Skip to main content

Showing 1–46 of 46 results for author: Saleh, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19526  [pdf, other

    cs.CL cs.IR cs.LG

    TocBERT: Medical Document Structure Extraction Using Bidirectional Transformers

    Authors: Majd Saleh, Sarra Baghdadi, Stéphane Paquelet

    Abstract: Text segmentation holds paramount importance in the field of Natural Language Processing (NLP). It plays an important role in several NLP downstream tasks like information retrieval and document summarization. In this work, we propose a new solution, namely TocBERT, for segmenting texts using bidirectional transformers. TocBERT represents a supervised solution trained on the detection of titles an… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: 6 pages, 6 figures

  2. arXiv:2405.01728  [pdf, other

    cs.CR

    Explainability Guided Adversarial Evasion Attacks on Malware Detectors

    Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Moustafa Saleh

    Abstract: As the focus on security of Artificial Intelligence (AI) is becoming paramount, research on crafting and inserting optimal adversarial perturbations has become increasingly critical. In the malware domain, this adversarial sample generation relies heavily on the accuracy and placement of crafted perturbation with the goal of evading a trained classifier. This work focuses on applying explainabilit… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  3. arXiv:2404.18550  [pdf, other

    cs.LG cs.HC

    IncidentResponseGPT: Generating Traffic Incident Response Plans with Generative Artificial Intelligence

    Authors: Artur Grigorev, Adriana-Simona Mihaita Khaled Saleh, Yuming Ou

    Abstract: Traffic congestion due to road incidents poses a significant challenge in urban environments, leading to increased pollution, economic losses, and traffic congestion. Efficiently managing these incidents is imperative for mitigating their adverse effects; however, the complexity of urban traffic systems and the variety of potential incidents represent a considerable obstacle. This paper introduces… ▽ More

    Submitted 29 May, 2024; v1 submitted 29 April, 2024; originally announced April 2024.

  4. arXiv:2404.07668  [pdf, other

    eess.IV cs.CV

    Shape Completion in the Dark: Completing Vertebrae Morphology from 3D Ultrasound

    Authors: Miruna-Alexandra Gafencu, Yordanka Velikova, Mahdi Saleh, Tamas Ungi, Nassir Navab, Thomas Wendler, Mohammad Farid Azampour

    Abstract: Purpose: Ultrasound (US) imaging, while advantageous for its radiation-free nature, is challenging to interpret due to only partially visible organs and a lack of complete 3D information. While performing US-based diagnosis or investigation, medical professionals therefore create a mental map of the 3D anatomy. In this work, we aim to replicate this process and enhance the visual representation of… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

  5. arXiv:2403.06428  [pdf, other

    cs.CR

    Intra-Section Code Cave Injection for Adversarial Evasion Attacks on Windows PE Malware File

    Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Moustafa Saleh

    Abstract: Windows malware is predominantly available in cyberspace and is a prime target for deliberate adversarial evasion attacks. Although researchers have investigated the adversarial malware attack problem, a multitude of important questions remain unanswered, including (a) Are the existing techniques to inject adversarial perturbations in Windows Portable Executable (PE) malware files effective enough… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  6. arXiv:2403.05530  [pdf, other

    cs.CL cs.AI

    Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context

    Authors: Gemini Team, Petko Georgiev, Ving Ian Lei, Ryan Burnell, Libin Bai, Anmol Gulati, Garrett Tanzer, Damien Vincent, Zhufeng Pan, Shibo Wang, Soroosh Mariooryad, Yifan Ding, Xinyang Geng, Fred Alcober, Roy Frostig, Mark Omernick, Lexi Walker, Cosmin Paduraru, Christina Sorokin, Andrea Tacchetti, Colin Gaffney, Samira Daruki, Olcan Sercinoglu, Zach Gleicher, Juliette Love , et al. (1092 additional authors not shown)

    Abstract: In this report, we introduce the Gemini 1.5 family of models, representing the next generation of highly compute-efficient multimodal models capable of recalling and reasoning over fine-grained information from millions of tokens of context, including multiple long documents and hours of video and audio. The family includes two new models: (1) an updated Gemini 1.5 Pro, which exceeds the February… ▽ More

