Skip to main content

Showing 1–3 of 3 results for author: Mahmud, S M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.08344  [pdf, other

    cs.CV

    Blind Image Deblurring using FFT-ReLU with Deep Learning Pipeline Integration

    Authors: Abdul Mohaimen Al Radi, Prothito Shovon Majumder, Syed Mumtahin Mahmud, Mahdi Mohd Hossain Noki, Md. Haider Ali, Md. Mosaddek Khan

    Abstract: Blind image deblurring is the process of deriving a sharp image and a blur kernel from a blurred image. Blurry images are typically modeled as the convolution of a sharp image with a blur kernel, necessitating the estimation of the unknown blur kernel to perform blind image deblurring effectively. Existing approaches primarily focus on domain-specific features of images, such as salient edges, dar… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

    Comments: 20 pages, 13 figures

  2. arXiv:2304.09181  [pdf, other

    cs.SE cs.AI

    Large Language Models Based Automatic Synthesis of Software Specifications

    Authors: Shantanu Mandal, Adhrik Chethan, Vahid Janfaza, S M Farabi Mahmud, Todd A Anderson, Javier Turek, Jesmin Jahan Tithi, Abdullah Muzahid

    Abstract: Software configurations play a crucial role in determining the behavior of software systems. In order to ensure safe and error-free operation, it is necessary to identify the correct configuration, along with their valid bounds and rules, which are commonly referred to as software specifications. As software systems grow in complexity and scale, the number of configurations and associated specific… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

  3. Attack of the Knights: A Non Uniform Cache Side-Channel Attack

    Authors: Farabi Mahmud, Sungkeun Kim, Harpreet Singh Chawla, Chia-Che Tsai, Eun Jung Kim, Abdullah Muzahid

    Abstract: For a distributed last-level cache (LLC) in a large multicore chip, the access time to one LLC bank can significantly differ from that to another due to the difference in physical distance. In this paper, we successfully demonstrated a new distance-based side-channel attack by timing the AES decryption operation and extracting part of an AES secret key on an Intel Knights Landing CPU. We introduce… ▽ More

    Submitted 31 May, 2023; v1 submitted 18 December, 2021; originally announced December 2021.

    Journal ref: Annual Computer Security Applications Conference ACSAC 2023