Skip to main content

Showing 1–50 of 54 results for author: Ahmed, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.03404  [pdf, other

    cs.LG cs.AI cs.CR

    ST-DPGAN: A Privacy-preserving Framework for Spatiotemporal Data Generation

    Authors: Wei Shao, Rongyi Zhu, Cai Yang, Chandra Thapa, Muhammad Ejaz Ahmed, Seyit Camtepe, Rui Zhang, DuYong Kim, Hamid Menouar, Flora D. Salim

    Abstract: Spatiotemporal data is prevalent in a wide range of edge devices, such as those used in personal communication and financial transactions. Recent advancements have sparked a growing interest in integrating spatiotemporal analysis with large-scale language models. However, spatiotemporal data often contains sensitive information, making it unsuitable for open third-party access. To address this cha… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  2. Malicious Package Detection using Metadata Information

    Authors: S. Halder, M. Bewong, A. Mahboubi, Y. Jiang, R. Islam, Z. Islam, R. Ip, E. Ahmed, G. Ramachandran, A. Babar

    Abstract: Protecting software supply chains from malicious packages is paramount in the evolving landscape of software development. Attacks on the software supply chain involve attackers injecting harmful software into commonly used packages or libraries in a software repository. For instance, JavaScript uses Node Package Manager (NPM), and Python uses Python Package Index (PyPi) as their respective package… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

  3. arXiv:2311.07033  [pdf, other

    eess.IV cs.CV

    TTMFN: Two-stream Transformer-based Multimodal Fusion Network for Survival Prediction

    Authors: Ruiquan Ge, Xiangyang Hu, Rungen Huang, Gangyong Jia, Yaqi Wang, Renshu Gu, Changmiao Wang, Elazab Ahmed, Linyan Wang, Juan Ye, Ye Li

    Abstract: Survival prediction plays a crucial role in assisting clinicians with the development of cancer treatment protocols. Recent evidence shows that multimodal data can help in the diagnosis of cancer disease and improve survival prediction. Currently, deep learning-based approaches have experienced increasing success in survival prediction by integrating pathological images and gene expression data. H… ▽ More

    Submitted 12 November, 2023; originally announced November 2023.

  4. arXiv:2311.06483  [pdf, other

    cs.LG math.NA

    Stacked networks improve physics-informed training: applications to neural networks and deep operator networks

    Authors: Amanda A Howard, Sarah H Murphy, Shady E Ahmed, Panos Stinis

    Abstract: Physics-informed neural networks and operator networks have shown promise for effectively solving equations modeling physical systems. However, these networks can be difficult or impossible to train accurately for some systems of equations. We present a novel multifidelity framework for stacking physics-informed neural networks and operator networks that facilitates training. We successively build… ▽ More

    Submitted 20 November, 2023; v1 submitted 11 November, 2023; originally announced November 2023.

  5. arXiv:2308.04115  [pdf, other

    cs.CR cs.SE

    model-based script synthesis for fuzzing

    Authors: Zian Liu, Chao Chen, Muhammad Ejaz Ahmed, Jun Zhang, Dongxi Liu

    Abstract: Kernel fuzzing is important for finding critical kernel vulnerabilities. Close-source (e.g., Windows) operating system kernel fuzzing is even more challenging due to the lack of source code. Existing approaches fuzz the kernel by modeling syscall sequences from traces or static analysis of system codes. However, a common limitation is that they do not learn and mutate the syscall sequences to reac… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

    Comments: 12 pages, conference paper

  6. arXiv:2308.01463  [pdf, other

    cs.CR

    SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs

    Authors: Zian Liu, Zhi Zhang, Siqi Ma, Dongxi Liu, Jun Zhang, Chao Chen, Shigang Liu, Muhammad Ejaz Ahmed, Yang Xiang

    Abstract: Binary similarity detection is a critical technique that has been applied in many real-world scenarios where source code is not available, e.g., bug search, malware analysis, and code plagiarism detection. Existing works are ineffective in detecting similar binaries in cases where different compiling optimizations, compilers, source code versions, or obfuscation are deployed. We observe that all… ▽ More

    Submitted 2 August, 2023; originally announced August 2023.

