Skip to main content

Showing 1–50 of 65 results for author: Iqbal, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.02871  [pdf, other

    eess.IV cs.CV

    LMBF-Net: A Lightweight Multipath Bidirectional Focal Attention Network for Multifeatures Segmentation

    Authors: Tariq M Khan, Shahzaib Iqbal, Syed S. Naqvi, Imran Razzak, Erik Meijering

    Abstract: Retinal diseases can cause irreversible vision loss in both eyes if not diagnosed and treated early. Since retinal diseases are so complicated, retinal imaging is likely to show two or more abnormalities. Current deep learning techniques for segmenting retinal images with many labels and attributes have poor detection accuracy and generalisability. This paper presents a multipath convolutional neu… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

  2. arXiv:2405.10787  [pdf, other

    cs.NI

    On the Application of Reliability Theory to Cellular Network Mobility Performance Analysis

    Authors: Subhyal Bin Iqbal, Behnam Khodapanah, Philipp Schulz, Gerhard P. Fettweis

    Abstract: Achieving connectivity reliability is one of the significant challenges for 5G and beyond 5G cellular networks. The present understanding of reliability in the context of mobile communication does not adequately cover the stochastic temporal aspects of the network, such as the duration and spread of packet errors that an outage session may cause. Rather, it simply confines the definition to the pe… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

    Comments: 6 pages, 4 figures. Submitted to IEEE Wireless Communication Letters for possible publication

  3. arXiv:2403.10286  [pdf, other

    cs.NI

    RACH-less Handover with Early Timing Advance Acquisition for Outage Reduction

    Authors: Subhyal Bin Iqbal, Umur Karabulut, Ahmad Awada, Philipp Schulz, Gerhard P. Fettweis

    Abstract: For fifth-generation (5G) and 5G-Advanced networks, outage reduction within the context of reliability is a key objective since outage denotes the time period when a user equipment (UE) cannot communicate with the network. Earlier studies have shown that in the experimental high mobility scenario considered, outage is dominated by the interruption time that stems from the random access channel (RA… ▽ More

    Submitted 27 March, 2024; v1 submitted 15 March, 2024; originally announced March 2024.

    Comments: 7 pages, 7 figures. Accepted for presentation at the 2024 IEEE 99th Vehicular Technology Conference (VTC2024)-Spring to be held in Singapore

  4. arXiv:2403.05530  [pdf, other

    cs.CL cs.AI

    Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context

    Authors: Gemini Team, Petko Georgiev, Ving Ian Lei, Ryan Burnell, Libin Bai, Anmol Gulati, Garrett Tanzer, Damien Vincent, Zhufeng Pan, Shibo Wang, Soroosh Mariooryad, Yifan Ding, Xinyang Geng, Fred Alcober, Roy Frostig, Mark Omernick, Lexi Walker, Cosmin Paduraru, Christina Sorokin, Andrea Tacchetti, Colin Gaffney, Samira Daruki, Olcan Sercinoglu, Zach Gleicher, Juliette Love , et al. (1092 additional authors not shown)

    Abstract: In this report, we introduce the Gemini 1.5 family of models, representing the next generation of highly compute-efficient multimodal models capable of recalling and reasoning over fine-grained information from millions of tokens of context, including multiple long documents and hours of video and audio. The family includes two new models: (1) an updated Gemini 1.5 Pro, which exceeds the February… ▽ More

    Submitted 14 June, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

  5. arXiv:2403.01365  [pdf, other

    cs.HC

    AI-Powered Reminders for Collaborative Tasks: Experiences and Futures

    Authors: Katelyn Morrison, Shamsi Iqbal, Eric Horvitz

    Abstract: Email continues to serve as a central medium for managing collaborations. While unstructured email messaging is lightweight and conducive to coordination, it is easy to overlook commitments and requests for collaborations that are embedded in the text of free-flowing communications. Twenty-one years ago, Bellotti et al. proposed TaskMaster with the goal of redesigning the email interface to have e… ▽ More

    Submitted 2 March, 2024; originally announced March 2024.

    Comments: 18 pages, 3 figures, 3 tables, accepted to ACM CSCW 2024

  6. DISCERN: Designing Decision Support Interfaces to Investigate the Complexities of Workplace Social Decision-Making With Line Managers

    Authors: Pranav Khadpe, Lindy Le, Kate Nowak, Shamsi T. Iqbal, **a Suh

    Abstract: Line managers form the first level of management in organizations, and must make complex decisions, while maintaining relationships with those impacted by their decisions. Amidst growing interest in technology-supported decision-making at work, their needs remain understudied. Further, most existing design knowledge for supporting social decision-making comes from domains where decision-makers are… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

    Comments: CHI 2024

  7. arXiv:2402.07868  [pdf, other

    stat.ML cs.LG stat.ME

    Nesting Particle Filters for Experimental Design in Dynamical Systems

    Authors: Sahel Iqbal, Adrien Corenflos, Simo Särkkä, Hany Abdulsamad

    Abstract: In this paper, we propose a novel approach to Bayesian experimental design for non-exchangeable data that formulates it as risk-sensitive policy optimization. We develop the Inside-Out SMC$^2$ algorithm, a nested sequential Monte Carlo technique to infer optimal designs, and embed it into a particle Markov chain Monte Carlo framework to perform gradient-based policy amortization. Our approach is d… ▽ More

    Submitted 29 May, 2024; v1 submitted 12 February, 2024; originally announced February 2024.

