Skip to main content

Showing 1–50 of 74 results for author: Hasan, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.17712  [pdf, other

    cs.CL cs.LG

    CLAIM Your Data: Enhancing Imputation Accuracy with Contextual Large Language Models

    Authors: Ahatsham Hayat, Mohammad Rashedul Hasan

    Abstract: This paper introduces the Contextual Language model for Accurate Imputation Method (CLAIM), a novel strategy that capitalizes on the expansive knowledge and reasoning capabilities of pre-trained large language models (LLMs) to address missing data challenges in tabular datasets. Unlike traditional imputation methods, which predominantly rely on numerical estimations, CLAIM utilizes contextually re… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  2. arXiv:2405.11712  [pdf, ps, other

    cs.CY

    Trust, Because You Can't Verify:Privacy and Security Hurdles in Education Technology Acquisition Practices

    Authors: Easton Kelso, Ananta Soneji, Sazzadur Rahaman, Yan Soshitaishvili, Rakibul Hasan

    Abstract: The education technology (EdTech) landscape is expanding rapidly in higher education institutes (HEIs). This growth brings enormous complexity. Protecting the extensive data collected by these tools is crucial for HEIs. Privacy incidents of data breaches and misuses can have dire security and privacy consequences on the data subjects, particularly students, who are often compelled to use these too… ▽ More

    Submitted 19 May, 2024; originally announced May 2024.

  3. arXiv:2405.09570  [pdf, other

    eess.SP cs.LG cs.SD eess.AS

    FunnelNet: An End-to-End Deep Learning Framework to Monitor Digital Heart Murmur in Real-Time

    Authors: Md Jobayer, Md. Mehedi Hasan Shawon, Md Rakibul Hasan, Shreya Ghosh, Tom Gedeon, Md Zakir Hossain

    Abstract: Objective: Heart murmurs are abnormal sounds caused by turbulent blood flow within the heart. Several diagnostic methods are available to detect heart murmurs and their severity, such as cardiac auscultation, echocardiography, phonocardiogram (PCG), etc. However, these methods have limitations, including extensive training and experience among healthcare providers, cost and accessibility of echoca… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

    Comments: 8-page main paper and 4-page supplementary material

  4. arXiv:2404.11050  [pdf, other

    cs.SE

    An Empirical Evaluation of Pre-trained Large Language Models for Repairing Declarative Formal Specifications

    Authors: Mohannad Alhanahnah, Md Rashedul Hasan, Hamid Bagheri

    Abstract: Automatic Program Repair (APR) has garnered significant attention as a practical research domain focused on automatically fixing bugs in programs. While existing APR techniques primarily target imperative programming languages like C and Java, there is a growing need for effective solutions applicable to declarative software specification languages. This paper presents a systematic investigation i… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

  5. arXiv:2404.03606  [pdf, other

    cs.SD cs.AI cs.IR eess.AS

    Analyzing Musical Characteristics of National Anthems in Relation to Global Indices

    Authors: S M Rakib Hasan, Aakar Dhakal, Ms. Ayesha Siddiqua, Mohammad Mominur Rahman, Md Maidul Islam, Mohammed Arfat Raihan Chowdhury, S M Masfequier Rahman Swapno, SM Nuruzzaman Nobel

    Abstract: Music plays a huge part in sha** peoples' psychology and behavioral patterns. This paper investigates the connection between national anthems and different global indices with computational music analysis and statistical correlation analysis. We analyze national anthem musical data to determine whether certain musical characteristics are associated with peace, happiness, suicide rate, crime rate… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

  6. arXiv:2404.02375  [pdf, other

    cs.CL

    Optical Text Recognition in Nepali and Bengali: A Transformer-based Approach

    Authors: S M Rakib Hasan, Aakar Dhakal, Md Humaion Kabir Mehedi, Annajiat Alim Rasel

    Abstract: Efforts on the research and development of OCR systems for Low-Resource Languages are relatively new. Low-resource languages have little training data available for training Machine Translation systems or other systems. Even though a vast amount of text has been digitized and made available on the internet the text is still in PDF and Image format, which are not instantly accessible. This paper di… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: Accepted and Presented at ICAECC 2023, Bengaluru, India

  7. arXiv:2404.02372  [pdf, other

    cs.CR cs.CL cs.LG

    Obfuscated Malware Detection: Investigating Real-world Scenarios through Memory Analysis

