Skip to main content

Showing 1–25 of 25 results for author: Rafi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.03744  [pdf, other

    cs.CV cs.LG

    ReDistill: Residual Encoded Distillation for Peak Memory Reduction

    Authors: Fang Chen, Gourav Datta, Mujahid Al Rafi, Hyeran Jeon, Meng Tang

    Abstract: The expansion of neural network sizes and the enhancement of image resolution through modern camera sensors result in heightened memory and power demands for neural networks. Reducing peak memory, which is the maximum memory consumed during the execution of a neural network, is critical to deploy neural networks on edge devices with limited memory budget. A naive approach to reducing peak memory i… ▽ More

    Submitted 6 June, 2024; v1 submitted 6 June, 2024; originally announced June 2024.

  2. arXiv:2404.04496  [pdf, other

    cs.SE

    Towards Better Graph Neural Network-based Fault Localization Through Enhanced Code Representation

    Authors: Md Nakhla Rafi, Dong Jae Kim, An Ran Chen, Tse-Hsun Chen, Shaowei Wang

    Abstract: Automatic software fault localization plays an important role in software quality assurance by pinpointing faulty locations for easier debugging. Coverage-based fault localization, a widely used technique, employs statistics on coverage spectra to rank code based on suspiciousness scores. However, the rigidity of statistical approaches calls for learning-based techniques. Amongst all, Grace, a gra… ▽ More

    Submitted 30 April, 2024; v1 submitted 6 April, 2024; originally announced April 2024.

  3. arXiv:2403.09715  [pdf, other

    cs.SE cs.CL cs.CR cs.LG

    Textual analysis of End User License Agreement for red-flagging potentially malicious software

    Authors: Behraj Khan, Tahir Syed, Zeshan Khan, Muhammad Rafi

    Abstract: New software and updates are downloaded by end users every day. Each dowloaded software has associated with it an End Users License Agreements (EULA), but this is rarely read. An EULA includes information to avoid legal repercussions. However,this proposes a host of potential problems such as spyware or producing an unwanted affect in the target system. End users do not read these EULA's because o… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  4. arXiv:2310.19139  [pdf, other

    cs.SE

    Back to the Future! Studying Data Cleanness in Defects4J and its Impact on Fault Localization

    Authors: An Ran Chen, Md Nakhla Rafi, Tse-Hsun Chen, Shaohua Wang

    Abstract: For software testing research, Defects4J stands out as the primary benchmark dataset, offering a controlled environment to study real bugs from prominent open-source systems. However, prior research indicates that Defects4J might include tests added post-bug report, embedding developer knowledge and affecting fault localization efficacy. In this paper, we examine Defects4J's fault-triggering tests… ▽ More

    Submitted 9 November, 2023; v1 submitted 29 October, 2023; originally announced October 2023.

  5. arXiv:2310.16991  [pdf

    cs.CV

    An Efficient Deep Learning-based approach for Recognizing Agricultural Pests in the Wild

    Authors: Mohtasim Hadi Rafi, Mohammad Ratul Mahjabin, Md Sabbir Rahman

    Abstract: One of the biggest challenges that the farmers go through is to fight insect pests during agricultural product yields. The problem can be solved easily and avoid economic losses by taking timely preventive measures. This requires identifying insect pests in an easy and effective manner. Most of the insect species have similarities between them. Without proper help from the agriculturist academicia… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

  6. arXiv:2301.01914  [pdf

    cs.CV

    Accuracy and Fidelity Comparison of Luna and DALL-E 2 Diffusion-Based Image Generation Systems

    Authors: Michael Cahyadi, Muhammad Rafi, William Shan, Jurike Moniaga, Henry Lucky

    Abstract: We qualitatively examine the accuracy and fidelity between two diffusion-based image generation systems, namely DALL-E 2 and Luna, which have massive differences in training datasets, algorithmic approaches, prompt resolvement, and output upscaling. The methodology used is a qualitative benchmark created by Saharia et al. and in our research we conclude that DALL-E 2 significantly edges Luna in bo… ▽ More

    Submitted 27 February, 2023; v1 submitted 5 January, 2023; originally announced January 2023.

