Skip to main content

Showing 1–16 of 16 results for author: Saleh, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.09120  [pdf, other

    eess.SP cs.IT

    Joint Communication and Sensing for 6G -- A Cross-Layer Perspective

    Authors: Henk Wymeersch, Sharief Saleh, Ahmad Nimr, Rreze Halili, Rafael Berkvens, Mohammad H. Moghaddam, José Miguel Mateos-Ramos, Athanasios Stavridis, Stefan Wänstedt, Sokratis Barmpounakis, Basuki Priyanto, Martin Beale, Jaap van de Beek, Zi Ye, Marvin Manalastas, Apostolos Kousaridas, Gerhard P. Fettweis

    Abstract: As 6G emerges, cellular systems are envisioned to integrate sensing with communication capabilities, leading to multi-faceted communication and sensing (JCAS). This paper presents a comprehensive cross-layer overview of the Hexa-X-II project's endeavors in JCAS, aligning 6G use cases with service requirements and pinpointing distinct scenarios that bridge communication and sensing. This work relat… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: 6 pages, 5 figures

  2. arXiv:2312.05704  [pdf, other

    cs.NI eess.SP

    On the Ground and in the Sky: A Tutorial on Radio Localization in Ground-Air-Space Networks

    Authors: Hazem Sallouha, Sharief Saleh, Sibren De Bast, Zhuangzhuang Cui, Sofie Pollin, Henk Wymeersch

    Abstract: The inherent limitations in scaling up ground infrastructure for future wireless networks, combined with decreasing operational costs of aerial and space networks, are driving considerable research interest in multisegment ground-air-space (GAS) networks. In GAS networks, where ground and aerial users share network resources, ubiquitous and accurate user localization becomes indispensable, not onl… ▽ More

    Submitted 17 June, 2024; v1 submitted 9 December, 2023; originally announced December 2023.

    Comments: Accepted for publication in IEEE Communications Surveys & Tutorials

  3. arXiv:2304.14902  [pdf, other

    cs.LG

    Enhancing Supply Chain Resilience: A Machine Learning Approach for Predicting Product Availability Dates Under Disruption

    Authors: Mustafa Can Camur, Sandipp Krishnan Ravi, Shadi Saleh

    Abstract: The COVID 19 pandemic and ongoing political and regional conflicts have a highly detrimental impact on the global supply chain, causing significant delays in logistics operations and international shipments. One of the most pressing concerns is the uncertainty surrounding the availability dates of products, which is critical information for companies to generate effective logistics and shipment pl… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

  4. arXiv:2007.00394  [pdf, other

    cs.CV

    The IKEA ASM Dataset: Understanding People Assembling Furniture through Actions, Objects and Pose

    Authors: Yizhak Ben-Shabat, Xin Yu, Fatemeh Sadat Saleh, Dylan Campbell, Cristian Rodriguez-Opazo, Hongdong Li, Stephen Gould

    Abstract: The availability of a large labeled dataset is a key requirement for applying deep learning methods to solve various computer vision tasks. In the context of understanding human activities, existing public datasets, while large in size, are often limited to a single RGB camera and provide only per-frame or per-clip action annotations. To enable richer analysis and understanding of human activities… ▽ More

    Submitted 17 May, 2023; v1 submitted 1 July, 2020; originally announced July 2020.

  5. arXiv:2004.06562  [pdf

    eess.SY cs.MA

    On the Optimal Interaction Range for Multi-Agent Systems Under Adversarial Attack

    Authors: Saad J Saleh

    Abstract: Consider a consensus-driven multi-agent dynamic system. The interaction range, which defines the set of neighbors for each agent, plays a key role in influencing connectivity of the underlying network. In this paper, we assume the system is under attack by a predator and explore the question of finding the optimal interaction range that facilitates the most-efficient escape trajectories for the gr… ▽ More

    Submitted 25 April, 2020; v1 submitted 14 April, 2020; originally announced April 2020.

