Skip to main content

Showing 1–50 of 229 results for author: Khan, M A

.
  1. arXiv:2406.17746  [pdf, other

    cs.CL cs.AI

    Recite, Reconstruct, Recollect: Memorization in LMs as a Multifaceted Phenomenon

    Authors: USVSN Sai Prashanth, Alvin Deng, Kyle O'Brien, Jyothir S V, Mohammad Aflah Khan, Jaydeep Borkar, Christopher A. Choquette-Choo, Jacob Ray Fuehne, Stella Biderman, Tracy Ke, Katherine Lee, Naomi Saphra

    Abstract: Memorization in language models is typically treated as a homogenous phenomenon, neglecting the specifics of the memorized data. We instead model memorization as the effect of a set of complex factors that describe each sample and relate it to the model and corpus. To build intuition around these factors, we break memorization down into a taxonomy: recitation of highly duplicated sequences, recons… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  2. arXiv:2406.08775  [pdf, other

    cs.CV

    ALINA: Advanced Line Identification and Notation Algorithm

    Authors: Mohammed Abdul Hafeez Khan, Parth Ganeriwala, Siddhartha Bhattacharyya, Natasha Neogi, Raja Muthalagu

    Abstract: Labels are the cornerstone of supervised machine learning algorithms. Most visual recognition methods are fully supervised, using bounding boxes or pixel-wise segmentations for object localization. Traditional labeling methods, such as crowd-sourcing, are prohibitive due to cost, data privacy, amount of time, and potential errors on large datasets. To address these issues, we propose a novel annot… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

    Comments: Paper has been accepted to The 3rd CVPR Workshop on Vision Datasets Understanding, 2024

  3. arXiv:2405.16743  [pdf, other

    cond-mat.mtrl-sci

    Tuning the Electronic and Optical Properties of Impurity-Engineered Two-Dimensional Graphullerene Half-Semiconductors

    Authors: M. A. Khan, Madeeha Atif, Michael N. Leuenberger

    Abstract: A novel material consisting of a monolayer of C$_{60}$ buckyballs with hexagonal symmetry has recently been observed experimentally, named graphullerene. In this study, we present a comprehensive \textit{ab-initio} theoretical analysis of the electronic and optical properties of both pristine and impurity-engineered monolayer graphullerene using spin-dependent density functional theory (spin-DFT).… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

    Comments: 11 pages, 7 figures

  4. arXiv:2405.15563  [pdf

    cs.CV

    Heterogeneous virus classification using a functional deep learning model based on transmission electron microscopy images (Preprint)

    Authors: Niloy Sikder, Md. Al-Masrur Khan, Anupam Kumar Bairagi, Mehedi Masud, Jun Jiat Tiang, Abdullah-Al Nahid

    Abstract: Viruses are submicroscopic agents that can infect all kinds of lifeforms and use their hosts' living cells to replicate themselves. Despite having some of the simplest genetic structures among all living beings, viruses are highly adaptable, resilient, and given the right conditions, are capable of causing unforeseen complications in their hosts' bodies. Due to their multiple transmission pathways… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  5. arXiv:2405.12427  [pdf, other

    cs.LG

    Deep learning approaches to indoor wireless channel estimation for low-power communication

    Authors: Samrah Arif, Muhammad Arif Khan, Sabih Ur Rehman

    Abstract: In the rapidly growing development of the Internet of Things (IoT) infrastructure, achieving reliable wireless communication is a challenge. IoT devices operate in diverse environments with common signal interference and fluctuating channel conditions. Accurate channel estimation helps adapt the transmission strategies to current conditions, ensuring reliable communication. Traditional methods, su… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

  6. arXiv:2405.07251  [pdf, other

    astro-ph.CO

    Constraints on bulk viscosity in $f(Q,T)$ gravity from H(z)/Pantheon+ data

    Authors: M. Koussour, Abdelghani Errehymy, O. Donmez, K. Myrzakulov, M. A. Khan, B. Çil, E. Güdekli

    Abstract: In this study, we investigate the role of bulk viscosity in $f(Q,T)$ gravity in explaining late-time cosmic acceleration. This model, an extension of symmetric teleparallel gravity, introduces viscosity into cosmic matter dynamics for a more realistic representation. Specifically, we consider the linear form of $f (Q, T) =αQ + βT$, where $α$ and $β$ are free model parameters. To assess the model,… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    Comments: Physics of the Dark Universe accepted version

  7. arXiv:2405.06835  [pdf, other

    cs.LG cs.AI cs.SE

    Automating Code Adaptation for MLOps -- A Benchmarking Study on LLMs

    Authors: Harsh Patel, Buvaneswari A. Ramanan, Manzoor A. Khan, Thomas Williams, Brian Friedman, Lawrence Drabeck