    Submitted 14 June, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

  7. arXiv:2402.03466  [pdf, other

    cs.CV cs.CG cs.RO

    Physics-Encoded Graph Neural Networks for Deformation Prediction under Contact

    Authors: Mahdi Saleh, Michael Sommersperger, Nassir Navab, Federico Tombari

    Abstract: In robotics, it's crucial to understand object deformation during tactile interactions. A precise understanding of deformation can elevate robotic simulations and have broad implications across different industries. We introduce a method using Physics-Encoded Graph Neural Networks (GNNs) for such predictions. Similar to robotic gras** and manipulation scenarios, we focus on modeling the dynamics… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: Accepted at 2024 IEEE International Conference on Robotics and Automation (ICRA2024)

  8. arXiv:2402.01878  [pdf, other

    cs.CL cs.LG

    LiPO: Listwise Preference Optimization through Learning-to-Rank

    Authors: Tianqi Liu, Zhen Qin, Junru Wu, Jiaming Shen, Misha Khalman, Rishabh Joshi, Yao Zhao, Mohammad Saleh, Simon Baumgartner, Jialu Liu, Peter J. Liu, Xuanhui Wang

    Abstract: Aligning language models (LMs) with curated human feedback is critical to control their behaviors in real-world applications. Several recent policy optimization methods, such as DPO and SLiC, serve as promising alternatives to the traditional Reinforcement Learning from Human Feedback (RLHF) approach. In practice, human feedback often comes in a format of a ranked list over multiple responses to a… ▽ More

    Submitted 22 May, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

  9. arXiv:2401.03797  [pdf

    cs.CL cs.LG

    Anatomy of Neural Language Models

    Authors: Majd Saleh, Stéphane Paquelet

    Abstract: The fields of generative AI and transfer learning have experienced remarkable advancements in recent years especially in the domain of Natural Language Processing (NLP). Transformers have been at the heart of these advancements where the cutting-edge transformer-based Language Models (LMs) have led to new state-of-the-art results in a wide spectrum of applications. While the number of research wor… ▽ More

    Submitted 27 February, 2024; v1 submitted 8 January, 2024; originally announced January 2024.

    Comments: 36 Pages; 25 Figures; some typos and notation errors are corrected in this version

  10. arXiv:2312.11805  [pdf, other

    cs.CL cs.AI cs.CV

    Gemini: A Family of Highly Capable Multimodal Models

    Authors: Gemini Team, Rohan Anil, Sebastian Borgeaud, Jean-Baptiste Alayrac, Jiahui Yu, Radu Soricut, Johan Schalkwyk, Andrew M. Dai, Anja Hauth, Katie Millican, David Silver, Melvin Johnson, Ioannis Antonoglou, Julian Schrittwieser, Amelia Glaese, Jilin Chen, Emily Pitler, Timothy Lillicrap, Angeliki Lazaridou, Orhan Firat, James Molloy, Michael Isard, Paul R. Barham, Tom Hennigan, Benjamin Lee , et al. (1325 additional authors not shown)

    Abstract: This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultr… ▽ More

    Submitted 17 June, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

  11. arXiv:2310.07264  [pdf, other

    cs.LG

    Classification of Dysarthria based on the Levels of Severity. A Systematic Review

    Authors: Afnan Al-Ali, Somaya Al-Maadeed, Moutaz Saleh, Rani Chinnappa Naidu, Zachariah C Alex, Prakash Ramachandran, Rajeev Khoodeeram, Rajesh Kumar M

    Abstract: Dysarthria is a neurological speech disorder that can significantly impact affected individuals' communication abilities and overall quality of life. The accurate and objective classification of dysarthria and the determination of its severity are crucial for effective therapeutic intervention. While traditional assessments by speech-language pathologists (SLPs) are common, they are often subjecti… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

    Comments: no comments

  12. arXiv:2309.06657  [pdf, other

    cs.CL

    Statistical Rejection Sampling Improves Preference Optimization

    Authors: Tianqi Liu, Yao Zhao, Rishabh Joshi, Misha Khalman, Mohammad Saleh, Peter J. Liu, Jialu Liu

    Abstract: Improving the alignment of language models with human preferences remains an active research challenge. Previous approaches have primarily utilized Reinforcement Learning from Human Feedback (RLHF) via online RL methods such as Proximal Policy Optimization (PPO). Recently, offline methods such as Sequence Likelihood Calibration (SLiC) and Direct Preference Optimization (DPO) have emerged as attrac… ▽ More

    Submitted 23 January, 2024; v1 submitted 12 September, 2023; originally announced September 2023.

