Skip to main content

Showing 1–50 of 135 results for author: Hussain, A

  1. arXiv:2407.05786  [pdf, ps, other

    cs.CL cs.AI

    Large Language Models for Judicial Entity Extraction: A Comparative Study

    Authors: Atin Sakkeer Hussain, Anu Thomas

    Abstract: Domain-specific Entity Recognition holds significant importance in legal contexts, serving as a fundamental task that supports various applications such as question-answering systems, text summarization, machine translation, sentiment analysis, and information retrieval specifically within case law documents. Recent advancements have highlighted the efficacy of Large Language Models in natural lan… ▽ More

    Submitted 8 July, 2024; originally announced July 2024.

    ACM Class: I.2.1

  2. arXiv:2407.05202  [pdf, other

    cs.SE cs.AI

    Harnessing the Power of LLMs: Automating Unit Test Generation for High-Performance Computing

    Authors: Rabimba Karanjai, Aftab Hussain, Md Rafiqul Islam Rabin, Lei Xu, Weidong Shi, Mohammad Amin Alipour

    Abstract: Unit testing is crucial in software engineering for ensuring quality. However, it's not widely used in parallel and high-performance computing software, particularly scientific applications, due to their smaller, diverse user base and complex logic. These factors make unit testing challenging and expensive, as it requires specialized knowledge and existing automated tools are often ineffective.… ▽ More

    Submitted 6 July, 2024; originally announced July 2024.

  3. arXiv:2405.18368  [pdf, other

    cs.CV

    The 2024 Brain Tumor Segmentation (BraTS) Challenge: Glioma Segmentation on Post-treatment MRI

    Authors: Maria Correia de Verdier, Rachit Saluja, Louis Gagnon, Dominic LaBella, Ujjwall Baid, Nourel Hoda Tahon, Martha Foltyn-Dumitru, Jikai Zhang, Maram Alafif, Saif Baig, Ken Chang, Gennaro D'Anna, Lisa Deptula, Diviya Gupta, Muhammad Ammar Haider, Ali Hussain, Michael Iv, Marinos Kontzialis, Paul Manning, Farzan Moodi, Teresa Nunes, Aaron Simon, Nico Sollmann, David Vu, Maruf Adewole , et al. (60 additional authors not shown)

    Abstract: Gliomas are the most common malignant primary brain tumors in adults and one of the deadliest types of cancer. There are many challenges in treatment and monitoring due to the genetic diversity and high intrinsic heterogeneity in appearance, shape, histology, and treatment response. Treatments include surgery, radiation, and systemic therapies, with magnetic resonance imaging (MRI) playing a key r… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

    Comments: 10 pages, 4 figures, 1 table

  4. Measuring Impacts of Poisoning on Model Parameters and Embeddings for Large Language Models of Code

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Mohammad Amin Alipour

    Abstract: Large language models (LLMs) have revolutionized software development practices, yet concerns about their safety have arisen, particularly regarding hidden backdoors, aka trojans. Backdoor attacks involve the insertion of triggers into training data, allowing attackers to manipulate the behavior of the model maliciously. In this paper, we focus on analyzing the model parameters to detect potential… ▽ More

    Submitted 19 May, 2024; originally announced May 2024.

    Comments: This work has been accepted at the 1st ACM International Conference on AI-powered Software (AIware), co-located with the ACM International Conference on the Foundations of Software Engineering (FSE) 2024, Porto de Galinhas, Brazil. arXiv admin note: substantial text overlap with arXiv:2402.12936

  5. arXiv:2405.09787  [pdf, other

    eess.IV cs.CV cs.LG

    Analysis of the BraTS 2023 Intracranial Meningioma Segmentation Challenge

    Authors: Dominic LaBella, Ujjwal Baid, Omaditya Khanna, Shan McBurney-Lin, Ryan McLean, Pierre Nedelec, Arif Rashid, Nourel Hoda Tahon, Talissa Altes, Radhika Bhalerao, Yaseen Dhemesh, Devon Godfrey, Fathi Hilal, Scott Floyd, Anastasia Janas, Anahita Fathi Kazerooni, John Kirkpatrick, Collin Kent, Florian Kofler, Kevin Leu, Nazanin Maleki, Bjoern Menze, Maxence Pajot, Zachary J. Reitman, Jeffrey D. Rudie , et al. (96 additional authors not shown)

    Abstract: We describe the design and results from the BraTS 2023 Intracranial Meningioma Segmentation Challenge. The BraTS Meningioma Challenge differed from prior BraTS Glioma challenges in that it focused on meningiomas, which are typically benign extra-axial tumors with diverse radiologic and anatomical presentation and a propensity for multiplicity. Nine participating teams each developed deep-learning… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: 16 pages, 11 tables, 10 figures, MICCAI

  6. arXiv:2405.02828  [pdf, other

    cs.SE cs.LG

    Trojans in Large Language Models of Code: A Critical Review through a Trigger-Based Taxonomy