    Abstract: This paper explores the possibilities of the current generation of Large Language Models for incorporating Machine Learning Operations (MLOps) functionalities into ML training code bases. We evaluate the performance of OpenAI (gpt-3.5-turbo) and WizardCoder (open-source, 15B parameters) models on the automated accomplishment of various MLOps functionalities in different settings. We perform a benc… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: The work was completed during 2Q, 3Q of Year 2023, when WizardCoder was the top performing Open source LLM for coding. Newer and better models have emerged since then. The processes and methodologies utilized for this benchmarking can still be utilized for evaluating the current SoTA models

  8. arXiv:2405.04735  [pdf, other

    cs.CR cs.DS cs.IR

    Cryptanalysis of the SIMON Cypher Using Neo4j

    Authors: Jonathan Cook, Sabih ur Rehman, M. Arif Khan

    Abstract: The exponential growth in the number of Internet of Things (IoT) devices has seen the introduction of several Lightweight Encryption Algorithms (LEA). While LEAs are designed to enhance the integrity, privacy and security of data collected and transmitted by IoT devices, it is hazardous to assume that all LEAs are secure and exhibit similar levels of protection. To improve encryption strength, cry… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 10 pages, 10 figures, 2 algorithms, accepted by the 4th International Conference on Electrical, Computer and Energy Technologies (ICECET) to be presented in July 2024

  9. arXiv:2405.01310  [pdf, other

    cs.IR cs.CL

    Overcoming LLM Challenges using RAG-Driven Precision in Coffee Leaf Disease Remediation

    Authors: Dr. Selva Kumar S, Afifah Khan Mohammed Ajmal Khan, Imadh Ajaz Banday, Manikantha Gada, Vibha Venkatesh Shanbhag

    Abstract: This research introduces an innovative AI-driven precision agriculture system, leveraging YOLOv8 for disease identification and Retrieval Augmented Generation (RAG) for context-aware diagnosis. Focused on addressing the challenges of diseases affecting the coffee production sector in Karnataka, The system integrates sophisticated object detection techniques with language models to address the inhe… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 6 pages, 3 figures

  10. arXiv:2404.15337  [pdf, other

    eess.SP cs.LG cs.NI

    RSSI Estimation for Constrained Indoor Wireless Networks using ANN

    Authors: Samrah Arif, M. Arif Khan, Sabih Ur Rehman

    Abstract: In the expanding field of the Internet of Things (IoT), wireless channel estimation is a significant challenge. This is specifically true for low-power IoT (LP-IoT) communication, where efficiency and accuracy are extremely important. This research establishes two distinct LP-IoT wireless channel estimation models using Artificial Neural Networks (ANN): a Feature-based ANN model and a Sequence-bas… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

  11. arXiv:2404.12957  [pdf, other

    cs.CL cs.LG

    Towards Reliable Latent Knowledge Estimation in LLMs: In-Context Learning vs. Prompting Based Factual Knowledge Extraction

    Authors: Qinyuan Wu, Mohammad Aflah Khan, Soumi Das, Vedant Nanda, Bishwamittra Ghosh, Camila Kolling, Till Speicher, Laurent Bindschaedler, Krishna P. Gummadi, Evimaria Terzi

    Abstract: We propose an approach for estimating the latent knowledge embedded inside large language models (LLMs). We leverage the in-context learning (ICL) abilities of LLMs to estimate the extent to which an LLM knows the facts stored in a knowledge base. Our knowledge estimator avoids reliability concerns with previous prompting-based methods, is both conceptually simpler and easier to apply, and we demo… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

  12. arXiv:2404.08165  [pdf, other

    cs.CR

    Lightweight Cryptanalysis of IoT Encryption Algorithms : Is Quota Sampling the Answer?

    Authors: Jonathan Cook, Sabih ur Rehman, M. Arif Khan

    Abstract: Rapid growth in the number of small sensor devices known as the Internet of Things (IoT) has seen the development of lightweight encryption algorithms. Two well-known lightweight algorithms are SIMON and SIMECK which have been specifically designed for use on resource-constrained IoT devices. These lightweight encryption algorithms are based on the efficient Feistel block structure which is known… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

    Comments: 24 pages, 21 figures, 7 tables

  13. arXiv:2404.05508  [pdf, other

    cs.SE cs.AI cs.CL

    Synergy of Large Language Model and Model Driven Engineering for Automated Development of Centralized Vehicular Systems

