Skip to main content

Showing 1–19 of 19 results for author: Zafar, A

Searching in archive cs. Search in all archives.
.
  1. Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective

    Authors: Khushnaseeb Roshan, Aasim Zafar

    Abstract: The rapid advancement of artificial intelligence within the realm of cybersecurity raises significant security concerns. The vulnerability of deep learning models in adversarial attacks is one of the major issues. In adversarial machine learning, malicious users try to fool the deep learning model by inserting adversarial perturbation inputs into the model during its training or testing phase. Sub… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: Submitted to Computer & Security (Elsevier)

  2. arXiv:2310.19290  [pdf, other

    cs.CR

    Analyzing eyebrow region for morphed image detection

    Authors: Abdullah Zafar, Christoph Busch

    Abstract: Facial images in passports are designated as primary identifiers for the verification of travelers according to the International Civil Aviation Organization (ICAO). Hence, it is important to ascertain the sanctity of the facial images stored in the electronic Machine-Readable Travel Document (eMRTD). With the introduction of automated border control (ABC) systems that rely on face recognition for… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

  3. Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System

    Authors: Khushnaseeb Roshan, Aasim Zafar, Sheikh Burhan Ul Haque

    Abstract: Network Intrusion Detection System (NIDS) is a key component in securing the computer network from various cyber security threats and network attacks. However, consider an unfortunate situation where the NIDS is itself attacked and vulnerable more specifically, we can say, How to defend the defender?. In Adversarial Machine Learning (AML), the malicious actors aim to fool the Machine Learning (ML)… ▽ More

    Submitted 7 October, 2023; v1 submitted 5 October, 2023; originally announced October 2023.

  4. arXiv:2309.06462  [pdf, other

    cs.CV

    Action Segmentation Using 2D Skeleton Heatmaps and Multi-Modality Fusion

    Authors: Syed Waleed Hyder, Muhammad Usama, Anas Zafar, Muhammad Naufil, Fawad Javed Fateh, Andrey Konin, M. Zeeshan Zia, Quoc-Huy Tran

    Abstract: This paper presents a 2D skeleton-based action segmentation method with applications in fine-grained human activity recognition. In contrast with state-of-the-art methods which directly take sequences of 3D skeleton coordinates as inputs and apply Graph Convolutional Networks (GCNs) for spatiotemporal feature learning, our main idea is to use sequences of 2D skeleton heatmaps as inputs and employ… ▽ More

    Submitted 25 April, 2024; v1 submitted 12 September, 2023; originally announced September 2023.

    Comments: Accepted to ICRA 2024

  5. Building Trust in Conversational AI: A Comprehensive Review and Solution Architecture for Explainable, Privacy-Aware Systems using LLMs and Knowledge Graph

    Authors: Ahtsham Zafar, Venkatesh Balavadhani Parthasarathy, Chan Le Van, Saad Shahid, Aafaq Iqbal khan, Arsalan Shahid

    Abstract: Conversational AI systems have emerged as key enablers of human-like interactions across diverse sectors. Nevertheless, the balance between linguistic nuance and factual accuracy has proven elusive. In this paper, we first introduce LLMXplorer, a comprehensive tool that provides an in-depth review of over 150 Large Language Models (LLMs), elucidating their myriad implications ranging from social a… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

  6. Extract and Characterize Hairpin Vortices in Turbulent Flows

    Authors: Adeel Zafar, Di Yang, Guoning Chen

    Abstract: Hairpin vortices are one of the most important vortical structures in turbulent flows. Extracting and characterizing hairpin vortices provides useful insight into many behaviors in turbulent flows. However, hairpin vortices have complex configurations and might be entangled with other vortices, making their extraction difficult. In this work, we introduce a framework to extract and separate hairpi… ▽ More

    Submitted 8 November, 2023; v1 submitted 8 August, 2023; originally announced August 2023.

  7. arXiv:2308.00077  [pdf

    cs.CR cs.AI cs.LG

    A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks

    Authors: Khushnaseeb Roshan, Aasim Zafar, Shiekh Burhan Ul Haque

    Abstract: Network Intrusion Detection System (NIDS) is an essential tool in securing cyberspace from a variety of security risks and unknown cyberattacks. A number of solutions have been implemented for Machine Learning (ML), and Deep Learning (DL) based NIDS. However, all these solutions are vulnerable to adversarial attacks, in which the malicious actor tries to evade or fool the model by injecting advers… ▽ More

    Submitted 31 July, 2023; originally announced August 2023.