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Toufique Ahmed, Bowen Xu, Premkumar Devanbu, Mohammad Amin Alipour

    Abstract: Large language models (LLMs) have provided a lot of exciting new capabilities in software development. However, the opaque nature of these models makes them difficult to reason about and inspect. Their opacity gives rise to potential security risks, as adversaries can train and deploy compromised models to disrupt the software development process in the victims' organization. This work presents… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2305.03803

  7. arXiv:2403.15848  [pdf, other

    cs.GT

    On the Stability of Learning in Network Games with Many Players

    Authors: Aamal Hussain, Dan Leonte, Francesco Belardinelli, Georgios Piliouras

    Abstract: Multi-agent learning algorithms have been shown to display complex, unstable behaviours in a wide array of games. In fact, previous works indicate that convergent behaviours are less likely to occur as the total number of agents increases. This seemingly prohibits convergence to stable strategies, such as Nash Equilibria, in games with many players. To make progress towards addressing this chall… ▽ More

    Submitted 23 March, 2024; originally announced March 2024.

    Comments: AAMAS 2024. arXiv admin note: text overlap with arXiv:2307.13922

    MSC Class: 93A16; 91A26; 91A68; 58K35 ACM Class: G.3; J.4; F.2.2

  8. arXiv:2402.16896  [pdf, other

    cs.CR cs.LG cs.SE

    On Trojan Signatures in Large Language Models of Code

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Mohammad Amin Alipour

    Abstract: Trojan signatures, as described by Fields et al. (2021), are noticeable differences in the distribution of the trojaned class parameters (weights) and the non-trojaned class parameters of the trojaned model, that can be used to detect the trojaned model. Fields et al. (2021) found trojan signatures in computer vision classification tasks with image models, such as, Resnet, WideResnet, Densenet, an… ▽ More

    Submitted 7 March, 2024; v1 submitted 23 February, 2024; originally announced February 2024.

    Comments: This work has been accepted at the International Conference on Learning Representations 2024 Workshop on Secure and Trustworthy Large Language Models, SeT LLM @ ICLR 2024 (Vienna, Austria)

  9. arXiv:2402.16757  [pdf, other

    cs.SD eess.AS

    Towards Environmental Preference Based Speech Enhancement For Individualised Multi-Modal Hearing Aids

    Authors: Jasper Kirton-Wingate, Shafique Ahmed, Adeel Hussain, Mandar Gogate, Kia Dashtipour, Jen-Cheng Hou, Tassadaq Hussain, Yu Tsao, Amir Hussain

    Abstract: Since the advent of Deep Learning (DL), Speech Enhancement (SE) models have performed well under a variety of noise conditions. However, such systems may still introduce sonic artefacts, sound unnatural, and restrict the ability for a user to hear ambient sound which may be of importance. Hearing Aid (HA) users may wish to customise their SE systems to suit their personal preferences and day-to-da… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

    Comments: This has been submitted to the Trends in Hearing journal

  10. arXiv:2402.16394  [pdf, other

    eess.AS cs.SD

    Audio-Visual Speech Enhancement in Noisy Environments via Emotion-Based Contextual Cues

    Authors: Tassadaq Hussain, Kia Dashtipour, Yu Tsao, Amir Hussain

    Abstract: In real-world environments, background noise significantly degrades the intelligibility and clarity of human speech. Audio-visual speech enhancement (AVSE) attempts to restore speech quality, but existing methods often fall short, particularly in dynamic noise conditions. This study investigates the inclusion of emotion as a novel contextual cue within AVSE, hypothesizing that incorporating emotio… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

  11. arXiv:2402.12936  [pdf, other

    cs.SE

    Measuring Impacts of Poisoning on Model Parameters and Neuron Activations: A Case Study of Poisoning CodeBERT

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Navid Ayoobi, Mohammad Amin Alipour

    Abstract: Large language models (LLMs) have revolutionized software development practices, yet concerns about their safety have arisen, particularly regarding hidden backdoors, aka trojans. Backdoor attacks involve the insertion of triggers into training data, allowing attackers to manipulate the behavior of the model maliciously. In this paper, we focus on analyzing the model parameters to detect potential… ▽ More

    Submitted 5 March, 2024; v1 submitted 20 February, 2024; originally announced February 2024.

  12. A Novel Technique to Parameterize Congestion Control in 6TiSCH IIoT Networks

    Authors: Kushal Chakraborty, Aritra Kumar Dutta, Mohammad Avesh Hussain, Syed Raafay Mohiuddin, Nikumani Choudhury, Rakesh Matam, Mithun Mukherjee

    Abstract: The Industrial Internet of Things (IIoT) refers to the use of interconnected smart devices, sensors, and other technologies to create a network of intelligent systems that can monitor and manage industrial processes. 6TiSCH (IPv6 over the Time Slotted Channel Hopping mode of IEEE 802.15.4e) as an enabling technology facilitates low-power and low-latency communication between IoT devices in industr… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

