Skip to main content

Showing 1–15 of 15 results for author: Hashmi, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11409  [pdf, other

    cs.CL cs.AI

    CodeGemma: Open Code Models Based on Gemma

    Authors: CodeGemma Team, Heri Zhao, Jeffrey Hui, Joshua Howland, Nam Nguyen, Siqi Zuo, Andrea Hu, Christopher A. Choquette-Choo, **gyue Shen, Joe Kelley, Kshitij Bansal, Luke Vilnis, Mateo Wirth, Paul Michel, Peter Choy, Pratik Joshi, Ravin Kumar, Sarmad Hashmi, Shubham Agrawal, Zhitao Gong, Jane Fine, Tris Warkentin, Ale Jakse Hartman, Bin Ni, Kathy Korevec , et al. (2 additional authors not shown)

    Abstract: This paper introduces CodeGemma, a collection of specialized open code models built on top of Gemma, capable of a variety of code and natural language generation tasks. We release three model variants. CodeGemma 7B pretrained (PT) and instruction-tuned (IT) variants have remarkably resilient natural language understanding, excel in mathematical reasoning, and match code capabilities of other open… ▽ More

    Submitted 18 June, 2024; v1 submitted 17 June, 2024; originally announced June 2024.

    Comments: v1: 11 pages, 4 figures, 5 tables. v2: Update metadata

  2. arXiv:2309.14383  [pdf

    cs.SD cs.AI cs.LG eess.AS

    Towards using Cough for Respiratory Disease Diagnosis by leveraging Artificial Intelligence: A Survey

    Authors: Aneeqa Ijaz, Muhammad Nabeel, Usama Masood, Tahir Mahmood, Mydah Sajid Hashmi, Iryna Posokhova, Ali Rizwan, Ali Imran

    Abstract: Cough acoustics contain multitudes of vital information about pathomorphological alterations in the respiratory system. Reliable and accurate detection of cough events by investigating the underlying cough latent features and disease diagnosis can play an indispensable role in revitalizing the healthcare practices. The recent application of Artificial Intelligence (AI) and advances of ubiquitous c… ▽ More

    Submitted 24 September, 2023; originally announced September 2023.

    Comments: 30 pages, 12 figures, 9 tables

  3. arXiv:2306.08431  [pdf, other

    cs.SE

    Team Composition in Software Engineering Education

    Authors: Sajid Ibrahim Hashmi, Jouni Markkula

    Abstract: One of the objectives of software engineering education is to make students to learn essential teamwork skills. This is done by having the students work in groups for course assignments. Student team composition plays a vital role in this, as it significantly affects learning outcomes, what is learned, and how. The study presented in this paper aims to better understand the student team compositio… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.

  4. arXiv:2205.08252  [pdf, other

    cs.CR

    An Empirical Assessment of Security and Privacy Risks of Web based-Chatbots

    Authors: Nazar Waheed, Muhammad Ikram, Saad Sajid Hashmi, Xiangjian He, Priyadarsi Nanda

    Abstract: Web-based chatbots provide website owners with the benefits of increased sales, immediate response to their customers, and insight into customer behaviour. While Web-based chatbots are getting popular, they have not received much scrutiny from security researchers. The benefits to owners come at the cost of users' privacy and security. Vulnerabilities, such as tracking cookies and third-party doma… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.

    Comments: Submitted to WISE 2020 Conference

  5. arXiv:2201.06220  [pdf

    cs.CV cs.AI

    Face Detection in Extreme Conditions: A Machine-learning Approach

    Authors: Sameer Aqib Hashmi

    Abstract: Face detection in unrestricted conditions has been a trouble for years due to various expressions, brightness, and coloration fringing. Recent studies show that deep learning knowledge of strategies can acquire spectacular performance inside the identification of different gadgets and patterns. This face detection in unconstrained surroundings is difficult due to various poses, illuminations, and… ▽ More

    Submitted 13 February, 2022; v1 submitted 17 January, 2022; originally announced January 2022.

    Comments: 6 pages, 9 figures

  6. Orientation Aware Weapons Detection In Visual Data : A Benchmark Dataset

    Authors: Nazeef Ul Haq, Muhammad Moazam Fraz, Tufail Sajjad Shah Hashmi, Muhammad Shahzad

    Abstract: Automatic detection of weapons is significant for improving security and well being of individuals, nonetheless, it is a difficult task due to large variety of size, shape and appearance of weapons. View point variations and occlusion also are reasons which makes this task more difficult. Further, the current object detection algorithms process rectangular areas, however a slender and long rifle m… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Comments: Submitted this paper in Journal

  7. Incremental Cross-Domain Adaptation for Robust Retinopathy Screening via Bayesian Deep Learning

    Authors: Taimur Hassan, Bilal Hassan, Muhammad Usman Akram, Shahrukh Hashmi, Abdel Hakim Taguri, Naoufel Werghi

    Abstract: Retinopathy represents a group of retinal diseases that, if not treated timely, can cause severe visual impairments or even blindness. Many researchers have developed autonomous systems to recognize retinopathy via fundus and optical coherence tomography (OCT) imagery. However, most of these frameworks employ conventional transfer learning and fine-tuning approaches, requiring a decent amount of w… ▽ More

    Submitted 4 November, 2021; v1 submitted 18 October, 2021; originally announced October 2021.