    Comments: Accepted to ICML 2024

  8. arXiv:2402.03417  [pdf, other

    cs.CV

    A Computer Vision Based Approach for Stalking Detection Using a CNN-LSTM-MLP Hybrid Fusion Model

    Authors: Murad Hasan, Shahriar Iqbal, Md. Billal Hossain Faisal, Md. Musnad Hossin Neloy, Md. Tonmoy Kabir, Md. Tanzim Reza, Md. Golam Rabiul Alam, Md Zia Uddin

    Abstract: Criminal and suspicious activity detection has become a popular research topic in recent years. The rapid growth of computer vision technologies has had a crucial impact on solving this issue. However, physical stalking detection is still a less explored area despite the evolution of modern technology. Nowadays, stalking in public places has become a common occurrence with women being the most aff… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: Under review for publication in the PLOS ONE journal, 17 pages, 9 figures

  9. arXiv:2401.17136  [pdf, other

    cs.CR cs.CY cs.LG

    Systematically Assessing the Security Risks of AI/ML-enabled Connected Healthcare Systems

    Authors: Mohammed Elnawawy, Mohammadreza Hallajiyan, Gargi Mitra, Shahrear Iqbal, Karthik Pattabiraman

    Abstract: The adoption of machine-learning-enabled systems in the healthcare domain is on the rise. While the use of ML in healthcare has several benefits, it also expands the threat surface of medical systems. We show that the use of ML in medical systems, particularly connected systems that involve interfacing the ML engine with multiple peripheral devices, has security risks that might cause life-threate… ▽ More

    Submitted 11 April, 2024; v1 submitted 30 January, 2024; originally announced January 2024.

    Comments: 13 pages, 5 figures, 3 tables

  10. arXiv:2401.10703  [pdf, other

    cs.LO

    DRAT Proofs of Unsatisfiability for SAT Modulo Monotonic Theories

    Authors: Nick Feng, Alan J. Hu, Sam Bayless, Syed M. Iqbal, Patrick Trentin, Mike Whalen, Lee Pike, John Backes

    Abstract: Generating proofs of unsatisfiability is a valuable capability of most SAT solvers, and is an active area of research for SMT solvers. This paper introduces the first method to efficiently generate proofs of unsatisfiability specifically for an important subset of SMT: SAT Modulo Monotonic Theories (SMMT), which includes many useful finite-domain theories (e.g., bit vectors and many graph-theoreti… ▽ More

    Submitted 18 April, 2024; v1 submitted 19 January, 2024; originally announced January 2024.

  11. arXiv:2401.08960  [pdf, other

    cs.HC cs.AI cs.CY

    From User Surveys to Telemetry-Driven Agents: Exploring the Potential of Personalized Productivity Solutions

    Authors: Subigya Nepal, Javier Hernandez, Talie Massachi, Kael Rowan, Judith Amores, **a Suh, Gonzalo Ramos, Brian Houck, Shamsi T. Iqbal, Mary Czerwinski

    Abstract: We present a comprehensive, user-centric approach to understand preferences in AI-based productivity agents and develop personalized solutions tailored to users' needs. Utilizing a two-phase method, we first conducted a survey with 363 participants, exploring various aspects of productivity, communication style, agent approach, personality traits, personalization, and privacy. Drawing on the surve… ▽ More

    Submitted 16 January, 2024; originally announced January 2024.

    ACM Class: H.5.0; H.5.3; H.5.m; J.0

  12. arXiv:2401.08465  [pdf, other

    cs.NI

    A Mobility Analysis of UE-Side Beamforming for Multi-Panel User Equipment with Hand Blockage

    Authors: Subhyal Bin Iqbal, Salman Nadaf, Umur Karabulut, Philipp Schulz, Anna Prado, Gerhard P. Fettweis, Wolfgang Kellerer

    Abstract: The hand blockage effect of the human hand around the user equipment (UE) is too considerable to be ignored in frequency range 2 (FR2). This adds another layer of complexity to the link budget design in FR2 for 5G networks, which already suffer from high path and diffraction loss. More recently, multipanel UEs (MPUEs) have been proposed as a way to address this problem, whereby multiple distinct a… ▽ More

    Submitted 16 January, 2024; originally announced January 2024.

