Skip to main content

Showing 1–21 of 21 results for author: Abdullah, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.06593  [pdf, other

    cs.CV

    Non-Uniform Spatial Alignment Errors in sUAS Imagery From Wide-Area Disasters

    Authors: Thomas Manzini, Priyankari Perali, Raisa Karnik, Mihir Godbole, Hasnat Abdullah, Robin Murphy

    Abstract: This work presents the first quantitative study of alignment errors between small uncrewed aerial systems (sUAS) geospatial imagery and a priori building polygons and finds that alignment errors are non-uniform and irregular. The work also introduces a publicly available dataset of imagery, building polygons, and human-generated and curated adjustments that can be used to evaluate existing strateg… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: 6 pages, 5 figures, 1 table

  2. arXiv:2402.01733  [pdf

    cs.CL cs.AI

    Development and Testing of Retrieval Augmented Generation in Large Language Models -- A Case Study Report

    Authors: YuHe Ke, Liyuan **, Kabilan Elangovan, Hairil Rizal Abdullah, Nan Liu, Alex Tiong Heng Sia, Chai Rick Soh, Joshua Yi Min Tung, Jasmine Chiat Ling Ong, Daniel Shu Wei Ting

    Abstract: Purpose: Large Language Models (LLMs) hold significant promise for medical applications. Retrieval Augmented Generation (RAG) emerges as a promising approach for customizing domain knowledge in LLMs. This case study presents the development and evaluation of an LLM-RAG pipeline tailored for healthcare, focusing specifically on preoperative medicine. Methods: We developed an LLM-RAG model using 3… ▽ More

    Submitted 29 January, 2024; originally announced February 2024.

    Comments: NA

  3. arXiv:2401.14589  [pdf

    cs.CL cs.AI

    Enhancing Diagnostic Accuracy through Multi-Agent Conversations: Using Large Language Models to Mitigate Cognitive Bias

    Authors: Yu He Ke, Rui Yang, Sui An Lie, Taylor Xin Yi Lim, Hairil Rizal Abdullah, Daniel Shu Wei Ting, Nan Liu

    Abstract: Background: Cognitive biases in clinical decision-making significantly contribute to errors in diagnosis and suboptimal patient outcomes. Addressing these biases presents a formidable challenge in the medical field. Objective: This study explores the role of large language models (LLMs) in mitigating these biases through the utilization of a multi-agent framework. We simulate the clinical decisi… ▽ More

    Submitted 12 May, 2024; v1 submitted 25 January, 2024; originally announced January 2024.

    Comments: 21 pages, 3 figures

  4. arXiv:2311.17066  [pdf

    q-bio.QM cs.AI

    Cluster trajectory of SOFA score in predicting mortality in sepsis

    Authors: Yuhe Ke, Matilda Swee Sun Tang, Celestine Jia Ling Loh, Hairil Rizal Abdullah, Nicholas Brian Shannon

    Abstract: Objective: Sepsis is a life-threatening condition. Sequential Organ Failure Assessment (SOFA) score is commonly used to assess organ dysfunction and predict ICU mortality, but it is taken as a static measurement and fails to capture dynamic changes. This study aims to investigate the relationship between dynamic changes in SOFA scores over the first 72 hours of ICU admission and patient outcomes.… ▽ More

    Submitted 23 November, 2023; originally announced November 2023.

    Comments: 26 pages, 4 figures, 2 tables

  5. SynthEnsemble: A Fusion of CNN, Vision Transformer, and Hybrid Models for Multi-Label Chest X-Ray Classification

    Authors: S. M. Nabil Ashraf, Md. Adyelullahil Mamun, Hasnat Md. Abdullah, Md. Golam Rabiul Alam

    Abstract: Chest X-rays are widely used to diagnose thoracic diseases, but the lack of detailed information about these abnormalities makes it challenging to develop accurate automated diagnosis systems, which is crucial for early detection and effective treatment. To address this challenge, we employed deep learning techniques to identify patterns in chest X-rays that correspond to different diseases. We co… ▽ More

    Submitted 22 May, 2024; v1 submitted 13 November, 2023; originally announced November 2023.

    Comments: Published in International Conference on Computer and Information Technology (ICCIT) 2023

    ACM Class: I.4; I.5

    Journal ref: 2023 26th International Conference on Computer and Information Technology (ICCIT), Cox's Bazar, Bangladesh, 2023, pp. 1-6

  6. arXiv:2304.11046  [pdf

    cs.SD cs.AI cs.CL cs.HC cs.LG

    Affective social anthropomorphic intelligent system

    Authors: Md. Adyelullahil Mamun, Hasnat Md. Abdullah, Md. Golam Rabiul Alam, Muhammad Mehedi Hassan, Md. Zia Uddin

    Abstract: Human conversational styles are measured by the sense of humor, personality, and tone of voice. These characteristics have become essential for conversational intelligent virtual assistants. However, most of the state-of-the-art intelligent virtual assistants (IVAs) are failed to interpret the affective semantics of human voices. This research proposes an anthropomorphic intelligent system that ca… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

