Skip to main content

Showing 1–18 of 18 results for author: Nadeem, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.06499  [pdf, other

    cs.CV cs.HC

    NarrativeBridge: Enhancing Video Captioning with Causal-Temporal Narrative

    Authors: Asmar Nadeem, Faegheh Sardari, Robert Dawes, Syed Sameed Husain, Adrian Hilton, Armin Mustafa

    Abstract: Existing video captioning benchmarks and models lack coherent representations of causal-temporal narrative, which is sequences of events linked through cause and effect, unfolding over time and driven by characters or agents. This lack of narrative restricts models' ability to generate text descriptions that capture the causal and temporal dynamics inherent in video content. To address this gap, w… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  2. arXiv:2310.16754  [pdf, other

    cs.CV

    CAD -- Contextual Multi-modal Alignment for Dynamic AVQA

    Authors: Asmar Nadeem, Adrian Hilton, Robert Dawes, Graham Thomas, Armin Mustafa

    Abstract: In the context of Audio Visual Question Answering (AVQA) tasks, the audio visual modalities could be learnt on three levels: 1) Spatial, 2) Temporal, and 3) Semantic. Existing AVQA methods suffer from two major shortcomings; the audio-visual (AV) information passing through the network isn't aligned on Spatial and Temporal levels; and, inter-modal (audio and visual) Semantic information is often n… ▽ More

    Submitted 27 October, 2023; v1 submitted 25 October, 2023; originally announced October 2023.

    Comments: Accepted to IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2024

  3. arXiv:2310.13079  [pdf, other

    cs.CR

    Critical Path Prioritization Dashboard for Alert-driven Attack Graphs

    Authors: Sònia Leal Díaz, Sergio Pastrana, Azqa Nadeem

    Abstract: Although intrusion alerts can provide threat intelligence regarding attacker strategies, extracting such intelligence via existing tools is expensive and time-consuming. Earlier work has proposed SAGE, which generates attack graphs from intrusion alerts using unsupervised sequential machine learning. This paper proposes a querying and prioritization-enabled visual analytics dashboard for SAGE. The… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

  4. Cybersecurity as a Crosscutting Concept Across an Undergrad Computer Science Curriculum: An Experience Report

    Authors: Azqa Nadeem

    Abstract: Although many Computer Science (CS) programs offer cybersecurity courses, they are typically optional and placed at the periphery of the program. We advocate to integrate cybersecurity as a crosscutting concept in CS curricula, which is also consistent with latest cybersecurity curricular guidelines, e.g., CSEC2017. We describe our experience of implementing this crosscutting intervention across t… ▽ More

    Submitted 16 January, 2024; v1 submitted 11 October, 2023; originally announced October 2023.

    Comments: 6 pages; Accepted at SIGCSE TS '24

  5. arXiv:2308.16464  [pdf, other

    cs.SE cs.AI

    MaintainoMATE: A GitHub App for Intelligent Automation of Maintenance Activities

    Authors: Anas Nadeem, Muhammad Usman Sarwar, Muhammad Zubair Malik

    Abstract: Software development projects rely on issue tracking systems at the core of tracking maintenance tasks such as bug reports, and enhancement requests. Incoming issue-reports on these issue tracking systems must be managed in an effective manner. First, they must be labelled and then assigned to a particular developer with relevant expertise. This handling of issue-reports is critical and requires t… ▽ More

    Submitted 31 August, 2023; originally announced August 2023.

  6. arXiv:2303.14829  [pdf, other

    cs.CV

    SEM-POS: Grammatically and Semantically Correct Video Captioning

    Authors: Asmar Nadeem, Adrian Hilton, Robert Dawes, Graham Thomas, Armin Mustafa

    Abstract: Generating grammatically and semantically correct captions in video captioning is a challenging task. The captions generated from the existing methods are either word-by-word that do not align with grammatical structure or miss key information from the input videos. To address these issues, we introduce a novel global-local fusion network, with a Global-Local Fusion Block (GLFB) that encodes and f… ▽ More

    Submitted 4 April, 2023; v1 submitted 26 March, 2023; originally announced March 2023.