    Authors: Nenad Petrovic, Fengjunjie Pan, Krzysztof Lebioda, Vahid Zolfaghari, Sven Kirchner, Nils Purschke, Muhammad Aqib Khan, Viktor Vorobev, Alois Knoll

    Abstract: We present a prototype of a tool leveraging the synergy of model driven engineering (MDE) and Large Language Models (LLM) for the purpose of software development process automation in the automotive industry. In this approach, the user-provided input is free form textual requirements, which are first translated to Ecore model instance representation using an LLM, which is afterwards checked for co… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

    Report number: TUM-I24109 ACM Class: D.2.1; D.2.2; D.2.4; I.2.7; I.2.2; I.7.0

  14. arXiv:2403.18863  [pdf, other

    physics.ao-ph physics.flu-dyn

    Investigating the Relationship between Simulation Parameters and Flow Variables in Simulating Atmospheric Gravity Waves in Wind Energy Applications

    Authors: Mehtab Ahmed Khan, Dries Allaerts, Simon Watson, Matthew Churchfield

    Abstract: Wind farms, particularly offshore clusters, are becoming larger than ever before. Besides influencing wind farms and local meteorology downstream, large wind farms can trigger atmospheric gravity waves in the inversion layer and the free atmosphere aloft. Wind farm-induced gravity waves can cause adverse pressure gradients upstream of the wind farm, that contribute to the global blockage effect, a… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

  15. arXiv:2403.14120  [pdf, other

    cs.LG cs.AI eess.SP

    Advancing IIoT with Over-the-Air Federated Learning: The Role of Iterative Magnitude Pruning

    Authors: Fazal Muhammad Ali Khan, Hatem Abou-Zeid, Aryan Kaushik, Syed Ali Hassan

    Abstract: The industrial Internet of Things (IIoT) under Industry 4.0 heralds an era of interconnected smart devices where data-driven insights and machine learning (ML) fuse to revolutionize manufacturing. A noteworthy development in IIoT is the integration of federated learning (FL), which addresses data privacy and security among devices. FL enables edge sensors, also known as peripheral intelligence uni… ▽ More

    Submitted 21 March, 2024; originally announced March 2024.

    Comments: 6 pages, 6 figures

  16. arXiv:2403.10861  [pdf, other

    quant-ph cs.ET cs.LG

    FedQNN: Federated Learning using Quantum Neural Networks

    Authors: Nouhaila Innan, Muhammad Al-Zafar Khan, Alberto Marchisio, Muhammad Shafique, Mohamed Bennai

    Abstract: In this study, we explore the innovative domain of Quantum Federated Learning (QFL) as a framework for training Quantum Machine Learning (QML) models via distributed networks. Conventional machine learning models frequently grapple with issues about data privacy and the exposure of sensitive information. Our proposed Federated Quantum Neural Network (FedQNN) framework emerges as a cutting-edge sol… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

    Comments: Accepted for presentation at IJCNN 2024

  17. arXiv:2403.04029  [pdf, ps, other

    econ.TH

    Two-Person Adversarial Games are Zero-Sum: An Elaboration of a Folk Theorem

    Authors: M. Ali Khan, Arthur Paul Pedersen, David Schrittesser

    Abstract: The observation that every two-person adversarial game is an affine transformation of a zero-sum game is traceable to Luce-Raiffa (1957) and made explicit in Aumann (1987). Recent work of (ADP) Adler-Daskalakis-Papadimitriou (2009), and of Raimondo (2023) in increasing generality, proves what has so far remained a conjecture. We present two proofs of an even more general formulation: the first dra… ▽ More

    Submitted 22 May, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

    MSC Class: 91A05; 91A10; 91A30

  18. Taking Second-life Batteries from Exhausted to Empowered using Experiments, Data Analysis, and Health Estimation

    Authors: Xiaofan Cui, Muhammad Aadil Khan, Gabriele Pozzato, Surinder Singh, Ratnesh Sharma, Simona Onori

    Abstract: The reuse of retired electric vehicle batteries in grid energy storage offers environmental and economic benefits. This study concentrates on health monitoring algorithms for retired batteries deployed in grid storage. Over 15 months of testing, we collect, analyze, and publicize a dataset of second-life batteries, implementing a cycling protocol simulating grid energy storage load profiles within… ▽ More

    Submitted 8 June, 2024; v1 submitted 29 February, 2024; originally announced February 2024.