    Comments: Accepted in ICLR 2024

  13. arXiv:2309.02965  [pdf, other

    cs.CV

    Dynamic Hyperbolic Attention Network for Fine Hand-object Reconstruction

    Authors: Zhiying Leng, Shun-Cheng Wu, Mahdi Saleh, Antonio Montanaro, Hao Yu, Yin Wang, Nassir Navab, Xiaohui Liang, Federico Tombari

    Abstract: Reconstructing both objects and hands in 3D from a single RGB image is complex. Existing methods rely on manually defined hand-object constraints in Euclidean space, leading to suboptimal feature learning. Compared with Euclidean space, hyperbolic space better preserves the geometric properties of meshes thanks to its exponentially-growing space distance, which amplifies the differences between th… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

    Comments: Accpeted by ICCV 2023

    ACM Class: I.4.5

  14. arXiv:2309.00372  [pdf, other

    eess.IV cs.CV

    On the Localization of Ultrasound Image Slices within Point Distribution Models

    Authors: Lennart Bastian, Vincent Bürgin, Ha Young Kim, Alexander Baumann, Benjamin Busam, Mahdi Saleh, Nassir Navab

    Abstract: Thyroid disorders are most commonly diagnosed using high-resolution Ultrasound (US). Longitudinal nodule tracking is a pivotal diagnostic protocol for monitoring changes in pathological thyroid morphology. This task, however, imposes a substantial cognitive load on clinicians due to the inherent challenge of maintaining a mental 3D reconstruction of the organ. We thus present a framework for autom… ▽ More

    Submitted 1 September, 2023; originally announced September 2023.

    Comments: ShapeMI Workshop @ MICCAI 2023; 12 pages 2 figures

  15. arXiv:2305.10425  [pdf, other

    cs.CL cs.AI

    SLiC-HF: Sequence Likelihood Calibration with Human Feedback

    Authors: Yao Zhao, Rishabh Joshi, Tianqi Liu, Misha Khalman, Mohammad Saleh, Peter J. Liu

    Abstract: Learning from human feedback has been shown to be effective at aligning language models with human preferences. Past work has often relied on Reinforcement Learning from Human Feedback (RLHF), which optimizes the language model using reward scores assigned from a reward model trained on human preference data. In this work we show how the recently introduced Sequence Likelihood Calibration (SLiC),… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

  16. arXiv:2304.14736  [pdf, other

    cs.CV

    Differentiable Sensor Layouts for End-to-End Learning of Task-Specific Camera Parameters

    Authors: Hendrik Sommerhoff, Shashank Agnihotri, Mohamed Saleh, Michael Moeller, Margret Keuper, Andreas Kolb

    Abstract: The success of deep learning is frequently described as the ability to train all parameters of a network on a specific application in an end-to-end fashion. Yet, several design choices on the camera level, including the pixel layout of the sensor, are considered as pre-defined and fixed, and high resolution, regular pixel layouts are considered to be the most generic ones in computer vision and gr… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

  17. arXiv:2304.07515  [pdf, other

    cs.CV cs.LG

    S3M: Scalable Statistical Shape Modeling through Unsupervised Correspondences

    Authors: Lennart Bastian, Alexander Baumann, Emily Hoppe, Vincent Bürgin, Ha Young Kim, Mahdi Saleh, Benjamin Busam, Nassir Navab

    Abstract: Statistical shape models (SSMs) are an established way to represent the anatomy of a population with various clinically relevant applications. However, they typically require domain expertise, and labor-intensive landmark annotations to construct. We address these shortcomings by proposing an unsupervised method that leverages deep geometric features and functional correspondences to simultaneousl… ▽ More

    Submitted 24 July, 2023; v1 submitted 15 April, 2023; originally announced April 2023.