  7. arXiv:2208.10605  [pdf, other

    cs.CR cs.CY cs.LG

    SoK: Explainable Machine Learning for Computer Security Applications

    Authors: Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer

    Abstract: Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) microcosm of studies that develop and utilize XAI methods for defensive and offensive cybersecurity tasks. We identify 3 cybersecurity stakeholders, i.e., model users, designers, and adversaries, who utilize XAI for 4 distinct objec… ▽ More

    Submitted 3 March, 2023; v1 submitted 22 August, 2022; originally announced August 2022.

    Comments: 13 pages. Accepted at Euro S&P

  8. arXiv:2206.12190  [pdf, other

    cs.LG

    SECLEDS: Sequence Clustering in Evolving Data Streams via Multiple Medoids and Medoid Voting

    Authors: Azqa Nadeem, Sicco Verwer

    Abstract: Sequence clustering in a streaming environment is challenging because it is computationally expensive, and the sequences may evolve over time. K-medoids or Partitioning Around Medoids (PAM) is commonly used to cluster sequences since it supports alignment-based distances, and the k-centers being actual data items helps with cluster interpretability. However, offline k-medoids has no support for co… ▽ More

    Submitted 24 June, 2022; originally announced June 2022.

    Comments: Accepted to appear in ECML/PKDD 2022

  9. arXiv:2206.07776  [pdf, other

    cs.LG cs.CR

    Robust Attack Graph Generation

    Authors: Dennis Mouwen, Sicco Verwer, Azqa Nadeem

    Abstract: We present a method to learn automaton models that are more robust to input modifications. It iteratively aligns sequences to a learned model, modifies the sequences to their aligned versions, and re-learns the model. Automaton learning algorithms are typically very good at modeling the frequent behavior of a software system. Our solution can be used to also learn the behavior present in infrequen… ▽ More

    Submitted 15 June, 2022; originally announced June 2022.

    Comments: Appeared at LearnAut '22

  10. arXiv:2205.01512  [pdf, other

    cs.NE cs.CY cs.LG

    Fair Feature Subset Selection using Multiobjective Genetic Algorithm

    Authors: Ayaz Ur Rehman, Anas Nadeem, Muhammad Zubair Malik

    Abstract: The feature subset selection problem aims at selecting the relevant subset of features to improve the performance of a Machine Learning (ML) algorithm on training data. Some features in data can be inherently noisy, costly to compute, improperly scaled, or correlated to other features, and they can adversely affect the accuracy, cost, and complexity of the induced algorithm. The goal of traditiona… ▽ More

    Submitted 30 April, 2022; originally announced May 2022.

  11. A Case for Microservices Orchestration Using Workflow Engines

    Authors: Anas Nadeem, Muhammad Zubair Malik

    Abstract: Microservices have become the de-facto software architecture for cloud-native applications. A contentious architectural decision in microservices is to compose them using choreography or orchestration. In choreography, every service works independently, whereas, in orchestration, there is a controller that coordinates service interactions. This paper makes a case for orchestration. The promise of… ▽ More

    Submitted 14 April, 2022; originally announced April 2022.

    Comments: 5 pages, International Conference on Software Engineering 2022 (NIER) Track

  12. Automatic Issue Classifier: A Transfer Learning Framework for Classifying Issue Reports

    Authors: Anas Nadeem, Muhammad Usman Sarwar, Muhammad Zubair Malik

    Abstract: Issue tracking systems are used in the software industry for the facilitation of maintenance activities that keep the software robust and up to date with ever-changing industry requirements. Usually, users report issues that can be categorized into different labels such as bug reports, enhancement requests, and questions related to the software. Most of the issue tracking systems make the labellin… ▽ More

    Submitted 12 February, 2022; originally announced February 2022.