    Comments: 6 pages, 5 figures. Accepted for presentation at the 2024 IEEE Wireless Communications and Networking Conference (IEEE WCNC 2024), to be held in Dubai, United Arab Emirates

  13. arXiv:2312.14000  [pdf, ps, other

    cs.LG eess.SY

    Risk-Sensitive Stochastic Optimal Control as Rao-Blackwellized Markovian Score Climbing

    Authors: Hany Abdulsamad, Sahel Iqbal, Adrien Corenflos, Simo Särkkä

    Abstract: Stochastic optimal control of dynamical systems is a crucial challenge in sequential decision-making. Recently, control-as-inference approaches have had considerable success, providing a viable risk-sensitive framework to address the exploration-exploitation dilemma. Nonetheless, a majority of these techniques only invoke the inference-control duality to derive a modified risk objective that is th… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

  14. arXiv:2312.11805  [pdf, other

    cs.CL cs.AI cs.CV

    Gemini: A Family of Highly Capable Multimodal Models

    Authors: Gemini Team, Rohan Anil, Sebastian Borgeaud, Jean-Baptiste Alayrac, Jiahui Yu, Radu Soricut, Johan Schalkwyk, Andrew M. Dai, Anja Hauth, Katie Millican, David Silver, Melvin Johnson, Ioannis Antonoglou, Julian Schrittwieser, Amelia Glaese, Jilin Chen, Emily Pitler, Timothy Lillicrap, Angeliki Lazaridou, Orhan Firat, James Molloy, Michael Isard, Paul R. Barham, Tom Hennigan, Benjamin Lee , et al. (1325 additional authors not shown)

    Abstract: This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultr… ▽ More

    Submitted 17 June, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

  15. arXiv:2311.05733  [pdf, other

    cs.CR cs.LG

    LogShield: A Transformer-based APT Detection System Leveraging Self-Attention

    Authors: Sihat Afnan, Mushtari Sadia, Shahrear Iqbal, Anindya Iqbal

    Abstract: Cyber attacks are often identified using system and network logs. There have been significant prior works that utilize provenance graphs and ML techniques to detect attacks, specifically advanced persistent threats, which are very difficult to detect. Lately, there have been studies where transformer-based language models are being used to detect various types of attacks from system logs. However,… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

  16. arXiv:2309.09840  [pdf, other

    cs.NI

    Mobility Performance Analysis of RACH Optimization Based on Decision Tree Supervised Learning for Conditional Handover in 5G Beamformed Networks

    Authors: Subhyal Bin Iqbal, Umur Karabulut, Ahmad Awada, Andre Noll Barreto, Philipp Schulz, Gerhard P. Fettweis

    Abstract: In 5G cellular networks, frequency range 2 (FR2) introduces higher frequencies that cause rapid signal degradation and challenge user mobility. In recent studies, a conditional handover procedure has been adopted as an enhancement to baseline handover to enhance user mobility robustness. In this article, the mobility performance of conditional handover is analyzed for a 5G mm-wave network in FR2 t… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

    Comments: 8 pages, 6 figures. Accepted for presentation at the European Wireless 2023 Conference (EW2023), to be held in Rome, Italy. arXiv admin note: text overlap with arXiv:1910.11890

  17. arXiv:2309.04968  [pdf, other

    eess.IV cs.LG

    LMBiS-Net: A Lightweight Multipath Bidirectional Skip Connection based CNN for Retinal Blood Vessel Segmentation

    Authors: Mufassir M. Abbasi, Shahzaib Iqbal, Asim Naveed, Tariq M. Khan, Syed S. Naqvi, Wajeeha Khalid

    Abstract: Blinding eye diseases are often correlated with altered retinal morphology, which can be clinically identified by segmenting retinal structures in fundus images. However, current methodologies often fall short in accurately segmenting delicate vessels. Although deep learning has shown promise in medical image segmentation, its reliance on repeated convolution and pooling operations can hinder the… ▽ More

    Submitted 10 September, 2023; originally announced September 2023.

  18. arXiv:2309.03535  [pdf, other

    eess.IV cs.CV cs.LG

    Feature Enhancer Segmentation Network (FES-Net) for Vessel Segmentation

    Authors: Tariq M. Khan, Muhammad Arsalan, Shahzaib Iqbal, Imran Razzak, Erik Meijering

    Abstract: Diseases such as diabetic retinopathy and age-related macular degeneration pose a significant risk to vision, highlighting the importance of precise segmentation of retinal vessels for the tracking and diagnosis of progression. However, existing vessel segmentation methods that heavily rely on encoder-decoder structures struggle to capture contextual information about retinal vessel configurations… ▽ More

    Submitted 7 September, 2023; originally announced September 2023.

