Skip to main content

Showing 1–10 of 10 results for author: Shahzad, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.06573  [pdf, other

    quant-ph cs.ET cs.LO cs.SE

    A Generalized Space-Efficient Algorithm for Quantum Bit String Comparators

    Authors: Khuram Shahzad, Omar Usman Khan

    Abstract: Quantum Bit String Comparators (QBSC) operate on two sequences of n-qubits, enabling the determination of their relationships, such as equality, greater than, or less than. This is analogous to the way conditional statements are used in programming languages. Consequently, QBSCs play a crucial role in various algorithms that can be executed or adapted for quantum computers. The development of effi… ▽ More

    Submitted 14 November, 2023; v1 submitted 11 November, 2023; originally announced November 2023.

  2. arXiv:2108.02830  [pdf

    cs.CL cs.AI cs.LG

    Hate Speech Detection in Roman Urdu

    Authors: Moin Khan, Khurram Shahzad, Kamran Malik

    Abstract: Hate speech is a specific type of controversial content that is widely legislated as a crime that must be identified and blocked. However, due to the sheer volume and velocity of the Twitter data stream, hate speech detection cannot be performed manually. To address this issue, several studies have been conducted for hate speech detection in European languages, whereas little attention has been pa… ▽ More

    Submitted 5 August, 2021; originally announced August 2021.

    Comments: This is a pre-print of a contribution published in ACM Transactions on Asian and Low-Resource Language Information Processing. The final version is available online at the given journal link

    Journal ref: ACM Transactions on Asian and Low Resource Language Information Processing; Volume 20; Issue 1; April 2021; Article Number 9; pp 1 to 19

  3. arXiv:2009.13023  [pdf, other

    cs.IT

    Covert Wireless Communications under Quasi-Static Fading with Channel Uncertainty

    Authors: Khurram Shahzad, Xiangyun Zhou

    Abstract: Covert communications enable a transmitter to send information reliably in the presence of an adversary, who looks to detect whether the transmission took place or not. We consider covert communications over quasi-static block fading channels, where users suffer from channel uncertainty. We investigate the adversary Willie's optimal detection performance in two extreme cases, i.e., the case of per… ▽ More

    Submitted 27 September, 2020; originally announced September 2020.

    Comments: 13 pages, 5 figures, Accepted to appear in IEEE Transactions on Information Forensics & Security

  4. arXiv:1910.07246  [pdf, other

    cs.IT

    Covert Wireless Communication in Presence of a Multi-Antenna Adversary and Delay Constraints

    Authors: Khurram Shahzad, Xiangyun Zhou, Shihao Yan

    Abstract: Covert communication hides the transmission of a message from a watchful adversary while ensuring reliable information decoding at the receiver, providing enhanced security in wireless communications. In this letter, covert communication in the presence of a multi-antenna adversary and under delay constraints is considered. Under the assumption of quasi-static wireless fading channels, we analyze… ▽ More

    Submitted 16 October, 2019; originally announced October 2019.

    Comments: Accepted to appear in IEEE Transactions on Vehicular Technology as Correspondence

  5. arXiv:1812.08652  [pdf

    cs.NI

    A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs

    Authors: M. K. Shahzad, Lewis Nkenyereye, S. M. Riazul Islam

    Abstract: Wireless sensor networks suffer from false report injection attacks. This results in energy drain over sensor nodes on the event traversal route. Novel en-route filtering schemes counter this problem by filtering these attacks on designated verification nodes. However, these filtering schemes among other limitations inherently are network lifetime inefficient. Generally, report traversal paths and… ▽ More

    Submitted 20 December, 2018; originally announced December 2018.

    Comments: 4 Pages, 4 Figures, ICCAE 2019

  6. arXiv:1810.06741  [pdf, other

    cs.IT

    Achieving Covert Wireless Communications Using a Full-Duplex Receiver

    Authors: Khurram Shahzad, Xiangyun Zhou, Shihao Yan, **song Hu, Feng Shu, Jun Li

    Abstract: Covert communications hide the transmission of a message from a watchful adversary while ensuring a certain decoding performance at the receiver. In this work, a wireless communication system under fading channels is considered where covertness is achieved by using a full-duplex (FD) receiver. More precisely, the receiver of covert information generates artificial noise with a varying power causin… ▽ More

    Submitted 15 October, 2018; originally announced October 2018.

    Comments: 13 pages, 11 figures, Accepted for publication in IEEE Transactions on Wireless Communications

  7. arXiv:1711.03684  [pdf, ps, other

    cs.IT

    Covert Communications with A Full-Duplex Receiver over Wireless Fading Channels

    Authors: **song Hu, Khurram Shahzad, Shihao Yan, Xiangyun Zhou, Feng Shu, Jun Li

    Abstract: In this work, we propose a covert communication scheme where the transmitter attempts to hide its transmission to a full-duplex receiver, from a warden that is to detect this covert transmission using a radiometer. Specifically, we first derive the detection error rate at the warden, based on which the optimal detection threshold for its radiometer is analytically determined and its expected detec… ▽ More

    Submitted 9 November, 2017; originally announced November 2017.

  8. arXiv:1703.03783  [pdf

    cs.SE

    Survey on Essential and Accidental Real-Time Issues in Software Engineering

    Authors: Furrakh Shahzad, Maruf Pasha, Urooj Pasha, Bushra Majeed, Khurram Shahzad

    Abstract: Software product lines have recently been presented as one of the best promising improvements for the efficient software development. Different research works contribute supportive parameters and negotiations regarding the problems of producing a perfect software scheme. Traditional approaches or recycling software are not effective to solve the problems concerning software competence. Since fast… ▽ More

    Submitted 10 March, 2017; originally announced March 2017.

    Journal ref: Journal of Software Engineering and Applications, 2017, 10, 245-256

  9. arXiv:1703.02169  [pdf, other

    cs.IT

    Covert Communication in Fading Channels under Channel Uncertainty

    Authors: Khurram Shahzad, Xiangyun Zhou, Shihao Yan

    Abstract: A covert communication system under block fading channels is considered where users experience uncertainty about their channel knowledge. The transmitter seeks to hide the covert communication to a private user by exploiting a legitimate public communication link while the warden tries to detect this covert communication by using a radiometer. We derive the exact expression for the radiometers opt… ▽ More

    Submitted 6 March, 2017; originally announced March 2017.

    Comments: to appear in IEEE VTC2017-Spring

  10. arXiv:1305.5530  [pdf, ps, other

    cs.IT cs.NI

    Optimal Scheduling for Energy Harvesting Transmitters with Hybrid Energy Storage

    Authors: Omur Ozel, Khurram Shahzad, Sennur Ulukus

    Abstract: We consider data transmission with an energy harvesting transmitter which has a hybrid energy storage unit composed of a perfectly efficient super-capacitor (SC) and an inefficient battery. The SC has finite space for energy storage while the battery has unlimited space. The transmitter can choose to store the harvested energy in the SC or in the battery. The energy is drained from the SC and the… ▽ More

    Submitted 23 May, 2013; originally announced May 2013.

    Comments: To be presented at ISIT 2013