    Authors: S M Rakib Hasan, Aakar Dhakal

    Abstract: In the era of the internet and smart devices, the detection of malware has become crucial for system security. Malware authors increasingly employ obfuscation techniques to evade advanced security solutions, making it challenging to detect and eliminate threats. Obfuscated malware, adept at hiding itself, poses a significant risk to various platforms, including computers, mobile devices, and IoT d… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: Accepted and Presented at IEEE-ICTP2023, Dhaka, Bangladesh

  8. arXiv:2403.19085  [pdf, other

    eess.SY cs.CY cs.HC

    Real-time accident detection and physiological signal monitoring to enhance motorbike safety and emergency response

    Authors: S. M. Kayser Mehbub Siam, Khadiza Islam Sumaiya, Md Rakib Al-Amin, Tamim Hasan Turjo, Ahsanul Islam, A. H. M. A. Rahim, Md Rakibul Hasan

    Abstract: Rapid urbanization and improved living standards have led to a substantial increase in the number of vehicles on the road, consequently resulting in a rise in the frequency of accidents. Among these accidents, motorbike accidents pose a particularly high risk, often resulting in serious injuries or deaths. A significant number of these fatalities occur due to delayed or inadequate medical attentio… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  9. arXiv:2403.07483  [pdf, other

    cs.LG cs.AI

    A Deep Learning Approach to Diabetes Diagnosis

    Authors: Zeyu Zhang, Khandaker Asif Ahmed, Md Rakibul Hasan, Tom Gedeon, Md Zakir Hossain

    Abstract: Diabetes, resulting from inadequate insulin production or utilization, causes extensive harm to the body. Existing diagnostic methods are often invasive and come with drawbacks, such as cost constraints. Although there are machine learning models like Classwise k Nearest Neighbor (CkNN) and General Regression Neural Network (GRNN), they struggle with imbalanced data and result in under-performance… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: Accepted to ACIIDS 2024

  10. arXiv:2402.11829  [pdf

    cs.CR eess.SY

    Deployment of Advanced and Intelligent Logistics Vehicles with Enhanced Tracking and Security Features

    Authors: Iqtiar Md Siddique, Selim Molla, MD Rakib Hasan, Anamika Ahmed Siddique

    Abstract: This study focuses on the implementation of modern and intelligent logistics vehicles equipped with advanced tracking and security features. In response to the evolving landscape of logistics management, the proposed system integrates cutting edge technologies to enhance efficiency and ensure the security of the entire logistics process. The core component of this implementation is the incorporati… ▽ More

    Submitted 18 February, 2024; originally announced February 2024.

    Comments: 8 pages

    Journal ref: Journal of IoT and Machine Learning,2024

  11. arXiv:2402.01689  [pdf

    cs.CY

    Predictive Health Analysis in Industry 5.0: A Scientometric and Systematic Review of Motion Capture in Construction

    Authors: Md Hadisur Rahman, Md Rabiul Hasan, Nahian Ismail Chowdhury, Md Asif Bin Syed, Mst Ummul Farah

    Abstract: In an era of rapid technological advancement, the rise of Industry 4.0 has prompted industries to pursue innovative improvements in their processes. As we advance towards Industry 5.0, which focuses more on collaboration between humans and intelligent systems, there is a growing requirement for better sensing technologies for healthcare and safety purposes. Consequently, Motion Capture (MoCap) sys… ▽ More

    Submitted 22 January, 2024; originally announced February 2024.

  12. arXiv:2312.08309  [pdf, other

    cs.DC

    FASTEN: Towards a FAult-tolerant and STorage EfficieNt Cloud: Balancing Between Replication and Deduplication

    Authors: Sabbir Ahmed, Md Nahiduzzaman, Tariqul Islam, Faisal Haque Bappy, Tarannum Shaila Zaman, Raiful Hasan

    Abstract: With the surge in cloud storage adoption, enterprises face challenges managing data duplication and exponential data growth. Deduplication mitigates redundancy, yet maintaining redundancy ensures high availability, incurring storage costs. Balancing these aspects is a significant research concern. We propose FASTEN, a distributed cloud storage scheme ensuring efficiency, security, and high availab… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

  13. arXiv:2311.18471  [pdf, other

    quant-ph cs.CR

    Enhancing the security of image transmission in Quantum era: A Chaos-Assisted QKD Approach using entanglement

    Authors: Raiyan Rahman, Md Shawmoon Azad, Mohammed Rakibul Hasan, Syed Emad Uddin Shubha, M. R. C. Mahdy

    Abstract: The emergence of quantum computing has introduced unprecedented security challenges to conventional cryptographic systems, particularly in the domain of optical communications. This research addresses these challenges by innovatively combining quantum key distribution (QKD), specifically the E91 protocol, with logistic chaotic maps to establish a secure image transmission scheme. Our approach util… ▽ More

    Submitted 30 November, 2023; originally announced November 2023.