    Comments: Accepted at MICCAI 2023. 13 pages, 6 figures

  18. arXiv:2303.08231  [pdf, other

    cs.CV

    Rotation-Invariant Transformer for Point Cloud Matching

    Authors: Hao Yu, Zheng Qin, Ji Hou, Mahdi Saleh, Dongsheng Li, Benjamin Busam, Slobodan Ilic

    Abstract: The intrinsic rotation invariance lies at the core of matching point clouds with handcrafted descriptors. However, it is widely despised by recent deep matchers that obtain the rotation invariance extrinsically via data augmentation. As the finite number of augmented rotations can never span the continuous SO(3) space, these methods usually show instability when facing rotations that are rarely se… ▽ More

    Submitted 27 March, 2024; v1 submitted 14 March, 2023; originally announced March 2023.

    Comments: Accepted to CVPR 2023

  19. arXiv:2212.09928  [pdf, other

    cs.CL cs.LG

    Improving the Robustness of Summarization Models by Detecting and Removing Input Noise

    Authors: Kundan Krishna, Yao Zhao, Jie Ren, Balaji Lakshminarayanan, Jiaming Luo, Mohammad Saleh, Peter J. Liu

    Abstract: The evaluation of abstractive summarization models typically uses test data that is identically distributed as training data. In real-world practice, documents to be summarized may contain input noise caused by text extraction artifacts or data pipeline bugs. The robustness of model performance under distribution shift caused by such noise is relatively under-studied. We present a large empirical… ▽ More

    Submitted 4 December, 2023; v1 submitted 19 December, 2022; originally announced December 2022.

    Comments: EMNLP Findings 2023 Camera Ready

  20. arXiv:2210.00045  [pdf, other

    cs.CL

    Calibrating Sequence likelihood Improves Conditional Language Generation

    Authors: Yao Zhao, Misha Khalman, Rishabh Joshi, Shashi Narayan, Mohammad Saleh, Peter J. Liu

    Abstract: Conditional language models are predominantly trained with maximum likelihood estimation (MLE), giving probability mass to sparsely observed target sequences. While MLE trained models assign high probability to plausible sequences given the context, the model probabilities often do not accurately rank-order generated sequences by quality. This has been empirically observed in beam search decoding… ▽ More

    Submitted 30 September, 2022; originally announced October 2022.

  21. arXiv:2209.15558  [pdf, other

    cs.CL

    Out-of-Distribution Detection and Selective Generation for Conditional Language Models

    Authors: Jie Ren, Jiaming Luo, Yao Zhao, Kundan Krishna, Mohammad Saleh, Balaji Lakshminarayanan, Peter J. Liu

    Abstract: Machine learning algorithms typically assume independent and identically distributed samples in training and at test time. Much work has shown that high-performing ML classifiers can degrade significantly and provide overly-confident, wrong classification predictions, particularly for out-of-distribution (OOD) inputs. Conditional language models (CLMs) are predominantly trained to classify the nex… ▽ More

    Submitted 7 March, 2023; v1 submitted 30 September, 2022; originally announced September 2022.

    Comments: Published in ICLR 2023

  22. arXiv:2209.13252  [pdf, other

    cs.CV

    RIGA: Rotation-Invariant and Globally-Aware Descriptors for Point Cloud Registration

    Authors: Hao Yu, Ji Hou, Zheng Qin, Mahdi Saleh, Ivan Shugurov, Kai Wang, Benjamin Busam, Slobodan Ilic

    Abstract: Successful point cloud registration relies on accurate correspondences established upon powerful descriptors. However, existing neural descriptors either leverage a rotation-variant backbone whose performance declines under large rotations, or encode local geometry that is less distinctive. To address this issue, we introduce RIGA to learn descriptors that are Rotation-Invariant by design and Glob… ▽ More

    Submitted 27 September, 2022; originally announced September 2022.

  23. arXiv:2208.04564  [pdf, other

    stat.ML cs.LG

    Statistical Properties of the log-cosh Loss Function Used in Machine Learning

    Authors: Resve A. Saleh, A. K. Md. Ehsanes Saleh

    Abstract: This paper analyzes a popular loss function used in machine learning called the log-cosh loss function. A number of papers have been published using this loss function but, to date, no statistical analysis has been presented in the literature. In this paper, we present the distribution function from which the log-cosh loss arises. We compare it to a similar distribution, called the Cauchy distribu… ▽ More

    Submitted 15 March, 2024; v1 submitted 9 August, 2022; originally announced August 2022.

