Skip to main content

Showing 1–13 of 13 results for author: Sayeed, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.00416  [pdf, other

    cs.CL

    Too Late to Train, Too Early To Use? A Study on Necessity and Viability of Low-Resource Bengali LLMs

    Authors: Tamzeed Mahfuz, Satak Kumar Dey, Ruwad Naswan, Hasnaen Adil, Khondker Salman Sayeed, Haz Sameen Shahgir

    Abstract: Each new generation of English-oriented Large Language Models (LLMs) exhibits enhanced cross-lingual transfer capabilities and significantly outperforms older LLMs on low-resource languages. This prompts the question: Is there a need for LLMs dedicated to a particular low-resource language? We aim to explore this question for Bengali, a low-to-moderate resource Indo-Aryan language native to the Be… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

  2. arXiv:2403.15952  [pdf, other

    cs.CV cs.CL

    IllusionVQA: A Challenging Optical Illusion Dataset for Vision Language Models

    Authors: Haz Sameen Shahgir, Khondker Salman Sayeed, Abhik Bhattacharjee, Wasi Uddin Ahmad, Yue Dong, Rifat Shahriyar

    Abstract: The advent of Vision Language Models (VLM) has allowed researchers to investigate the visual understanding of a neural network using natural language. Beyond object classification and detection, VLMs are capable of visual comprehension and common-sense reasoning. This naturally led to the question: How do VLMs respond when the image itself is inherently unreasonable? To this end, we present Illusi… ▽ More

    Submitted 30 March, 2024; v1 submitted 23 March, 2024; originally announced March 2024.

  3. arXiv:2401.12210  [pdf, other

    cs.CV

    Connecting the Dots: Leveraging Spatio-Temporal Graph Neural Networks for Accurate Bangla Sign Language Recognition

    Authors: Haz Sameen Shahgir, Khondker Salman Sayeed, Md Toki Tahmid, Tanjeem Azwad Zaman, Md. Zarif Ul Alam

    Abstract: Recent advances in Deep Learning and Computer Vision have been successfully leveraged to serve marginalized communities in various contexts. One such area is Sign Language - a primary means of communication for the deaf community. However, so far, the bulk of research efforts and investments have gone into American Sign Language, and research activity into low-resource sign languages - especially… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

  4. arXiv:2311.14783  [pdf

    cs.CR

    cryptoRAN: A review on cryptojacking and ransomware attacks w.r.t. banking industry -- threats, challenges, & problems

    Authors: Naresh Kshetri, Mir Mehedi Rahman, Sayed Abu Sayeed, Irin Sultana

    Abstract: In the banking industry, ransomware is a well-known threat, but since the beginning of 2022, cryptojacking, an emerging threat is posing a considerable challenge to the banking industry. Ransomware has variants, and the attackers keep changing the nature of these variants. This review paper studies the complex background of these two threats and scrutinizes the actual challenges, and problems that… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

    Comments: 6 pages, 4 figures

  5. arXiv:2310.14005  [pdf, ps, other

    eess.IV cs.CV

    Ophthalmic Biomarker Detection Using Ensembled Vision Transformers -- Winning Solution to IEEE SPS VIP Cup 2023

    Authors: H. A. Z. Sameen Shahgir, Khondker Salman Sayeed, Tanjeem Azwad Zaman, Md. Asif Haider, Sheikh Saifur Rahman Jony, M. Sohel Rahman

    Abstract: This report outlines our approach in the IEEE SPS VIP Cup 2023: Ophthalmic Biomarker Detection competition. Our primary objective in this competition was to identify biomarkers from Optical Coherence Tomography (OCT) images obtained from a diverse range of patients. Using robust augmentations and 5-fold cross-validation, we trained two vision transformer-based models: MaxViT and EVA-02, and ensemb… ▽ More

    Submitted 21 October, 2023; originally announced October 2023.

  6. arXiv:2303.10612  [pdf, other

    cs.CL cs.LG

    Bangla Grammatical Error Detection Using T5 Transformer Model

    Authors: H. A. Z. Sameen Shahgir, Khondker Salman Sayeed

    Abstract: This paper presents a method for detecting grammatical errors in Bangla using a Text-to-Text Transfer Transformer (T5) Language Model, using the small variant of BanglaT5, fine-tuned on a corpus of 9385 sentences where errors were bracketed by the dedicated demarcation symbol. The T5 model was primarily designed for translation and is not specifically designed for this task, so extensive post-proc… ▽ More

    Submitted 19 March, 2023; originally announced March 2023.

