Zum Hauptinhalt springen

Showing 1–19 of 19 results for author: Akhtar, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.01273  [pdf, other

    cs.CV cs.AI

    Towards Inclusive Face Recognition Through Synthetic Ethnicity Alteration

    Authors: Praveen Kumar Chandaliya, Kiran Raja, Raghavendra Ramachandra, Zahid Akhtar, Christoph Busch

    Abstract: Numerous studies have shown that existing Face Recognition Systems (FRS), including commercial ones, often exhibit biases toward certain ethnicities due to under-represented data. In this work, we explore ethnicity alteration and skin tone modification using synthetic face image generation methods to increase the diversity of datasets. We conduct a detailed analysis by first constructing a balance… ▽ More

    Submitted 6 May, 2024; v1 submitted 2 May, 2024; originally announced May 2024.

    Comments: 8 Pages

    Journal ref: Automatic Face and Gesture Recognition 2024

  2. arXiv:2311.01472  [pdf, other

    cs.CL cs.AI

    Relation Extraction from News Articles (RENA): A Tool for Epidemic Surveillance

    Authors: Jaeff Hong, Duong Dung, Danielle Hutchinson, Zubair Akhtar, Rosalie Chen, Rebecca Dawson, Aditya Joshi, Samsung Lim, C Raina MacIntyre, Deepti Gurdasani

    Abstract: Relation Extraction from News Articles (RENA) is a browser-based tool designed to extract key entities and their semantic relationships in English language news articles related to infectious diseases. Constructed using the React framework, this system presents users with an elegant and user-friendly interface. It enables users to input a news article and select from a choice of two models to gene… ▽ More

    Submitted 31 October, 2023; originally announced November 2023.

    Comments: Under review in AAAI 2024

  3. arXiv:2307.07036  [pdf, other

    cs.CV

    Deepfake Video Detection Using Generative Convolutional Vision Transformer

    Authors: Deressa Wodajo, Solomon Atnafu, Zahid Akhtar

    Abstract: Deepfakes have raised significant concerns due to their potential to spread false information and compromise digital media integrity. In this work, we propose a Generative Convolutional Vision Transformer (GenConViT) for deepfake video detection. Our model combines ConvNeXt and Swin Transformer models for feature extraction, and it utilizes Autoencoder and Variational Autoencoder to learn from the… ▽ More

    Submitted 13 July, 2023; originally announced July 2023.

    Comments: 11 pages, 4 figures

  4. arXiv:2305.18679  [pdf, other

    cs.CL cs.LG

    KEYword based Sampling (KEYS) for Large Language Models

    Authors: Jyothir S V, Zuhaib Akhtar

    Abstract: Question answering (Q/A) can be formulated as a generative task (Mitra, 2017) where the task is to generate an answer given the question and the passage (knowledge, if available). Recent advances in QA task is focused a lot on language model advancements and less on other areas such as sampling(Krishna et al., 2021), (Nakano et al., 2021). Keywords play very important role for humans in language g… ▽ More

    Submitted 1 June, 2023; v1 submitted 29 May, 2023; originally announced May 2023.

  5. arXiv:2305.14757  [pdf, other

    cs.CL

    Psychological Metrics for Dialog System Evaluation

    Authors: Salvatore Giorgi, Shreya Havaldar, Farhan Ahmed, Zuhaib Akhtar, Shalaka Vaidya, Gary Pan, Lyle H. Ungar, H. Andrew Schwartz, Joao Sedoc

    Abstract: We present metrics for evaluating dialog systems through a psychologically-grounded "human" lens in which conversational agents express a diversity of both states (e.g., emotion) and traits (e.g., personality), just as people do. We present five interpretable metrics from established psychology that are fundamental to human communication and relationships: emotional entropy, linguistic style and e… ▽ More

    Submitted 15 September, 2023; v1 submitted 24 May, 2023; originally announced May 2023.