    Comments: 29 pages, 10 equations, 11 figures

  14. arXiv:2311.03636  [pdf

    cs.HC cs.AI cs.LG

    Analysis of the User Perception of Chatbots in Education Using A Partial Least Squares Structural Equation Modeling Approach

    Authors: Md Rabiul Hasan, Nahian Ismail Chowdhury, Md Hadisur Rahman, Md Asif Bin Syed, JuHyeong Ryu

    Abstract: The integration of Artificial Intelligence (AI) into education is a recent development, with chatbots emerging as a noteworthy addition to this transformative landscape. As online learning platforms rapidly advance, students need to adapt swiftly to excel in this dynamic environment. Consequently, understanding the acceptance of chatbots, particularly those employing Large Language Model (LLM) suc… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

    Comments: Chatbot, ChatGPT, Google BARD, Interactive AI, PLS-SEM, Technology Acceptance Model, Technology Readiness Index

  15. arXiv:2311.00721  [pdf, other

    cs.HC cs.LG cs.SI

    Empathy Detection from Text, Audiovisual, Audio or Physiological Signals: Task Formulations and Machine Learning Methods

    Authors: Md Rakibul Hasan, Md Zakir Hossain, Shreya Ghosh, Aneesh Krishna, Tom Gedeon

    Abstract: Empathy indicates an individual's ability to understand others. Over the past few years, empathy has drawn attention from various disciplines, including but not limited to Affective Computing, Cognitive Science and Psychology. Detecting empathy has potential applications in society, healthcare and education. Despite being a broad and overlap** topic, the avenue of empathy detection leveraging Ma… ▽ More

    Submitted 26 June, 2024; v1 submitted 30 October, 2023; originally announced November 2023.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice

  16. arXiv:2310.12425  [pdf

    cs.SE cs.AI cs.LG

    Automated Repair of Declarative Software Specifications in the Era of Large Language Models

    Authors: Md Rashedul Hasan, Jiawei Li, Iftekhar Ahmed, Hamid Bagheri

    Abstract: The growing adoption of declarative software specification languages, coupled with their inherent difficulty in debugging, has underscored the need for effective and automated repair techniques applicable to such languages. Researchers have recently explored various methods to automatically repair declarative software specifications, such as template-based repair, feedback-driven iterative repair,… ▽ More

    Submitted 7 November, 2023; v1 submitted 18 October, 2023; originally announced October 2023.

    Comments: 13 Pages with reference, 4 Tables, 2 Figures, 2 Listings

  17. arXiv:2310.03994  [pdf, other

    cs.AR cs.CR eess.SY

    DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans

    Authors: Enahoro Oriero, Faiq Khalid, Syed Rafay Hasan

    Abstract: The global semiconductor supply chain involves design and fabrication at various locations, which leads to multiple security vulnerabilities, e.g., Hardware Trojan (HT) insertion. Although most HTs target digital circuits, HTs can be inserted in analog circuits. Therefore, several techniques have been developed for HT insertions in analog circuits. Capacitance-based Analog Hardware Trojan (AHT) is… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

    Comments: Accepted at ACM Hardware and Architectural Support for Security and Privacy (HASP) 2023

  18. arXiv:2309.16700  [pdf, other

    cs.CV cs.LG

    Framework and Model Analysis on Bengali Document Layout Analysis Dataset: BaDLAD

    Authors: Kazi Reyazul Hasan, Mubasshira Musarrat, Sadif Ahmed, Shahriar Raj

    Abstract: This study focuses on understanding Bengali Document Layouts using advanced computer programs: Detectron2, YOLOv8, and SAM. We looked at lots of different Bengali documents in our study. Detectron2 is great at finding and separating different parts of documents, like text boxes and paragraphs. YOLOv8 is good at figuring out different tables and pictures. We also tried SAM, which helps us understan… ▽ More

    Submitted 15 August, 2023; originally announced September 2023.

