correction thresholds and efficiency. The first decoder is a generali… ▽ More

    Submitted 19 November, 2013; originally announced November 2013.

    Comments: 20 pages, 21 figures, comments are welcome

    Journal ref: New J. Phys. 16 (2014) 063038

  25. arXiv:1304.6192  [pdf, other

    cs.CV

    A Bag of Visual Words Approach for Symbols-Based Coarse-Grained Ancient Coin Classification

    Authors: Hafeez Anwar, Sebastian Zambanini, Martin Kampel

    Abstract: The field of Numismatics provides the names and descriptions of the symbols minted on the ancient coins. Classification of the ancient coins aims at assigning a given coin to its issuer. Various issuers used various symbols for their coins. We propose to use these symbols for a framework that will coarsely classify the ancient coins. Bag of visual words (BoVWs) is a well established visual recogni… ▽ More

    Submitted 23 April, 2013; originally announced April 2013.

    Comments: Part of the OAGM/AAPR 2013 proceedings (arXiv:1304.1876)

    Report number: OAGM AND AAPR/2013/17

  26. Measurement-based classical computation

    Authors: Matty J. Hoban, Joel J. Wallman, Hussain Anwar, Naïri Usher, Robert Raussendorf, Dan E. Browne

    Abstract: Measurement-based quantum computation (MBQC) is a model of quantum computation, in which computation proceeds via adaptive single qubit measurements on a multi-qubit quantum state. It is computationally equivalent to the circuit model. Unlike the circuit model, however, its classical analog is little studied. Here we present a classical analog of MBQC whose computational complexity presents a rich… ▽ More

    Submitted 13 November, 2014; v1 submitted 9 April, 2013; originally announced April 2013.

    Comments: 5+3 pages, 2 figures. Latest version has a new title and has been rewritten to talk about other possible resource states. Accepted for publication in Physical Review Letters

    Journal ref: Phys. Rev. Lett. 112, 140505 (2014)

  27. arXiv:1304.0207  [pdf, ps, other

    cs.IT

    Effective Capacity of Delay Constrained Cognitive Radio Links Exploiting Primary Feedback

    Authors: Ahmed H. Anwar, Karim G. Seddik, Tamer ElBatt, Ahmed H. Zahran

    Abstract: In this paper, we analyze the performance of a secondary link in a cognitive radio (CR) system operating under statistical quality of service (QoS) delay constraints. In particular, we quantify analytically the performance improvement for the secondary user (SU) when applying a feedback based sensing scheme under the "SINR Interference" model. We leverage the concept of effective capacity (EC) int… ▽ More

    Submitted 31 March, 2013; originally announced April 2013.

    Comments: 8 pages, 7 figures, wiopt 2013. arXiv admin note: text overlap with arXiv:0906.3888, arXiv:1004.0907 by other authors

  28. Magic state distillation in all prime dimensions using quantum Reed-Muller codes

    Authors: Earl T. Campbell, Hussain Anwar, Dan E. Browne

    Abstract: We propose families of protocols for magic state distillation -- important components of fault tolerance schemes --- for systems of odd prime dimension. Our protocols utilize quantum Reed-Muller codes with transversal non-Clifford gates. We find that, in higher dimensions, small and effective codes can be used that have no direct analogue in qubit (two-dimensional) systems. We present several conc… ▽ More

    Submitted 19 July, 2012; v1 submitted 14 May, 2012; originally announced May 2012.

    Comments: Updated from V1 to include results on the remarkable d=5 case

    Journal ref: Phys. Rev. X 2, 041021 (2012)

  29. Qutrit Magic State Distillation

    Authors: Hussain Anwar, Earl T. Campbell, Dan E. Browne

    Abstract: Magic state distillation (MSD) is a purification protocol that plays a central role in fault tolerant quantum computation. Repeated iteration of the steps of a MSD protocol, generates pure single non-stabilizer states, or magic states, from multiple copies of a mixed resource state using stabilizer operations only. Thus mixed resource states promote the stabilizer operations to full universality.… ▽ More

    Submitted 8 June, 2012; v1 submitted 10 February, 2012; originally announced February 2012.

    Comments: 13 pages, 5 figures

    Journal ref: New J. Phys. 14 063006 (2012)