    Comments: 16 pages, 8 figures

  19. arXiv:2402.06100  [pdf

    math.OC econ.GN

    Towards Industry 5.0: A Systematic Literature Review on Sustainable and Green Composite Materials Supply Chains

    Authors: Md Rabiul Hasan, Muztoba Ahmed Khan, Thorsten Wuest

    Abstract: Sustainable supply chain management is a key objective of Industry 5.0, leveraging technologies like real-time data analytics, connectivity, and intelligent automation. At the same time, composite materials present benefits such as lightweight structures, crucial for reducing fuel consumption. This study investigates the intersection between sustainable supply chains and composites by analyzing th… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  20. arXiv:2402.02144  [pdf, other

    cs.CL

    Probing Critical Learning Dynamics of PLMs for Hate Speech Detection

    Authors: Sarah Masud, Mohammad Aflah Khan, Vikram Goyal, Md Shad Akhtar, Tanmoy Chakraborty

    Abstract: Despite the widespread adoption, there is a lack of research into how various critical aspects of pretrained language models (PLMs) affect their performance in hate speech detection. Through five research questions, our findings and recommendations lay the groundwork for empirically investigating different aspects of PLMs' use in hate speech detection. We deep dive into comparing different pretrai… ▽ More

    Submitted 3 February, 2024; originally announced February 2024.

    Comments: 20 pages, 9 figures, 14 tables. Accepted at EACL'24

  21. arXiv:2401.17741  [pdf, other

    cs.RO cs.AI

    Haris: an Advanced Autonomous Mobile Robot for Smart Parking Assistance

    Authors: Layth Hamad, Muhammad Asif Khan, Hamid Menouar, Fethi Filali, Amr Mohamed

    Abstract: This paper presents Haris, an advanced autonomous mobile robot system for tracking the location of vehicles in crowded car parks using license plate recognition. The system employs simultaneous localization and map** (SLAM) for autonomous navigation and precise map** of the parking area, eliminating the need for GPS dependency. In addition, the system utilizes a sophisticated framework using c… ▽ More

    Submitted 31 January, 2024; originally announced January 2024.

    Comments: Accepted in 2024 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 2024

  22. arXiv:2401.15804  [pdf, other

    eess.IV quant-ph

    Brain Tumor Diagnosis Using Quantum Convolutional Neural Networks

    Authors: Muhammad Al-Zafar Khan, Nouhaila Innan, Abdullah Al Omar Galib, Mohamed Bennai

    Abstract: Integrating Quantum Convolutional Neural Networks (QCNNs) into medical diagnostics represents a transformative advancement in the classification of brain tumors. This research details a high-precision design and execution of a QCNN model specifically tailored to identify and classify brain cancer images. Our proposed QCNN architecture and algorithm have achieved an exceptional classification accur… ▽ More

    Submitted 30 January, 2024; v1 submitted 28 January, 2024; originally announced January 2024.

    Comments: 10 pages, 9 figures, 45 references

  23. arXiv:2401.07591  [pdf, other

    cs.CV cs.AI

    Multimodal Crowd Counting with Pix2Pix GANs

    Authors: Muhammad Asif Khan, Hamid Menouar, Ridha Hamila

    Abstract: Most state-of-the-art crowd counting methods use color (RGB) images to learn the density map of the crowd. However, these methods often struggle to achieve higher accuracy in densely crowded scenes with poor illumination. Recently, some studies have reported improvement in the accuracy of crowd counting models using a combination of RGB and thermal images. Although multimodal data can lead to bett… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

    Comments: Accepted version of the paper in 19th International Conference on Computer Vision Theory and Applications (VISAPP), Rome, Italy, 27-29 Feb, 2024,

  24. arXiv:2401.07586  [pdf, other

    cs.CV cs.AI

    Curriculum for Crowd Counting -- Is it Worthy?

    Authors: Muhammad Asif Khan, Hamid Menouar, Ridha Hamila

    Abstract: Recent advances in deep learning techniques have achieved remarkable performance in several computer vision problems. A notably intuitive technique called Curriculum Learning (CL) has been introduced recently for training deep learning models. Surprisingly, curriculum learning achieves significantly improved results in some tasks but marginal or no improvement in others. Hence, there is still a de… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

    Comments: Accepted version of the paper in 19th International Conference on Computer Vision Theory and Applications (VISAPP), Rome, Italy, 27-19 February 2024

  25. arXiv:2401.04734  [pdf, other

    eess.SY

    Online Adaptive Data-driven State-of-health Estimation for Second-life Batteries with BIBO Stability Guarantees

    Authors: Xiaofan Cui, Muhammad Aadil Khan, Simona Onori

    Abstract: A key challenge that is currently hindering the widespread deployment and use of retired electric vehicle (EV) batteries for second-life (SL) applications is the ability to accurately estimate and monitor their state of health (SOH). Second-life battery systems can be sourced from different battery packs with a lack of knowledge of their historical usage. To facilitate the on-the-field use of SL… ▽ More

    Submitted 7 January, 2024; originally announced January 2024.