    Comments: 5 pages, 6 figures, uses IEEEtran.cls

    ACM Class: I.4.6

  19. arXiv:2309.07610  [pdf, other

    cs.LG cs.AI cs.IR

    Feature Engineering in Learning-to-Rank for Community Question Answering Task

    Authors: Nafis Sajid, Md Rashidul Hasan, Muhammad Ibrahim

    Abstract: Community question answering (CQA) forums are Internet-based platforms where users ask questions about a topic and other expert users try to provide solutions. Many CQA forums such as Quora, Stackoverflow, Yahoo!Answer, StackExchange exist with a lot of user-generated data. These data are leveraged in automated CQA ranking systems where similar questions (and answers) are presented in response to… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

    Comments: 20 pages

  20. arXiv:2308.10647  [pdf, other

    cs.CV

    bbOCR: An Open-source Multi-domain OCR Pipeline for Bengali Documents

    Authors: Imam Mohammad Zulkarnain, Shayekh Bin Islam, Md. Zami Al Zunaed Farabe, Md. Mehedi Hasan Shawon, Jawaril Munshad Abedin, Beig Rajibul Hasan, Marsia Haque, Istiak Shihab, Syed Mobassir, MD. Nazmuddoha Ansary, Asif Sushmit, Farig Sadeque

    Abstract: Despite the existence of numerous Optical Character Recognition (OCR) tools, the lack of comprehensive open-source systems hampers the progress of document digitization in various low-resource languages, including Bengali. Low-resource languages, especially those with an alphasyllabary writing system, suffer from the lack of large-scale datasets for various document OCR components such as word-lev… ▽ More

    Submitted 21 August, 2023; v1 submitted 21 August, 2023; originally announced August 2023.

  21. arXiv:2308.02358  [pdf, other

    cs.DC

    A Deep Dive into the Google Cluster Workload Traces: Analyzing the Application Failure Characteristics and User Behaviors

    Authors: Faisal Haque Bappy, Tariqul Islam, Tarannum Shaila Zaman, Raiful Hasan, Carlos Caicedo

    Abstract: Large-scale cloud data centers have gained popularity due to their high availability, rapid elasticity, scalability, and low cost. However, current data centers continue to have high failure rates due to the lack of proper resource utilization and early failure detection. To maximize resource efficiency and reduce failure rates in large-scale cloud data centers, it is crucial to understand the wor… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

  22. arXiv:2306.04883  [pdf

    cs.CR

    From Bad to Worse: Using Private Data to Propagate Disinformation on Online Platforms with a Greater Efficiency

    Authors: Protik Bose Pranto, Waqar Hassan Khan, Sahar Abdelnabi, Rebecca Weil, Mario Fritz, Rakibul Hasan

    Abstract: We outline a planned experiment to investigate if personal data (e.g., demographics and behavioral patterns) can be used to selectively expose individuals to disinformation such that an adversary can spread disinformation more efficiently compared to broadcasting the same information to everyone. This mechanism, if effective, will have devastating consequences as modern technologies collect and in… ▽ More

    Submitted 7 June, 2023; originally announced June 2023.

  23. arXiv:2305.06110  [pdf, other

    cs.CV

    Pavlok-Nudge: A Feedback Mechanism for Atomic Behaviour Modification with Snoring Usecase

    Authors: Shreya Ghosh, Md Rakibul Hasan, Pradyumna Agrawal, Zhixi Cai, Susannah Soon, Abhinav Dhall, Tom Gedeon

    Abstract: This paper proposes a feedback mechanism to 'break bad habits' using the Pavlok device. Pavlok utilises beeps, vibration and shocks as a mode of aversion technique to help individuals with behaviour modification. While the device can be useful in certain periodic daily life situations, like alarms and exercise notifications, the device relies on manual operations that limit its usage. To this end,… ▽ More

    Submitted 10 May, 2023; v1 submitted 10 May, 2023; originally announced May 2023.

    Comments: Shreya Ghosh, Md Rakibul Hasan and Pradyumna Agrawal contributed equally to this research

  24. ChartSumm: A Comprehensive Benchmark for Automatic Chart Summarization of Long and Short Summaries

    Authors: Raian Rahman, Rizvi Hasan, Abdullah Al Farhad, Md Tahmid Rahman Laskar, Md. Hamjajul Ashmafee, Abu Raihan Mostofa Kamal

    Abstract: Automatic chart to text summarization is an effective tool for the visually impaired people along with providing precise insights of tabular data in natural language to the user. A large and well-structured dataset is always a key part for data driven models. In this paper, we propose ChartSumm: a large-scale benchmark dataset consisting of a total of 84,363 charts along with their metadata and de… ▽ More

    Submitted 11 June, 2023; v1 submitted 26 April, 2023; originally announced April 2023.

