Skip to main content

Showing 1–13 of 13 results for author: Mirza, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.01475  [pdf, other

    cs.LG cond-mat.mtrl-sci cs.AI physics.chem-ph

    Are large language models superhuman chemists?

    Authors: Adrian Mirza, Nawaf Alampara, Sreekanth Kunchapu, Benedict Emoekabu, Aswanth Krishnan, Mara Wilhelmi, Macjonathan Okereke, Juliane Eberhardt, Amir Mohammad Elahi, Maximilian Greiner, Caroline T. Holick, Tanya Gupta, Mehrdad Asgari, Christina Glaubitz, Lea C. Klepsch, Yannik Köster, Jakob Meyer, Santiago Miret, Tim Hoffmann, Fabian Alexander Kreth, Michael Ringleb, Nicole Roesner, Ulrich S. Schubert, Leanne M. Stafast, Dinga Wonanke , et al. (3 additional authors not shown)

    Abstract: Large language models (LLMs) have gained widespread interest due to their ability to process human language and perform tasks on which they have not been explicitly trained. This is relevant for the chemical sciences, which face the problem of small and diverse datasets that are frequently in the form of text. LLMs have shown promise in addressing these issues and are increasingly being harnessed… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  2. arXiv:2301.03164  [pdf, other

    cs.CV cs.AI cs.LG

    Cursive Caption Text Detection in Videos

    Authors: Ali Mirza, Imran Siddiqi

    Abstract: Textual content appearing in videos represents an interesting index for semantic retrieval of videos (from archives), generation of alerts (live streams) as well as high level applications like opinion mining and content summarization. One of the key components of such systems is the detection of textual content in video frames and the same makes the subject of our present study. This paper presen… ▽ More

    Submitted 8 January, 2023; originally announced January 2023.

    Comments: 19 pages, 16 figures

  3. Characterization and Optimization of Integrated Silicon-Photonic Neural Networks under Fabrication-Process Variations

    Authors: Asif Mirza, Amin Shafiee, Sanmitra Banerjee, Krishnendu Chakrabarty, Sudeep Pasricha, Mahdi Nikdast

    Abstract: Silicon-photonic neural networks (SPNNs) have emerged as promising successors to electronic artificial intelligence (AI) accelerators by offering orders of magnitude lower latency and higher energy efficiency. Nevertheless, the underlying silicon photonic devices in SPNNs are sensitive to inevitable fabrication-process variations (FPVs) stemming from optical lithography imperfections. Consequently… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

  4. arXiv:2107.05530  [pdf

    cs.LG cs.AR cs.ET

    ROBIN: A Robust Optical Binary Neural Network Accelerator

    Authors: Febin P. Sunny, Asif Mirza, Mahdi Nikdast, Sudeep Pasricha

    Abstract: Domain specific neural network accelerators have garnered attention because of their improved energy efficiency and inference performance compared to CPUs and GPUs. Such accelerators are thus well suited for resource-constrained embedded systems. However, map** sophisticated neural network models on these accelerators still entails significant energy and memory consumption, along with high infer… ▽ More

    Submitted 12 July, 2021; originally announced July 2021.

  5. arXiv:2103.08828  [pdf

    cs.ET cs.AR cs.DC

    ARXON: A Framework for Approximate Communication over Photonic Networks-on-Chip

    Authors: Febin Sunny, Asif Mirza, Ishan Thakkar, Mahdi Nikdast, Sudeep Pasricha

    Abstract: The approximate computing paradigm advocates for relaxing accuracy goals in applications to improve energy-efficiency and performance. Recently, this paradigm has been explored to improve the energy-efficiency of silicon photonic networks-on-chip (PNoCs). Silicon photonic interconnects suffer from high power dissipation because of laser sources, which generate carrier wavelengths, and tuning power… ▽ More

    Submitted 15 March, 2021; originally announced March 2021.

    Comments: arXiv admin note: text overlap with arXiv:2002.11289

  6. arXiv:2102.06960  [pdf

    cs.LG cs.AR cs.ET cs.NE

    CrossLight: A Cross-Layer Optimized Silicon Photonic Neural Network Accelerator

    Authors: Febin Sunny, Asif Mirza, Mahdi Nikdast, Sudeep Pasricha

    Abstract: Domain-specific neural network accelerators have seen growing interest in recent years due to their improved energy efficiency and inference performance compared to CPUs and GPUs. In this paper, we propose a novel cross-layer optimized neural network accelerator called CrossLight that leverages silicon photonics. CrossLight includes device-level engineering for resilience to process variations and… ▽ More

    Submitted 13 February, 2021; originally announced February 2021.