    Comments: Submitted to the 2020 IEEE Conference on Decision and Control

  6. arXiv:2004.05763  [pdf, other

    cs.CV

    UC-Net: Uncertainty Inspired RGB-D Saliency Detection via Conditional Variational Autoencoders

    Authors: **g Zhang, Deng-** Fan, Yuchao Dai, Saeed Anwar, Fatemeh Sadat Saleh, Tong Zhang, Nick Barnes

    Abstract: In this paper, we propose the first framework (UCNet) to employ uncertainty for RGB-D saliency detection by learning from the data labeling process. Existing RGB-D saliency detection methods treat the saliency detection task as a point estimation problem, and produce a single saliency map following a deterministic learning pipeline. Inspired by the saliency data labeling process, we propose probab… ▽ More

    Submitted 13 April, 2020; originally announced April 2020.

    Comments: Accepted by IEEE CVPR 2020 (ORAL). Code: https://github.com/**gZhang617/UCNet

  7. arXiv:1912.08521  [pdf, other

    cs.LG cs.CV stat.ML

    Contextually Plausible and Diverse 3D Human Motion Prediction

    Authors: Sadegh Aliakbarian, Fatemeh Sadat Saleh, Lars Petersson, Stephen Gould, Mathieu Salzmann

    Abstract: We tackle the task of diverse 3D human motion prediction, that is, forecasting multiple plausible future 3D poses given a sequence of observed 3D poses. In this context, a popular approach consists of using a Conditional Variational Autoencoder (CVAE). However, existing approaches that do so either fail to capture the diversity in human motion, or generate diverse but semantically implausible cont… ▽ More

    Submitted 5 December, 2020; v1 submitted 18 December, 2019; originally announced December 2019.

  8. arXiv:1908.09168  [pdf, other

    cs.CR math.GR

    A Novel Method to Generate Key-Dependent S-Boxes with Identical Algebraic Properties

    Authors: Ahmad Y. Al-Dweik, Iqtadar Hussain, Moutaz S. Saleh, M. T. Mustafa

    Abstract: The s-box plays the vital role of creating confusion between the ciphertext and secret key in any cryptosystem, and is the only nonlinear component in many block ciphers. Dynamic s-boxes, as compared to static, improve entropy of the system, hence leading to better resistance against linear and differential attacks. It was shown in [2] that while incorporating dynamic s-boxes in cryptosystems is s… ▽ More

    Submitted 3 May, 2021; v1 submitted 24 August, 2019; originally announced August 2019.

  9. arXiv:1908.07236  [pdf, other

    cs.CV

    Proposal-free Temporal Moment Localization of a Natural-Language Query in Video using Guided Attention

    Authors: Cristian Rodriguez-Opazo, Edison Marrese-Taylor, Fatemeh Sadat Saleh, Hongdong Li, Stephen Gould

    Abstract: This paper studies the problem of temporal moment localization in a long untrimmed video using natural language as the query. Given an untrimmed video and a sentence as the query, the goal is to determine the starting, and the ending, of the relevant visual moment in the video, that corresponds to the query sentence. While previous works have tackled this task by a propose-and-rank approach, we in… ▽ More

    Submitted 12 March, 2020; v1 submitted 20 August, 2019; originally announced August 2019.

    Comments: Winter Conference on Applications of Computer Vision 2020

  10. arXiv:1908.00733  [pdf, other

    cs.LG cs.CV stat.ML

    Learning Variations in Human Motion via Mix-and-Match Perturbation

    Authors: Mohammad Sadegh Aliakbarian, Fatemeh Sadat Saleh, Mathieu Salzmann, Lars Petersson, Stephen Gould, Amirhossein Habibian

    Abstract: Human motion prediction is a stochastic process: Given an observed sequence of poses, multiple future motions are plausible. Existing approaches to modeling this stochasticity typically combine a random noise vector with information about the previous poses. This combination, however, is done in a deterministic manner, which gives the network the flexibility to learn to ignore the random noise. In… ▽ More

    Submitted 24 February, 2020; v1 submitted 2 August, 2019; originally announced August 2019.

  11. arXiv:1810.09044  [pdf, other

    cs.CV

    VIENA2: A Driving Anticipation Dataset

    Authors: Mohammad Sadegh Aliakbarian, Fatemeh Sadat Saleh, Mathieu Salzmann, Basura Fernando, Lars Petersson, Lars Andersson

    Abstract: Action anticipation is critical in scenarios where one needs to react before the action is finalized. This is, for instance, the case in automated driving, where a car needs to, e.g., avoid hitting pedestrians and respect traffic lights. While solutions have been proposed to tackle subsets of the driving anticipation tasks, by making use of diverse, task-specific sensors, there is no single datase… ▽ More

    Submitted 29 October, 2018; v1 submitted 21 October, 2018; originally announced October 2018.