    Comments: Accepted as a long paper at the Canadian AI 2023

  25. arXiv:2304.07482  [pdf, other

    cs.SE

    Documentation Practices in Agile Software Development: A Systematic Literature Review

    Authors: Md Athikul Islam, Rizbanul Hasan, Nasir U. Eisty

    Abstract: Context: Agile development methodologies in the software industry have increased significantly over the past decade. Although one of the main aspects of agile software development (ASD) is less documentation, there have always been conflicting opinions about what to document in ASD. Objective: This study aims to systematically identify what to document in ASD, which documentation tools and methods… ▽ More

    Submitted 15 April, 2023; originally announced April 2023.

    Comments: Accepted to 21st IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2023). May 23-25, 2023, Orlando, USA

  26. arXiv:2303.05325  [pdf, other

    cs.CV

    BaDLAD: A Large Multi-Domain Bengali Document Layout Analysis Dataset

    Authors: Md. Istiak Hossain Shihab, Md. Rakibul Hasan, Mahfuzur Rahman Emon, Syed Mobassir Hossen, Md. Nazmuddoha Ansary, Intesur Ahmed, Fazle Rabbi Rakib, Shahriar Elahi Dhruvo, Souhardya Saha Dip, Akib Hasan Pavel, Marsia Haque Meghla, Md. Rezwanul Haque, Sayma Sultana Chowdhury, Farig Sadeque, Tahsin Reasat, Ahmed Imtiaz Humayun, Asif Shahriyar Sushmit

    Abstract: While strides have been made in deep learning based Bengali Optical Character Recognition (OCR) in the past decade, the absence of large Document Layout Analysis (DLA) datasets has hindered the application of OCR in document transcription, e.g., transcribing historical documents and newspapers. Moreover, rule-based DLA systems that are currently being employed in practice are not robust to domain… ▽ More

    Submitted 5 May, 2023; v1 submitted 9 March, 2023; originally announced March 2023.

  27. arXiv:2212.13333  [pdf

    quant-ph cs.NI eess.SY

    Quantum Communication Systems: Vision, Protocols, Applications, and Challenges

    Authors: Syed Rakib Hasan, Mostafa Zaman Chowdhury, Md. Saiam, Yeong Min Jang

    Abstract: The growth of modern technological sectors have risen to such a spectacular level that the blessings of technology have spread to every corner of the world, even to remote corners. At present, technological development finds its basis in the theoretical foundation of classical physics in every field of scientific research, such as wireless communication, visible light communication, machine learni… ▽ More

    Submitted 26 December, 2022; originally announced December 2022.

    Comments: 23 pages, 11 Figures

  28. arXiv:2209.14812  [pdf, other

    cs.AI cs.CL

    Named Entity Recognition in Industrial Tables using Tabular Language Models

    Authors: Aneta Koleva, Martin Ringsquandl, Mark Buckley, Rakebul Hasan, Volker Tresp

    Abstract: Specialized transformer-based models for encoding tabular data have gained interest in academia. Although tabular data is omnipresent in industry, applications of table transformers are still missing. In this paper, we study how these models can be applied to an industrial Named Entity Recognition (NER) problem where the entities are mentioned in tabular-structured spreadsheets. The highly technic… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

    Comments: EMNLP 2022 Industry Track

  29. arXiv:2205.10386  [pdf, other

    cs.CV cs.LG

    A Dynamic Weighted Tabular Method for Convolutional Neural Networks

    Authors: Md Ifraham Iqbal, Md. Saddam Hossain Mukta, Ahmed Rafi Hasan

    Abstract: Traditional Machine Learning (ML) models like Support Vector Machine, Random Forest, and Logistic Regression are generally preferred for classification tasks on tabular datasets. Tabular data consists of rows and columns corresponding to instances and features, respectively. Past studies indicate that traditional classifiers often produce unsatisfactory results in complex tabular datasets. Hence,… ▽ More

    Submitted 20 May, 2022; originally announced May 2022.

  30. arXiv:2203.06848  [pdf

    cs.LG q-fin.ST stat.AP

    A Comparative Study on Forecasting of Retail Sales

    Authors: Md Rashidul Hasan, Muntasir A Kabir, Rezoan A Shuvro, Pankaz Das

    Abstract: Predicting product sales of large retail companies is a challenging task considering volatile nature of trends, seasonalities, events as well as unknown factors such as market competitions, change in customer's preferences, or unforeseen events, e.g., COVID-19 outbreak. In this paper, we benchmark forecasting models on historical sales data from Walmart to predict their future sales. We provide a… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

  31. arXiv:2202.09461  [pdf, other

    cs.LG cs.AI

    Towards Enabling Dynamic Convolution Neural Network Inference for Edge Intelligence

    Authors: Adewale Adeyemo, Travis Sandefur, Tolulope A. Odetola, Syed Rafay Hasan

    Abstract: Deep learning applications have achieved great success in numerous real-world applications. Deep learning models, especially Convolution Neural Networks (CNN) are often prototyped using FPGA because it offers high power efficiency and reconfigurability. The deployment of CNNs on FPGAs follows a design cycle that requires saving of model parameters in the on-chip memory during High-level synthesis… ▽ More

    Submitted 18 February, 2022; originally announced February 2022.