  26. arXiv:2401.04619  [pdf, other

    cs.CL

    Language Detection for Transliterated Content

    Authors: Selva Kumar S, Afifah Khan Mohammed Ajmal Khan, Chirag Manjeshwar, Imadh Ajaz Banday

    Abstract: In the contemporary digital era, the Internet functions as an unparalleled catalyst, dismantling geographical and linguistic barriers particularly evident in texting. This evolution facilitates global communication, transcending physical distances and fostering dynamic cultural exchange. A notable trend is the widespread use of transliteration, where the English alphabet is employed to convey mess… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    Comments: 4 Pages, 6 diagrams

    ACM Class: C.m; I.2

  27. arXiv:2401.00986  [pdf

    cs.CV cs.AI

    Real-Time Object Detection in Occluded Environment with Background Cluttering Effects Using Deep Learning

    Authors: Syed Muhammad Aamir, Hongbin Ma, Malak Abid Ali Khan, Muhammad Aaqib

    Abstract: Detection of small, undetermined moving objects or objects in an occluded environment with a cluttered background is the main problem of computer vision. This greatly affects the detection accuracy of deep learning models. To overcome these problems, we concentrate on deep learning models for real-time detection of cars and tanks in an occluded environment with a cluttered background employing SSD… ▽ More

    Submitted 1 January, 2024; originally announced January 2024.

  28. arXiv:2312.10512  [pdf, other

    cs.NI cs.LG

    Value of Information and Timing-aware Scheduling for Federated Learning

    Authors: Muhammad Azeem Khan, Howard H. Yang, Zihan Chen, Antonio Iera, Nikolaos Pappas

    Abstract: Data possesses significant value as it fuels advancements in AI. However, protecting the privacy of the data generated by end-user devices has become crucial. Federated Learning (FL) offers a solution by preserving data privacy during training. FL brings the model directly to User Equipments (UEs) for local training by an access point (AP). The AP periodically aggregates trained parameters from UE… ▽ More

    Submitted 16 December, 2023; originally announced December 2023.

    Comments: IEEE Conference on Standards for Communications and Networking 2023

  29. arXiv:2311.16161  [pdf, other

    cs.CV cs.AI

    Vision Encoder-Decoder Models for AI Coaching

    Authors: Jyothi S Nayak, Afifah Khan Mohammed Ajmal Khan, Chirag Manjeshwar, Imadh Ajaz Banday

    Abstract: This research paper introduces an innovative AI coaching approach by integrating vision-encoder-decoder models. The feasibility of this method is demonstrated using a Vision Transformer as the encoder and GPT-2 as the decoder, achieving a seamless integration of visual input and textual interaction. Departing from conventional practices of employing distinct models for image recognition and text-b… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

    Comments: 6 pages, 2 figures

    ACM Class: I.2.1

  30. arXiv:2311.09834  [pdf, other

    cs.CL

    Overview of the HASOC Subtrack at FIRE 2023: Identification of Tokens Contributing to Explicit Hate in English by Span Detection

    Authors: Sarah Masud, Mohammad Aflah Khan, Md. Shad Akhtar, Tanmoy Chakraborty

    Abstract: As hate speech continues to proliferate on the web, it is becoming increasingly important to develop computational methods to mitigate it. Reactively, using black-box models to identify hateful content can perplex users as to why their posts were automatically flagged as hateful. On the other hand, proactive mitigation can be achieved by suggesting rephrasing before a post is made public. However,… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: 8 pages, 1 figure, 4 Tables

  31. arXiv:2311.09055  [pdf, other

    cond-mat.mes-hall cond-mat.mtrl-sci

    Electronic structure in a transition metal dipnictide TaAs2

    Authors: Sabin Regmi, Cheng-Yi Huang, Mojammel A. Khan, Baokai Wang, Anup Pradhan Sakhya, M. Mofazzel Hosen, Jesse Thompson, Bahadur Singh, Jonathan D. Denlinger, Masahiro Ishigami, J. F. Mitchell, Dariusz Kaczorowski, Arun Bansil, Madhab Neupane

    Abstract: The family of transition metal dipnictides (TMDs) has been of theoretical and experimental interest because this family hosts topological states and extremely large magnetoresistance (MR). Recently, TaAs2, a member of this family, has been predicted to support a topological crystalline insulating state. Here, by using high resolution. Angle resolved photoemission spectroscopy (ARPES), we reveal bo… ▽ More

    Submitted 15 November, 2023; originally announced November 2023.