  7. arXiv:2002.11289  [pdf

    cs.AR

    LORAX: Loss-Aware Approximations for Energy-Efficient Silicon Photonic Networks-on-Chip

    Authors: Febin Sunny, Asif Mirza, Ishan Thakkar, Sudeep Pasricha, Nikdast Mahdi

    Abstract: The approximate computing paradigm advocates for relaxing accuracy goals in applications to improve energy-efficiency and performance. Recently, this paradigm has been explored to improve the energy efficiency of silicon photonic networks-on-chip (PNoCs). In this paper, we propose a novel framework (LORAX) to enable more aggressive approximation during communication over silicon photonic links in… ▽ More

    Submitted 25 February, 2020; originally announced February 2020.

    Comments: Submitted and accepted at GLSVLSI 2020

  8. arXiv:2001.08155  [pdf, other

    cs.CR cs.LG stat.ML

    An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks SAD-F: Spark Based Anomaly Detection Framework

    Authors: Awais Ahmed, Sufian Hameed, Muhammad Rafi, Qublai Khan Ali Mirza

    Abstract: Anomaly detection is a crucial step for preventing malicious activities in the network and kee** resources available all the time for legitimate users. It is noticed from various studies that classical anomaly detectors work well with small and sampled data, but the chances of failures increase with real-time (non-sampled data) traffic data. In this paper, we will be exploring security analytic… ▽ More

    Submitted 14 February, 2020; v1 submitted 21 January, 2020; originally announced January 2020.

  9. arXiv:1910.10958  [pdf

    cs.CR cs.LG

    Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique

    Authors: Muhammad Furqan Rafique, Muhammad Ali, Aqsa Saeed Qureshi, Asifullah Khan, Anwar Majid Mirza

    Abstract: In the case of malware analysis, categorization of malicious files is an essential part after malware detection. Numerous static and dynamic techniques have been reported so far for categorizing malware. This research presents a deep learning-based malware detection (DLMD) technique based on static methods for classifying different malware families. The proposed DLMD technique uses both the byte a… ▽ More

    Submitted 26 December, 2020; v1 submitted 24 October, 2019; originally announced October 2019.

    Comments: 21 pages, 8 figures, 11 tables

  10. arXiv:1710.09207  [pdf, other

    eess.SP cs.LG stat.ML

    Unsupervised and Semi-supervised Anomaly Detection with LSTM Neural Networks

    Authors: Tolga Ergen, Ali Hassan Mirza, Suleyman Serdar Kozat

    Abstract: We investigate anomaly detection in an unsupervised framework and introduce Long Short Term Memory (LSTM) neural network based algorithms. In particular, given variable length data sequences, we first pass these sequences through our LSTM based structure and obtain fixed length sequences. We then find a decision function for our anomaly detectors based on the One Class Support Vector Machines (OC-… ▽ More

    Submitted 25 October, 2017; originally announced October 2017.

  11. arXiv:1105.2002  [pdf

    cs.CR cs.NI

    Security Risks and Modern Cyber Security Technologies for Corporate Networks

    Authors: Wajeb Gharibi, Abdulrahman Mirza

    Abstract: This article aims to highlight current trends on the market of corporate antivirus solutions. Brief overview of modern security threats that can destroy IT environment is provided as well as a typical structure and features of antivirus suits for corporate users presented on the market. The general requirements for corporate products are determined according to the last report from av-comparatives… ▽ More

    Submitted 10 May, 2011; originally announced May 2011.

    Comments: 5 pages

    Journal ref: (IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 1, January 2011

  12. arXiv:1105.1720  [pdf

    cs.NI cs.CR cs.IT

    Software Vulnerabilities, Banking Threats, Botnets and Malware Self-Protection Technologies

    Authors: Wajeb Gharibi, Abdulrahman Mirza

    Abstract: Information security is the protection of information from a wide range of threats in order to ensure success business continuity by minimizing risks and maximizing the return of investments and business opportunities. In this paper, we study and discuss the software vulnerabilities, banking threats, botnets and propose the malware self-protection technologies.

    Submitted 9 May, 2011; originally announced May 2011.

    Comments: 5 pages

    MSC Class: www.IJCSI.org

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 1, January 2011, 236-241

  13. arXiv:1003.1796  [pdf

    cs.CR

    Content based Zero-Watermarking Algorithm for Authentication of Text Documents

    Authors: Zunera Jalil, Anwar M. Mirza, Maria Sabir

    Abstract: Copyright protection and authentication of digital contents has become a significant issue in the current digital epoch with efficient communication mediums such as internet. Plain text is the rampantly used medium used over the internet for information exchange and it is very crucial to verify the authenticity of information. There are very limited techniques available for plain text watermarking… ▽ More

    Submitted 9 March, 2010; originally announced March 2010.

    Comments: Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 7 No. 2, February 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/