    Comments: 12 pages, conference paper

  7. arXiv:2308.00288  [pdf, other

    cs.CR

    VulMatch: Binary-level Vulnerability Detection Through Signature

    Authors: Zian Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Shigang Liu, Jun Zhang, Dongxi Liu

    Abstract: Similar vulnerability repeats in real-world software products because of code reuse, especially in wildly reused third-party code and libraries. Detecting repeating vulnerabilities like 1-day and N-day vulnerabilities is an important cyber security task. Unfortunately, the state-of-the-art methods suffer from poor performance because they detect patch existence instead of vulnerability existence a… ▽ More

    Submitted 17 January, 2024; v1 submitted 1 August, 2023; originally announced August 2023.

    Comments: 15 pages IEEE journal template

  8. arXiv:2306.09637  [pdf, other

    cs.NI cs.AI

    DeepMPR: Enhancing Opportunistic Routing in Wireless Networks through Multi-Agent Deep Reinforcement Learning

    Authors: Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Deokseong Kim, Jae Kim, Carrie Spiker, Blake Harnden

    Abstract: Opportunistic routing relies on the broadcast capability of wireless networks. It brings higher reliability and robustness in highly dynamic and/or severe environments such as mobile or vehicular ad-hoc networks (MANETs/VANETs). To reduce the cost of broadcast, multicast routing schemes use the connected dominating set (CDS) or multi-point relaying (MPR) set to decrease the network overhead and he… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

  9. arXiv:2306.09286  [pdf

    cs.NI eess.SP

    Open Source-based Over-The-Air 5G New Radio Sidelink Testbed

    Authors: Melissa Elkadi, Doekseong Kim, Ejaz Ahmed, Moein Sadeghi, Anh Le, Paul Russell, Bo Ryu

    Abstract: The focus of this paper is to demonstrate an over-the-air (OTA) 5G new radio (NR) sidelink communication prototype. 5G NR sidelink communications allow NR UEs to transfer data independently without the assistance of a base station (gNB), which enables V2X communications, including platooning, autonomous driving, sensor extension, industrial IoT, public safety communication and much more. Our desig… ▽ More

    Submitted 6 October, 2023; v1 submitted 15 June, 2023; originally announced June 2023.

    Comments: 8 pages, 13 figures, Accepted for MILCOM 2023

  10. arXiv:2306.07946  [pdf, other

    cs.SI cs.AI cs.IR

    STUDY: Socially Aware Temporally Causal Decoder Recommender Systems

    Authors: Eltayeb Ahmed, Diana Mincu, Lauren Harrell, Katherine Heller, Subhrajit Roy

    Abstract: Recommender systems are widely used to help people find items that are tailored to their interests. These interests are often influenced by social networks, making it important to use social network information effectively in recommender systems. This is especially true for demographic groups with interests that differ from the majority. This paper introduces STUDY, a Socially-aware Temporally caU… ▽ More

    Submitted 5 September, 2023; v1 submitted 2 June, 2023; originally announced June 2023.

    Comments: 15 pages, 5 figures

  11. arXiv:2304.08885  [pdf

    cs.RO cs.HC

    Socially Assistive Robots as Decision Makers in the Wild: Insights from a Participatory Design Workshop

    Authors: Eshtiak Ahmed, Laura Cosio, Juho Hamari, Oğuz 'Oz' Buruk

    Abstract: Socially Assistive Robots (SARs) are becoming very popular every day because of their effectiveness in handling social situations. However, social robots are perceived as intelligent, and thus their decision-making process might have a significant effect on how they are perceived and how effective they are. In this paper, we present the findings from a participatory design study consisting of 5 de… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

    Comments: CHI Workshop on Socially Assistive Robots as Decision Makers: Transparency, Motivations, and Intentions

    Report number: SARTMI/2023/13

  12. arXiv:2303.08893  [pdf, other

    physics.comp-ph cs.LG math.NA physics.flu-dyn

    A Multifidelity deep operator network approach to closure for multiscale systems

    Authors: Shady E. Ahmed, Panos Stinis

    Abstract: Projection-based reduced order models (PROMs) have shown promise in representing the behavior of multiscale systems using a small set of generalized (or latent) variables. Despite their success, PROMs can be susceptible to inaccuracies, even instabilities, due to the improper accounting of the interaction between the resolved and unresolved scales of the multiscale system (known as the closure pro… ▽ More

    Submitted 1 June, 2023; v1 submitted 15 March, 2023; originally announced March 2023.