  19. Neural Networks at a Fraction with Pruned Quaternions

    Authors: Sahel Mohammad Iqbal, Subhankar Mishra

    Abstract: Contemporary state-of-the-art neural networks have increasingly large numbers of parameters, which prevents their deployment on devices with limited computational power. Pruning is one technique to remove unnecessary weights and reduce resource requirements for training and inference. In addition, for ML tasks where the input data is multi-dimensional, using higher-dimensional data embeddings such… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

    Journal ref: In Proceedings of the 6th Joint International Conference on Data Science & Management of Data (CODS-COMAD '23). ACM. 19-27 (2023)

  20. arXiv:2306.14632  [pdf, other

    cs.NI

    On the Mobility Analysis of UE-Side Beamforming for Multi-Panel User Equipment in 5G-Advanced

    Authors: Subhyal Bin Iqbal, Salman Nadaf, Umur Karabulut, Philipp Schulz, Anna Prado, Gerhard P. Fettweis, Wolfgang Kellerer

    Abstract: Frequency range 2 (FR2) has become an integral part of 5G networks to fulfill the ever-increasing demand for data hungry-applications. However, radio signals in FR2 experience high path and diffraction loss, which also pronounces the problem of inter and intra-cell interference. As a result, both the serving and target links are affected, leading to radio link failures (RLFs) and handover failures… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

    Comments: 7 pages, 6 figures. Accepted for presentation at the 2023 Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 2023), to be held in Toronto, Canada. arXiv admin note: text overlap with arXiv:2203.14763

  21. arXiv:2306.07888  [pdf, other

    cs.PF cs.SE eess.SY

    CAMEO: A Causal Transfer Learning Approach for Performance Optimization of Configurable Computer Systems

    Authors: Md Shahriar Iqbal, Ziyuan Zhong, Iftakhar Ahmad, Baishakhi Ray, Pooyan Jamshidi

    Abstract: Modern computer systems are highly configurable, with hundreds of configuration options that interact, resulting in an enormous configuration space. As a result, optimizing performance goals (e.g., latency) in such systems is challenging due to frequent uncertainties in their environments (e.g., workload fluctuations). Recently, transfer learning has been applied to address this problem by reusing… ▽ More

    Submitted 3 October, 2023; v1 submitted 13 June, 2023; originally announced June 2023.

  22. arXiv:2306.06145  [pdf, other

    eess.IV cs.CV cs.LG

    LDMRes-Net: Enabling Efficient Medical Image Segmentation on IoT and Edge Platforms

    Authors: Shahzaib Iqbal, Tariq M. Khan, Syed S. Naqvi, Muhammad Usman, Imran Razzak

    Abstract: In this study, we propose LDMRes-Net, a lightweight dual-multiscale residual block-based computational neural network tailored for medical image segmentation on IoT and edge platforms. Conventional U-Net-based models face challenges in meeting the speed and efficiency demands of real-time clinical applications, such as disease monitoring, radiation therapy, and image-guided surgery. LDMRes-Net ove… ▽ More

    Submitted 7 September, 2023; v1 submitted 9 June, 2023; originally announced June 2023.

  23. arXiv:2306.03971  [pdf

    cs.SE

    A Review Of Progress for Component Based Software Cost Estimation From 1965 to 2023

    Authors: Muhammad Nadeem, Humaira Afzal, Muhammad. Idrees, Sajid Iqbal, M. Rafiq Asim

    Abstract: Component Based Software Engineering (CBSE) is used to develop software from Commercial Off the Shelf Components (COTs) with minimum cost and time. Component Based Software Cost Estimation (CBSCE) is an important pre-development activity for the successful planning and cost estimation of Components-Based Software Development (CBSD) that saves cost and time. Many researchers are putting their effor… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Comments: 4. International Antalya Scientific Research and Innovative Studies Congress May 9-10, 2023, Antalya, Türkiye

  24. arXiv:2305.11077  [pdf, other

    cs.CV cs.LG

    A Comparative Study of Face Detection Algorithms for Masked Face Detection

    Authors: Sahel Mohammad Iqbal, Danush Shekar, Subhankar Mishra

    Abstract: Contemporary face detection algorithms have to deal with many challenges such as variations in pose, illumination, and scale. A subclass of the face detection problem that has recently gained increasing attention is occluded face detection, or more specifically, the detection of masked faces. Three years on since the advent of the COVID-19 pandemic, there is still a complete lack of evidence regar… ▽ More

    Submitted 18 May, 2023; originally announced May 2023.

  25. arXiv:2303.06794  [pdf, other

    cs.HC

    Sensing Wellbeing in the Workplace, Why and For Whom? Envisioning Impacts with Organizational Stakeholders

    Authors: Anna Kawakami, Shreya Chowdhary, Shamsi T. Iqbal, Q. Vera Liao, Alexandra Olteanu, **a Suh, Koustuv Saha

    Abstract: With the heightened digitization of the workplace, alongside the rise of remote and hybrid work prompted by the pandemic, there is growing corporate interest in using passive sensing technologies for workplace wellbeing. Existing research on these technologies often focus on understanding or improving interactions between an individual user and the technology. Workplace settings can, however, intr… ▽ More

    Submitted 6 June, 2023; v1 submitted 12 March, 2023; originally announced March 2023.