    Comments: 6 pages, International Symposium on Software Reliability Engineering (ISSRE 2021) Industry Track

  13. arXiv:2107.02783  [pdf, other

    cs.CR cs.LG

    SAGE: Intrusion Alert-driven Attack Graph Extractor

    Authors: Azqa Nadeem, Sicco Verwer, Shanchieh Jay Yang

    Abstract: Attack graphs (AG) are used to assess pathways availed by cyber adversaries to penetrate a network. State-of-the-art approaches for AG generation focus mostly on deriving dependencies between system vulnerabilities based on network scans and expert knowledge. In real-world operations however, it is costly and ineffective to rely on constant vulnerability scanning and expert-crafted AGs. We propose… ▽ More

    Submitted 14 October, 2021; v1 submitted 6 July, 2021; originally announced July 2021.

    Comments: Appeared at VizSec '21 (proceedings) and KDD AI4Cyber '21 (without proceedings)

  14. arXiv:1907.08083   

    cs.CY cs.CR

    Laptop Theft in a University Setting can be Avoided with Warnings

    Authors: Azqa Nadeem, Marianne Junger

    Abstract: Laptops have become an indispensable asset in today's digital age. They often contain highly sensitive information, such as credentials and confidential documents. As a result, the value of a laptop is an accumulation of the value of both the physical device itself and the cyber assets it contains, making it a lucrative target for theft. Educational institutions have a large population of potentia… ▽ More

    Submitted 4 November, 2022; v1 submitted 18 July, 2019; originally announced July 2019.

    Comments: The results in this paper are erroneous. Due to selection bias, the results are not statistically significant

  15. Beyond Labeling: Using Clustering to Build Network Behavioral Profiles of Malware Families

    Authors: Azqa Nadeem, Christian Hammerschmidt, Carlos H. Gañán, Sicco Verwer

    Abstract: Malware family labels are known to be inconsistent. They are also black-box since they do not represent the capabilities of malware. The current state-of-the-art in malware capability assessment include mostly manual approaches, which are infeasible due to the ever-increasing volume of discovered malware samples. We propose a novel unsupervised machine learning-based method called MalPaCA, which a… ▽ More

    Submitted 13 November, 2020; v1 submitted 2 April, 2019; originally announced April 2019.

    Comments: Accepted as a chapter in Springer MAAIDL 2020

  16. A Safe Regression Testing Technique for Web Services based on WSDL Specification

    Authors: Tehreem Masood, Aamer Nadeem, Gang-soo Lee

    Abstract: Specification-based regression testing of web services is an important activity which verifies the quality of web services. A major problem in web services is that only provider has the source code and both user and broker only have the XML based specification. So from the perspective of user and broker, specification based regression testing of web services is needed. The existing techniques are… ▽ More

    Submitted 3 June, 2015; originally announced June 2015.

    Comments: 9 figures, 2 tables, 11 pages, ASEA 2011

    Journal ref: Communications in Computer and Information Science Volume 257, 2011, pp 108-119

  17. arXiv:1102.4162  [pdf

    cs.SE

    Comparative Study on DFD to UML Diagrams Transformations

    Authors: Atif A. A. Jilani, Muhammad Usman, Aamer Nadeem

    Abstract: Most of legacy systems use nowadays were modeled and documented using structured approach. Expansion of these systems in terms of functionality and maintainability requires shift towards object-oriented documentation and design, which has been widely accepted by the industry. In this paper, we present a survey of the existing Data Flow Diagram (DFD) to Unified Modeling language (UML) transformatio… ▽ More

    Submitted 21 February, 2011; originally announced February 2011.

    Comments: 7 pages; ISSN: 2221-0741

    Journal ref: World of Computer Science and Information Technology Journal(WCSIT), Vol. 1, No.1,10-16, 2011

  18. arXiv:1003.2677  [pdf

    cs.IR

    Classified Ads Harvesting Agent and Notification System

    Authors: Razvi Doomun, Lollmahamod N., Auleear Nadeem, Mozafar Aukin

    Abstract: The shift from an information society to a knowledge society require rapid information harvesting, reliable search and instantaneous on demand delivery. Information extraction agents are used to explore and collect data available from Web, in order to effectively exploit such data for business purposes, such as automatic news filtering, advertisement or product searching and price comparing. In t… ▽ More

    Submitted 13 March, 2010; originally announced March 2010.

    Comments: International Conference on Information and Communication Technology for the Muslim World (ICT4M 2006), 21-23 November 2006, Kuala Lumpur, Malaysia