Skip to main content

Showing 1–8 of 8 results for author: Chehab, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.17787  [pdf, other

    cs.AI cs.CR cs.CV

    Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications

    Authors: Fouad Trad, Ali Chehab

    Abstract: The success of Large Language Models (LLMs) has led to a parallel rise in the development of Large Multimodal Models (LMMs), which have begun to transform a variety of applications. These sophisticated multimodal models are designed to interpret and analyze complex data by integrating multiple modalities such as text and images, thereby opening new avenues for a range of applications. This paper i… ▽ More

    Submitted 10 June, 2024; v1 submitted 26 March, 2024; originally announced March 2024.

  2. arXiv:2103.17028  [pdf, other

    cs.CR

    Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations

    Authors: Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab

    Abstract: The number of cyber attacks has increased tremendously in the last few years. This resulted into both human and financial losses at the individual and organization levels. Recently, cyber-criminals are leveraging new skills and capabilities by employing anti-forensics activities, techniques and tools to cover their tracks and evade any possible detection. Consequently, cyber-attacks are becoming m… ▽ More

    Submitted 31 March, 2021; originally announced March 2021.

  3. arXiv:2103.15072  [pdf, other

    cs.CR

    A Survey on Ethical Hacking: Issues and Challenges

    Authors: Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab

    Abstract: Security attacks are growing in an exponential manner and their impact on existing systems is seriously high and can lead to dangerous consequences. However, in order to reduce the effect of these attacks, penetration tests are highly required, and can be considered as a suitable solution for this task. Therefore, the main focus of this paper is to explain the technical and non-technical steps of… ▽ More

    Submitted 28 March, 2021; originally announced March 2021.

  4. arXiv:1904.09030  [pdf, other

    eess.IV cs.CV

    Automatic Target Detection for Sparse Hyperspectral Images

    Authors: Ahmad W. Bitar, Jean-Philippe Ovarlez, Loong-Fah Cheong, Ali Chehab

    Abstract: In this work, a novel target detector for hyperspectral imagery is developed. The detector is independent on the unknown covariance matrix, behaves well in large dimensions, distributional free, invariant to atmospheric effects, and does not require a background dictionary to be constructed. Based on a modification of the robust principal component analysis (RPCA), a given hyperspectral image (HSI… ▽ More

    Submitted 5 March, 2020; v1 submitted 14 April, 2019; originally announced April 2019.

    Comments: Accepted for publication in the book "Hyperspectral Image Analysis - Advances in Signal Processing and Machine Learning". arXiv admin note: text overlap with arXiv:1711.08970, arXiv:1808.06490

  5. arXiv:1803.00983  [pdf, other

    cs.IT

    Power Control and Channel Allocation for D2D Underlaid Cellular Networks

    Authors: Asmaa Abdallah, Mohammad M. Mansour, Ali Chehab

    Abstract: Device-to-Device (D2D) communications underlaying cellular networks is a viable network technology that can potentially increase spectral utilization and improve power efficiency for proximitybased wireless applications and services. However, a major challenge in such deployment scenarios is the interference caused by D2D links when sharing the same resources with cellular users. In this work, we… ▽ More

    Submitted 2 March, 2018; originally announced March 2018.

    Comments: 35 pages

  6. arXiv:1712.01877  [pdf, other

    cs.IT

    Large MIMO Detection Schemes Based on Channel Puncturing: Performance and Complexity Analysis

    Authors: H. Sarieddeen, M. M. Mansour, A. Chehab

    Abstract: A family of low-complexity detection schemes based on channel matrix puncturing targeted for large multiple-input multiple-output (MIMO) systems is proposed. It is well-known that the computational cost of MIMO detection based on QR decomposition is directly proportional to the number of non-zero entries involved in back-substitution and slicing operations in the triangularized channel matrix, whi… ▽ More

    Submitted 5 December, 2017; originally announced December 2017.

  7. arXiv:1711.07827  [pdf, other

    cs.CV

    Efficient Implementation of a Recognition System Using the Cortex Ventral Stream Model

    Authors: Ahmad W. Bitar, Mohammad M. Mansour, Ali Chehab

    Abstract: In this paper, an efficient implementation for a recognition system based on the original HMAX model of the visual cortex is proposed. Various optimizations targeted to increase accuracy at the so-called layers S1, C1, and S2 of the HMAX model are proposed. At layer S1, all unimportant information such as illumination and expression variations are eliminated from the images. Each image is then con… ▽ More

    Submitted 21 November, 2017; originally announced November 2017.

    Comments: 10 pages

    Journal ref: In Proceedings of the 10th International Conference on Computer Vision Theory and Applications (VISIGRAPP 2015)

  8. arXiv:1610.03362  [pdf, ps, other

    cs.IT

    Modulation Classification via Subspace Detection in MIMO Systems

    Authors: Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab

    Abstract: The problem of efficient modulation classification (MC) in multiple-input multiple-output (MIMO) systems is considered. Per-layer likelihood-based MC is proposed by employing subspace decomposition to partially decouple the transmitted streams. When detecting the modulation type of the stream of interest, a dense constellation is assumed on all remaining streams. The proposed classifier outperform… ▽ More

    Submitted 11 October, 2016; originally announced October 2016.