  26. A Domain-Agnostic Approach for Characterization of Lifelong Learning Systems

    Authors: Megan M. Baker, Alexander New, Mario Aguilar-Simon, Ziad Al-Halah, Sébastien M. R. Arnold, Ese Ben-Iwhiwhu, Andrew P. Brna, Ethan Brooks, Ryan C. Brown, Zachary Daniels, Anurag Daram, Fabien Delattre, Ryan Dellana, Eric Eaton, Haotian Fu, Kristen Grauman, Jesse Hostetler, Shariq Iqbal, Cassandra Kent, Nicholas Ketz, Soheil Kolouri, George Konidaris, Dhireesha Kudithipudi, Erik Learned-Miller, Seungwon Lee , et al. (22 additional authors not shown)

    Abstract: Despite the advancement of machine learning techniques in recent years, state-of-the-art systems lack robustness to "real world" events, where the input distributions and tasks encountered by the deployed systems will not be limited to the original training context, and systems will instead need to adapt to novel distributions and tasks while deployed. This critical gap may be addressed through th… ▽ More

    Submitted 18 January, 2023; originally announced January 2023.

    Comments: To appear in Neural Networks

  27. arXiv:2211.00573  [pdf, other

    cs.NI

    On the Analysis and Optimization of Fast Conditional Handover with Hand Blockage for Mobility

    Authors: Subhyal Bin Iqbal, Salman Nadaf, Ahmad Awada, Umur Karabulut, Philipp Schulz, Gerhard P. Fettweis

    Abstract: Although frequency range 2 (FR2) systems are an essential part of 5G-Advanced and future 3GPP releases, the mobility performance of multi-panel user equipment (MPUE) with hand blockage is still an area open for research and standardization. In this article, a comprehensive study on the mobility performance of MPUE with hand blockage is performed for conditional handover (CHO) and its potential enh… ▽ More

    Submitted 28 November, 2023; v1 submitted 1 November, 2022; originally announced November 2022.

    Comments: Accepted IEEE Access journal publication

  28. arXiv:2205.14205  [pdf, other

    cs.LG

    ALMA: Hierarchical Learning for Composite Multi-Agent Tasks

    Authors: Shariq Iqbal, Robby Costales, Fei Sha

    Abstract: Despite significant progress on multi-agent reinforcement learning (MARL) in recent years, coordination in complex domains remains a challenge. Work in MARL often focuses on solving tasks where agents interact with all other agents and entities in the environment; however, we observe that real-world tasks are often composed of several isolated instances of local agent interactions (subtasks), and… ▽ More

    Submitted 25 September, 2022; v1 submitted 27 May, 2022; originally announced May 2022.

    Comments: NeurIPS 2022 Camera Ready

  29. arXiv:2204.06909  [pdf, other

    cs.NI

    On the Modeling and Analysis of Fast Conditional Handover for 5G-Advanced

    Authors: Subhyal Bin Iqbal, Ahmad Awada, Umur Karabulut, Ingo Viering, Philipp Schulz, Gerhard P. Fettweis

    Abstract: Conditional handover (CHO) is a state-of-the-art 3GPP handover mechanism used in 5G networks. Although it improves mobility robustness by reducing mobility failures, the decoupling of the handover preparation and execution phases in CHO significantly increases the signaling overhead. For 5G-Advanced networks, fast CHO (FCHO) is a recent 3GPP proposal that offers a practical solution whereby the us… ▽ More

    Submitted 29 July, 2022; v1 submitted 14 April, 2022; originally announced April 2022.

    Comments: 7 pages, 7 figures. Accepted for presentation at the 2022 Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 2022)

  30. arXiv:2203.14763  [pdf, other

    cs.NI

    Analysis and Performance Evaluation of Mobility for Multi-Panel User Equipment in 5G Networks

    Authors: Subhyal Bin Iqbal, Ahmad Awada, Umur Karabulut, Ingo Viering, Philipp Schulz, Gerhard P. Fettweis

    Abstract: Frequency Range 2 (FR2) has become an integral part of 5G networks to fulfill the ever increasing demand for user data throughput. However, radio signals in FR2 experience high path and diffraction loss in mobile environments. To address this issue, multi-panel user equipment (MPUE) is adopted for FR2 whereby multiple antenna panels are placed on the UE body to leverage gains from antenna directiv… ▽ More

    Submitted 11 April, 2022; v1 submitted 28 March, 2022; originally announced March 2022.

    Comments: 7 pages, 7 figures. Accepted for presentation at the 2022 IEEE 95th Vehicular Technology Conference (VTC2022)-Spring, Helsinki, Finland

  31. arXiv:2203.12686  [pdf, other

    cs.LG cs.AI cs.NE stat.ML

    Possibility Before Utility: Learning And Using Hierarchical Affordances

    Authors: Robby Costales, Shariq Iqbal, Fei Sha

    Abstract: Reinforcement learning algorithms struggle on tasks with complex hierarchical dependency structures. Humans and other intelligent agents do not waste time assessing the utility of every high-level action in existence, but instead only consider ones they deem possible in the first place. By focusing only on what is feasible, or "afforded", at the present moment, an agent can spend more time both ev… ▽ More

    Submitted 23 March, 2022; originally announced March 2022.