    Comments: 13 pages, 5 figures

    Journal ref: J. Phys.: Condens. Matter 36, 075502 (2023)

  32. arXiv:2311.04789  [pdf, other

    cs.LG cs.CL cs.CY

    Determination of toxic comments and unintended model bias minimization using Deep learning approach

    Authors: Md Azim Khan

    Abstract: Online conversations can be toxic and subjected to threats, abuse, or harassment. To identify toxic text comments, several deep learning and machine learning models have been proposed throughout the years. However, recent studies demonstrate that because of the imbalances in the training data, some models are more likely to show unintended biases including gender bias and identity bias. In this re… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

  33. arXiv:2311.01571  [pdf, other

    cs.CL cs.AI

    Preserving the knowledge of long clinical texts using aggregated ensembles of large language models

    Authors: Mohammad Junayed Hasan, Suhra Noor, Mohammad Ashrafuzzaman Khan

    Abstract: Clinical texts, such as admission notes, discharge summaries, and progress notes, contain rich and valuable information that can be used for various clinical outcome prediction tasks. However, applying large language models, such as BERT-based models, to clinical texts poses two major challenges: the limitation of input length and the diversity of data sources. This paper proposes a novel method t… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    Comments: 17 pages, 4 figures, 4 tables, 9 equations and 1 algorithm

    ACM Class: I.2.7

  34. arXiv:2310.20190  [pdf, other

    cs.CV cs.LG eess.IV

    Visible to Thermal image Translation for improving visual task in low light conditions

    Authors: Md Azim Khan

    Abstract: Several visual tasks, such as pedestrian detection and image-to-image translation, are challenging to accomplish in low light using RGB images. Heat variation of objects in thermal images can be used to overcome this. In this work, an end-to-end framework, which consists of a generative network and a detector network, is proposed to translate RGB image into Thermal ones and compare generated therm… ▽ More

    Submitted 8 November, 2023; v1 submitted 31 October, 2023; originally announced October 2023.

  35. arXiv:2310.10662  [pdf, other

    cs.CR

    Assessing the Influence of Different Types of Probing on Adversarial Decision-Making in a Deception Game

    Authors: Md Abu Sayed, Mohammad Ariful Islam Khan, Bryant A Allsup, Joshua Zamora, Palvi Aggarwal

    Abstract: Deception, which includes leading cyber-attackers astray with false information, has shown to be an effective method of thwarting cyber-attacks. There has been little investigation of the effect of probing action costs on adversarial decision-making, despite earlier studies on deception in cybersecurity focusing primarily on variables like network size and the percentage of honeypots utilized in g… ▽ More

    Submitted 8 January, 2024; v1 submitted 15 September, 2023; originally announced October 2023.

  36. arXiv:2310.07245  [pdf, other

    cs.CV cs.LG eess.IV

    Crowd Counting in Harsh Weather using Image Denoising with Pix2Pix GANs

    Authors: Muhammad Asif Khan, Hamid Menouar, Ridha Hamila

    Abstract: Visual crowd counting estimates the density of the crowd using deep learning models such as convolution neural networks (CNNs). The performance of the model heavily relies on the quality of the training data that constitutes crowd images. In harsh weather such as fog, dust, and low light conditions, the inference performance may severely degrade on the noisy and blur images. In this paper, we prop… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

    Comments: The paper has been accepted for presentation in IEEE 38th International Conference on Image and Vision Computing New Zealand (IVCNZ 2023). The final manuscript can be accessed at ieeexplore

  37. arXiv:2310.00531  [pdf, other

    econ.TH

    Separately Convex and Separately Continuous Preferences: On Results of Schmeidler, Shafer, and Bergstrom-Parks-Rader

    Authors: Metin Uyanik, Aniruddha Ghosh, M. Ali Khan

    Abstract: We provide necessary and sufficient conditions for a correspondence taking values in a finite-dimensional Euclidean space to be open so as to revisit the pioneering work of Schmeidler (1969), Shafer (1974), Shafer-Sonnenschein (1975) and Bergstrom-Rader-Parks (1976) to answer several questions they and their followers left open. We introduce the notion of separate convexity for a correspondence an… ▽ More

    Submitted 30 September, 2023; originally announced October 2023.

  38. arXiv:2309.01127  [pdf, other

    quant-ph cs.AI cs.LG

    Financial Fraud Detection using Quantum Graph Neural Networks

    Authors: Nouhaila Innan, Abhishek Sawaika, Ashim Dhor, Siddhant Dutta, Sairupa Thota, Husayn Gokal, Nandan Patel, Muhammad Al-Zafar Khan, Ioannis Theodonis, Mohamed Bennai

    Abstract: Financial fraud detection is essential for preventing significant financial losses and maintaining the reputation of financial institutions. However, conventional methods of detecting financial fraud have limited effectiveness, necessitating the need for new approaches to improve detection rates. In this paper, we propose a novel approach for detecting financial fraud using Quantum Graph Neural Ne… ▽ More

    Submitted 3 September, 2023; originally announced September 2023.