    Comments: The paper has been submitted, accepted, and presented at the 2023 IEEE Global Communications Conference: Next-Generation Networking and Internet, with plans for publication. It was delivered during the IEEE Global Communications Conference held on December 6th, 2023, in Kuala Lumpur, Malaysia

  13. arXiv:2402.05466  [pdf, other

    cs.HC

    Engineering End-to-End Remote Labs using IoT-based Retrofitting

    Authors: K. S. Viswanadh, Akshit Gureja, Nagesh Walchatwar, Rishabh Agrawal, Shiven Sinha, Sachin Chaudhari, Karthik Vaidhyanathan, Venkatesh Choppella, Prabhakar Bhimalapuram, Harikumar Kandath, Aftab Hussain

    Abstract: Remote labs are a groundbreaking development in the education industry, providing students with access to laboratory education anytime, anywhere. However, most remote labs are costly and difficult to scale, especially in developing countries. With this as a motivation, this paper proposes a new remote labs (RLabs) solution that includes two use case experiments: Vanishing Rod and Focal Length. The… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

    Comments: 30 pages, 7 tables and 20 figures. Submitted to ACM Transactions on IoT

  14. arXiv:2312.11943  [pdf, other

    cs.GT cs.AI cs.MA math.DS

    Stability of Multi-Agent Learning in Competitive Networks: Delaying the Onset of Chaos

    Authors: Aamal Hussain, Francesco Belardinelli

    Abstract: The behaviour of multi-agent learning in competitive network games is often studied within the context of zero-sum games, in which convergence guarantees may be obtained. However, outside of this class the behaviour of learning is known to display complex behaviours and convergence cannot be always guaranteed. Nonetheless, in order to develop a complete picture of the behaviour of multi-agent lear… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

    Comments: AAAI 2024

    MSC Class: 93A16; 91A26; 91A68; 58K35 ACM Class: G.3; J.4; F.2.2

  15. arXiv:2312.07039  [pdf, other

    cs.CV

    Open-Pose 3D Zero-Shot Learning: Benchmark and Challenges

    Authors: Weiguang Zhao, Guanyu Yang, Rui Zhang, Chenru Jiang, Chaolong Yang, Yuyao Yan, Amir Hussain, Kaizhu Huang

    Abstract: With the explosive 3D data growth, the urgency of utilizing zero-shot learning to facilitate data labeling becomes evident. Recently, methods transferring language or language-image pre-training models like Contrastive Language-Image Pre-training (CLIP) to 3D vision have made significant progress in the 3D zero-shot classification task. These methods primarily focus on 3D object classification wit… ▽ More

    Submitted 16 April, 2024; v1 submitted 12 December, 2023; originally announced December 2023.

  16. arXiv:2312.04004  [pdf, other

    cs.SE

    Occlusion-based Detection of Trojan-triggering Inputs in Large Language Models of Code

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Toufique Ahmed, Mohammad Amin Alipour, Bowen Xu

    Abstract: Large language models (LLMs) are becoming an integrated part of software development. These models are trained on large datasets for code, where it is hard to verify each data point. Therefore, a potential attack surface can be to inject poisonous data into the training data to make models vulnerable, aka trojaned. It can pose a significant threat by hiding manipulative behaviors inside models, le… ▽ More

    Submitted 10 December, 2023; v1 submitted 6 December, 2023; originally announced December 2023.

  17. arXiv:2312.03483  [pdf, other

    cs.CL cs.LG

    Exploring Answer Information Methods for Question Generation with Transformers

    Authors: Talha Chafekar, Aafiya Hussain, Grishma Sharma, Deepak Sharma

    Abstract: There has been a lot of work in question generation where different methods to provide target answers as input, have been employed. This experimentation has been mostly carried out for RNN based models. We use three different methods and their combinations for incorporating answer information and explore their effect on several automatic evaluation metrics. The methods that are used are answer pro… ▽ More

    Submitted 6 December, 2023; originally announced December 2023.

  18. arXiv:2311.14850  [pdf, other

    cs.SE

    TrojanedCM: A Repository of Trojaned Large Language Models of Code

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Mohammad Amin Alipour

    Abstract: With the rapid growth of research in trojaning deep neural models of source code, we observe that there is a need of developing a benchmark trojaned models for testing various trojan detection and unlearning techniques. In this work, we aim to provide the scientific community with diverse trojaned code models, that cover a variety of state-of-the-art architectures, on which they can examine such t… ▽ More

    Submitted 11 December, 2023; v1 submitted 24 November, 2023; originally announced November 2023.

  19. arXiv:2311.11255  [pdf, other

    cs.SD cs.MM eess.AS

    M$^{2}$UGen: Multi-modal Music Understanding and Generation with the Power of Large Language Models

    Authors: Shansong Liu, Atin Sakkeer Hussain, Chenshuo Sun, Ying Shan

    Abstract: The current landscape of research leveraging large language models (LLMs) is experiencing a surge. Many works harness the powerful reasoning capabilities of these models to comprehend various modalities, such as text, speech, images, videos, etc. They also utilize LLMs to understand human intention and generate desired outputs like images, videos, and music. However, research that combines both un… ▽ More

    Submitted 4 March, 2024; v1 submitted 19 November, 2023; originally announced November 2023.