    Comments: 10 pages, 17 figures

  24. arXiv:2208.00524  [pdf, other

    cs.CV cs.AI

    CloudAttention: Efficient Multi-Scale Attention Scheme For 3D Point Cloud Learning

    Authors: Mahdi Saleh, Yige Wang, Nassir Navab, Benjamin Busam, Federico Tombari

    Abstract: Processing 3D data efficiently has always been a challenge. Spatial operations on large-scale point clouds, stored as sparse data, require extra cost. Attracted by the success of transformers, researchers are using multi-head attention for vision tasks. However, attention calculations in transformers come with quadratic complexity in the number of inputs and miss spatial intuition on sets like poi… ▽ More

    Submitted 31 July, 2022; originally announced August 2022.

  25. arXiv:2203.09418  [pdf, other

    cs.CV

    ZebraPose: Coarse to Fine Surface Encoding for 6DoF Object Pose Estimation

    Authors: Yongzhi Su, Mahdi Saleh, Torben Fetzer, Jason Rambach, Nassir Navab, Benjamin Busam, Didier Stricker, Federico Tombari

    Abstract: Establishing correspondences from image to 3D has been a key task of 6DoF object pose estimation for a long time. To predict pose more accurately, deeply learned dense maps replaced sparse templates. Dense methods also improved pose estimation in the presence of occlusion. More recently researchers have shown improvements by learning object fragments as segmentation. In this work, we present a dis… ▽ More

    Submitted 29 March, 2022; v1 submitted 17 March, 2022; originally announced March 2022.

    Comments: CVPR2022 camera ready

  26. arXiv:2202.01537  [pdf, other

    cs.CV cs.CG cs.GR

    Bending Graphs: Hierarchical Shape Matching using Gated Optimal Transport

    Authors: Mahdi Saleh, Shun-Cheng Wu, Luca Cosmo, Nassir Navab, Benjamin Busam, Federico Tombari

    Abstract: Shape matching has been a long-studied problem for the computer graphics and vision community. The objective is to predict a dense correspondence between meshes that have a certain degree of deformation. Existing methods either consider the local description of sampled points or discover correspondences based on global shape information. In this work, we investigate a hierarchical learning design,… ▽ More

    Submitted 3 February, 2022; originally announced February 2022.

  27. arXiv:2111.04805  [pdf, other

    stat.ML cs.LG

    Solution to the Non-Monotonicity and Crossing Problems in Quantile Regression

    Authors: Resve A. Saleh, A. K. Md. Ehsanes Saleh

    Abstract: This paper proposes a new method to address the long-standing problem of lack of monotonicity in estimation of the conditional and structural quantile function, also known as quantile crossing problem. Quantile regression is a very powerful tool in data science in general and econometrics in particular. Unfortunately, the crossing problem has been confounding researchers and practitioners alike fo… ▽ More

    Submitted 24 November, 2021; v1 submitted 8 November, 2021; originally announced November 2021.

    Comments: 8 pages, 14 figures, IEEE conference format

  28. arXiv:2110.14076  [pdf, other

    cs.CV cs.AI

    CoFiNet: Reliable Coarse-to-fine Correspondences for Robust Point Cloud Registration

    Authors: Hao Yu, Fu Li, Mahdi Saleh, Benjamin Busam, Slobodan Ilic

    Abstract: We study the problem of extracting correspondences between a pair of point clouds for registration. For correspondence retrieval, existing works benefit from matching sparse keypoints detected from dense points but usually struggle to guarantee their repeatability. To address this issue, we present CoFiNet - Coarse-to-Fine Network which extracts hierarchical correspondences from coarse to fine wit… ▽ More

    Submitted 26 October, 2021; originally announced October 2021.

    Comments: Accepted to NeurIPS 2021

  29. arXiv:2108.05576  [pdf

    cs.CY

    Common Investigation Process Model for Internet of Things Forensics

    Authors: Muhammed Ahmed Saleh, Siti Hajar Othman, Arafat Al-Dhaqm, Mahmoud Ahmad Al-Khasawneh

    Abstract: Internet of Things Forensics (IoTFs) is a new discipline in digital forensics science used in the detection, acquisition, preservation, rebuilding, analyzing, and the presentation of evidence from IoT environments. IoTFs discipline still suffers from several issues and challenges that have in the recent past been documented. For example, heterogeneity of IoT infrastructures has mainly been a key c… ▽ More

    Submitted 12 August, 2021; originally announced August 2021.