  6. arXiv:2305.14533  [pdf, other

    cs.CL

    How to Choose How to Choose Your Chatbot: A Massively Multi-System MultiReference Data Set for Dialog Metric Evaluation

    Authors: Huda Khayrallah, Zuhaib Akhtar, Edward Cohen, João Sedoc

    Abstract: We release MMSMR, a Massively Multi-System MultiReference dataset to enable future work on metrics and evaluation for dialog. Automatic metrics for dialogue evaluation should be robust proxies for human judgments; however, the verification of robustness is currently far from satisfactory. To quantify the robustness correlation and understand what is necessary in a test set, we create and release a… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  7. arXiv:2304.12183  [pdf, other

    cs.SD cs.LG eess.AS

    Small-footprint slimmable networks for keyword spotting

    Authors: Zuhaib Akhtar, Mohammad Omar Khursheed, Dongsu Du, Yuzong Liu

    Abstract: In this work, we present Slimmable Neural Networks applied to the problem of small-footprint keyword spotting. We show that slimmable neural networks allow us to create super-nets from Convolutioanl Neural Networks and Transformers, from which sub-networks of different sizes can be extracted. We demonstrate the usefulness of these models on in-house Alexa data and Google Speech Commands, and focus… ▽ More

    Submitted 21 April, 2023; originally announced April 2023.

  8. arXiv:2303.14856  [pdf

    cs.CV

    Automatic Number Plate Recognition using Random Forest Classifier

    Authors: Zuhaib Akhtar, Rashid Ali

    Abstract: Automatic Number Plate Recognition System (ANPRS) is a mass surveillance embedded system that recognizes the number plate of the vehicle. This system is generally used for traffic management applications. It should be very efficient in detecting the number plate in noisy as well as in low illumination and also within required time frame. This paper proposes a number plate recognition method by pro… ▽ More

    Submitted 26 March, 2023; originally announced March 2023.

  9. arXiv:2303.14848  [pdf, ps, other

    cs.DC

    From Blockchain to Hashgraph: Distributed Ledger Technologies in the Wild

    Authors: Zuhaib Akhtar

    Abstract: With the introduction of the term blockchain in 2008, its interest has been increasing in the community since the idea was coined. The reason for this interest is because it provides anonymity, security and integrity without any central third party organisation in control of data and transaction. It has attracted huge interest in research areas due to its advances in various platforms, limitations… ▽ More

    Submitted 26 March, 2023; originally announced March 2023.

  10. arXiv:2201.00484  [pdf

    cs.CR

    Secure Spectrum and Resource Sharing for 5G Networks using a Blockchain-based Decentralized Trusted Computing Platform

    Authors: Hisham A. Kholidy, Mohammad A. Rahman, Andrew Karam, Zahid Akhtar

    Abstract: The 5G network would fuel next-gen, bandwidth-heavy technologies such as automation, IoT, and AI on the factory floor. It will improve efficiency by powering AR overlays in workflows, as well as ensure safer practices and reduce the number of defects through predictive analytics and real-time detection of damage. The Dynamic Spectrum Sharing (DSS) in 5G networks will permit 5G NR and 4G LTE to coe… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

  11. arXiv:2111.00121  [pdf, other

    cs.CV

    Longitudinal Analysis of Mask and No-Mask on Child Face Recognition

    Authors: Praveen Kumar Chandaliya, Zahid Akhtar, Neeta Nain

    Abstract: Face is one of the most widely employed traits for person recognition, even in many large-scale applications. Despite technological advancements in face recognition systems, they still face obstacles caused by pose, expression, occlusion, and aging variations. Owing to the COVID-19 pandemic, contactless identity verification has become exceedingly vital. Recently, few studies have been conducted o… ▽ More

    Submitted 13 March, 2022; v1 submitted 29 October, 2021; originally announced November 2021.

    Comments: 5 Pages, 3 Figure

  12. arXiv:2110.11721  [pdf, other

    math.OC cs.CC cs.LG

    Projection-Free Algorithm for Stochastic Bi-level Optimization

    Authors: Zeeshan Akhtar, Amrit Singh Bedi, Srujan Teja Thomdapu, Ketan Rajawat

    Abstract: This work presents the first projection-free algorithm to solve stochastic bi-level optimization problems, where the objective function depends on the solution of another stochastic optimization problem. The proposed $\textbf{S}$tochastic $\textbf{Bi}$-level $\textbf{F}$rank-$\textbf{W}$olfe ($\textbf{SBFW}$) algorithm can be applied to streaming settings and does not make use of large batches or… ▽ More

    Submitted 3 April, 2022; v1 submitted 22 October, 2021; originally announced October 2021.