    Comments: 6 Pages, 4 Figures, 1 Tables

  8. arXiv:2308.00074  [pdf

    cs.LG cs.CR

    Using Kernel SHAP XAI Method to optimize the Network Anomaly Detection Model

    Authors: Khushnaseeb Roshan, Aasim Zafar

    Abstract: Anomaly detection and its explanation is important in many research areas such as intrusion detection, fraud detection, unknown attack detection in network traffic and logs. It is challenging to identify the cause or explanation of why one instance is an anomaly? and the other is not due to its unbounded and lack of supervisory nature. The answer to this question is possible with the emerging tech… ▽ More

    Submitted 31 July, 2023; originally announced August 2023.

    Comments: 7 Pages, 8 Figures, 3 Tables

  9. arXiv:2305.19478  [pdf, other

    cs.CV

    Permutation-Aware Action Segmentation via Unsupervised Frame-to-Segment Alignment

    Authors: Quoc-Huy Tran, Ahmed Mehmood, Muhammad Ahmed, Muhammad Naufil, Anas Zafar, Andrey Konin, M. Zeeshan Zia

    Abstract: This paper presents an unsupervised transformer-based framework for temporal activity segmentation which leverages not only frame-level cues but also segment-level cues. This is in contrast with previous methods which often rely on frame-level information only. Our approach begins with a frame-level prediction module which estimates framewise action classes via a transformer encoder. The frame-lev… ▽ More

    Submitted 26 October, 2023; v1 submitted 30 May, 2023; originally announced May 2023.

    Comments: Accepted to WACV 2024

  10. arXiv:2212.06049  [pdf, other

    cs.CL cs.AI

    CDialog: A Multi-turn Covid-19 Conversation Dataset for Entity-Aware Dialog Generation

    Authors: Deeksha Varshney, Aizan Zafar, Niranshu Kumar Behra, Asif Ekbal

    Abstract: The development of conversational agents to interact with patients and deliver clinical advice has attracted the interest of many researchers, particularly in light of the COVID-19 pandemic. The training of an end-to-end neural based dialog system, on the other hand, is hampered by a lack of multi-turn medical dialog corpus. We make the very first attempt to release a high-quality multi-turn Medic… ▽ More

    Submitted 16 November, 2022; originally announced December 2022.

  11. Brain Tumor Synthetic Data Generation with Adaptive StyleGANs

    Authors: Usama Tariq, Rizwan Qureshi, Anas Zafar, Danyal Aftab, Jia Wu, Tanvir Alam, Zubair Shah, Hazrat Ali

    Abstract: Generative models have been very successful over the years and have received significant attention for synthetic data generation. As deep learning models are getting more and more complex, they require large amounts of data to perform accurately. In medical image analysis, such generative models play a crucial role as the available data is limited due to challenges related to data privacy, lack of… ▽ More

    Submitted 4 December, 2022; originally announced December 2022.

    Comments: Accepted in AICS conference

  12. Detect-and-describe: Joint learning framework for detection and description of objects

    Authors: Addel Zafar, Umar Khalid

    Abstract: Traditional object detection answers two questions; "what" (what the object is?) and "where" (where the object is?). "what" part of the object detection can be fine-grained further i.e. "what type", "what shape" and "what material" etc. This results in the shifting of the object detection tasks to the object description paradigm. Describing an object provides additional detail that enables us to u… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

  13. arXiv:2112.08442  [pdf

    cs.LG cs.AI cs.CR

    Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP)

    Authors: Khushnaseeb Roshan, Aasim Zafar

    Abstract: Machine learning (ML) and Deep Learning (DL) methods are being adopted rapidly, especially in computer network security, such as fraud detection, network anomaly detection, intrusion detection, and much more. However, the lack of transparency of ML and DL based models is a major obstacle to their implementation and criticized due to its black-box nature, even with such tremendous results. Explaina… ▽ More

    Submitted 14 December, 2021; originally announced December 2021.

    Comments: 20 pages, 12 figures, 4 tables, journal article

    Journal ref: International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.6, November 2021

  14. arXiv:2106.07359  [pdf, other

    cs.IR cs.CL cs.CV cs.DL cs.LG

    MexPub: Deep Transfer Learning for Metadata Extraction from German Publications

    Authors: Zeyd Boukhers, Nada Beili, Timo Hartmann, Prantik Goswami, Muhammad Arslan Zafar

    Abstract: Extracting metadata from scientific papers can be considered a solved problem in NLP due to the high accuracy of state-of-the-art methods. However, this does not apply to German scientific publications, which have a variety of styles and layouts. In contrast to most of the English scientific publications that follow standard and simple layouts, the order, content, position and size of metadata in… ▽ More

    Submitted 4 June, 2021; originally announced June 2021.