    Comments: Multimedia Tools and Applications (2023)

  7. arXiv:2303.17408  [pdf, other

    cs.CL

    P-Transformer: A Prompt-based Multimodal Transformer Architecture For Medical Tabular Data

    Authors: Yucheng Ruan, Xiang Lan, Daniel J. Tan, Hairil Rizal Abdullah, Mengling Feng

    Abstract: Medical tabular data, abundant in Electronic Health Records (EHRs), is a valuable resource for diverse medical tasks such as risk prediction. While deep learning approaches, particularly transformer-based models, have shown remarkable performance in tabular data prediction, there are still problems remained for existing work to be effectively adapted into medical domain, such as under-utilization… ▽ More

    Submitted 9 January, 2024; v1 submitted 30 March, 2023; originally announced March 2023.

  8. arXiv:2209.13523  [pdf, other

    cs.LG cs.CL cs.CR

    Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models

    Authors: Raphael Olivier, Hadi Abdullah, Bhiksha Raj

    Abstract: A targeted adversarial attack produces audio samples that can force an Automatic Speech Recognition (ASR) system to output attacker-chosen text. To exploit ASR models in real-world, black-box settings, an adversary can leverage the transferability property, i.e. that an adversarial sample produced for a proxy ASR can also fool a different remote ASR. However recent work has shown that transferabil… ▽ More

    Submitted 29 September, 2022; v1 submitted 17 September, 2022; originally announced September 2022.

  9. arXiv:2203.05408  [pdf, other

    cs.CR cs.AI cs.SD eess.AS

    Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems

    Authors: Hadi Abdullah, Aditya Karlekar, Saurabh Prasad, Muhammad Sajidur Rahman, Logan Blue, Luke A. Bauer, Vincent Bindschaedler, Patrick Traynor

    Abstract: Audio CAPTCHAs are supposed to provide a strong defense for online resources; however, advances in speech-to-text mechanisms have rendered these defenses ineffective. Audio CAPTCHAs cannot simply be abandoned, as they are specifically named by the W3C as important enablers of accessibility. Accordingly, demonstrably more robust audio CAPTCHAs are important to the future of a secure and accessible… ▽ More

    Submitted 10 March, 2022; originally announced March 2022.

  10. arXiv:2110.13250  [pdf, other

    cs.CR cs.SD eess.AS

    Beyond $L_p$ clip**: Equalization-based Psychoacoustic Attacks against ASRs

    Authors: Hadi Abdullah, Muhammad Sajidur Rahman, Christian Peeters, Cassidy Gibson, Washington Garcia, Vincent Bindschaedler, Thomas Shrimpton, Patrick Traynor

    Abstract: Automatic Speech Recognition (ASR) systems convert speech into text and can be placed into two broad categories: traditional and fully end-to-end. Both types have been shown to be vulnerable to adversarial audio examples that sound benign to the human ear but force the ASR to produce malicious transcriptions. Of these attacks, only the "psychoacoustic" attacks can create examples with relatively i… ▽ More

    Submitted 25 October, 2021; originally announced October 2021.

    Comments: accepted at ACML 2021

  11. AutoScore-Imbalance: An interpretable machine learning tool for development of clinical scores with rare events data

    Authors: Han Yuan, Feng Xie, Marcus Eng Hock Ong, Yilin Ning, Marcel Lucas Chee, Seyed Ehsan Saffari, Hairil Rizal Abdullah, Benjamin Alan Goldstein, Bibhas Chakraborty, Nan Liu

    Abstract: Background: Medical decision-making impacts both individual and public health. Clinical scores are commonly used among a wide variety of decision-making models for determining the degree of disease deterioration at the bedside. AutoScore was proposed as a useful clinical score generator based on machine learning and a generalized linear model. Its current framework, however, still leaves room for… ▽ More

    Submitted 13 July, 2021; originally announced July 2021.

  12. arXiv:2007.06622  [pdf, other

    cs.CR cs.LG cs.SD

    SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems

    Authors: Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, Patrick Traynor

    Abstract: Speech and speaker recognition systems are employed in a variety of applications, from personal assistants to telephony surveillance and biometric authentication. The wide deployment of these systems has been made possible by the improved accuracy in neural networks. Like other systems based on neural networks, recent research has demonstrated that speech and speaker recognition systems are vulner… ▽ More

    Submitted 21 July, 2020; v1 submitted 13 July, 2020; originally announced July 2020.

  13. arXiv:2004.02543  [pdf

    cs.CR cs.DC

    SmartCoAuth: Smart-Contract privacy preservation mechanism on querying sensitive records in the cloud

    Authors: Muhammed Siraj, Mohd. Izuan Hafez Hj. Ninggal, Nur Izura Udzir, Muhammad Daniel Hafiz Abdullah, Aziah Asmawi

    Abstract: Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. The Blockchain technology is a nascent and a promisin… ▽ More

    Submitted 6 April, 2020; originally announced April 2020.