  7. arXiv:2212.12741  [pdf, other

    cs.CV cs.AI

    LMFLOSS: A Hybrid Loss For Imbalanced Medical Image Classification

    Authors: Abu Adnan Sadi, Labib Chowdhury, Nursrat Jahan, Mohammad Newaz Sharif Rafi, Radeya Chowdhury, Faisal Ahamed Khan, Nabeel Mohammed

    Abstract: Automatic medical image classification is a very important field where the use of AI has the potential to have a real social impact. However, there are still many challenges that act as obstacles to making practically effective solutions. One of those is the fact that most of the medical imaging datasets have a class imbalance problem. This leads to the fact that existing AI techniques, particular… ▽ More

    Submitted 24 December, 2022; originally announced December 2022.

  8. arXiv:2211.10877  [pdf, other

    cs.CL cs.AI cs.LG

    Artificial Interrogation for Attributing Language Models

    Authors: Farhan Dhanani, Muhammad Rafi

    Abstract: This paper presents solutions to the Machine Learning Model Attribution challenge (MLMAC) collectively organized by MITRE, Microsoft, Schmidt-Futures, Robust-Intelligence, Lincoln-Network, and Huggingface community. The challenge provides twelve open-sourced base versions of popular language models developed by well-known organizations and twelve fine-tuned language models for text generation. The… ▽ More

    Submitted 20 November, 2022; originally announced November 2022.

  9. arXiv:2207.09539  [pdf, other

    cs.CR cs.LG

    Revealing Secrets From Pre-trained Models

    Authors: Mujahid Al Rafi, Yuan Feng, Hyeran Jeon

    Abstract: With the growing burden of training deep learning models with large data sets, transfer-learning has been widely adopted in many emerging deep learning algorithms. Transformer models such as BERT are the main player in natural language processing and use transfer-learning as a de facto standard training method. A few big data companies release pre-trained models that are trained with a few popular… ▽ More

    Submitted 19 July, 2022; originally announced July 2022.

  10. arXiv:2205.11038  [pdf, other

    cs.CE physics.app-ph physics.comp-ph physics.optics

    Computational Approach of Designing Magnetfree Nonreciprocal Metamaterial

    Authors: Swadesh Poddar, Md. Tanvir Hasan, Md. Ragib Shakil Rafi

    Abstract: This article aims at discussing computational approach to design magnet-free nonreciprocal metamaterial. Detailed mathematical derivation on floquet mode analysis is presented for Faraday and Kerr rotation. Non-reciprocity in the designed metasurface is achieved in the presence of biased transistor loaded in the gap of circular ring resonator. Based on the synthesized mathematical model, We extrac… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

    Comments: 8 figures, 10 pages

  11. arXiv:2204.07476  [pdf, other

    cs.CV

    Guiding Attention using Partial-Order Relationships for Image Captioning

    Authors: Murad Popattia, Muhammad Rafi, Rizwan Qureshi, Shah Nawaz

    Abstract: The use of attention models for automated image captioning has enabled many systems to produce accurate and meaningful descriptions for images. Over the years, many novel approaches have been proposed to enhance the attention process using different feature representations. In this paper, we extend this approach by creating a guided attention network mechanism, that exploits the relationship betwe… ▽ More

    Submitted 15 April, 2022; originally announced April 2022.

    Comments: Accepted at CVPRW

  12. arXiv:2009.06862  [pdf, other

    cs.SI

    Understanding Global Reaction to the Recent Outbreaks of COVID-19: Insights from Instagram Data Analysis

    Authors: Abdul Muntakim Rafi, Shivang Rana, Rajwinder Kaur, Q. M. Jonathan Wu, Pooya Moradian Zadeh

    Abstract: The coronavirus disease, also known as the COVID-19, is an ongoing pandemic of a severe acute respiratory syndrome. The pandemic has led to the cancellation of many religious, political, and cultural events around the world. A huge number of people have been stuck within their homes because of unprecedented lockdown measures taken globally. This paper examines the reaction of individuals to the vi… ▽ More

    Submitted 15 September, 2020; originally announced September 2020.