  20. arXiv:2311.06564  [pdf, other

    cs.IT cs.CR

    Seeing is Believing: A Federated Learning Based Prototype to Detect Wireless Injection Attacks

    Authors: Aadil Hussain, Nitheesh Gundapu, Sarang Drugkar, Suraj Kiran, J. Harshan, Ranjitha Prasad

    Abstract: Reactive injection attacks are a class of security threats in wireless networks wherein adversaries opportunistically inject spoofing packets in the frequency band of a client thereby forcing the base-station to deploy impersonation-detection methods. Towards circumventing such threats, we implement secret-key based physical-layer signalling methods at the clients which allow the base-stations to… ▽ More

    Submitted 11 November, 2023; originally announced November 2023.

    Comments: 6 pages with 8 figures

  21. arXiv:2310.16406  [pdf, other

    cs.CR cs.AI eess.SP

    Radio Frequency Fingerprinting via Deep Learning: Challenges and Opportunities

    Authors: Saeif Al-Hazbi, Ahmed Hussain, Savio Sciancalepore, Gabriele Oligeri, Panos Papadimitratos

    Abstract: Radio Frequency Fingerprinting (RFF) techniques promise to authenticate wireless devices at the physical layer based on inherent hardware imperfections introduced during manufacturing. Such RF transmitter imperfections are reflected into over-the-air signals, allowing receivers to accurately identify the RF transmitting source. Recent advances in Machine Learning, particularly in Deep Learning (DL… ▽ More

    Submitted 15 April, 2024; v1 submitted 25 October, 2023; originally announced October 2023.

    Comments: Authors version; Accepted for the 20th International Wireless Communications and Mobile Computing (IWCMC) Security Symposium, 2024

  22. arXiv:2309.11059  [pdf, other

    eess.AS cs.SD

    Deep Complex U-Net with Conformer for Audio-Visual Speech Enhancement

    Authors: Shafique Ahmed, Chia-Wei Chen, Wenze Ren, Chin-Jou Li, Ernie Chu, Jun-Cheng Chen, Amir Hussain, Hsin-Min Wang, Yu Tsao, Jen-Cheng Hou

    Abstract: Recent studies have increasingly acknowledged the advantages of incorporating visual data into speech enhancement (SE) systems. In this paper, we introduce a novel audio-visual SE approach, termed DCUC-Net (deep complex U-Net with conformer network). The proposed DCUC-Net leverages complex domain features and a stack of conformer blocks. The encoder and decoder of DCUC-Net are designed using a com… ▽ More

    Submitted 8 October, 2023; v1 submitted 20 September, 2023; originally announced September 2023.

  23. arXiv:2309.04698  [pdf, other

    cs.RO cs.AI cs.AR

    Advancements in Upper Body Exoskeleton: Implementing Active Gravity Compensation with a Feedforward Controller

    Authors: Muhammad Ayaz Hussain, Ioannis Iossifidis

    Abstract: In this study, we present a feedforward control system designed for active gravity compensation on an upper body exoskeleton. The system utilizes only positional data from internal motor sensors to calculate torque, employing analytical control equations based on Newton-Euler Inverse Dynamics. Compared to feedback control systems, the feedforward approach offers several advantages. It eliminates t… ▽ More

    Submitted 9 September, 2023; originally announced September 2023.

    ACM Class: B.m; B.1; I.6

  24. arXiv:2308.11276  [pdf, other

    cs.SD cs.AI cs.CL cs.MM eess.AS

    Music Understanding LLaMA: Advancing Text-to-Music Generation with Question Answering and Captioning

    Authors: Shansong Liu, Atin Sakkeer Hussain, Chenshuo Sun, Ying Shan

    Abstract: Text-to-music generation (T2M-Gen) faces a major obstacle due to the scarcity of large-scale publicly available music datasets with natural language captions. To address this, we propose the Music Understanding LLaMA (MU-LLaMA), capable of answering music-related questions and generating captions for music files. Our model utilizes audio representations from a pretrained MERT model to extract musi… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

  25. arXiv:2308.06272  [pdf, other

    cs.HC cs.AI

    Beyond Reality: The Pivotal Role of Generative AI in the Metaverse

    Authors: Vinay Chamola, Gaurang Bansal, Tridib Kumar Das, Vikas Hassija, Naga Siva Sai Reddy, Jiacheng Wang, Sherali Zeadally, Amir Hussain, F. Richard Yu, Mohsen Guizani, Dusit Niyato

    Abstract: Imagine stepping into a virtual world that's as rich, dynamic, and interactive as our physical one. This is the promise of the Metaverse, and it's being brought to life by the transformative power of Generative Artificial Intelligence (AI). This paper offers a comprehensive exploration of how generative AI technologies are shaping the Metaverse, transforming it into a dynamic, immersive, and inter… ▽ More

    Submitted 28 July, 2023; originally announced August 2023.