    Comments: 24 pages, 21 figures

    Report number: PNNL-SA-182879

  13. Beamforming and Device Selection Design in Federated Learning with Over-the-air Aggregation

    Authors: Faeze Moradi Kalarde, Min Dong, Ben Liang, Yahia A. Eldemerdash Ahmed, Ho Ting Cheng

    Abstract: Federated learning (FL) with over-the-air computation can efficiently utilize the communication bandwidth but is susceptible to analog aggregation error. Excluding those devices with weak channel conditions can reduce the aggregation error, but it also limits the amount of local training data for FL, which can reduce the training convergence rate. In this work, we jointly design uplink receiver be… ▽ More

    Submitted 6 March, 2024; v1 submitted 28 February, 2023; originally announced February 2023.

    Comments: 12 pages, 8 figures

  14. arXiv:2301.08336  [pdf, other

    cs.MS

    PyOED: An Extensible Suite for Data Assimilation and Model-Constrained Optimal Design of Experiments

    Authors: Abhijit Chowdhary, Shady E. Ahmed, Ahmed Attia

    Abstract: This paper describes PyOED, a highly extensible scientific package that enables develo** and testing model-constrained optimal experimental design (OED) for inverse problems. Specifically, PyOED aims to be a comprehensive Python toolkit for model-constrained OED. The package targets scientists and researchers interested in understanding the details of OED formulations and approaches. It is also… ▽ More

    Submitted 19 December, 2023; v1 submitted 19 January, 2023; originally announced January 2023.

    Comments: 22 pages, 8 figures

    MSC Class: 68Vxx

  15. arXiv:2208.12449  [pdf, other

    cs.CR cs.CY

    Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns

    Authors: Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal

    Abstract: The daily deluge of alerts is a sombre reality for Security Operations Centre (SOC) personnel worldwide. They are at the forefront of an organisation's cybersecurity infrastructure, and face the unenviable task of prioritising threats amongst a flood of abstruse alerts triggered by their Security Information and Event Management (SIEM) systems. URLs found within malicious communications form the b… ▽ More

    Submitted 26 August, 2022; originally announced August 2022.

    Comments: arXiv admin note: text overlap with arXiv:2108.12726

  16. arXiv:2205.12419  [pdf, other

    physics.flu-dyn cs.LG nlin.PS

    Physics Guided Machine Learning for Variational Multiscale Reduced Order Modeling

    Authors: Shady E. Ahmed, Omer San, Adil Rasheed, Traian Iliescu, Alessandro Veneziani

    Abstract: We propose a new physics guided machine learning (PGML) paradigm that leverages the variational multiscale (VMS) framework and available data to dramatically increase the accuracy of reduced order models (ROMs) at a modest computational cost. The hierarchical structure of the ROM basis and the VMS framework enable a natural separation of the resolved and unresolved ROM spatial scales. Modern PGML… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

  17. arXiv:2204.03214  [pdf, other

    cs.CR cs.AI cs.LG

    Transformer-Based Language Models for Software Vulnerability Detection

    Authors: Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk, Surya Nepal

    Abstract: The large transformer-based language models demonstrate excellent performance in natural language processing. By considering the transferability of the knowledge gained by these models in one domain to other related domains, and the closeness of natural languages to high-level programming languages, such as C/C++, this work studies how to leverage (large) transformer-based language models in detec… ▽ More

    Submitted 5 September, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: 16 pages

  18. arXiv:2204.00985  [pdf, other

    cs.CR cs.LG

    Towards Web Phishing Detection Limitations and Mitigation

    Authors: Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal

    Abstract: Web phishing remains a serious cyber threat responsible for most data breaches. Machine Learning (ML)-based anti-phishing detectors are seen as an effective countermeasure, and are increasingly adopted by web-browsers and software products. However, with an average of 10K phishing links reported per hour to platforms such as PhishTank and VirusTotal (VT), the deficiencies of such ML-based solution… ▽ More

    Submitted 3 April, 2022; originally announced April 2022.

    Comments: 12 pages

  19. arXiv:2111.15013  [pdf, other

    cs.NI cs.AI cs.LG

    DeepCQ+: Robust and Scalable Routing with Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks

    Authors: Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Kevin Larson, Anh Le, Alex Yahja, Jae H. Kim

    Abstract: Highly dynamic mobile ad-hoc networks (MANETs) remain as one of the most challenging environments to develop and deploy robust, efficient, and scalable routing protocols. In this paper, we present DeepCQ+ routing protocol which, in a novel manner integrates emerging multi-agent deep reinforcement learning (MADRL) techniques into existing Q-learning-based routing protocols and their variants and ac… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2101.03273

  20. arXiv:2111.08217  [pdf, other

    cs.CR

    NatiDroid: Cross-Language Android Permission Specification

    Authors: Chaoran Li, Xiao Chen, Ruoxi Sun, Jason Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang

    Abstract: The Android system manages access to sensitive APIs by permission enforcement. An application (app) must declare proper permissions before invoking specific Android APIs. However, there is no official documentation providing the complete list of permission-protected APIs and the corresponding permissions to date. Researchers have spent significant efforts extracting such API protection map** fro… ▽ More

    Submitted 15 November, 2021; originally announced November 2021.

