Skip to main content

Showing 1–10 of 10 results for author: Sajid, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.01426  [pdf, other

    cs.CR cs.DC

    Maximizing Blockchain Performance: Mitigating Conflicting Transactions through Parallelism and Dependency Management

    Authors: Faisal Haque Bappy, Tarannum Shaila Zaman, Md Sajidul Islam Sajid, Mir Mehedi Ahsan Pritom, Tariqul Islam

    Abstract: While blockchains initially gained popularity in the realm of cryptocurrencies, their widespread adoption is expanding beyond conventional applications, driven by the imperative need for enhanced data security. Despite providing a secure network, blockchains come with certain tradeoffs, including high latency, lower throughput, and an increased number of transaction failures. A pivotal issue contr… ▽ More

    Submitted 2 July, 2024; v1 submitted 1 July, 2024; originally announced July 2024.

  2. arXiv:2406.00801  [pdf, other

    cs.LG

    Ensemble Deep Random Vector Functional Link Neural Network Based on Fuzzy Inference System

    Authors: M. Sajid, M. Tanveer, P. N. Suganthan

    Abstract: The ensemble deep random vector functional link (edRVFL) neural network has demonstrated the ability to address the limitations of conventional artificial neural networks. However, since edRVFL generates features for its hidden layers through random projection, it can potentially lose intricate features or fail to capture certain non-linear features in its base models (hidden layers). To enhance t… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

    Journal ref: IEEE Transactions on Fuzzy Systems, 2024

  3. Decoding Cognitive Health Using Machine Learning: A Comprehensive Evaluation for Diagnosis of Significant Memory Concern

    Authors: M. Sajid, Rahul Sharma, Iman Beheshti, M. Tanveer

    Abstract: The timely identification of significant memory concern (SMC) is crucial for proactive cognitive health management, especially in an aging population. Detecting SMC early enables timely intervention and personalized care, potentially slowing cognitive disorder progression. This study presents a state-of-the-art review followed by a comprehensive evaluation of machine learning models within the ran… ▽ More

    Submitted 11 May, 2024; originally announced May 2024.

    Journal ref: WIREs Data Mining and Knowledge Discovery, 2024

  4. arXiv:2312.09123  [pdf, other

    cs.DC cs.CR

    MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain

    Authors: Tariqul Islam, Faisal Haque Bappy, Tarannum Shaila Zaman, Md Sajidul Islam Sajid, Mir Mehedi Ahsan Pritom

    Abstract: The core of a blockchain network is its consensus algorithm. Starting with the Proof-of-Work, there have been various versions of consensus algorithms, such as Proof-of-Stake (PoS), Proof-of-Authority (PoA), and Practical Byzantine Fault Tolerance (PBFT). Each of these algorithms focuses on different aspects to ensure efficient and reliable processing of transactions. Blockchain operates in a dece… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

  5. arXiv:2312.08305  [pdf, other

    cs.DC

    ConChain: A Scheme for Contention-free and Attack Resilient BlockChain

    Authors: Faisal Haque Bappy, Tariqul Islam, Tarannum Shaila Zaman, Md Sajidul Islam Sajid, Mir Mehedi Ahsan Pritom

    Abstract: Although blockchains have become widely popular for their use in cryptocurrencies, they are now becoming pervasive as more traditional applications adopt blockchain to ensure data security. Despite being a secured network, blockchains have some tradeoffs such as high latency, low throughput, and transaction failures. One of the core problems behind these is improper management of "conflicting tran… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

  6. Intuitionistic Fuzzy Broad Learning System: Enhancing Robustness Against Noise and Outliers

    Authors: M. Sajid, A. K. Malik, M. Tanveer

    Abstract: In the realm of data classification, broad learning system (BLS) has proven to be a potent tool that utilizes a layer-by-layer feed-forward neural network. However, the traditional BLS treats all samples as equally significant, which makes it less robust and less effective for real-world datasets with noises and outliers. To address this issue, we propose fuzzy broad learning system (F-BLS) and th… ▽ More

    Submitted 11 May, 2024; v1 submitted 15 July, 2023; originally announced July 2023.

    Journal ref: IEEE Transactions on Fuzzy Systems, 2024

  7. Graph Embedded Intuitionistic Fuzzy Random Vector Functional Link Neural Network for Class Imbalance Learning

    Authors: M. A. Ganaie, M. Sajid, A. K. Malik, M. Tanveer

    Abstract: The domain of machine learning is confronted with a crucial research area known as class imbalance learning, which presents considerable hurdles in precise classification of minority classes. This issue can result in biased models where the majority class takes precedence in the training process, leading to the underrepresentation of the minority class. The random vector functional link (RVFL) net… ▽ More

    Submitted 16 February, 2024; v1 submitted 15 July, 2023; originally announced July 2023.

    Comments: IEEE Transactions on Neural Networks and Learning Systems

    Journal ref: IEEE Transactions on Neural Networks and Learning Systems, 2024

  8. arXiv:2304.13090  [pdf, ps, other

    cs.LG cs.CR eess.SY

    Model Extraction Attacks Against Reinforcement Learning Based Controllers

    Authors: Momina Sajid, Yanning Shen, Yasser Shoukry

    Abstract: We introduce the problem of model-extraction attacks in cyber-physical systems in which an attacker attempts to estimate (or extract) the feedback controller of the system. Extracting (or estimating) the controller provides an unmatched edge to attackers since it allows them to predict the future control actions of the system and plan their attack accordingly. Hence, it is important to understand… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Comments: 8 pages, 8 figures

  9. arXiv:2202.04620  [pdf, other

    cs.CR

    IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms

    Authors: Md Morshed Alam, Md Sajidul Islam Sajid, Weichao Wang, **peng Wei

    Abstract: With the emergence and fast development of trigger-action platforms in IoT settings, security vulnerabilities caused by the interactions among IoT devices become more prevalent. The event occurrence at one device triggers an action in another device, which may eventually contribute to the creation of a chain of events in a network. Adversaries exploit the chain effect to compromise IoT devices and… ▽ More

    Submitted 9 February, 2022; originally announced February 2022.

    Comments: This paper appears in the 2022 IEEE Wireless Communications and Networking Conference (WCNC 2022). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses

  10. arXiv:2004.03675  [pdf, other

    eess.IV cs.CV

    Spatio-temporal Learning from Longitudinal Data for Multiple Sclerosis Lesion Segmentation

    Authors: Stefan Denner, Ashkan Khakzar, Moiz Sajid, Mahdi Saleh, Ziga Spiclin, Seong Tae Kim, Nassir Navab

    Abstract: Segmentation of Multiple Sclerosis (MS) lesions in longitudinal brain MR scans is performed for monitoring the progression of MS lesions. We hypothesize that the spatio-temporal cues in longitudinal data can aid the segmentation algorithm. Therefore, we propose a multi-task learning approach by defining an auxiliary self-supervised task of deformable registration between two time-points to guide t… ▽ More

    Submitted 26 September, 2020; v1 submitted 7 April, 2020; originally announced April 2020.

    Comments: Accepted at BrainLes Workshop in MICCAI2020