    Comments: ICLR 2022 camera-ready

  32. arXiv:2202.07704  [pdf

    cs.CR cs.LG

    Simulating Malicious Attacks on VANETs for Connected and Autonomous Vehicle Cybersecurity: A Machine Learning Dataset

    Authors: Safras Iqbal, Peter Ball, Muhammad H Kamarudin, Andrew Bradley

    Abstract: Connected and Autonomous Vehicles (CAVs) rely on Vehicular Adhoc Networks with wireless communication between vehicles and roadside infrastructure to support safe operation. However, cybersecurity attacks pose a threat to VANETs and the safe operation of CAVs. This study proposes the use of simulation for modelling typical communication scenarios which may be subject to malicious attacks. The Ecli… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

    Comments: 12 page, 13 figures, 3 tables, conference CSNDSP 2022

  33. arXiv:2201.08413  [pdf, other

    cs.LG cs.AI cs.AR cs.DC cs.PF

    Unicorn: Reasoning about Configurable System Performance through the lens of Causality

    Authors: Md Shahriar Iqbal, Rahul Krishna, Mohammad Ali Javidian, Baishakhi Ray, Pooyan Jamshidi

    Abstract: Modern computer systems are highly configurable, with the total variability space sometimes larger than the number of atoms in the universe. Understanding and reasoning about the performance behavior of highly configurable systems, over a vast and variable space, is challenging. State-of-the-art methods for performance modeling and analyses rely on predictive machine learning models, therefore, th… ▽ More

    Submitted 17 March, 2022; v1 submitted 20 January, 2022; originally announced January 2022.

    Comments: EuroSys 2022 (camera-ready)

  34. arXiv:2201.04322  [pdf, other

    cs.DC cs.NI

    Gridiron: A Technique for Augmenting Cloud Workloads with Network Bandwidth Requirements

    Authors: Nodir Kodirov, Shane Bergsma, Syed M. Iqbal, Alan J. Hu, Ivan Beschastnikh, Margo Seltzer

    Abstract: Cloud applications use more than just server resources, they also require networking resources. We propose a new technique to model network bandwidth demand of networked cloud applications. Our technique, Gridiron, augments VM workload traces from Azure cloud with network bandwidth requirements. The key to the Gridiron technique is to derive inter-VM network bandwidth requirements using Amdahl's s… ▽ More

    Submitted 12 January, 2022; originally announced January 2022.

    Comments: 9 pages, 8 figures, 2 tables

  35. ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection

    Authors: Md. Monowar Anjum, Shahrear Iqbal, Benoit Hamelin

    Abstract: We present ANUBIS, a highly effective machine learning-based APT detection system. Our design philosophy for ANUBIS involves two principal components. Firstly, we intend ANUBIS to be effectively utilized by cyber-response teams. Therefore, prediction explainability is one of the main focuses of ANUBIS design. Secondly, ANUBIS uses system provenance graphs to capture causality and thereby achieve h… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

    Comments: Accepted for publication in the 37th ACM SIGAPP Symposium on Applied Computing (SAC 2022)

  36. arXiv:2107.04026  [pdf, other

    cs.CY cs.AI

    CVEH: A Dynamic Framework To Profile Vehicle Movements To Mitigate Hit And Run Cases Using Crowdsourcing

    Authors: Attiq ur Rehman, Asad Waqar Malik, Anis ur Rahman, Sohail Iqbal, Ghalib Ahmed Tahir

    Abstract: In developed countries like the USA, Germany, and the UK, the security forces used highly sophisticated equipment, fast vehicles, drones, and helicopters to catch offenders' vehicles. Whereas, in develo** countries with limited resources such schemes cannot be utilized due to management cost and other constraints. In this paper, we proposed a framework called CVEH that enables develo** countri… ▽ More

    Submitted 28 June, 2021; originally announced July 2021.

  37. arXiv:2105.04356  [pdf, other

    eess.IV cs.CV cs.LG

    Coconut trees detection and segmentation in aerial imagery using mask region-based convolution neural network

    Authors: Muhammad Shakaib Iqbal, Hazrat Ali, Son N. Tran, Talha Iqbal

    Abstract: Food resources face severe damages under extraordinary situations of catastrophes such as earthquakes, cyclones, and tsunamis. Under such scenarios, speedy assessment of food resources from agricultural land is critical as it supports aid activity in the disaster hit areas. In this article, a deep learning approach is presented for the detection and segmentation of coconut tress in aerial imagery… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

    Comments: Published in IET Computer Vision, 09 April 2021

  38. Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research

    Authors: Md. Monowar Anjum, Shahrear Iqbal, Benoit Hamelin

    Abstract: Maintaining security and privacy in real-world enterprise networks is becoming more and more challenging. Cyber actors are increasingly employing previously unreported and state-of-the-art techniques to break into corporate networks. To develop novel and effective methods to thwart these sophisticated cyberattacks, we need datasets that reflect real-world enterprise scenarios to a high degree of a… ▽ More

    Submitted 8 May, 2021; v1 submitted 4 March, 2021; originally announced March 2021.