    Comments: A long version of an accepted paper @ JCDL 2021

  15. arXiv:2010.06505  [pdf, other

    cs.SE

    A Lean and Highly-automated Model-Based Software Development Process Based on DO-178C/DO-331

    Authors: Konstantin Dmitriev, Shanza Ali Zafar, Kevin Schmiechen, Yi Lai, Micheal Saleab, Pranav Nagarajan, Daniel Dollinger, Markus Hochstrasser, Stephan Myschik, Florian Holzapfel

    Abstract: The emergence of a global market for urban air mobility and unmanned aerial systems has attracted many startups across the world. These organizations have little training or experience in the traditional processes used in civil aviation for the development of software and electronic hardware. They are also constrained in the resources they can allocate for dedicated teams of professionals to follo… ▽ More

    Submitted 13 October, 2020; originally announced October 2020.

  16. Throughput of Infrastructure-based Cooperative Vehicular Networks

    Authors: Jieqiong Chen, Guoqiang Mao, Changle Li, Ammar Zafar, Albert Y. Zomaya

    Abstract: In this paper, we provide detailed analysis of the achievable throughput of infrastructure-based vehicular network with a finite traffic density under a cooperative communication strategy, which explores combined use of vehicle-to-infrastructure (V2I) communications, vehicle-to-vehicle (V2V) communications, mobility of vehicles and cooperations among vehicles and infrastructure to facilitate the d… ▽ More

    Submitted 15 January, 2017; v1 submitted 4 December, 2016; originally announced December 2016.

    Journal ref: IEEE Transactions on Intelligent Transportation Systems, 2017

  17. arXiv:1602.04257  [pdf, other

    cs.AI cs.CY

    Identifying Diabetic Patients with High Risk of Readmission

    Authors: Malladihalli S Bhuvan, Ankit Kumar, Adil Zafar, Vinith Kishore

    Abstract: Hospital readmissions are expensive and reflect the inadequacies in healthcare system. In the United States alone, treatment of readmitted diabetic patients exceeds 250 million dollars per year. Early identification of patients facing a high risk of readmission can enable healthcare providers to to conduct additional investigations and possibly prevent future readmissions. This not only improves t… ▽ More

    Submitted 12 February, 2016; originally announced February 2016.

    Comments: 10 pages, 5 figures, 7 tables

    ACM Class: J.3; H.2.8

  18. arXiv:1211.5931  [pdf, ps, other

    cs.IT

    Power Allocation Strategies for Fixed-Gain Half-Duplex Amplify-and-Forward Relaying in Nakagami-m Fading

    Authors: Ammar Zafar, Redha M. Radaydeh, Yunfei Chen, Mohamed-Slim Alouini

    Abstract: In this paper, we study power allocation strategies for a fixed-gain amplify-and-forward relay network employing multiple relays. We consider two optimization problems for the relay network: 1) optimal power allocation to maximize the end-to-end signal-to-noise ratio (SNR) and 2) minimizing the total consumed power while maintaining the end-to-end SNR over a threshold value. We investigate these t… ▽ More

    Submitted 16 December, 2012; v1 submitted 26 November, 2012; originally announced November 2012.

    Comments: 8 figures, 28 pages. Journal paper

  19. arXiv:cs/0504033  [pdf

    cs.DC

    Resource Management Services for a Grid Analysis Environment

    Authors: Arshad Ali, Ashiq Anjum, Tahir Azim, Julian Bunn, Atif Mehmood, Richard McClatchey, Harvey Newman, Waqas ur Rehman, Conrad Steenberg, Michael Thomas, Frank van Lingen, Ian Willers, Muhammad Adeel Zafar

    Abstract: Selecting optimal resources for submitting jobs on a computational Grid or accessing data from a data grid is one of the most important tasks of any Grid middleware. Most modern Grid software today satisfies this responsibility and gives a best-effort performance to solve this problem. Almost all decisions regarding scheduling and data access are made by the software automatically, giving users… ▽ More

    Submitted 10 April, 2005; originally announced April 2005.

    Comments: 8 pages, 7 figures. Workshop on Web and Grid Services for Scientific Data Analysis at the Int Conf on Parallel Processing (ICPP05). Norway June 2005

    ACM Class: H2.4; J.3