    Comments: 8 pages, 4 figures

  26. arXiv:2307.13928  [pdf, other

    cs.GT

    Beyond Strict Competition: Approximate Convergence of Multi Agent Q-Learning Dynamics

    Authors: Aamal Hussain, Francesco Belardinelli, Georgios Piliouras

    Abstract: The behaviour of multi-agent learning in competitive settings is often considered under the restrictive assumption of a zero-sum game. Only under this strict requirement is the behaviour of learning well understood; beyond this, learning dynamics can often display non-convergent behaviours which prevent fixed-point analysis. Nonetheless, many relevant competitive games do not satisfy the zero-sum… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: Presented at IJCAI 2023

    MSC Class: 93A16; 91A26; 91A68; 58K35 ACM Class: G.3; J.4; F.2.2

  27. arXiv:2307.13922  [pdf, other

    cs.GT cs.AI cs.MA math.DS

    Stability of Multi-Agent Learning: Convergence in Network Games with Many Players

    Authors: Aamal Hussain, Dan Leonte, Francesco Belardinelli, Georgios Piliouras

    Abstract: The behaviour of multi-agent learning in many player games has been shown to display complex dynamics outside of restrictive examples such as network zero-sum games. In addition, it has been shown that convergent behaviour is less likely to occur as the number of players increase. To make progress in resolving this problem, we study Q-Learning dynamics and determine a sufficient condition for the… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: Presented at the Workshop on New Frontiers in Learning, Control, and Dynamical Systems at the International Conference on Machine Learning (ICML), Honolulu, Hawaii, USA, 2023

    MSC Class: 93A16; 91A26; 91A68; 58K35 ACM Class: G.3; J.4; F.2.2

  28. arXiv:2307.07062  [pdf, other

    eess.AS cs.LG cs.SD

    Controllable Emphasis with zero data for text-to-speech

    Authors: Arnaud Joly, Marco Nicolis, Ekaterina Peterova, Alessandro Lombardi, Ammar Abbas, Arent van Korlaar, Aman Hussain, Parul Sharma, Alexis Moinet, Mateusz Lajszczak, Penny Karanasou, Antonio Bonafonte, Thomas Drugman, Elena Sokolova

    Abstract: We present a scalable method to produce high quality emphasis for text-to-speech (TTS) that does not require recordings or annotations. Many TTS models include a phoneme duration model. A simple but effective method to achieve emphasized speech consists in increasing the predicted duration of the emphasised word. We show that this is significantly better than spectrogram modification techniques im… ▽ More

    Submitted 13 July, 2023; originally announced July 2023.

    Comments: In proceeding of 12th Speech Synthesis Workshop (SSW) 2023

  29. arXiv:2307.01221  [pdf, other

    cs.IR cs.AI

    Filter Bubbles in Recommender Systems: Fact or Fallacy -- A Systematic Review

    Authors: Qazi Mohammad Areeb, Mohammad Nadeem, Shahab Saquib Sohail, Raza Imam, Faiyaz Doctor, Yassine Himeur, Amir Hussain, Abbes Amira

    Abstract: A filter bubble refers to the phenomenon where Internet customization effectively isolates individuals from diverse opinions or materials, resulting in their exposure to only a select set of content. This can lead to the reinforcement of existing attitudes, beliefs, or conditions. In this study, our primary focus is to investigate the impact of filter bubbles in recommender systems. This pioneerin… ▽ More

    Submitted 2 July, 2023; originally announced July 2023.

    Comments: 21 pages, 10 figures and 5 tables

  30. arXiv:2305.13765  [pdf

    cs.CV cs.AI

    Human Body Pose Estimation for Gait Identification: A Comprehensive Survey of Datasets and Models

    Authors: Luke K. Topham, Wasiq Khan, Dhiya Al-Jumeily, Abir Hussain

    Abstract: Person identification is a problem that has received substantial attention, particularly in security domains. Gait recognition is one of the most convenient approaches enabling person identification at a distance without the need of high-quality images. There are several review studies addressing person identification such as the utilization of facial images, silhouette images, and wearable sensor… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  31. arXiv:2305.10025  [pdf

    cs.NI cs.CR

    Resolving the Decreased Rank Attack in RPL's IoT Networks

    Authors: B. Ghaleb, A. Al-Dubai, A. Hussain, J. Ahmad, I. Romdhani, Z. Jaroucheh

    Abstract: The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core communication technology for the Internet of Things (IoT) networks. RPL organizes its network in the form of a tree-like structure where a node is co… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

  32. arXiv:2305.03803  [pdf, other

    cs.SE

    A Survey of Trojans in Neural Models of Source Code: Taxonomy and Techniques

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Toufique Ahmed, Navid Ayoobi, Bowen Xu, Prem Devanbu, Mohammad Amin Alipour

    Abstract: In this work, we study literature in Explainable AI and Safe AI to understand poisoning of neural models of code. In order to do so, we first establish a novel taxonomy for Trojan AI for code, and present a new aspect-based classification of triggers in neural models of code. Next, we highlight recent works that help us deepen our conception of how these models understand software code. Then we pi… ▽ More

    Submitted 18 April, 2024; v1 submitted 5 May, 2023; originally announced May 2023.