    Comments: Accepted in ACM SACMAT 2021

  39. arXiv:2103.02524  [pdf

    cs.CY cs.AI cs.HC cs.SE cs.SI

    Personal Productivity and Well-being -- Chapter 2 of the 2021 New Future of Work Report

    Authors: Jenna Butler, Mary Czerwinski, Shamsi Iqbal, Sonia Jaffe, Kate Nowak, Emily Peloquin, Longqi Yang

    Abstract: We now turn to understanding the impact that COVID-19 had on the personal productivity and well-being of information workers as their work practices were impacted by remote work. This chapter overviews people's productivity, satisfaction, and work patterns, and shows that the challenges and benefits of remote work are closely linked. Looking forward, the infrastructure surrounding work will need t… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

    Comments: In The New Future of Work: Research from Microsoft on the Impact of the Pandemic on Work Practices, edited by Jaime Teevan, Brent Hecht, and Sonia Jaffe, 1st ed. Microsoft, 2021. https://aka.ms/newfutureofwork

  40. arXiv:2102.10593  [pdf, ps, other

    eess.IV cs.CV math.AT

    Classification of COVID-19 via Homology of CT-SCAN

    Authors: Sohail Iqbal, H. Fareed Ahmed, Talha Qaiser, Muhammad Imran Qureshi, Nasir Rajpoot

    Abstract: In this worldwide spread of SARS-CoV-2 (COVID-19) infection, it is of utmost importance to detect the disease at an early stage especially in the hot spots of this epidemic. There are more than 110 Million infected cases on the globe, sofar. Due to its promptness and effective results computed tomography (CT)-scan image is preferred to the reverse-transcription polymerase chain reaction (RT-PCR).… ▽ More

    Submitted 21 February, 2021; originally announced February 2021.

  41. Large Scale Analysis of Multitasking Behavior During Remote Meetings

    Authors: Hancheng Cao, Chia-Jung Lee, Shamsi Iqbal, Mary Czerwinski, Priscilla Wong, Sean Rintel, Brent Hecht, Jaime Teevan, Longqi Yang

    Abstract: Virtual meetings are critical for remote work because of the need for synchronous collaboration in the absence of in-person interactions. In-meeting multitasking is closely linked to people's productivity and wellbeing. However, we currently have limited understanding of multitasking in remote meetings and its potential impact. In this paper, we present what we believe is the most comprehensive st… ▽ More

    Submitted 28 January, 2021; originally announced January 2021.

    Comments: In ACM CHI 2021

  42. Towards a Robust and Trustworthy Machine Learning System Development: An Engineering Perspective

    Authors: Pulei Xiong, Scott Buffett, Shahrear Iqbal, Philippe Lamontagne, Mohammad Mamun, Heather Molyneaux

    Abstract: While Machine Learning (ML) technologies are widely adopted in many mission critical fields to support intelligent decision-making, concerns remain about system resilience against ML-specific security attacks and privacy breaches as well as the trust that users have in these systems. In this article, we present our recent systematic and comprehensive survey on the state-of-the-art ML robustness an… ▽ More

    Submitted 14 February, 2022; v1 submitted 8 January, 2021; originally announced January 2021.

    Comments: 20 pages (58 pages pre-print), 6 figures

    Journal ref: Journal of Information Security and Applications 65 (2022) 103121

  43. A Survey of Methods for Managing the Classification and Solution of Data Imbalance Problem

    Authors: Khan Md. Hasib, Md. Sadiq Iqbal, Faisal Muhammad Shah, Jubayer Al Mahmud, Mahmudul Hasan Popel, Md. Imran Hossain Showrov, Shakil Ahmed, Obaidur Rahman

    Abstract: The problem of class imbalance is extensive for focusing on numerous applications in the real world. In such a situation, nearly all of the examples are labeled as one class called majority class, while far fewer examples are labeled as the other class usually, the more important class is called minority. Over the last few years, several types of research have been carried out on the issue of clas… ▽ More

    Submitted 22 December, 2020; originally announced December 2020.

    Comments: 12 Pages, 2 Figures

    Journal ref: Journal of Computer Science, Volume 16, Issue 11, Year 2020, Page - 1546-1557

  44. arXiv:2010.06061  [pdf, other

    cs.SE eess.SY

    CADET: Debugging and Fixing Misconfigurations using Counterfactual Reasoning

    Authors: Rahul Krishna, Md Shahriar Iqbal, Mohammad Ali Javidian, Baishakhi Ray, Pooyan Jamshidi

    Abstract: Modern computing platforms are highly-configurable with thousands of interacting configurations. However, configuring these systems is challenging. Erroneous configurations can cause unexpected non-functional faults. This paper proposes CADET (short for Causal Debugging Toolkit) that enables users to identify, explain, and fix the root cause of non-functional faults early and in a principled fashi… ▽ More

    Submitted 8 March, 2021; v1 submitted 12 October, 2020; originally announced October 2020.