  32. arXiv:2112.00061  [pdf, other

    cs.CV cs.CL cs.CY cs.LG

    Open-Domain, Content-based, Multi-modal Fact-checking of Out-of-Context Images via Online Resources

    Authors: Sahar Abdelnabi, Rakibul Hasan, Mario Fritz

    Abstract: Misinformation is now a major problem due to its potential high risks to our core democratic and societal values and orders. Out-of-context misinformation is one of the easiest and effective ways used by adversaries to spread viral false stories. In this threat, a real image is re-purposed to support other narratives by misrepresenting its context and/or elements. The internet is being used as the… ▽ More

    Submitted 20 March, 2022; v1 submitted 30 November, 2021; originally announced December 2021.

    Comments: CVPR'22

  33. arXiv:2110.15703  [pdf, other

    cs.CL cs.LG

    Navigating the Kaleidoscope of COVID-19 Misinformation Using Deep Learning

    Authors: Yuanzhi Chen, Mohammad Rashedul Hasan

    Abstract: Irrespective of the success of the deep learning-based mixed-domain transfer learning approach for solving various Natural Language Processing tasks, it does not lend a generalizable solution for detecting misinformation from COVID-19 social media data. Due to the inherent complexity of this type of data, caused by its dynamic (context evolves rapidly), nuanced (misinformation types are often ambi… ▽ More

    Submitted 19 September, 2021; originally announced October 2021.

    Comments: The 2021 Conference on Empirical Methods in Natural Language Processing (EMNLP)

  34. arXiv:2110.14013  [pdf, other

    eess.IV cs.CV cs.LG

    Deep Integrated Pipeline of Segmentation Guided Classification of Breast Cancer from Ultrasound Images

    Authors: Muhammad Sakib Khan Inan, Fahim Irfan Alam, Rizwan Hasan

    Abstract: Breast cancer has become a symbol of tremendous concern in the modern world, as it is one of the major causes of cancer mortality worldwide. In this regard, breast ultrasonography images are frequently utilized by doctors to diagnose breast cancer at an early stage. However, the complex artifacts and heavily noised breast ultrasonography images make diagnosis a great challenge. Furthermore, the ev… ▽ More

    Submitted 14 February, 2022; v1 submitted 26 October, 2021; originally announced October 2021.

    Comments: Accepted for publication as a Research Paper (Journal Article) in Biomedical Signal Processing and Control, Elsevier

  35. arXiv:2109.11041  [pdf, other

    cs.LG cs.CR

    Security Analysis of Capsule Network Inference using Horizontal Collaboration

    Authors: Adewale Adeyemo, Faiq Khalid, Tolulope A. Odetola, Syed Rafay Hasan

    Abstract: The traditional convolution neural networks (CNN) have several drawbacks like the Picasso effect and the loss of information by the pooling layer. The Capsule network (CapsNet) was proposed to address these challenges because its architecture can encode and preserve the spatial orientation of input images. Similar to traditional CNNs, CapsNet is also vulnerable to several malicious attacks, as stu… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

  36. A Study of the Generalizability of Self-Supervised Representations

    Authors: Atharva Tendle, Mohammad Rashedul Hasan

    Abstract: Recent advancements in self-supervised learning (SSL) made it possible to learn generalizable visual representations from unlabeled data. The performance of Deep Learning models fine-tuned on pretrained SSL representations is on par with models fine-tuned on the state-of-the-art supervised learning (SL) representations. Irrespective of the progress made in SSL, its generalizability has not been st… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Comments: Journal of Machine Learning With Applications (MLWA)

    Journal ref: Volume 6, 2021, 100124

  37. arXiv:2107.05828  [pdf, other

    cs.CV

    Dynamic Distribution of Edge Intelligence at the Node Level for Internet of Things

    Authors: Hawzhin Mohammed, Tolulope A. Odetola, Nan Guo, Syed Rafay Hasan

    Abstract: In this paper, dynamic deployment of Convolutional Neural Network (CNN) architecture is proposed utilizing only IoT-level devices. By partitioning and pipelining the CNN, it horizontally distributes the computation load among resource-constrained devices (called horizontal collaboration), which in turn increases the throughput. Through partitioning, we can decrease the computation and energy consu… ▽ More

    Submitted 12 July, 2021; originally announced July 2021.