  33. Morphological Classification of Extragalactic Radio Sources Using Gradient Boosting Methods

    Authors: Abdollah Masoud Darya, Ilias Fernini, Marley Vellasco, Abir Hussain

    Abstract: The field of radio astronomy is witnessing a boom in the amount of data produced per day due to newly commissioned radio telescopes. One of the most crucial problems in this field is the automatic classification of extragalactic radio sources based on their morphologies. Most recent contributions in the field of morphological classification of extragalactic radio sources have proposed classifiers… ▽ More

    Submitted 3 August, 2023; v1 submitted 25 April, 2023; originally announced April 2023.

    Comments: The peer-reviewed paper was presented at The 2023 International Joint Conference on Neural Networks (IJCNN) and published on IEEE Xplore. The code and dataset used in this work are available from https://github.com/AbdollahMasoud/IJCNN-2023

  34. arXiv:2303.04942  [pdf, other

    cs.LG cs.PL cs.SE

    A Study of Variable-Role-based Feature Enrichment in Neural Models of Code

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Bowen Xu, David Lo, Mohammad Amin Alipour

    Abstract: Although deep neural models substantially reduce the overhead of feature engineering, the features readily available in the inputs might significantly impact training cost and the performance of the models. In this paper, we explore the impact of an unsuperivsed feature enrichment approach based on variable roles on the performance of neural models of code. The notion of variable roles (as introdu… ▽ More

    Submitted 12 March, 2023; v1 submitted 8 March, 2023; originally announced March 2023.

    Comments: Accepted in the 1st International Workshop on Interpretability and Robustness in Neural Software Engineering (InteNSE'23), Co-located with ICSE

  35. Study of Distractors in Neural Models of Code

    Authors: Md Rafiqul Islam Rabin, Aftab Hussain, Sahil Suneja, Mohammad Amin Alipour

    Abstract: Finding important features that contribute to the prediction of neural models is an active area of research in explainable AI. Neural models are opaque and finding such features sheds light on a better understanding of their predictions. In contrast, in this work, we present an inverse perspective of distractor features: features that cast doubt about the prediction by affecting the model's confid… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

    Comments: The 1st International Workshop on Interpretability and Robustness in Neural Software Engineering, Co-located with ICSE (InteNSE'23)

  36. arXiv:2301.10177  [pdf, other

    eess.SP cs.IT eess.SY

    Co-channel Interference Management for the Next-Generation Heterogeneous Networks using Deep Leaning

    Authors: Ishtiaq Ahmad, Aftab Hussain

    Abstract: The connectivity of public-safety mobile users (MU) in the co-existence of a public-safety network (PSN), unmanned aerial vehicles (UAVs), and LTE-based railway networks (LRN) needs a thorough investigation. UAVs are deployed as mobile base stations (BSs) for cell-edge coverage enhancement for MU. The co-existence of heterogeneous networks gives rise to the issue of co-channel interference due to… ▽ More

    Submitted 6 January, 2023; originally announced January 2023.

  37. arXiv:2301.09619  [pdf, other

    cs.GT cs.AI cs.MA math.DS

    Asymptotic Convergence and Performance of Multi-Agent Q-Learning Dynamics

    Authors: Aamal Abbas Hussain, Francesco Belardinelli, Georgios Piliouras

    Abstract: Achieving convergence of multiple learning agents in general $N$-player games is imperative for the development of safe and reliable machine learning (ML) algorithms and their application to autonomous systems. Yet it is known that, outside the bounds of simple two-player games, convergence cannot be taken for granted. To make progress in resolving this problem, we study the dynamics of smooth Q… ▽ More

    Submitted 23 January, 2023; originally announced January 2023.

    Comments: Accepted in AAMAS 2023

    MSC Class: 93A16; 91A26; 91A68; 58K35 ACM Class: G.3; J.4; F.2.2

  38. arXiv:2301.00031  [pdf

    cs.OH

    Predicting the Students Involvements and its Impacts on Learning Outcomes Through Online Education During Covid-19

    Authors: Muhammad Nadeem, Faisal Bukhari, Ali Hussain

    Abstract: Everybody knows very well about the COVID-19 pandemic, lockdown, and its impacts and effects on every field of life, from childhood to senior citizens, from local to global. The underlying research study focuses on students' involvement in online classes. This paper assesses the effect of the COVID-19 pandemic on the students' participation and involvement during online classes compared to the phy… ▽ More

    Submitted 28 December, 2022; originally announced January 2023.

