Zum Hauptinhalt springen

Showing 1–19 of 19 results for author: Baig, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.14649  [pdf, other

    cs.NE

    CIMulator: A Comprehensive Simulation Platform for Computing-In-Memory Circuit Macros with Low Bit-Width and Real Memory Materials

    Authors: Hoang-Hiep Le, Md. Aftab Baig, Wei-Chen Hong, Cheng-Hsien Tsai, Cheng-Jui Yeh, Fu-Xiang Liang, I-Ting Huang, Wei-Tzu Tsai, Ting-Yin Cheng, Sourav De, Nan-Yow Chen, Wen-Jay Lee, Ing-Chao Lin, Da-Wei Chang, Darsen D. Lu

    Abstract: This paper presents a simulation platform, namely CIMulator, for quantifying the efficacy of various synaptic devices in neuromorphic accelerators for different neural network architectures. Nonvolatile memory devices, such as resistive random-access memory, ferroelectric field-effect transistor, and volatile static random-access memory devices, can be selected as synaptic devices. A multilayer pe… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

  2. A Generic Privacy-Preserving Protocol For Keystroke Dynamics-Based Continuous Authentication

    Authors: Ahmed Fraz Baig, Sigurd Eskeland

    Abstract: Continuous authentication utilizes automatic recognition of certain user features for seamless and passive authentication without requiring user attention. Such features can be divided into categories of physiological biometrics and behavioral biometrics. Keystroke dynamics is proposed for behavioral biometrics-oriented authentication by recognizing users by means of their typing patterns. However… ▽ More

    Submitted 14 September, 2022; originally announced September 2022.

    Comments: Baig, A. and Eskeland, S. A Generic Privacy-preserving Protocol for Keystroke Dynamics-based Continuous Authentication.In Proceedings of the 19th International Conference on Security and Cryptography (SECRYPT 2022), pages 491-498 ISBN: 978-989-758-590-6; ISSN: 2184-7711

    Journal ref: In Proceedings of the 19th International Conference on Security and Cryptography (SECRYPT 2022), pages 491-498 ISBN: 978-989-758-590-6; ISSN: 2184-7711

  3. Cryptanalysis of a privacy-preserving behavior-oriented authentication scheme

    Authors: Sigurd Eskeland, Ahmed Fraz Baig

    Abstract: Continuous authentication has been proposed as a complementary security mechanism to password-based authentication for computer devices that are handled directly by humans, such as smart phones. Continuous authentication has some privacy issues as certain user features and actions are revealed to the authentication server, which is not assumed to be trusted. Wei et al. proposed in 2021 a privacy-p… ▽ More

    Submitted 14 September, 2022; originally announced September 2022.

    Comments: Eskeland, S. and Baig, A. (2022). Cryptanalysis of a Privacy-preserving Behavior-oriented Authentication Scheme. In Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT, ISBN 978-989- 758-590-6; ISSN 2184-7711, pages 299-304

    Journal ref: In Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT 2022, ISBN 978-989- 758-590-6; ISSN 2184-7711, pages 299-304

  4. arXiv:2205.12923  [pdf, other

    cs.CV

    Domain Adaptation for Object Detection using SE Adaptors and Center Loss

    Authors: Sushruth Nagesh, Shreyas Rajesh, Asfiya Baig, Savitha Srinivasan

    Abstract: Despite growing interest in object detection, very few works address the extremely practical problem of cross-domain robustness especially for automative applications. In order to prevent drops in performance due to domain shift, we introduce an unsupervised domain adaptation method built on the foundation of faster-RCNN with two domain adaptation components addressing the shift at the instance an… ▽ More

    Submitted 25 May, 2022; originally announced May 2022.