  21. arXiv:2110.08295  [pdf, other

    physics.flu-dyn cs.LG math.DS

    Nonlinear proper orthogonal decomposition for convection-dominated flows

    Authors: Shady E. Ahmed, Omer San, Adil Rasheed, Traian Iliescu

    Abstract: Autoencoder techniques find increasingly common use in reduced order modeling as a means to create a latent space. This reduced order representation offers a modular data-driven modeling approach for nonlinear dynamical systems when integrated with a time series predictive model. In this letter, we put forth a nonlinear proper orthogonal decomposition (POD) framework, which is an end-to-end Galerk… ▽ More

    Submitted 5 November, 2021; v1 submitted 15 October, 2021; originally announced October 2021.

  22. arXiv:2109.12952  [pdf, other

    cs.NI cs.PF

    A Tutorial on Trace-based Simulations of Mobile Ad-hoc Networks on the Example of Aeronautical Communications

    Authors: Musab Ahmed Eltayeb Ahmed, Konrad Fuger, Sebastian Lindner, Fatema Khan, Andreas Timm-Giel

    Abstract: The OMNeT++ simulator is well-suited for the simulation of randomized user behavior in communication networks. However, there are scenarios, where such a random model is unsuited to evaluate a communication system, and this paper attempts to highlight such a case. Using this example of ad-hoc communication between aircraft mid-flight, a tutorial-style description is attempted that shall show how t… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

    Comments: Published in: M. Marek, G. Nardini, V. Vesely (Eds.), Proceedings of the 8th OMNeT++ Community Summit, Virtual Summit, September 8-10, 2021

    Report number: OMNET/2021/04

  23. arXiv:2108.12726  [pdf, other

    cs.CR cs.CY cs.LG cs.NI

    Characterizing Malicious URL Campaigns

    Authors: Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal

    Abstract: URLs are central to a myriad of cyber-security threats, from phishing to the distribution of malware. Their inherent ease of use and familiarity is continuously abused by attackers to evade defences and deceive end-users. Seemingly dissimilar URLs are being used in an organized way to perform phishing attacks and distribute malware. We refer to such behaviours as campaigns, with the hypothesis bei… ▽ More

    Submitted 28 August, 2021; originally announced August 2021.

  24. arXiv:2108.06862  [pdf

    cs.LG cs.CR

    Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling

    Authors: Md Imran Hossen, Ashraful Islam, Farzana Anowar, Eshtiak Ahmed, Mohammad Masudur Rahman, Xiali, Hei

    Abstract: Due to the variety of cyber-attacks or threats, the cybersecurity community enhances the traditional security control mechanisms to an advanced level so that automated tools can encounter potential security threats. Very recently, Cyber Threat Intelligence (CTI) has been presented as one of the proactive and robust mechanisms because of its automated cybersecurity threat prediction. Generally, CTI… ▽ More

    Submitted 14 November, 2022; v1 submitted 15 August, 2021; originally announced August 2021.

  25. arXiv:2104.08492  [pdf, other

    cs.AI cs.LG

    A Self-Supervised Auxiliary Loss for Deep RL in Partially Observable Settings

    Authors: Eltayeb Ahmed, Luisa Zintgraf, Christian A. Schroeder de Witt, Nicolas Usunier

    Abstract: In this work we explore an auxiliary loss useful for reinforcement learning in environments where strong performing agents are required to be able to navigate a spatial environment. The auxiliary loss proposed is to minimize the classification error of a neural network classifier that predicts whether or not a pair of states sampled from the agents current episode trajectory are in order. The clas… ▽ More

    Submitted 17 April, 2021; originally announced April 2021.