    Comments: 15 pages, 18 figures, 4 tables

    Journal ref: Quantum Mach. Intell. 6, 7 (2024)

  39. arXiv:2309.00184  [pdf, other

    cs.CR

    A Survey of Network Requirements for Enabling Effective Cyber Deception

    Authors: Md Abu Sayed, Moqsadur Rahman, Mohammad Ariful Islam Khan, Deepak Tosh

    Abstract: In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence as a proactive defense strategy against sophisticated attacks. This paper presents a comprehensive survey that investigates the crucial network requirements essential for the successful implementation of effective cyber deception techniques. With a focus on diverse network architectures and topolog… ▽ More

    Submitted 8 January, 2024; v1 submitted 31 August, 2023; originally announced September 2023.

  40. arXiv:2308.10677  [pdf, other

    cs.CV cs.AI

    Visual Crowd Analysis: Open Research Problems

    Authors: Muhammad Asif Khan, Hamid Menouar, Ridha Hamila

    Abstract: Over the last decade, there has been a remarkable surge in interest in automated crowd monitoring within the computer vision community. Modern deep-learning approaches have made it possible to develop fully-automated vision-based crowd-monitoring applications. However, despite the magnitude of the issue at hand, the significant technological advancements, and the consistent interest of the researc… ▽ More

    Submitted 24 August, 2023; v1 submitted 21 August, 2023; originally announced August 2023.

    Comments: Accepted in AI Magazine published by Wiley Periodicals LLC on behalf of the Association for the Advancement of Artificial Intelligence

  41. arXiv:2308.10327  [pdf, other

    quant-ph cs.LG physics.comp-ph physics.data-an

    Quantum State Tomography using Quantum Machine Learning

    Authors: Nouhaila Innan, Owais Ishtiaq Siddiqui, Shivang Arora, Tamojit Ghosh, Yasemin Poyraz Koçak, Dominic Paragas, Abdullah Al Omar Galib, Muhammad Al-Zafar Khan, Mohamed Bennai

    Abstract: Quantum State Tomography (QST) is a fundamental technique in Quantum Information Processing (QIP) for reconstructing unknown quantum states. However, the conventional QST methods are limited by the number of measurements required, which makes them impractical for large-scale quantum systems. To overcome this challenge, we propose the integration of Quantum Machine Learning (QML) techniques to enha… ▽ More

    Submitted 20 August, 2023; originally announced August 2023.

    Comments: 18 pages, 19 figures

    Journal ref: Quantum Mach. Intell. 6, 28 (2024)

  42. arXiv:2308.05237  [pdf, other

    quant-ph cs.LG q-fin.GN

    Financial Fraud Detection: A Comparative Study of Quantum Machine Learning Models

    Authors: Nouhaila Innan, Muhammad Al-Zafar Khan, Mohamed Bennai

    Abstract: In this research, a comparative study of four Quantum Machine Learning (QML) models was conducted for fraud detection in finance. We proved that the Quantum Support Vector Classifier model achieved the highest performance, with F1 scores of 0.98 for fraud and non-fraud classes. Other models like the Variational Quantum Classifier, Estimator Quantum Neural Network (QNN), and Sampler QNN demonstrate… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

    Comments: 30 pages, 15 figures, and 2 tables

  43. CAMP: A Context-Aware Cricket Players Performance Metric

    Authors: Muhammad Sohaib Ayub, Naimat Ullah, Sarwan Ali, Imdad Ullah Khan, Mian Muhammad Awais, Muhammad Asad Khan, Safiullah Faizullah

    Abstract: Cricket is the second most popular sport after soccer in terms of viewership. However, the assessment of individual player performance, a fundamental task in team sports, is currently primarily based on aggregate performance statistics, including average runs and wickets taken. We propose Context-Aware Metric of player Performance, CAMP, to quantify individual players' contributions toward a crick… ▽ More

    Submitted 14 July, 2023; originally announced July 2023.

    Journal ref: Journal of the Operational Research Society (2023) 1-27

  44. arXiv:2306.14939  [pdf, other

    cs.CL cs.LG

    The Art of Embedding Fusion: Optimizing Hate Speech Detection

    Authors: Mohammad Aflah Khan, Neemesh Yadav, Mohit Jain, Sanyam Goyal

    Abstract: Hate speech detection is a challenging natural language processing task that requires capturing linguistic and contextual nuances. Pre-trained language models (PLMs) offer rich semantic representations of text that can improve this task. However there is still limited knowledge about ways to effectively combine representations across PLMs and leverage their complementary strengths. In this work, w… ▽ More

    Submitted 8 October, 2023; v1 submitted 26 June, 2023; originally announced June 2023.