  5. arXiv:2205.12519  [pdf, other

    cs.CV

    Structure Aware and Class Balanced 3D Object Detection on nuScenes Dataset

    Authors: Sushruth Nagesh, Asfiya Baig, Savitha Srinivasan, Akshay Rangesh, Mohan Trivedi

    Abstract: 3-D object detection is pivotal for autonomous driving. Point cloud based methods have become increasingly popular for 3-D object detection, owing to their accurate depth information. NuTonomy's nuScenes dataset greatly extends commonly used datasets such as KITTI in size, sensor modalities, categories, and annotation numbers. However, it suffers from severe class imbalance. The Class-balanced Gro… ▽ More

    Submitted 3 October, 2022; v1 submitted 25 May, 2022; originally announced May 2022.

  6. arXiv:2103.13302  [pdf

    cs.ET cs.LG cs.NE

    Neuromorphic Computing with Ferroelectric FinFETs in the Presence of Temperature, Process Variation, Device Aging and Flicker Noise

    Authors: Sourav De, Bo-Han Qiu, Wei-Xuan Bu, Md. Aftab Baig, Chung-Jun Su, Yao-Jen Lee, Darsen Lu

    Abstract: This paper reports a comprehensive study on the impacts of temperature-change, process variation, flicker noise and device aging on the inference accuracy of pre-trained all-ferroelectric (FE) FinFET deep neural networks. Multiple-level-cell (MLC) operation with a novel adaptive-program-and-read algorithm with 100ns write pulse has been experimentally demonstrated in 5 nm thick hafnium zirconium o… ▽ More

    Submitted 2 July, 2022; v1 submitted 4 March, 2021; originally announced March 2021.

  7. arXiv:2103.03111  [pdf

    cs.LG cs.ET physics.app-ph

    Alleviation of Temperature Variation Induced Accuracy Degradation in Ferroelectric FinFET Based Neural Network

    Authors: Sourav De, Hoang-Hiep Le, Md. Aftab Baig, Yao-Jen Lee, Darsen D. Lu, Thomas Kämpfe

    Abstract: This paper reports the impacts of temperature variation on the inference accuracy of pre-trained all-ferroelectric FinFET deep neural networks, along with plausible design techniques to abate these impacts. We adopted a pre-trained artificial neural network (N.N.) with 96.4% inference accuracy on the MNIST dataset as the baseline. As an aftermath of temperature change, a compact model captured the… ▽ More

    Submitted 15 August, 2022; v1 submitted 3 March, 2021; originally announced March 2021.

  8. arXiv:2010.08707  [pdf, other

    cs.RO cs.AI cs.LG math.DG

    Constrained Motion Planning Networks X

    Authors: Ahmed H. Qureshi, Jiangeng Dong, Asfiya Baig, Michael C. Yip

    Abstract: Constrained motion planning is a challenging field of research, aiming for computationally efficient methods that can find a collision-free path on the constraint manifolds between a given start and goal configuration. These planning problems come up surprisingly frequently, such as in robot manipulation for performing daily life assistive tasks. However, few solutions to constrained motion planni… ▽ More

    Submitted 3 July, 2021; v1 submitted 16 October, 2020; originally announced October 2020.

    Comments: This is preprint version of a paper published in IEEE Transactions on Robotics. The videos, code, dataset and trained models can be found here: https://sites.google.com/view/compnetx/home

  9. arXiv:1910.03651  [pdf, ps, other

    cs.DS

    Improved Bounds for Two Query Adaptive Bitprobe Schemes Storing Five Elements

    Authors: Mirza Galib Anwarul Husain Baig, Deepanjan Kesh

    Abstract: In this paper, we study two-bitprobe adaptive schemes storing five elements. For these class of schemes, the best known lower bound is m^{1/2} due to Alon and Feige [SODA 2009]. Recently, it was proved by Kesh [FSTTCS 2018] that two-bitprobe adaptive schemes storing three elements will take at least m^{2/3} space, which also puts a lower bound on schemes storing five elements. In this work, we hav… ▽ More

    Submitted 23 March, 2020; v1 submitted 7 October, 2019; originally announced October 2019.