  26. arXiv:2103.11547  [pdf, other

    cs.DL cs.SI econ.GN physics.soc-ph

    Grand challenges and emergent modes of convergence science

    Authors: Alexander M. Petersen, Mohammed E. Ahmed, Ioannis Pavlidis

    Abstract: To address complex problems, scholars are increasingly faced with challenges of integrating diverse knowledge domains. We analyzed the evolution of this convergence paradigm in the broad ecosystem of brain science, which provides a real-time testbed for evaluating two modes of cross-domain integration - subject area exploration via expansive learning and cross-disciplinary collaboration among doma… ▽ More

    Submitted 21 March, 2021; originally announced March 2021.

    Comments: 15 pages, 5 figures; Supplementary Information: 25 pages, 12 Figures and 5 Tables

    Journal ref: Humanities and Social Sciences Communications, 8, 194 (2021)

  27. arXiv:2102.10336  [pdf, other

    cs.AI cs.LG

    Physical Reasoning Using Dynamics-Aware Models

    Authors: Eltayeb Ahmed, Anton Bakhtin, Laurens van der Maaten, Rohit Girdhar

    Abstract: A common approach to solving physical reasoning tasks is to train a value learner on example tasks. A limitation of such an approach is that it requires learning about object dynamics solely from reward values assigned to the final state of a rollout of the environment. This study aims to address this limitation by augmenting the reward value with self-supervised signals about object dynamics. Spe… ▽ More

    Submitted 1 September, 2021; v1 submitted 20 February, 2021; originally announced February 2021.

    Comments: ICML 2021 Workshop on Self-Supervised Learning for Reasoning and Perception; Webpage/Code: https://facebookresearch.github.io/DynamicsAware

  28. arXiv:2101.12434  [pdf, ps, other

    cs.CR

    Peeler: Profiling Kernel-Level Events to Detect Ransomware

    Authors: Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal

    Abstract: Ransomware is a growing threat that typically operates by either encrypting a victim's files or locking a victim's computer until the victim pays a ransom. However, it is still challenging to detect such malware timely with existing traditional malware detection techniques. In this paper, we present a novel ransomware detection system, called "Peeler" (Profiling kErnEl -Level Events to detect Rans… ▽ More

    Submitted 29 January, 2021; originally announced January 2021.

    Comments: 15 pages, 10 figures

  29. arXiv:2101.03273  [pdf, other

    cs.NI cs.AI cs.LG cs.MA

    Robust and Scalable Routing with Multi-Agent Deep Reinforcement Learning for MANETs

    Authors: Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Kevin A. Larson, Anh Le, Alex Yahja, Jae H. Kim

    Abstract: Highly dynamic mobile ad-hoc networks (MANETs) are continuing to serve as one of the most challenging environments to develop and deploy robust, efficient, and scalable routing protocols. In this paper, we present DeepCQ+ routing which, in a novel manner, integrates emerging multi-agent deep reinforcement learning (MADRL) techniques into existing Q-learning-based routing protocols and their varian… ▽ More

    Submitted 28 March, 2021; v1 submitted 8 January, 2021; originally announced January 2021.

    Comments: 14 pages, 8 figures

  30. arXiv:2010.03735  [pdf, other

    cs.CV

    Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks

    Authors: Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Hyoungshick Kim, Surya Nepal

    Abstract: As an essential processing step in computer vision applications, image resizing or scaling, more specifically downsampling, has to be applied before feeding a normally large image into a convolutional neural network (CNN) model because CNN models typically take small fixed-size images as inputs. However, image scaling functions could be adversarially abused to perform a newly revealed attack calle… ▽ More

    Submitted 7 October, 2020; originally announced October 2020.

  31. arXiv:2008.03157  [pdf, other

    physics.comp-ph cs.LG

    A nudged hybrid analysis and modeling approach for realtime wake-vortex transport and decay prediction

    Authors: Shady Ahmed, Suraj Pawar, Omer San, Adil Rasheed, Mandar Tabib

    Abstract: We put forth a long short-term memory (LSTM) nudging framework for the enhancement of reduced order models (ROMs) of fluid flows utilizing noisy measurements for air traffic improvements. Toward emerging applications of digital twins in aviation, the proposed approach allows for constructing a realtime predictive tool for wake-vortex transport and decay systems. We build on the fact that in realis… ▽ More

    Submitted 5 March, 2021; v1 submitted 5 August, 2020; originally announced August 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2005.14246

  32. arXiv:2006.10112  [pdf, other

    physics.comp-ph cs.LG physics.flu-dyn

    Interface learning of multiphysics and multiscale systems

    Authors: Shady E. Ahmed, Omer San, Kursat Kara, Rami Younis, Adil Rasheed

    Abstract: Complex natural or engineered systems comprise multiple characteristic scales, multiple spatiotemporal domains, and even multiple physical closure laws. To address such challenges, we introduce an interface learning paradigm and put forth a data-driven closure approach based on memory embedding to provide physically correct boundary conditions at the interface. To enable the interface learning for… ▽ More

    Submitted 31 October, 2020; v1 submitted 17 June, 2020; originally announced June 2020.