  14. arXiv:1910.05262  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems

    Authors: Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor

    Abstract: Automatic speech recognition and voice identification systems are being deployed in a wide array of applications, from providing control mechanisms to devices lacking traditional interfaces, to the automatic transcription of conversations and authentication of users. Many of these applications have significant security and privacy considerations. We develop attacks that force mistranscription and… ▽ More

    Submitted 11 October, 2019; originally announced October 2019.

  15. arXiv:1904.05734  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

    Authors: Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson

    Abstract: Voice Processing Systems (VPSes), now widely deployed, have been made significantly more accurate through the application of recent advances in machine learning. However, adversarial machine learning has similarly advanced and has been used to demonstrate that VPSes are vulnerable to the injection of hidden commands - audio obscured by noise that is correctly recognized by a VPS but not by human b… ▽ More

    Submitted 18 March, 2019; originally announced April 2019.

    Journal ref: The Network and Distributed System Security Symposium (NDSS) 2019

  16. arXiv:1503.05493  [pdf

    cs.SE

    Testability Measurement Model for Object Oriented Design (TMMOOD)

    Authors: M. H. Khan Abdullah, Reena Srivastava

    Abstract: Measuring testability early in the development life cycle especially at design phase is a criterion of crucial importance to software designers, developers, quality controllers and practitioners. However, most of the mechanism available for testability measurement may be used in the later phases of development life cycle. Early estimation of testability, absolutely at design phase helps designers… ▽ More

    Submitted 18 March, 2015; originally announced March 2015.

    Comments: 10

    Journal ref: International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 1, February 2015

  17. arXiv:1411.7336  [pdf

    cs.CV cs.IR

    Edge direction matrixes-based local binar patterns descriptor for shape pattern recognition

    Authors: Mohammed A. Talab, Siti Norul Huda Sheikh Abdullah, Bilal Bataineh

    Abstract: Shapes and texture image recognition usage is an essential branch of pattern recognition. It is made up of techniques that aim at extracting information from images via human knowledge and works. Local Binary Pattern (LBP) ensures encoding global and local information and scaling invariance by introducing a look-up table to reflect the uniformity structure of an object. However, edge direction mat… ▽ More

    Submitted 26 November, 2014; originally announced November 2014.

  18. arXiv:1410.4603  [pdf

    cs.GR

    Efficient Distance Computation Algorithm between Nearly Intersected Objects Using Dynamic Pivot Point in Virtual Environment Application

    Authors: Hamzah Asyrani Sulaiman, Abdullah Bade, Mohd Harun Abdullah

    Abstract: Finding nearly accurate distance between two or more nearly intersecting three-dimensional (3D) objects is vital especially for collision determination such as in virtual surgeon simulation and real-time car crash simulation. Instead of performing broad phase collision detection, we need to check for accuracy of detection by running narrow phase collision detection. One of the important elements f… ▽ More

    Submitted 16 October, 2014; originally announced October 2014.

    Comments: 6 pages

  19. arXiv:1211.5221  [pdf, ps, other

    cs.NI

    Traffic Engineering Based on Effective Envelope Algorithm on Novel Resource Reservation Method over Mobile Internet Protocol Version 6

    Authors: Reza Malekian, Abdul Hanan Abdullah

    Abstract: The first decade of the 21st century has seen tremendous improvements in mobile internet and its technologies. The high traffic volume of services such as video conference and other real-time traffic applications are imposing a great challenge on networks. In the meantime, demand for the use of mobile devices in computation and communication such as smart phones, personal digital assistants, and m… ▽ More

    Submitted 22 November, 2012; originally announced November 2012.

    Comments: International Journal of Innovative Computing, Information and Control, 2012

    MSC Class: 68U35

  20. arXiv:1209.6337  [pdf, ps, other

    cs.CR

    Cryptanalysis and Improvements on Some Graph-based Authentication Schemes

    Authors: Mohammad Eftekhari, Herish Abdullah

    Abstract: In 2010, Grigoriev and Shpilrain, introduced some graph-based authentication schemes. We present a cryptanalysis of some of these protocols, and introduce some new schemes to fix the problems.

    Submitted 27 September, 2012; originally announced September 2012.

    Journal ref: cryptanalysis and improvements on some graph-based authentication schemes (2012) 7

  21. arXiv:1005.0925  [pdf

    cs.DC

    Improving Overhead Computation and pre-processing Time for Grid Scheduling System

    Authors: Asgarali Bouyer, Mohammad Javad hoseyni, Abdul Hanan Abdullah

    Abstract: Computational Grid is enormous environments with heterogeneous resources and stable infrastructures among other Internet-based computing systems. However, the managing of resources in such systems has its special problems. Scheduler systems need to get last information about participant nodes from information centers for the purpose of firmly job scheduling. In this paper, we focus on online updat… ▽ More

    Submitted 6 May, 2010; originally announced May 2010.

    Comments: IEEE Publication format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 8 No. 1, April 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/