    Comments: 6 pages, 5 figuers, 76 references

  30. arXiv:2102.09681  [pdf, other

    cs.CL cs.IR

    WebRED: Effective Pretraining And Finetuning For Relation Extraction On The Web

    Authors: Robert Ormandi, Mohammad Saleh, Erin Winter, Vinay Rao

    Abstract: Relation extraction is used to populate knowledge bases that are important to many applications. Prior datasets used to train relation extraction models either suffer from noisy labels due to distant supervision, are limited to certain domains or are too small to train high-capacity models. This constrains downstream applications of relation extraction. We therefore introduce: WebRED (Web Relation… ▽ More

    Submitted 18 February, 2021; originally announced February 2021.

  31. arXiv:2012.12958  [pdf

    cs.CR cs.NI

    Privacy Preservation for Wireless Sensor Networks in Healthcare: State of the Art, and Open Research Challenges

    Authors: Yasmine N. M. Saleh, Claude C. Chibelushi, Ayman A. Abdel-Hamid, Abdel-Hamid Soliman

    Abstract: The advent of miniature biosensors has generated numerous opportunities for deploying wireless sensor networks in healthcare. However, an important barrier is that acceptance by healthcare stakeholders is influenced by the effectiveness of privacy safeguards for personal and intimate information which is collected and transmitted over the air, within and beyond these networks. In particular, these… ▽ More

    Submitted 23 December, 2020; originally announced December 2020.

    Comments: 42 pages, 15 figures and 4 tables

  32. arXiv:2010.09079  [pdf, other

    cs.CV cs.AI

    Graphite: GRAPH-Induced feaTure Extraction for Point Cloud Registration

    Authors: Mahdi Saleh, Shervin Dehghani, Benjamin Busam, Nassir Navab, Federico Tombari

    Abstract: 3D Point clouds are a rich source of information that enjoy growing popularity in the vision community. However, due to the sparsity of their representation, learning models based on large point clouds is still a challenge. In this work, we introduce Graphite, a GRAPH-Induced feaTure Extraction pipeline, a simple yet powerful feature transform and keypoint detector. Graphite enables intensive down… ▽ More

    Submitted 18 October, 2020; originally announced October 2020.

  33. Evaluating the impact of different types of crossover and selection methods on the convergence of 0/1 Knapsack using Genetic Algorithm

    Authors: Waleed Bin Owais, Iyad W. J. Alkhazendar, Dr. Mohammad Saleh

    Abstract: Genetic Algorithm is an evolutionary algorithm and a metaheuristic that was introduced to overcome the failure of gradient based method in solving the optimization and search problems. The purpose of this paper is to evaluate the impact on the convergence of Genetic Algorithm vis-a-vis 0/1 knapsack. By kee** the number of generations and the initial population fixed, different crossover methods… ▽ More

    Submitted 7 October, 2020; originally announced October 2020.

    Comments: 7th International Conference on Computer Science, Engineering and Information Technology (CSEIT 2020) September 26 ~ 27, 2020, Copenhagen, Denmark

  34. arXiv:2006.10213  [pdf, other

    cs.CL cs.IR cs.LG

    SEAL: Segment-wise Extractive-Abstractive Long-form Text Summarization

    Authors: Yao Zhao, Mohammad Saleh, Peter J. Liu

    Abstract: Most prior work in the sequence-to-sequence paradigm focused on datasets with input sequence lengths in the hundreds of tokens due to the computational constraints of common RNN and Transformer architectures. In this paper, we study long-form abstractive text summarization, a sequence-to-sequence setting with input sequence lengths up to 100,000 tokens and output sequence lengths up to 768 tokens.… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

  35. arXiv:2004.03675  [pdf, other

    eess.IV cs.CV

    Spatio-temporal Learning from Longitudinal Data for Multiple Sclerosis Lesion Segmentation

    Authors: Stefan Denner, Ashkan Khakzar, Moiz Sajid, Mahdi Saleh, Ziga Spiclin, Seong Tae Kim, Nassir Navab

    Abstract: Segmentation of Multiple Sclerosis (MS) lesions in longitudinal brain MR scans is performed for monitoring the progression of MS lesions. We hypothesize that the spatio-temporal cues in longitudinal data can aid the segmentation algorithm. Therefore, we propose a multi-task learning approach by defining an auxiliary self-supervised task of deformable registration between two time-points to guide t… ▽ More

    Submitted 26 September, 2020; v1 submitted 7 April, 2020; originally announced April 2020.