  45. arXiv:2009.11979  [pdf

    math.OC cs.AI

    An Environmentally Sustainable Closed-Loop Supply Chain Network Design under Uncertainty: Application of Optimization

    Authors: Md. Mohsin Ahmed, S. M. Salauddin Iqbal, Tazrin Jahan Priyanka, Mohammad Arani, Mohsen Momenitabar, Md Mashum Billal

    Abstract: Newly, the rates of energy and material consumption to augment industrial pro-duction are substantially high, thus the environmentally sustainable industrial de-velopment has emerged as the main issue of either developed or develo** coun-tries. A novel approach to supply chain management is proposed to maintain economic growth along with environmentally friendly concerns for the design of the su… ▽ More

    Submitted 24 September, 2020; originally announced September 2020.

    Comments: The paper has been accepted by "the 4th International Conference on Intelligent Decision Science (IDS)" and it will be published in "the Advances in Intelligent Systems and Computing"

  46. arXiv:2008.13020  [pdf

    cs.DL cs.LG

    A Decade of In-text Citation Analysis based on Natural Language Processing and Machine Learning Techniques: An overview of empirical studies

    Authors: Sehrish Iqbal, Saeed-Ul Hassan, Naif Radi Aljohani, Salem Alelyani, Raheel Nawaz, Lutz Bornmann

    Abstract: Citation analysis is one of the most frequently used methods in research evaluation. We are seeing significant growth in citation analysis through bibliometric metadata, primarily due to the availability of citation databases such as the Web of Science, Scopus, Google Scholar, Microsoft Academic, and Dimensions. Due to better access to full-text publication corpora in recent years, information sci… ▽ More

    Submitted 29 August, 2020; originally announced August 2020.

    Comments: 59 pages, 4 figures, 8 tables (submitted to Scientometrics)

    MSC Class: 68P20 ACM Class: H.3.1

  47. arXiv:2006.04222  [pdf, other

    cs.LG cs.AI cs.MA stat.ML

    Randomized Entity-wise Factorization for Multi-Agent Reinforcement Learning

    Authors: Shariq Iqbal, Christian A. Schroeder de Witt, Bei Peng, Wendelin Böhmer, Shimon Whiteson, Fei Sha

    Abstract: Multi-agent settings in the real world often involve tasks with varying types and quantities of agents and non-agent entities; however, common patterns of behavior often emerge among these agents/entities. Our method aims to leverage these commonalities by asking the question: ``What is the expected utility of each agent when only considering a randomly selected sub-group of its observed entities?… ▽ More

    Submitted 11 June, 2021; v1 submitted 7 June, 2020; originally announced June 2020.

    Comments: ICML 2021 Camera Ready

  48. arXiv:2002.05525  [pdf, other

    eess.SP cs.IT

    Minimum Length Scheduling for Discrete-Rate Full-Duplex Wireless Powered Communication Networks

    Authors: Muhammad Shahid Iqbal, Yalcin Sadi, Sinem Coleri

    Abstract: In this paper, we consider a wireless powered communication network where multiple users with RF energy harvesting capabilities communicate to a hybrid energy and information access point (HAP) in full-duplex mode. Each user has to transmit a certain amount of data with a transmission rate from a finite set of discrete rate levels, using the energy initially available in its battery and the energy… ▽ More

    Submitted 13 February, 2020; originally announced February 2020.

  49. arXiv:2002.00586  [pdf, other

    eess.SP cs.IT

    Minimum Length Scheduling for Full Duplex Time-Critical Wireless Powered Communication Networks

    Authors: Muhammad Shahid Iqbal, Yalcin Sadi, Sinem Coleri

    Abstract: Radio frequency (RF) energy harvesting is key in attaining perpetual lifetime for time-critical wireless powered communication networks due to full control on energy transfer, far field region, small and low-cost circuitry. In this paper, we propose a novel minimum length scheduling problem to determine the optimal power control, time allocation and transmission schedule subject to data, energy ca… ▽ More

    Submitted 21 June, 2020; v1 submitted 3 February, 2020; originally announced February 2020.

    Comments: accepted in IEEE Transactions on Wireless Communications and will appear in the future issue

  50. arXiv:2001.06588  [pdf, other

    cs.LG math.OC stat.ML

    FlexiBO: A Decoupled Cost-Aware Multi-Objective Optimization Approach for Deep Neural Networks

    Authors: Md Shahriar Iqbal, Jianhai Su, Lars Kotthoff, Pooyan Jamshidi

    Abstract: The design of machine learning systems often requires trading off different objectives, for example, prediction error and energy consumption for deep neural networks (DNNs). Typically, no single design performs well in all objectives; therefore, finding Pareto-optimal designs is of interest. The search for Pareto-optimal designs involves evaluating designs in an iterative process, and the measurem… ▽ More

    Submitted 21 August, 2022; v1 submitted 17 January, 2020; originally announced January 2020.