    Comments: 10 pages, 4

  39. arXiv:2212.06682  [pdf, other

    cs.CV

    Towards Deeper and Better Multi-view Feature Fusion for 3D Semantic Segmentation

    Authors: Chaolong Yang, Yuyao Yan, Weiguang Zhao, Jianan Ye, Xi Yang, Amir Hussain, Kaizhu Huang

    Abstract: 3D point clouds are rich in geometric structure information, while 2D images contain important and continuous texture information. Combining 2D information to achieve better 3D semantic segmentation has become mainstream in 3D scene understanding. Albeit the success, it still remains elusive how to fuse and process the cross-dimensional features from these two distinct spaces. Existing state-of-th… ▽ More

    Submitted 13 December, 2022; originally announced December 2022.

  40. arXiv:2211.01950  [pdf, other

    cs.NE cs.CV cs.LG

    Unlocking the potential of two-point cells for energy-efficient and resilient training of deep nets

    Authors: Ahsan Adeel, Adewale Adetomi, Khubaib Ahmed, Amir Hussain, Tughrul Arslan, W. A. Phillips

    Abstract: Context-sensitive two-point layer 5 pyramidal cells (L5PCs) were discovered as long ago as 1999. However, the potential of this discovery to provide useful neural computation has yet to be demonstrated. Here we show for the first time how a transformative L5PCs-driven deep neural network (DNN), termed the multisensory cooperative computing (MCC) architecture, can effectively process large amounts… ▽ More

    Submitted 22 December, 2022; v1 submitted 24 October, 2022; originally announced November 2022.

  41. arXiv:2210.17456  [pdf, other

    eess.AS cs.SD

    Audio-Visual Speech Enhancement and Separation by Utilizing Multi-Modal Self-Supervised Embeddings

    Authors: I-Chun Chern, Kuo-Hsuan Hung, Yi-Ting Chen, Tassadaq Hussain, Mandar Gogate, Amir Hussain, Yu Tsao, Jen-Cheng Hou

    Abstract: AV-HuBERT, a multi-modal self-supervised learning model, has been shown to be effective for categorical problems such as automatic speech recognition and lip-reading. This suggests that useful audio-visual speech representations can be obtained via utilizing multi-modal self-supervised embeddings. Nevertheless, it is unclear if such representations can be generalized to solve real-world multi-moda… ▽ More

    Submitted 31 May, 2023; v1 submitted 31 October, 2022; originally announced October 2022.

    Comments: ICASSP AMHAT 2023

  42. arXiv:2210.13127  [pdf, other

    eess.AS cs.SD eess.SP

    A Novel Frame Structure for Cloud-Based Audio-Visual Speech Enhancement in Multimodal Hearing-aids

    Authors: Abhijeet Bishnu, Ankit Gupta, Mandar Gogate, Kia Dashtipour, Ahsan Adeel, Amir Hussain, Mathini Sellathurai, Tharmalingam Ratnarajah

    Abstract: In this paper, we design a first of its kind transceiver (PHY layer) prototype for cloud-based audio-visual (AV) speech enhancement (SE) complying with high data rate and low latency requirements of future multimodal hearing assistive technology. The innovative design needs to meet multiple challenging constraints including up/down link communications, delay of transmission and signal processing,… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

  43. arXiv:2210.04252  [pdf, other

    cs.CV cs.AI cs.LG

    Precise Single-stage Detector

    Authors: Aisha Chandio, Gong Gui, Teerath Kumar, Irfan Ullah, Ramin Ranjbarzadeh, Arunabha M Roy, Akhtar Hussain, Yao Shen

    Abstract: There are still two problems in SDD causing some inaccurate results: (1) In the process of feature extraction, with the layer-by-layer acquisition of semantic information, local information is gradually lost, resulting into less representative feature maps; (2) During the Non-Maximum Suppression (NMS) algorithm due to inconsistency in classification and regression tasks, the classification confide… ▽ More

    Submitted 9 October, 2022; originally announced October 2022.

    Comments: We will submit it soon to the IEEE transaction. Due to characters limitation, we can not upload the full abstract. Please read the pdf file for more detail

  44. arXiv:2209.13101  [pdf, other

    cs.CL

    WikiDes: A Wikipedia-Based Dataset for Generating Short Descriptions from Paragraphs

    Authors: Hoang Thang Ta, Abu Bakar Siddiqur Rahman, Navonil Majumder, Amir Hussain, Lotfollah Najjar, Newton Howard, Soujanya Poria, Alexander Gelbukh

    Abstract: As free online encyclopedias with massive volumes of content, Wikipedia and Wikidata are key to many Natural Language Processing (NLP) tasks, such as information retrieval, knowledge base building, machine translation, text classification, and text summarization. In this paper, we introduce WikiDes, a novel dataset to generate short descriptions of Wikipedia articles for the problem of text summar… ▽ More

    Submitted 26 September, 2022; originally announced September 2022.