    Comments: Accepted at BrainLes Workshop in MICCAI2020

  36. arXiv:1912.08777  [pdf, other

    cs.CL

    PEGASUS: Pre-training with Extracted Gap-sentences for Abstractive Summarization

    Authors: **gqing Zhang, Yao Zhao, Mohammad Saleh, Peter J. Liu

    Abstract: Recent work pre-training Transformers with self-supervised objectives on large text corpora has shown great success when fine-tuned on downstream NLP tasks including text summarization. However, pre-training objectives tailored for abstractive text summarization have not been explored. Furthermore there is a lack of systematic evaluation across diverse domains. In this work, we propose pre-trainin… ▽ More

    Submitted 10 July, 2020; v1 submitted 18 December, 2019; originally announced December 2019.

    Comments: Added results from mixed+stochastic model, test-set overlap** analysis; Code link added; Accepted for ICML 2020. arXiv admin note: text overlap with arXiv:1605.06560, arXiv:1205.2395, arXiv:0902.4351, arXiv:1610.09932, arXiv:nucl-ex/0512029 by other authors

  37. arXiv:1908.09168  [pdf, other

    cs.CR math.GR

    A Novel Method to Generate Key-Dependent S-Boxes with Identical Algebraic Properties

    Authors: Ahmad Y. Al-Dweik, Iqtadar Hussain, Moutaz S. Saleh, M. T. Mustafa

    Abstract: The s-box plays the vital role of creating confusion between the ciphertext and secret key in any cryptosystem, and is the only nonlinear component in many block ciphers. Dynamic s-boxes, as compared to static, improve entropy of the system, hence leading to better resistance against linear and differential attacks. It was shown in [2] that while incorporating dynamic s-boxes in cryptosystems is s… ▽ More

    Submitted 3 May, 2021; v1 submitted 24 August, 2019; originally announced August 2019.

  38. Assessing The Factual Accuracy of Generated Text

    Authors: Ben Goodrich, Vinay Rao, Mohammad Saleh, Peter J Liu

    Abstract: We propose a model-based metric to estimate the factual accuracy of generated text that is complementary to typical scoring schemes like ROUGE (Recall-Oriented Understudy for Gisting Evaluation) and BLEU (Bilingual Evaluation Understudy). We introduce and release a new large-scale dataset based on Wikipedia and Wikidata to train relation classifiers and end-to-end fact extraction models. The end-t… ▽ More

    Submitted 25 May, 2021; v1 submitted 30 May, 2019; originally announced May 2019.

    Journal ref: The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD '19), August 4--8, 2019, Anchorage, AK, USA

  39. arXiv:1810.10597  [pdf, other

    cs.CV eess.AS

    The speaker-independent lipreading play-off; a survey of lipreading machines

    Authors: Jake Burton, David Frank, Madhi Saleh, Nassir Navab, Helen L. Bear

    Abstract: Lipreading is a difficult gesture classification task. One problem in computer lipreading is speaker-independence. Speaker-independence means to achieve the same accuracy on test speakers not included in the training set as speakers within the training set. Current literature is limited on speaker-independent lipreading, the few independent test speaker accuracy scores are usually aggregated withi… ▽ More

    Submitted 24 October, 2018; originally announced October 2018.

    Comments: To appear at the third IEEE International Conference on Image Processing, Applications and Systems 2018

  40. arXiv:1810.06276  [pdf

    math.NA cs.IT

    Eigenvalue Analysis via Kernel Density Estimation

    Authors: Ahmed Yehia, Mohamed Saleh

    Abstract: In this paper, we propose an eigenvalue analysis -- of system dynamics models -- based on the Mutual Information measure, which in turn will be estimated via the Kernel Density Estimation method. We postulate that the proposed approach represents a novel and efficient multivariate eigenvalue sensitivity analysis.

    Submitted 16 October, 2018; v1 submitted 15 October, 2018; originally announced October 2018.