    Comments: 5 pages, 4 figures, and 4 tables

  38. FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack

    Authors: Tolulope Odetola, Faiq Khalid, Travis Sandefur, Hawzhin Mohammed, Syed Rafay Hasan

    Abstract: To reduce the time-to-market and access to state-of-the-art techniques, CNN hardware map** and deployment on embedded accelerators are often outsourced to untrusted third parties, which is going to be more prevalent in futuristic artificial intelligence of things (AIoT) systems. These AIoT systems anticipate horizontal collaboration among different resource-constrained AIoT node devices, where C… ▽ More

    Submitted 25 August, 2021; v1 submitted 12 June, 2021; originally announced June 2021.

    Comments: Accepted for publication in IEEE Access

    Journal ref: IEEE Access, vol. 9, pp. 115370-115387, 2021

  39. SmartOil: Blockchain and smart contract-based oil supply chain management

    Authors: AKM Bahalul Haque, Md. Rifat Hasan, Md. Oahiduzzaman Mondol Zihad

    Abstract: The traditional oil supply chain suffers from various shortcomings regarding crude oil extraction, processing, distribution, environmental pollution, and traceability. It offers an only a forward flow of products with almost no security and tracking process. In time, the system will lag behind due to the limitations in quality inspection, fraudulent information, and monopolistic behavior of supply… ▽ More

    Submitted 11 May, 2021; originally announced May 2021.

    Comments: Accepted as Open access article in IET Blockchain

    Journal ref: IET Blockchain, 2021

  40. arXiv:2103.09327  [pdf, other

    cs.CR cs.LG

    SoWaF: Shuffling of Weights and Feature Maps: A Novel Hardware Intrinsic Attack (HIA) on Convolutional Neural Network (CNN)

    Authors: Tolulope A. Odetola, Syed Rafay Hasan

    Abstract: Security of inference phase deployment of Convolutional neural network (CNN) into resource constrained embedded systems (e.g. low end FPGAs) is a growing research area. Using secure practices, third party FPGA designers can be provided with no knowledge of initial and final classification layers. In this work, we demonstrate that hardware intrinsic attack (HIA) in such a "secure" design is still p… ▽ More

    Submitted 13 July, 2021; v1 submitted 16 March, 2021; originally announced March 2021.

    Comments: 5 pages, 6 figures, 2 tables, ISCAS 2021 Conference

  41. arXiv:2101.09575  [pdf, other

    cs.SI

    Examining Factors Associated with Twitter Account Suspension Following the 2020 U.S. Presidential Election

    Authors: Farhan Asif Chowdhury, Dheeman Saha, Md Rashidul Hasan, Koustuv Saha, Abdullah Mueen

    Abstract: Online social media enables mass-level, transparent, and democratized discussion on numerous socio-political issues. Due to such openness, these platforms often endure manipulation and misinformation - leading to negative impacts. To prevent such harmful activities, platform moderators employ countermeasures to safeguard against actors violating their rules. However, the correlation between public… ▽ More

    Submitted 23 January, 2021; originally announced January 2021.

  42. arXiv:2101.05983  [pdf

    cs.SI

    Russian Troll Account Classification with Twitter and Facebook Data

    Authors: Dominic Lewinski, Md Rashidul Hasan

    Abstract: In this analysis, we work with the data set that was compiled by Darren Linvill and Patrick Warren, along with a representative sample of Facebook ads that were released by the House Intelligence Committee Minority. The goal of this analysis is to use the categories defined by Linvill and Warren in the Twitter data and investigate if these categories exist in Facebook ads. This begin to give us in… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

    Comments: 17 pages

  43. MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices

    Authors: Faiq Khalid, Syed Rafay Hasan, Sara Zia, Osman Hasan, Falah Awwad, Muhammad Shafique

    Abstract: Traditional learning-based approaches for run-time Hardware Trojan detection require complex and expensive on-chip data acquisition frameworks and thus incur high area and power overhead. To address these challenges, we propose to leverage the power correlation between the executing instructions of a microprocessor to establish a machine learning-based run-time Hardware Trojan (HT) detection frame… ▽ More

    Submitted 20 November, 2020; originally announced November 2020.