    Comments: 27 pages, 8 figures, 15 tables

  45. arXiv:2206.04615  [pdf, other

    cs.CL cs.AI cs.CY cs.LG stat.ML

    Beyond the Imitation Game: Quantifying and extrapolating the capabilities of language models

    Authors: Aarohi Srivastava, Abhinav Rastogi, Abhishek Rao, Abu Awal Md Shoeb, Abubakar Abid, Adam Fisch, Adam R. Brown, Adam Santoro, Aditya Gupta, Adrià Garriga-Alonso, Agnieszka Kluska, Aitor Lewkowycz, Akshat Agarwal, Alethea Power, Alex Ray, Alex Warstadt, Alexander W. Kocurek, Ali Safaya, Ali Tazarv, Alice Xiang, Alicia Parrish, Allen Nie, Aman Hussain, Amanda Askell, Amanda Dsouza , et al. (426 additional authors not shown)

    Abstract: Language models demonstrate both quantitative improvement and new qualitative capabilities with increasing scale. Despite their potentially transformative impact, these new capabilities are as yet poorly characterized. In order to inform future research, prepare for disruptive new model capabilities, and ameliorate socially harmful effects, it is vital that we understand the present and near-futur… ▽ More

    Submitted 12 June, 2023; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: 27 pages, 17 figures + references and appendices, repo: https://github.com/google/BIG-bench

    Journal ref: Transactions on Machine Learning Research, May/2022, https://openreview.net/forum?id=uyTL5Bvosj

  46. arXiv:2206.02671  [pdf, ps, other

    cs.SD cs.CV eess.AS

    Canonical Cortical Graph Neural Networks and its Application for Speech Enhancement in Audio-Visual Hearing Aids

    Authors: Leandro A. Passos, João Paulo Papa, Amir Hussain, Ahsan Adeel

    Abstract: Despite the recent success of machine learning algorithms, most models face drawbacks when considering more complex tasks requiring interaction between different sources, such as multimodal input data and logical time sequences. On the other hand, the biological brain is highly sharpened in this sense, empowered to automatically manage and integrate such streams of information. In this context, th… ▽ More

    Submitted 31 January, 2023; v1 submitted 6 June, 2022; originally announced June 2022.

  47. arXiv:2205.14374  [pdf, other

    cs.SE cs.LG cs.PL

    Syntax-Guided Program Reduction for Understanding Neural Code Intelligence Models

    Authors: Md Rafiqul Islam Rabin, Aftab Hussain, Mohammad Amin Alipour

    Abstract: Neural code intelligence (CI) models are opaque black-boxes and offer little insight on the features they use in making predictions. This opacity may lead to distrust in their prediction and hamper their wider adoption in safety-critical applications. Recently, input program reduction techniques have been proposed to identify key features in the input programs to improve the transparency of CI mod… ▽ More

    Submitted 14 June, 2022; v1 submitted 28 May, 2022; originally announced May 2022.

    Comments: The 6th ACM SIGPLAN International Symposium on Machine Programming (MAPS'22); Related to arXiv:2202.06474

  48. arXiv:2205.09239  [pdf, other

    cs.SE

    Readle: A Formal Framework for Designing AI-based Edge Systems

    Authors: Aftab Hussain

    Abstract: With the wide spread use of AI-driven systems in the edge (a.k.a edge intelligence systems), such as autonomous driving vehicles, wearable biotech devices, intelligent manufacturing, etc., such systems are becoming very critical for our day-to-day lives. A challenge in designing edge intelligence systems is that we have to deal with a large number of constraints in two design spaces that form the… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

  49. arXiv:2204.03842  [pdf, other

    cs.CV

    From 2D Images to 3D Model:Weakly Supervised Multi-View Face Reconstruction with Deep Fusion

    Authors: Weiguang Zhao, Chaolong Yang, Jianan Ye, Rui Zhang, Yuyao Yan, Xi Yang, Bin Dong, Amir Hussain, Kaizhu Huang

    Abstract: While weakly supervised multi-view face reconstruction (MVR) is garnering increased attention, one critical issue still remains open: how to effectively fuse multiple image information to reconstruct high-precision 3D models. In this regard, we propose a novel model called Deep Fusion MVR (DF-MVR) to reconstruct high-precision 3D facial shapes from multi-view images. Specifically, we introduce Mul… ▽ More

    Submitted 22 January, 2024; v1 submitted 8 April, 2022; originally announced April 2022.

  50. arXiv:2202.09115  [pdf, other

    cs.CV

    Towards Simple and Accurate Human Pose Estimation with Stair Network

    Authors: Chenru Jiang, Kaizhu Huang, Shufei Zhang, Shufei Zhang, Jimin Xiao, Zhenxing Niu, Amir Hussain

    Abstract: In this paper, we focus on tackling the precise keypoint coordinates regression task. Most existing approaches adopt complicated networks with a large number of parameters, leading to a heavy model with poor cost-effectiveness in practice. To overcome this limitation, we develop a small yet discrimicative model called STair Network, which can be simply stacked towards an accurate multi-stage pose… ▽ More

    Submitted 21 November, 2022; v1 submitted 18 February, 2022; originally announced February 2022.

    Comments: The paper has been accepted by IEEE Transactions on Emerging Topics in Computational Intelligence