  13. arXiv:2001.08155  [pdf, other

    cs.CR cs.LG stat.ML

    An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks SAD-F: Spark Based Anomaly Detection Framework

    Authors: Awais Ahmed, Sufian Hameed, Muhammad Rafi, Qublai Khan Ali Mirza

    Abstract: Anomaly detection is a crucial step for preventing malicious activities in the network and kee** resources available all the time for legitimate users. It is noticed from various studies that classical anomaly detectors work well with small and sampled data, but the chances of failures increase with real-time (non-sampled data) traffic data. In this paper, we will be exploring security analytic… ▽ More

    Submitted 14 February, 2020; v1 submitted 21 January, 2020; originally announced January 2020.

  14. arXiv:1907.12355  [pdf, other

    cs.NI

    Performance Evaluation of the LoRa Protocol in the context of Smart Meter

    Authors: Muhammad Nouman Rafi, Muhammad Muaaz

    Abstract: In recent years, the use of Low Power Wide Area Network (LPWAN) is increasing for the Internet of Things (IoT) applications. In order to demonstrate the application of LPWAN technologies for a realistic smart metering scenario, we set-up and implement a widely used LPWAN protocol which is called LoRaWAN. In this study, the LoRaWAN is implemented by using Multitech devices (end-node and gateway) an… ▽ More

    Submitted 4 July, 2019; originally announced July 2019.

    Comments: 13 pages

  15. arXiv:1506.08966  [pdf

    cs.IR cs.DL

    Classification of Research Citations (CRC)

    Authors: Bilal Hayat Butt, Muhammad Rafi, Arsal Jamal, Raja Sami Ur Rehman, Syed Muhammad Zubair Alam, Muhammad Bilal Alam

    Abstract: Research is a continuous phenomenon. It is recursive in nature. Every research is based on some earlier research outcome. A general approach in reviewing the literature for a problem is to categorize earlier work for the same problem as positive and negative citations. In this paper, we propose a novel automated technique, which classifies whether an earlier work is cited as sentiment positive or… ▽ More

    Submitted 30 June, 2015; originally announced June 2015.

  16. arXiv:1412.1888  [pdf

    cs.IR

    Document clustering using graph based document representation with constraints

    Authors: Muhammad Rafi, Farnaz Amin, Mohammad Shahid Shaikh

    Abstract: Document clustering is an unsupervised approach in which a large collection of documents (corpus) is subdivided into smaller, meaningful, identifiable, and verifiable sub-groups (clusters). Meaningful representation of documents and implicitly identifying the patterns, on which this separation is performed, is the challenging part of document clustering. We have proposed a document clustering tech… ▽ More

    Submitted 4 December, 2014; originally announced December 2014.

  17. arXiv:1303.4087  [pdf

    cs.IR

    An improved semantic similarity measure for document clustering based on topic maps

    Authors: Muhammad Rafi, Mohammad Shahid Shaikh

    Abstract: A major computational burden, while performing document clustering, is the calculation of similarity measure between a pair of documents. Similarity measure is a function that assigns a real number between 0 and 1 to a pair of documents, depending upon the degree of similarity between them. A value of zero means that the documents are completely dissimilar whereas a value of one indicates that the… ▽ More

    Submitted 17 March, 2013; originally announced March 2013.

    Comments: 5 pages

  18. arXiv:1301.2785  [pdf

    cs.IR cs.LG

    A comparison of SVM and RVM for Document Classification

    Authors: Muhammad Rafi, Mohammad Shahid Shaikh

    Abstract: Document classification is a task of assigning a new unclassified document to one of the predefined set of classes. The content based document classification uses the content of the document with some weighting criteria to assign it to one of the predefined classes. It is a major task in library science, electronic document management systems and information sciences. This paper investigates docum… ▽ More

    Submitted 13 January, 2013; originally announced January 2013.

    Comments: ICoCSIM 2012, Medan Indonesia

  19. arXiv:1208.3623  [pdf

    cs.IR cs.AI

    Content-based Text Categorization using Wikitology

    Authors: Muhammad Rafi, Sundus Hassan, Mohammad Shahid Shaikh

    Abstract: A major computational burden, while performing document clustering, is the calculation of similarity measure between a pair of documents. Similarity measure is a function that assign a real number between 0 and 1 to a pair of documents, depending upon the degree of similarity between them. A value of zero means that the documents are completely dissimilar whereas a value of one indicates that the… ▽ More

    Submitted 17 August, 2012; originally announced August 2012.