    Journal ref: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ( Volume: 39, Issue: 11, Nov. 2020)

  44. arXiv:2006.09301  [pdf, other

    cs.NI

    Collaborative Pipeline Using Opportunistic Mobile Resources via D2D for Computation-Intensive Tasks

    Authors: Terry N. Guo, Hawzhin Mohammed, Syed R. Hasan

    Abstract: This paper proposes a mobile pipeline computing concept in a Device-to-Device (D2D) communication setup and studies related issues, where D2D is likely based on millimeter-wave (mmWave) in the 5G mobile communication. The proposed opportunistic system employs a cluster of pipelined resource-limited devices on the move to handle real-time on-site computation-intensive tasks for which current cloud… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

  45. arXiv:2006.09276  [pdf, other

    cs.CV cs.CR

    How Secure is Distributed Convolutional Neural Network on IoT Edge Devices?

    Authors: Hawzhin Mohammed, Tolulope A. Odetola, Syed Rafay Hasan

    Abstract: Convolutional Neural Networks (CNN) has found successful adoption in many applications. The deployment of CNN on resource-constrained edge devices have proved challenging. CNN distributed deployment across different edge devices has been adopted. In this paper, we propose Trojan attacks on CNN deployed across a distributed edge network across different nodes. We propose five stealthy attack scenar… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

  46. arXiv:2005.14627  [pdf, other

    cs.CL cs.IR cs.LG

    Detection of Bangla Fake News using MNB and SVM Classifier

    Authors: Md Gulzar Hussain, Md Rashidul Hasan, Mahmuda Rahman, Joy Protim, Sakib Al Hasan

    Abstract: Fake news has been coming into sight in significant numbers for numerous business and political reasons and has become frequent in the online world. People can get contaminated easily by these fake news for its fabricated words which have enormous effects on the offline community. Thus, interest in research in this area has risen. Significant research has been conducted on the detection of fake ne… ▽ More

    Submitted 29 May, 2020; originally announced May 2020.

  47. arXiv:1911.10654  [pdf, other

    stat.ML cs.LG

    Lung Cancer Detection and Classification based on Image Processing and Statistical Learning

    Authors: Md Rashidul Hasan, Muntasir Al Kabir

    Abstract: Lung cancer is one of the death threatening diseases among human beings. Early and accurate detection of lung cancer can increase the survival rate from lung cancer. Computed Tomography (CT) images are commonly used for detecting the lung cancer.Using a data set of thousands of high-resolution lung scans collected from Kaggle competition [1], we will develop algorithms that accurately determine in… ▽ More

    Submitted 24 November, 2019; originally announced November 2019.

  48. arXiv:1911.05944  [pdf, other

    cs.LG stat.ML

    2L-3W: 2-Level 3-Way Hardware-Software Co-Verification for the Map** of Deep Learning Architecture (DLA) onto FPGA Boards

    Authors: Tolulope A. Odetola, Katie M. Groves, Syed Rafay Hasan

    Abstract: FPGAs have become a popular choice for deploying deep learning architectures (DLA). There are many researchers that have explored the deployment and map** of DLA on FPGA. However, there has been a growing need to do design-time hardware-software co-verification of these deployments. To the best of our knowledge this is the first work that proposes a 2-Level 3-Way (2L-3W) hardware-software co-ver… ▽ More

    Submitted 14 November, 2019; originally announced November 2019.

  49. arXiv:1911.02098  [pdf, other

    cs.LG stat.ML

    A Scalable Multilabel Classification to Deploy Deep Learning Architectures For Edge Devices

    Authors: Tolulope A. Odetola, Ogheneuriri Oderhohwo, Syed Rafay Hasan

    Abstract: Convolution Neural Networks (CNN) have performed well in many applications such as object detection, pattern recognition, video surveillance and so on. CNN carryout feature extraction on labelled data to perform classification. Multi-label classification assigns more than one label to a particular data sample in a data set. In multi-label classification, properties of a data point that are conside… ▽ More

    Submitted 27 January, 2021; v1 submitted 5 November, 2019; originally announced November 2019.

  50. arXiv:1911.00783  [pdf, other

    cs.CR cs.LG stat.ML

    A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)

    Authors: Tolulope A. Odetola, Hawzhin Raoof Mohammed, Syed Rafay Hasan

    Abstract: Deep learning architectures (DLA) have shown impressive performance in computer vision, natural language processing and so on. Many DLA make use of cloud computing to achieve classification due to the high computation and memory requirements. Privacy and latency concerns resulting from cloud computing has inspired the deployment of DLA on embedded hardware accelerators. To achieve short time-to-ma… ▽ More

    Submitted 27 January, 2021; v1 submitted 2 November, 2019; originally announced November 2019.