    Comments: Published as a Tiny Paper at ICLR 2023, 12 Pages

  45. arXiv:2306.12668  [pdf, ps, other

    math.NA

    Numerical analysis of the stochastic Stefan problem

    Authors: Jerome Droniou, Muhammad Awais Khan, Kim Ngan Le

    Abstract: The gradient discretisation method (GDM) -- a generic framework encompassing many numerical methods -- is studied for a general stochastic Stefan problem with multiplicative noise. The convergence of the numerical solutions is proved by compactness method using discrete functional analysis tools, Skorohod theorem and the martingale representation theorem. The generic convergence results establishe… ▽ More

    Submitted 26 June, 2023; v1 submitted 22 June, 2023; originally announced June 2023.

  46. arXiv:2306.01742  [pdf, ps, other

    cs.CL cs.LG

    Beyond Negativity: Re-Analysis and Follow-Up Experiments on Hope Speech Detection

    Authors: Neemesh Yadav, Mohammad Aflah Khan, Diksha Sethi, Raghav Sahni

    Abstract: Health experts assert that hope plays a crucial role in enhancing individuals' physical and mental well-being, facilitating their recovery, and promoting restoration. Hope speech refers to comments, posts and other social media messages that offer support, reassurance, suggestions, inspiration, and insight. The detection of hope speech involves the analysis of such textual content, with the aim of… ▽ More

    Submitted 10 May, 2023; originally announced June 2023.

    Comments: Published as a Tiny Paper at ICLR 2023, 7 Pages

  47. arXiv:2305.11180  [pdf, other

    nlin.PS math-ph nlin.SI quant-ph

    Conservation Laws for the Nonlinear Klein-Gordon Equation in (1+1)-, (2+1), and (3+1)-dimensions

    Authors: Muhammad Al-Zafar Khan

    Abstract: We study soliton solutions to the Klein-Gordon equation via Lie symmetries and the travelling-wave ansatz. It is shown, by taking a linear combination of the spatial and temporal Lie point symmetries, that soliton solutions naturally exist, and the resulting field lies in the complex plane. We normalize the field over a finite spatial interval, and thereafter, specify one of the integration consta… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

    Comments: 11 pages, 3 figures

  48. arXiv:2305.10864  [pdf, ps, other

    gr-qc math-ph nlin.SI

    Lie Symmetry Analysis of the Einstein-Maxwell Equations for Quark Stars

    Authors: Muhammad Al-Zafar Khan, Riven Narain

    Abstract: We derive the Lie point symmetries for the MIT Bag Model for quark stars in relativistic astrophysics. Four cases of reduction arise; three cases of specific values of the measure of the anisotropy variation, and one general case, which we postulate as a specific relationship between the two gravitational potentials. We demonstrate the applicability of the model by generating two closed form solut… ▽ More

    Submitted 18 May, 2023; originally announced May 2023.

    Comments: 19 pages

  49. arXiv:2305.09338  [pdf, other

    hep-ph hep-th math-ph quant-ph

    Soliton Solutions and Conservation Laws for a Self-interacting Scalar Field in \(φ^{4}\) Theory

    Authors: Muhammad Al-Zafar Khan, Mervlyn Moodley, Francesco Petruccione

    Abstract: We calculate soliton solutions to the scalar field equation of motion that arises for the 4th-order extended Lagrangian (\(φ^{4}\) theory) in quantum field theory using the extended hyperbolic tangent and the sine-cosine methods. Using the former technique, ten complex soliton waves are obtained; we graphically represent three of these profiles using density plots. In the latter case, two real sol… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

    Comments: 19 pages, 2 figures

  50. arXiv:2305.09326  [pdf, ps, other

    quant-ph math-ph

    Conservation Laws for a Thermal Reservoir Model in Open Quantum Systems

    Authors: Muhammad Al-Zafar Khan, Mervlyn Moodley, Francesco Petruccione

    Abstract: We construct Lie point symmetries, a closed-form solution and conservation laws using a non-Noetherian approach for a specific case of the Gorini-Kossakowski-Sudarshan-Lindblad equation that has been recast for the study of non-relativistic free particles in a thermal reservoir environment. Conservation laws are constructed subsequently using the Ibragimov method via a solution to the adjoint form… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

    Comments: 11 pages