    Journal ref: Phys. Rev. E 102, 053304 (2020)

  33. arXiv:2006.00804  [pdf, other

    cs.SI cs.CL cs.IR

    COVID-19: Social Media Sentiment Analysis on Reopening

    Authors: Mohammed Emtiaz Ahmed, Md Rafiqul Islam Rabin, Farah Naz Chowdhury

    Abstract: The novel coronavirus (COVID-19) pandemic is the most talked topic in social media platforms in 2020. People are using social media such as Twitter to express their opinion and share information on a number of issues related to the COVID-19 in this stay at home order. In this paper, we investigate the sentiment and emotion of peoples in the United States on the subject of reopening. We choose the… ▽ More

    Submitted 1 June, 2020; originally announced June 2020.

    Comments: 8 pages, 4 figures, 1 table

  34. arXiv:1910.00785  [pdf, other

    cs.NI eess.SP

    Energy Harvesting in 5G Networks: Taxonomy, Requirements, Challenges, and Future Directions

    Authors: Muhammad Imran, Latif U. Khan, Ibrar Yaqoob, Ejaz Ahmed, Muhammad Ahsan Qureshi, Arif Ahmed

    Abstract: Consciousness of energy saving is increasing in fifth-generation (5G) wireless networks due to the high energy consumption issue. Energy harvesting technology is a possible appealing solution for ultimately prolonging the lifetime of devices and networks. Although considerable research efforts have been conducted in the context of using energy harvesting technology in 5G wireless networks, these e… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

  35. arXiv:1808.01462  [pdf, other

    cs.CV

    A survey on Deep Learning Advances on Different 3D Data Representations

    Authors: Eman Ahmed, Alexandre Saint, Abd El Rahman Shabayek, Kseniya Cherenkova, Rig Das, Gleb Gusev, Djamila Aouada, Bjorn Ottersten

    Abstract: 3D data is a valuable asset the computer vision filed as it provides rich information about the full geometry of sensed objects and scenes. Recently, with the availability of both large 3D datasets and computational power, it is today possible to consider applying deep learning to learn specific tasks on 3D data such as segmentation, recognition and correspondence. Depending on the considered 3D d… ▽ More

    Submitted 6 April, 2019; v1 submitted 4 August, 2018; originally announced August 2018.

    Comments: 35 pages

  36. arXiv:1803.09193  [pdf, ps, other

    cs.IT

    Optimal Spectrum Sensing Policy with Traffic Classification in RF-Powered CRNs

    Authors: Hae Sol Lee, Muhammad Ejaz Ahmed, Dong In Kim

    Abstract: An orthogonal frequency division multiple access (OFDMA)-based primary user (PU) network is considered, which provides different spectral access/energy harvesting opportunities in RF-powered cognitive radio networks (CRNs). In this scenario, we propose an optimal spectrum sensing policy for opportunistic spectrum access/energy harvesting under both the PU collision and energy causality constraints… ▽ More

    Submitted 6 April, 2018; v1 submitted 24 March, 2018; originally announced March 2018.

    Comments: 14 pages, 12 figures

  37. arXiv:1609.08399  [pdf, other

    cs.CV

    House price estimation from visual and textual features

    Authors: Eman Ahmed, Mohamed Moustafa

    Abstract: Most existing automatic house price estimation systems rely only on some textual data like its neighborhood area and the number of rooms. The final price is estimated by a human agent who visits the house and assesses it visually. In this paper, we propose extracting visual features from house photographs and combining them with the house's textual information. The combined features are fed to a f… ▽ More

    Submitted 27 September, 2016; originally announced September 2016.

    Comments: NCTA 2016. Final paper is on SCITEPRESS digital library

  38. Adaptive Beaconing Approaches for Vehicular ad hoc Networks: A Survey

    Authors: Syed Adeel Ali Shah, Ejaz Ahmed, Feng Xia, Ahmad Karim, Muhammad Shiraz, Rafidah MD Noor

    Abstract: Vehicular communication requires vehicles to self-organize through the exchange of periodic beacons. Recent analysis on beaconing indicates that the standards for beaconing restrict the desired performance of vehicular applications. This situation can be attributed to the quality of the available transmission medium, persistent change in the traffic situation and the inability of standards to cope… ▽ More

    Submitted 24 May, 2016; originally announced May 2016.