    Comments: Accepted in IEEE Transactions on Instrumentation and Measurement. Source code is available at https://github.com/taimurhassan/continual_learning/

    Journal ref: IEEE Transactions on Instrumentation and Measurement, 2021

  8. arXiv:2106.10035  [pdf, other

    cs.CR

    Longitudinal Compliance Analysis of Android Applications with Privacy Policies

    Authors: Saad Sajid Hashmi, Nazar Waheed, Gioacchino Tangari, Muhammad Ikram, Stephen Smith

    Abstract: Contemporary mobile applications (apps) are designed to track, use, and share users' data, often without their consent, which results in potential privacy and transparency issues. To investigate whether mobile apps have always been (non-)transparent regarding how they collect information about users, we perform a longitudinal analysis of the historical versions of 268 Android apps. These apps comp… ▽ More

    Submitted 28 July, 2021; v1 submitted 18 June, 2021; originally announced June 2021.

    Comments: 11 pages

  9. arXiv:2105.13553  [pdf, other

    cs.LG cond-mat.mtrl-sci physics.flu-dyn

    A Machine Learning and Computer Vision Approach to Rapidly Optimize Multiscale Droplet Generation

    Authors: Alexander E. Siemenn, Evyatar Shaulsky, Matthew Beveridge, Tonio Buonassisi, Sara M. Hashmi, Iddo Drori

    Abstract: Generating droplets from a continuous stream of fluid requires precise tuning of a device to find optimized control parameter conditions. It is analytically intractable to compute the necessary control parameter values of a droplet-generating device that produces optimized droplets. Furthermore, as the length scale of the fluid flow changes, the formation physics and optimized conditions that indu… ▽ More

    Submitted 15 January, 2022; v1 submitted 27 May, 2021; originally announced May 2021.

    Comments: Published as a journal article in ACS Applied Materials & Interfaces

  10. Energy Efficient Cross Layer Time Synchronization in Cognitive Radio Networks

    Authors: S. M. Usman Hashmi, Muntazir Hussain, S. M. Nashit Arshad, Kashif Inayat, Seong Oun Hwang

    Abstract: Time synchronization is a vital concern for any Cognitive Radio Network (CRN) to perform dynamic spectrum management. Each Cognitive Radio (CR) node has to be environment aware and self adaptive and must have the ability to switch between multiple modulation schemes and frequencies. Achieving same notion of time within these CR nodes is essential to fulfill the requirements for simultaneous quiet… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

    Comments: International Journal of Internet Technology and Secured Transactions, 2020

  11. Implementation of Symbol Timing Recovery for Estimation of Clock Skew

    Authors: S. M. Usman Hashmi, Muntazir Hussain, Fahad Bin Muslim, Kashif Inayat, Seong Oun Hwang

    Abstract: Time synchronization in any distributed network can be achieved by using application layer protocols for time correction. Time synchronization method proposed in this article uses symbol timing recovery at the physical layer to correct application layer clock. This cross layer methodology diminishes the quantity of message trades needed by application layer for time synchronization thus resulting… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

    Journal ref: International Journal of Internet Technology and Secured Transactions (2020): https://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijitst

  12. A Non-Ideal NOMA-based mmWave D2D Networks with Hardware and CSI Imperfections

    Authors: Leila Tlebaldiyeva, Galymzhan Nauryzbayev, Sultangali Arzykulov, Yerassyl Akhmetkaziyev, Mohammad S. Hashmi, Ahmed M. Eltawil

    Abstract: This letter investigates a non-orthogonal multiple access (NOMA) assisted millimeter-wave device-to-device (D2D) network practically limited by multiple interference noises, transceiver hardware impairments, imperfect successive interference cancellation, and channel state information mismatch. Generalized outage probability expressions for NOMA-D2D users are deduced and achieved results, validate… ▽ More

    Submitted 22 April, 2020; originally announced April 2020.

    Comments: 4 pages, 3 figures

  13. arXiv:2002.03488  [pdf, other

    cs.CR cs.LG

    Security and Privacy in IoT Using Machine Learning and Blockchain: Threats & Countermeasures

    Authors: Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman

    Abstract: Security and privacy of the users have become significant concerns due to the involvement of the Internet of things (IoT) devices in numerous applications. Cyber threats are growing at an explosive pace making the existing security and privacy measures inadequate. Hence, everyone on the Internet is a product for hackers. Consequently, Machine Learning (ML) algorithms are used to produce accurate o… ▽ More

    Submitted 5 August, 2020; v1 submitted 9 February, 2020; originally announced February 2020.

    Comments: 35 pages, ACM CSUR Journal

  14. arXiv:1906.00166  [pdf, other

    cs.CR

    A Longitudinal Analysis of Online Ad-Blocking Blacklists

    Authors: Saad Sajid Hashmi, Muhammad Ikram, Mohamed Ali Kaafar

    Abstract: Websites employ third-party ads and tracking services leveraging cookies and JavaScript code, to deliver ads and track users' behavior, causing privacy concerns. To limit online tracking and block advertisements, several ad-blocking (black) lists have been curated consisting of URLs and domains of well-known ads and tracking services. Using Internet Archive's Wayback Machine in this paper, we coll… ▽ More

    Submitted 1 June, 2019; originally announced June 2019.

    Comments: 9

  15. User Transmit Power Minimization through Uplink Resource Allocation and User Association in HetNets

    Authors: Umar Bin Farooq, Umair Sajid Hashmi, Junaid Qadir, Ali Imran, Adnan Noor Mian

    Abstract: The popularity of cellular internet of things (IoT) is increasing day by day and billions of IoT devices will be connected to the internet. Many of these devices have limited battery life with constraints on transmit power. High user power consumption in cellular networks restricts the deployment of many IoT devices in 5G. To enable the inclusion of these devices, 5G should be supplemented with st… ▽ More

    Submitted 13 October, 2018; originally announced October 2018.

    Journal ref: 2018 IEEE Global Communications Conference (GLOBECOM)