  7. Towards The Creation Of The Future Fish Farm

    Authors: Pavlos Papadopoulos, William J Buchanan, Sarwar Sayeed, Nikolaos Pitropakis

    Abstract: A fish farm is an area where fish raise and bred for food. Fish farm environments support the care and management of seafood within a controlled environment. Over the past few decades, there has been a remarkable increase in the calorie intake of protein attributed to seafood. Along with this, there are significant opportunities within the fish farming industry for economic development. Determinin… ▽ More

    Submitted 2 January, 2023; originally announced January 2023.

    Journal ref: Security and Safety, 3(4), 174-186 (2022)

  8. arXiv:2212.03218  [pdf, other

    cs.CR

    Transforming EU Governance: The Digital Integration through EBSI and GLASS

    Authors: Dimitrios Kasimatis, William J Buchanan, Mwarwan Abubakar, Owen Lo, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, Sarwar Sayeed, Marc Sel

    Abstract: Traditionally, government systems managed citizen identities through disconnected data systems, using simple identifiers and paper-based processes, limiting digital trust and requiring citizens to request identity verification documents. The digital era offers a shift towards unique digital identifiers for each citizen, enabling a 'citizen wallet' for easier access to personal documents like acade… ▽ More

    Submitted 19 April, 2024; v1 submitted 6 December, 2022; originally announced December 2022.

  9. arXiv:2209.06581  [pdf, ps, other

    eess.AS cs.AI cs.LG

    Applying wav2vec2 for Speech Recognition on Bengali Common Voices Dataset

    Authors: H. A. Z. Sameen Shahgir, Khondker Salman Sayeed, Tanjeem Azwad Zaman

    Abstract: Speech is inherently continuous, where discrete words, phonemes and other units are not clearly segmented, and so speech recognition has been an active research problem for decades. In this work we have fine-tuned wav2vec 2.0 to recognize and transcribe Bengali speech -- training it on the Bengali Common Voice Speech Dataset. After training for 71 epochs, on a training set consisting of 36919 mp3… ▽ More

    Submitted 11 September, 2022; originally announced September 2022.

    Comments: 5 pages

  10. GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

    Authors: Owen Lo, William J. Buchanan, Sarwar Sayeed, Pavlos Papadopoulos, Nikolaos Pitropakis, Christos Chrysoulas

    Abstract: E-governance is a process that aims to enhance a government's ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evolution of digital technologies has often created the necessity for the establishment of an e-Governance model. There is often a need for an inclusive e-governance model with integrated multiactor governance services and where… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Comments: Sensors 2022, 22(6), 2291; https://doi.org/10.3390/s22062291

  11. arXiv:2112.02855  [pdf, other

    cs.CR cs.CY

    PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching

    Authors: William Abramson, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis, Owen Lo

    Abstract: The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure that enables infected individuals to have their contacts traced, and followed up with a test. The key entities involved within a contact tracing infrastructure may include the Citizen, a Testing Centre (TC), a Health Authority (HA), and a Government Authority (GA). Typically, these different domains need to… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

    Journal ref: IEEE SIN 2021

  12. arXiv:1912.12257  [pdf, other

    cs.CR cs.ET

    Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device

    Authors: Jon Barton, William J Buchanan, Nikolaos Pitropakis, Sarwar Sayeed, Will Abramson

    Abstract: Advances in quantum computing make Shor's algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on the difficulty of factorisation. It also threatens methods based on discrete logarithms, such as with the Diffie-Hellman key exchange method. For a cryptographic system to remain secure against a quantum adversary, we need to… ▽ More

    Submitted 7 February, 2022; v1 submitted 20 September, 2019; originally announced December 2019.

    Journal ref: 8th International Conference on Information Systems Security and Privacy (ICISSP) 2022

  13. arXiv:0712.4168  [pdf

    cs.OH cs.NI

    A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks

    Authors: Al-Sakib Khan Pathan, Humayun Kadir Islam, Sabit Anjum Sayeed, Farruk Ahmed, Choong Seon Hong

    Abstract: In recent years, the proliferation of mobile computing devices has driven a revolutionary change in the computing world. The nature of ubiquitous devices makes wireless networks the easiest solution for their interconnection. This has led to the rapid growth of several wireless systems like wireless ad hoc networks, wireless sensor networks etc. In this paper we have proposed a framework for rur… ▽ More

    Submitted 26 December, 2007; originally announced December 2007.

    Comments: 5 pages

    Journal ref: Proceedings of IEEE ICNEWS 2006, January 2-4, Dhaka, Bangladesh, 2006, pp. 282-286