Skip to main content

Showing 1–5 of 5 results for author: Bashir, M A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2111.03260  [pdf

    cs.CV cs.AI cs.LG eess.IV

    Remote Sensing Image Super-resolution and Object Detection: Benchmark and State of the Art

    Authors: Yi Wang, Syed Muhammad Arsalan Bashir, Mahrukh Khan, Qudrat Ullah, Rui Wang, Yilin Song, Zhe Guo, Yilong Niu

    Abstract: For the past two decades, there have been significant efforts to develop methods for object detection in Remote Sensing (RS) images. In most cases, the datasets for small object detection in remote sensing images are inadequate. Many researchers used scene classification datasets for object detection, which has its limitations; for example, the large-sized objects outnumber the small objects in ob… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

    Comments: 39 pages, 15 figures, 5 tables. Submitted to Elsevier journal for review

    Journal ref: Expert Systems with Applications, 2022

  2. arXiv:2102.09351  [pdf

    cs.CV cs.LG eess.IV

    A Comprehensive Review of Deep Learning-based Single Image Super-resolution

    Authors: Syed Muhammad Arsalan Bashir, Yi Wang, Mahrukh Khan, Yilong Niu

    Abstract: Image super-resolution (SR) is one of the vital image processing methods that improve the resolution of an image in the field of computer vision. In the last two decades, significant progress has been made in the field of super-resolution, especially by utilizing deep learning methods. This survey is an effort to provide a detailed survey of recent progress in single-image super-resolution in the… ▽ More

    Submitted 5 September, 2022; v1 submitted 18 February, 2021; originally announced February 2021.

    Comments: 35 Pages, 10 Figures, 2 Tables

  3. Perspective Texture Synthesis Based on Improved Energy Optimization

    Authors: Syed Muhammad Arsalan Bashir, Farhan Ali Khan Ghouri

    Abstract: Perspective texture synthesis has great significance in many fields like video editing, scene capturing etc., due to its ability to read and control global feature information. In this paper, we present a novel example-based, specifically energy optimization-based algorithm, to synthesize perspective textures. Energy optimization technique is a pixel-based approach, so it is time-consuming. We imp… ▽ More

    Submitted 21 June, 2020; originally announced June 2020.

    Comments: Published in PLOS One

    Journal ref: PLoS ONE 9 (10), e110622 (2014)

  4. arXiv:1811.00920  [pdf, other

    cs.CR

    Tracing Information Flows Between Ad Exchanges Using Retargeted Ads

    Authors: Muhammad Ahmad Bashir, Sajjad Arshad, William Robertson, Christo Wilson

    Abstract: Numerous surveys have shown that Web users are concerned about the loss of privacy associated with online tracking. Alarmingly, these surveys also reveal that people are also unaware of the amount of data sharing that occurs between ad exchanges, and thus underestimate the privacy risks associated with online tracking. In reality, the modern ad ecosystem is fueled by a flow of user data between… ▽ More

    Submitted 13 February, 2020; v1 submitted 2 November, 2018; originally announced November 2018.

    Comments: USENIX Security Symposium, Austin, TX, USA, August 2016

  5. Font Acknowledgment and Character Extraction of Digital and Scanned Images

    Authors: Syed Muhammad Arsalan Bashir

    Abstract: The font recognition and character extraction is of immense importance as these are many scenarios where data are in such a form, which cannot be processed like in image form or as a hard copy. So the procedure developed in this paper is basically related to identifying the font (Times New Roman, Arial and Comic Sans MS) and afterwards recovering the text using simple correlation based method wher… ▽ More

    Submitted 17 May, 2013; originally announced May 2013.

    Comments: 5 pages, 5 figures, 1 table, Published with International Journal of Computer Applications (IJCA)

    Journal ref: International Journal of Computer Applications 70(8):1-5, May 2013