    Comments: 9 pages; IJCSI August 2012

  20. Comparing SVM and Naive Bayes classifiers for text categorization with Wikitology as knowledge enrichment

    Authors: Sundus Hassan, Muhammad Rafi, Muhammad Shahid Shaikh

    Abstract: The activity of labeling of documents according to their content is known as text categorization. Many experiments have been carried out to enhance text categorization by adding background knowledge to the document using knowledge repositories like Word Net, Open Project Directory (OPD), Wikipedia and Wikitology. In our previous work, we have carried out intensive experiments by extracting knowled… ▽ More

    Submitted 18 February, 2012; originally announced February 2012.

    Comments: 5 pages

    Journal ref: Multitopic Conference (INMIC), 2011 IEEE 14th International

  21. arXiv:1201.2084  [pdf

    cs.AI cs.IR

    Sentence based semantic similarity measure for blog-posts

    Authors: Mehwish Aziz, Muhammad Rafi

    Abstract: Blogs-Online digital diary like application on web 2.0 has opened new and easy way to voice opinion, thoughts, and like-dislike of every Internet user to the World. Blogosphere has no doubt the largest user-generated content repository full of knowledge. The potential of this knowledge is still to be explored. Knowledge discovery from this new genre is quite difficult and challenging as it is tota… ▽ More

    Submitted 10 January, 2012; originally announced January 2012.

    Comments: 6th International Conference on Digital Content, Multimedia Technology and its Applications (IDC), 2010

  22. arXiv:1201.2073  [pdf

    cs.AI cs.CL cs.IR

    Pbm: A new dataset for blog mining

    Authors: Mehwish Aziz, Muhammad Rafi

    Abstract: Text mining is becoming vital as Web 2.0 offers collaborative content creation and sharing. Now Researchers have growing interest in text mining methods for discovering knowledge. Text mining researchers come from variety of areas like: Natural Language Processing, Computational Linguistic, Machine Learning, and Statistics. A typical text mining application involves preprocessing of text, stemming… ▽ More

    Submitted 10 January, 2012; originally announced January 2012.

    Comments: 6; Internet and Web Engineering from: International Conference on Computer Engineering and Technology, 3rd (ICCET 2011)

  23. A comparison of two suffix tree-based document clustering algorithms

    Authors: Muhammad Rafi, M. Maujood, M. M. Fazal, S. M. Ali

    Abstract: Document clustering as an unsupervised approach extensively used to navigate, filter, summarize and manage large collection of document repositories like the World Wide Web (WWW). Recently, focuses in this domain shifted from traditional vector based document similarity for clustering to suffix tree based document similarity, as it offers more semantic representation of the text present in the doc… ▽ More

    Submitted 10 January, 2012; v1 submitted 28 December, 2011; originally announced December 2011.

    Comments: Information and Emerging Technologies (ICIET), 2010 International Conference

  24. arXiv:1112.6219  [pdf

    cs.IR cs.AI

    Document Clustering based on Topic Maps

    Authors: Muhammad Rafi, M. Shahid Shaikh, Amir Farooq

    Abstract: Importance of document clustering is now widely acknowledged by researchers for better management, smart navigation, efficient filtering, and concise summarization of large collection of documents like World Wide Web (WWW). The next challenge lies in semantically performing clustering based on the semantic contents of the document. The problem of document clustering has two main components: (1) to… ▽ More

    Submitted 28 December, 2011; originally announced December 2011.

    Journal ref: International Journal of Computer Applications 12(1):32-36, December 2010

  25. arXiv:1004.3263  [pdf

    cs.SE

    DRMS Co-design by F4MS

    Authors: Aissam Berrahou, Mourad Rafi, Mohsine Eleuldj

    Abstract: In this paper, we present Digital Rights Management systems (DRMS) which are becoming more and more complex due to technology revolution in relation with telecommunication networks, multimedia applications and the reading equipments (Mobile Phone, IPhone, PDA, DVD Player,..). The complexity of the DRMS, involves the use of new tools and methodologies that support software components and hardware c… ▽ More

    Submitted 19 April, 2010; originally announced April 2010.

    Comments: International Journal of Computer Science Issues online at http://ijcsi.org/articles/DRMS-Co-design-by-F4MS.php

    Journal ref: IJCSI, Volume 7, Issue 2, March 2010