Skip to main content

Showing 1–5 of 5 results for author: Shaheen, M

Searching in archive cs. Search in all archives.
.
  1. Multivariate Microaggregation of Set-Valued Data

    Authors: Malik Imran-Daud, Muhammad Shaheen, Abbas Ahmed

    Abstract: Data controllers manage immense data, and occasionally, it is released publically to help the researchers to conduct their studies. However, this publically shared data may hold personally identifiable information (PII) that can be collected to re-identify a person. Therefore, an effective anonymization mechanism is required to anonymize such data before it is released publically. Microaggregation… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

    Journal ref: Information Technology and Control, 51(1), 104-125, 2022

  2. arXiv:2203.04111  [pdf, other

    cs.CL cs.AI cs.LG

    Plumeria at SemEval-2022 Task 6: Robust Approaches for Sarcasm Detection for English and Arabic Using Transformers and Data Augmentation

    Authors: Shubham Kumar Nigam, Mosab Shaheen

    Abstract: This paper describes our submission to SemEval-2022 Task 6 on sarcasm detection and its five subtasks for English and Arabic. Sarcasm conveys a meaning which contradicts the literal meaning, and it is mainly found on social networks. It has a significant role in understanding the intention of the user. For detecting sarcasm, we used deep learning techniques based on transformers due to its success… ▽ More

    Submitted 8 March, 2022; originally announced March 2022.

    Comments: SemEval-2022 workshop paper, submitted in NAACL-2022 conference. 8 figures and 29 tables. 8 main pages, 4 appendix pages

  3. arXiv:2111.10776  [pdf

    cs.CL cs.HC cs.LG

    A Case Study on the Independence of Speech Emotion Recognition in Bangla and English Languages using Language-Independent Prosodic Features

    Authors: Fardin Saad, Hasan Mahmud, Mohammad Ridwan Kabir, Md. Alamin Shaheen, Paresha Farastu, Md. Kamrul Hasan

    Abstract: A language agnostic approach to recognizing emotions from speech remains an incomplete and challenging task. In this paper, we performed a step-by-step comparative analysis of Speech Emotion Recognition (SER) using Bangla and English languages to assess whether distinguishing emotions from speech is independent of language. Six emotions were categorized for this study, such as - happy, angry, neut… ▽ More

    Submitted 13 May, 2022; v1 submitted 21 November, 2021; originally announced November 2021.

    Comments: 13 pages [currently under review]

  4. arXiv:1210.7650  [pdf

    cs.CR

    Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems

    Authors: Heba Ezzat Ibrahim, Sherif M. Badr, Mohamed A. Shaheen

    Abstract: Intrusion Detection System (IDS) has increasingly become a crucial issue for computer and network systems. Optimizing performance of IDS becomes an important open problem which receives more and more attention from the research community. In this work, A multi-layer intrusion detection model is designed and developed to achieve high efficiency and improve the detection and classification rate accu… ▽ More

    Submitted 29 October, 2012; originally announced October 2012.

    Comments: 7 pages

    Journal ref: (IJCA)International Journal of Computer Applications, Volume 56, No.7, 2012, 10-16

  5. arXiv:1208.5997  [pdf

    cs.CR

    Phases vs. Levels using Decision Trees for Intrusion Detection Systems

    Authors: Heba Ezzat Ibrahim, Sherif M. Badr, Mohamed A. Shaheen

    Abstract: Security of computers and the networks that connect them is increasingly becoming of great significance. Intrusion detection system is one of the security defense tools for computer networks. This paper compares two different model Approaches for representing intrusion detection system by using decision tree techniques. These approaches are Phase-model approach and Level-model approach. Each model… ▽ More

    Submitted 29 August, 2012; originally announced August 2012.

    Comments: 7 pages; (IJCSIS) International Journal of Computer Science and Information Security, Vol. 10, No. 8, 2012