    Comments: Accepted in ACCV 2018

  12. arXiv:1807.06132  [pdf, other

    cs.CV

    Effective Use of Synthetic Data for Urban Scene Semantic Segmentation

    Authors: Fatemeh Sadat Saleh, Mohammad Sadegh Aliakbarian, Mathieu Salzmann, Lars Petersson, Jose M. Alvarez

    Abstract: Training a deep network to perform semantic segmentation requires large amounts of labeled data. To alleviate the manual effort of annotating real images, researchers have investigated the use of synthetic data, which can be labeled automatically. Unfortunately, a network trained on synthetic data performs relatively poorly on real images. While this can be addressed by domain adaptation, existing… ▽ More

    Submitted 16 July, 2018; originally announced July 2018.

    Comments: Accepted in European Conference on Computer Vision (ECCV), 2018

  13. arXiv:1803.02816  [pdf, other

    cs.NI cs.CR

    Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research

    Authors: Saad Saleh, Junaid Qadir, Muhammad U. Ilyas

    Abstract: Anonymity services have seen high growth rates with increased usage in the past few years. Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In this survey paper, we summarize, analyze, classify and quantify 26 years of research on the Tor network. Our research shows that `security' and `anonymity' are the most frequent keywords associated with Tor research s… ▽ More

    Submitted 7 March, 2018; originally announced March 2018.

  14. arXiv:1708.04400  [pdf, other

    cs.CV

    Bringing Background into the Foreground: Making All Classes Equal in Weakly-supervised Video Semantic Segmentation

    Authors: Fatemeh Sadat Saleh, Mohammad Sadegh Aliakbarian, Mathieu Salzmann, Lars Petersson, Jose M. Alvarez

    Abstract: Pixel-level annotations are expensive and time-consuming to obtain. Hence, weak supervision using only image tags could have a significant impact in semantic segmentation. Recent years have seen great progress in weakly-supervised semantic segmentation, whether from a single image or from videos. However, most existing methods are designed to handle a single background class. In practical applicat… ▽ More

    Submitted 15 August, 2017; originally announced August 2017.

    Comments: 11 pages, 4 figures, 7 tables, Accepted in ICCV 2017

  15. Incorporating Network Built-in Priors in Weakly-supervised Semantic Segmentation

    Authors: Fatemeh Sadat Saleh, Mohammad Sadegh Aliakbarian, Mathieu Salzmann, Lars Petersson, Jose M. Alvarez, Stephen Gould

    Abstract: Pixel-level annotations are expensive and time consuming to obtain. Hence, weak supervision using only image tags could have a significant impact in semantic segmentation. Recently, CNN-based methods have proposed to fine-tune pre-trained networks using image tags. Without additional information, this leads to poor localization accuracy. This problem, however, was alleviated by making use of objec… ▽ More

    Submitted 5 June, 2017; originally announced June 2017.

    Comments: 14 pages, 11 figures, 8 tables, Accepted in IEEE Transaction on Pattern Analysis and Machine Intelligence (IEEE TPAMI)

  16. arXiv:1703.07023  [pdf, other

    cs.CV

    Encouraging LSTMs to Anticipate Actions Very Early

    Authors: Mohammad Sadegh Aliakbarian, Fatemeh Sadat Saleh, Mathieu Salzmann, Basura Fernando, Lars Petersson, Lars Andersson

    Abstract: In contrast to the widely studied problem of recognizing an action given a complete sequence, action anticipation aims to identify the action from only partially available videos. As such, it is therefore key to the success of computer vision applications requiring to react as early as possible, such as autonomous navigation. In this paper, we propose a new action anticipation method that achieves… ▽ More

    Submitted 13 August, 2017; v1 submitted 20 March, 2017; originally announced March 2017.

    Comments: 13 Pages, 7 Figures, 11 Tables. Accepted in ICCV 2017. arXiv admin note: text overlap with arXiv:1611.05520