Skip to main content

Showing 1–4 of 4 results for author: Syed, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.09715  [pdf, other

    cs.SE cs.CL cs.CR cs.LG

    Textual analysis of End User License Agreement for red-flagging potentially malicious software

    Authors: Behraj Khan, Tahir Syed, Zeshan Khan, Muhammad Rafi

    Abstract: New software and updates are downloaded by end users every day. Each dowloaded software has associated with it an End Users License Agreements (EULA), but this is rarely read. An EULA includes information to avoid legal repercussions. However,this proposes a host of potential problems such as spyware or producing an unwanted affect in the target system. End users do not read these EULA's because o… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  2. Latency-Aware Radio Resource Optimization in Learning-Based Cloud-Aided Small Cell Wireless Networks

    Authors: Tamoor-ul-Hassan Syed, Samarakoon Sumudu, Bennis Mehdi, Matti Latva-aho

    Abstract: Low latency communication is one of the fundamental requirements for 5G wireless networks and beyond. In this paper, a novel approach for joint caching, user scheduling and resource allocation is proposed for minimizing the queuing latency in serving user's requests in cloud-aided wireless networks. Due to the slow temporal variations in user requests, a time-scale separation technique is used to… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

    Comments: Accepted for publication in IEEE Transactions on Green Computing and Networking

  3. arXiv:2005.01908  [pdf, other

    cs.AI cs.LG

    A multi-component framework for the analysis and design of explainable artificial intelligence

    Authors: S. Atakishiyev, H. Babiker, N. Farruque, R. Goebel1, M-Y. Kima, M. H. Motallebi, J. Rabelo, T. Syed, O. R. Zaïane

    Abstract: The rapid growth of research in explainable artificial intelligence (XAI) follows on two substantial developments. First, the enormous application success of modern machine learning methods, especially deep and reinforcement learning, which have created high expectations for industrial, commercial and social value. Second, the emergence of concern for creating trusted AI systems, including the cre… ▽ More

    Submitted 4 May, 2020; originally announced May 2020.

    Comments: 39 pages

  4. arXiv:1904.10623  [pdf, other

    cs.CR

    Security Analysis of Near-Field Communication (NFC) Payments

    Authors: Dennis Giese, Kevin Liu, Michael Sun, Tahin Syed, Linda Zhang

    Abstract: Near-Field Communication (NFC) is a modern technology for short range communication with a variety of applications ranging from physical access control to contactless payments. These applications are often heralded as being more secure, as they require close physical proximity and do not involve Wi-Fi or mobile networks. However, these systems are still vulnerable to security attacks at the time o… ▽ More

    Submitted 23 April, 2019; originally announced April 2019.

    Comments: 10 pages, 3 figures