  39. All-Digital Self-interference Cancellation Technique for Full-duplex Systems

    Authors: Elsayed Ahmed, Ahmed M. Eltawil

    Abstract: Full-duplex systems are expected to double the spectral efficiency compared to conventional half-duplex systems if the self-interference signal can be significantly mitigated. Digital cancellation is one of the lowest complexity self-interference cancellation techniques in full-duplex systems. However, its mitigation capability is very limited, mainly due to transmitter and receiver circuit's impa… ▽ More

    Submitted 20 June, 2014; originally announced June 2014.

    Comments: Submitted to IEEE Transactions on Wireless Communications

  40. arXiv:1405.7720  [pdf, other

    cs.IT

    Full-Duplex Systems Using Multi-Reconfigurable Antennas

    Authors: Elsayed Ahmed, Ahmed M. Eltawil, Zhouyuan Li, Bedri A. Cetiner

    Abstract: Full-duplex systems are expected to achieve 100% rate improvement over half-duplex systems if the self-interference signal can be significantly mitigated. In this paper, we propose the first full-duplex system utilizing Multi-Reconfigurable Antenna (MRA) with ?90% rate improvement compared to half-duplex systems. MRA is a dynamically reconfigurable antenna structure, that is capable of changing it… ▽ More

    Submitted 29 May, 2014; originally announced May 2014.

    Comments: Submitted to IEEE Transactions on Wireless Communications

  41. On Phase Noise Suppression in Full-Duplex Systems

    Authors: Elsayed Ahmed, Ahmed M. Eltawil

    Abstract: Oscillator phase noise has been shown to be one of the main performance limiting factors in full-duplex systems. In this paper, we consider the problem of self-interference cancellation with phase noise suppression in full-duplex systems. The feasibility of performing phase noise suppression in full-duplex systems in terms of both complexity and achieved gain is analytically and experimentally inv… ▽ More

    Submitted 6 November, 2014; v1 submitted 24 January, 2014; originally announced January 2014.

    Comments: Published in IEEE transactions on wireless communications on October-2014. Please refer to the IEEE version for the most updated document

  42. Self-Interference Cancellation with Phase Noise Induced ICI Suppression for Full-Duplex Systems

    Authors: Elsayed Ahmed, Ahmed M. Eltawil, Ashutosh Sabharwal

    Abstract: One of the main bottlenecks in practical full-duplex systems is the oscillator phase noise, which bounds the possible cancellable self-interference power. In this paper, a digitaldomain self-interference cancellation scheme for full-duplex orthogonal frequency division multiplexing systems is proposed. The proposed scheme increases the amount of cancellable selfinterference power by suppressing th… ▽ More

    Submitted 15 July, 2013; originally announced July 2013.

    Comments: To be presented in Global Telecommunications Conference (GLOBECOM 2013). arXiv admin note: text overlap with arXiv:1307.3796

  43. Self-Interference Cancellation with Nonlinear Distortion Suppression for Full-Duplex Systems

    Authors: Elsayed Ahmed, Ahmed M. Eltawil, Ashutosh Sabharwal

    Abstract: In full-duplex systems, due to the strong self-interference signal, system nonlinearities become a significant limiting factor that bounds the possible cancellable self-interference power. In this paper, a self-interference cancellation scheme for full-duplex orthogonal frequency division multiplexing systems is proposed. The proposed scheme increases the amount of cancellable self-interference po… ▽ More

    Submitted 23 September, 2013; v1 submitted 14 July, 2013; originally announced July 2013.

    Comments: To be presented in Asilomar Conference on Signals, Systems & Computers (November 2013)

  44. Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges

    Authors: Saeid Abolfazli, Zohreh Sanaei, Ejaz Ahmed, Abdullah Gani, Rajkumar Buyya

    Abstract: Recently, Cloud-based Mobile Augmentation (CMA) approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented mobile devices envision to perform extensive c… ▽ More

    Submitted 20 June, 2013; originally announced June 2013.