  41. arXiv:1801.10198  [pdf, other

    cs.CL

    Generating Wikipedia by Summarizing Long Sequences

    Authors: Peter J. Liu, Mohammad Saleh, Etienne Pot, Ben Goodrich, Ryan Sepassi, Lukasz Kaiser, Noam Shazeer

    Abstract: We show that generating English Wikipedia articles can be approached as a multi- document summarization of source documents. We use extractive summarization to coarsely identify salient information and a neural abstractive model to generate the article. For the abstractive model, we introduce a decoder-only architecture that can scalably attend to very long sequences, much longer than typical enco… ▽ More

    Submitted 30 January, 2018; originally announced January 2018.

    Comments: Published as a conference paper at ICLR 2018

  42. arXiv:1707.00654  [pdf, other

    cs.CR cs.NI

    Secure Location-Aided Routing Protocols With Wi-Fi Direct For Vehicular Ad Hoc Networks

    Authors: Ma'en Saleh, Liang Dong

    Abstract: Secure routing protocols are proposed for the vehicular ad hoc networks. The protocols integrate the security authentication process with the Location-Aided Routing (LAR) protocol to support Wi-Fi Direct communications between the vehicles. The methods are robust against various security threats. The security authentication process adopts a modified Diffie-Hellman key agreement protocol. The Diffi… ▽ More

    Submitted 3 July, 2017; originally announced July 2017.

    Comments: 10 pages, 14 figures

    Journal ref: International Journal of Communication Networks and Information Security, vol. 12, no. 1, pp. 10-18, Apr. 2020

  43. arXiv:1706.08924  [pdf, other

    cs.CV

    Cross-Country Skiing Gears Classification using Deep Learning

    Authors: Aliaa Rassem, Mohammed El-Beltagy, Mohamed Saleh

    Abstract: Human Activity Recognition has witnessed a significant progress in the last decade. Although a great deal of work in this field goes in recognizing normal human activities, few studies focused on identifying motion in sports. Recognizing human movements in different sports has high impact on understanding the different styles of humans in the play and on improving their performance. As deep learni… ▽ More

    Submitted 27 June, 2017; originally announced June 2017.

    Comments: 15 pages, 8 figures, 1 table

  44. arXiv:1402.4936  [pdf

    cs.CV

    Enhanced Secure Algorithm for Fingerprint Recognition

    Authors: Amira Mohammad Abdel-Mawgoud Saleh

    Abstract: Fingerprint recognition requires a minimal effort from the user, does not capture other information than strictly necessary for the recognition process, and provides relatively good performance. A critical step in fingerprint identification system is thinning of the input fingerprint image. The performance of a minutiae extraction algorithm relies heavily on the quality of the thinning algorithm.… ▽ More

    Submitted 20 February, 2014; originally announced February 2014.

    Comments: PhD Thesis, Ain Shams University, 2011

  45. arXiv:1206.5871  [pdf

    cs.CR

    Towards Metamorphic Virus Recognition Using Eigenviruses

    Authors: Moustafa Saleh

    Abstract: Metamorphic viruses are considered the most dangerous of all computer viruses. Unlike other computer viruses that can be detected statically using static signature technique or dynamically using emulators, metamorphic viruses change their code to avoid such detection techniques. This makes metamorphic viruses a real challenge for computer security researchers. In this thesis, we investigate the te… ▽ More

    Submitted 15 December, 2013; v1 submitted 25 June, 2012; originally announced June 2012.

  46. arXiv:1204.6250  [pdf

    eess.SY cs.LG

    Feature Selection for Generator Excitation Neurocontroller Development Using Filter Technique

    Authors: Abdul Ghani Abro, Junita Mohamad Saleh

    Abstract: Essentially, motive behind using control system is to generate suitable control signal for yielding desired response of a physical process. Control of synchronous generator has always remained very critical in power system operation and control. For certain well known reasons power generators are normally operated well below their steady state stability limit. This raises demand for efficient and… ▽ More

    Submitted 28 November, 2011; originally announced April 2012.

    Comments: 10-Pages, 10-Figures, 8-Tables, International Journal of Computer Science Issues, Vol. 8, Issue 5, No 3, September 2011

    Journal ref: International Journal of Computer Science Issues,PP. 108-117, Vol. 8, Issue 5, No 3, September 2011