    Comments: 34 Pages

  13. arXiv:2107.06534  [pdf, other

    math.OC cs.LG eess.SP stat.ML

    Zeroth and First Order Stochastic Frank-Wolfe Algorithms for Constrained Optimization

    Authors: Zeeshan Akhtar, Ketan Rajawat

    Abstract: This paper considers stochastic convex optimization problems with two sets of constraints: (a) deterministic constraints on the domain of the optimization variable, which are difficult to project onto; and (b) deterministic or stochastic constraints that admit efficient projection. Problems of this form arise frequently in the context of semidefinite programming as well as when various NP-hard pro… ▽ More

    Submitted 18 March, 2022; v1 submitted 14 July, 2021; originally announced July 2021.

  14. arXiv:2101.08429  [pdf, other

    cs.CR

    Malware Detection and Analysis: Challenges and Research Opportunities

    Authors: Zahid Akhtar

    Abstract: Malwares are continuously growing in sophistication and numbers. Over the last decade, remarkable progress has been achieved in anti-malware mechanisms. However, several pressing issues (e.g., unknown malware samples detection) still need to be addressed adequately. This article first presents a concise overview of malware along with anti-malware and then summarizes various research challenges. Th… ▽ More

    Submitted 20 January, 2021; originally announced January 2021.

  15. arXiv:2010.01592  [pdf, other

    cs.CV cs.CR cs.GT cs.LG

    Unknown Presentation Attack Detection against Rational Attackers

    Authors: Ali Khodabakhsh, Zahid Akhtar

    Abstract: Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real-life settings. Some of the challenges for existing solutions are the detection of unknown attacks, the ability to perform in adversarial settings, few-shot learning, and explainability. In this study, these limitations ar… ▽ More

    Submitted 2 July, 2021; v1 submitted 4 October, 2020; originally announced October 2020.

  16. arXiv:2008.05758  [pdf, other

    math.OC cs.LG eess.SP

    Conservative Stochastic Optimization with Expectation Constraints

    Authors: Zeeshan Akhtar, Amrit Singh Bedi, Ketan Rajawat

    Abstract: This paper considers stochastic convex optimization problems where the objective and constraint functions involve expectations with respect to the data indices or environmental variables, in addition to deterministic convex constraints on the domain of the variables. Although the setting is generic and arises in different machine learning applications, online and efficient approaches for solving s… ▽ More

    Submitted 29 May, 2021; v1 submitted 13 August, 2020; originally announced August 2020.

  17. Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks

    Authors: Kishor Datta Gupta, Zahid Akhtar, Dipankar Dasgupta

    Abstract: Developing secure machine learning models from adversarial examples is challenging as various methods are continually being developed to generate adversarial attacks. In this work, we propose an evolutionary approach to automatically determine Image Processing Techniques Sequence (IPTS) for detecting malicious inputs. Accordingly, we first used a diverse set of attack methods including adaptive at… ▽ More

    Submitted 7 July, 2020; v1 submitted 1 July, 2020; originally announced July 2020.

    Journal ref: SN COMPUT. SCI. 2, 383 (2021)

  18. arXiv:1912.11145  [pdf, other

    eess.IV cs.MM

    Reducing Storage in Large-Scale Photo Sharing Services using Recompression

    Authors: Xing Xu, Zahaib Akhtar, Wyatt Lloyd, Antonio Ortega, Ramesh Govindan

    Abstract: The popularity of photo sharing services has increased dramatically in recent years. Increases in users, quantity of photos, and quality/resolution of photos combined with the user expectation that photos are reliably stored indefinitely creates a growing burden on the storage backend of these services. We identify a new opportunity for storage savings with application-specific compression for pho… ▽ More

    Submitted 23 December, 2019; originally announced December 2019.

  19. arXiv:1802.07770  [pdf, other

    cs.CV

    Generalizable Adversarial Examples Detection Based on Bi-model Decision Mismatch

    Authors: João Monteiro, Isabela Albuquerque, Zahid Akhtar, Tiago H. Falk

    Abstract: Modern applications of artificial neural networks have yielded remarkable performance gains in a wide range of tasks. However, recent studies have discovered that such modelling strategy is vulnerable to Adversarial Examples, i.e. examples with subtle perturbations often too small and imperceptible to humans, but that can easily fool neural networks. Defense techniques against adversarial examples… ▽ More

    Submitted 22 April, 2019; v1 submitted 21 February, 2018; originally announced February 2018.