    Comments: Accepted for Publication in IEEE Communications Surveys & Tutorials

    Journal ref: IEEE Communications Surveys & Tutorials (2013) 1-32

  45. Rate Gain Region and Design Tradeoffs for Full-Duplex Wireless Communications

    Authors: Elsayed Ahmed, Ahmed Eltawil, Ashutosh Sabharwal

    Abstract: In this paper, we analytically study the regime in which practical full-duplex systems can achieve larger rates than an equivalent half-duplex systems. The key challenge in practical full-duplex systems is uncancelled self-interference signal, which is caused by a combination of hardware and implementation imperfections. Thus, we first present a signal model which captures the effect of significan… ▽ More

    Submitted 24 January, 2014; v1 submitted 7 March, 2013; originally announced March 2013.

    Comments: Accepted on 09-May-2013 for publications at IEEE Transactions on Wireless Communications (check the IEEE website for the final published version)

    Journal ref: Wireless Communications, IEEE Transactions on , vol.12, no.7, pp.3556,3565, July 2013

  46. arXiv:1208.4528  [pdf, ps, other

    cs.GT

    On Dynamical Cournot Game on a Graph

    Authors: E. Ahmed, M. I. Shehata, H. A. A. El-Saka

    Abstract: Cournot dynamical game is studied on a graph. The stability of the system is studied. Prisoner's dilemma game is used to model natural gas transmission.

    Submitted 13 July, 2012; originally announced August 2012.

  47. arXiv:1203.3589  [pdf

    cs.DB cs.IR

    Building MultiView Analyst Profile From Multidimensional Query Logs: From Consensual to Conflicting Preferences

    Authors: Eya Ben Ahmed, Ahlem Nabli, Faïez Gargouri

    Abstract: In order to provide suitable results to the analyst needs, user preferences summarization is widely used in several domains. In this paper, we introduce a new approach for user profile construction from OLAP query logs. The key idea is to learn the user's preferences by drawing the evidence from OLAP logs. In fact, the analyst preferences are clustered into three main pools : (i) consensual or non… ▽ More

    Submitted 15 March, 2012; originally announced March 2012.

    Comments: 8 pages

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, January 2012 ISSN (Online): 1694-0814 www.IJCSI.org

  48. arXiv:1112.5957   

    cs.DB

    Usage Des Mesures Pour La Génération Des Règles d'Associations Cycliques

    Authors: Eya Ben Ahmed, Ahlem Nabli, Faïez Gargouri

    Abstract: The online analytical processing (OLAP) does not provide any explanation of correlations discovered between data. Thus, the coupling of OLAP and data mining, especially association rules, is considered as an efficient solution to this problem. In this context, we mainly focus on a particular class of association rules which is the cyclic association rules. These rules aimed to discover patterns th… ▽ More

    Submitted 9 September, 2012; v1 submitted 27 December, 2011; originally announced December 2011.

    Comments: 18 pages, 3 figures; 7 ème journées Francophones sur les Entrepôts de données et l'Analyse en ligne (EDA'2011)

  49. arXiv:1107.1779  [pdf

    cs.DB

    A Survey of User-Centric Data Warehouses: From Personalization to Recommendation

    Authors: Eya Ben Ahmed, Ahlem Nabli, Faïez Gargouri

    Abstract: Providing a customized support for the OLAP brings tremendous challenges to the OLAP technology. Standing at the crossroads of the preferences and the data warehouse, two emerging trends are pointed out; namely: (i) the personalization and (ii) the recommendation. Although the panoply of the proposed approaches, the user-centric data warehouse community issues have not been addressed yet. In this… ▽ More

    Submitted 9 July, 2011; originally announced July 2011.

    Comments: 13 pages, 3 figures, 1 table

    Journal ref: The International Journal of Database Management Systems (IJDMS), May 2011, Volume 3, Number 2

  50. arXiv:1009.5149  [pdf, ps, other

    cs.DB

    Towards an incremental maintenance of cyclic association rules

    Authors: Eya ben Ahmed, Mohamed Salah Gouider

    Abstract: Recently, the cyclic association rules have been introduced in order to discover rules from items characterized by their regular variation over time. In real life situations, temporal databases are often appended or updated. Rescanning the whole database every time is highly expensive while existing incremental mining techniques can efficiently solve such a problem. In this paper, we propose an in… ▽ More

    Submitted 26 September, 2010; originally announced September 2010.

    Report number: November 2010, Volume 2, Number 4

    Journal ref: International Journal of Database Management Systems (IJDMS), November 2010, Volume 2, Number 4