    Comments: This paper is accepted in the proceeding of COCOA 2019. arXiv admin note: substantial text overlap with arXiv:1810.13331

  10. arXiv:1812.04802  [pdf, ps, other

    cs.DS

    An Improved Scheme in the Two Query Adaptive Bitprobe Model

    Authors: Mirza Galib Anwarul Husain Baig, Deepanjan Kesh, Chirag Sodani

    Abstract: In this paper, we look into the adaptive bitprobe model that stores subsets of size at most four from a universe of size m, and answers membership queries using two bitprobes. We propose a scheme that stores arbitrary subsets of size four using O(m^{5/6}) amount of space. This improves upon the non-explicit scheme proposed by Garg and Radhakrishnan [Garg2015] which uses O(m^{16/17}) amount of spac… ▽ More

    Submitted 11 December, 2018; originally announced December 2018.

  11. arXiv:1810.13331  [pdf, ps, other

    cs.DS

    A Two Query Adaptive Bitprobe Scheme Storing Five Elements

    Authors: Mirza Galib Anwarul Husain Baig, Deepanjan Kesh, Chirag Sodani

    Abstract: We are studying the adaptive bitprobe model to store an arbitrary subset S of size at most five from a universe U of size m and answer the membership queries of the form "Is x in S?" in two bitprobes. In this paper, we present a data structure for the aforementioned problem. Our data structure takes O(m^{10/11}) space. This result improves the non-explicit result by Garg and Radhakrishnan [2015] w… ▽ More

    Submitted 23 October, 2019; v1 submitted 31 October, 2018; originally announced October 2018.

    Comments: This paper is accepted for the proceeding of WALCOM 2019. It contains some of the cases which could not be added in the original paper due to page limit. Furthermore, we have added a counter example for a six element subset

  12. arXiv:1801.10472  [pdf, other

    cs.SE cs.NE

    Soft Computing Techniques for Dependable Cyber-Physical Systems

    Authors: Muhammad Atif, Siddique Latif, Rizwan Ahmad, Adnan Khalid Kiani, Junaid Qadir, Adeel Baig, Hisao Ishibuchi, Waseem Abbas

    Abstract: Cyber-Physical Systems (CPS) allow us to manipulate objects in the physical world by providing a communication bridge between computation and actuation elements. In the current scheme of things, this sought-after control is marred by limitations inherent in the underlying communication network(s) as well as by the uncertainty found in the physical world. These limitations hamper fine-grained contr… ▽ More

    Submitted 27 July, 2020; v1 submitted 25 January, 2018; originally announced January 2018.

    Comments: IEEE Access

  13. Multicasting in Cognitive Radio Networks: Algorithms, Techniques and Protocols

    Authors: Junaid Qadir, Adeel Baig, Asad Ali, Quratulain Shafi

    Abstract: Multicasting is a fundamental networking primitive utilized by numerous applications. This also holds true for cognitive radio networks (CRNs) which have been proposed as a solution to the problems that emanate from the static non-adaptive features of classical wireless networks. A prime application of CRNs is dynamic spectrum access (DSA), which improves the efficiency of spectrum allocation by a… ▽ More

    Submitted 12 June, 2014; originally announced June 2014.

    Journal ref: Elsevier Journal of Network and Computer Applications, October, 2014

  14. arXiv:0904.3321  [pdf

    cs.DB cs.AI cs.DS

    Introducing Partial Matching Approach in Association Rules for Better Treatment of Missing Values

    Authors: Shariq Bashir, Saad Razzaq, Umer Maqbool, Sonya Tahir, Abdul Rauf Baig

    Abstract: Handling missing values in training datasets for constructing learning models or extracting useful information is considered to be an important research task in data mining and knowledge discovery in databases. In recent years, lot of techniques are proposed for imputing missing values by considering attribute relationships with missing value observation and other observations of training datase… ▽ More

    Submitted 21 April, 2009; originally announced April 2009.

  15. arXiv:0904.3320  [pdf

    cs.DB cs.AI cs.DS

    Using Association Rules for Better Treatment of Missing Values

    Authors: Shariq Bashir, Saad Razzaq, Umer Maqbool, Sonya Tahir, Abdul Rauf Baig

    Abstract: The quality of training data for knowledge discovery in databases (KDD) and data mining depends upon many factors, but handling missing values is considered to be a crucial factor in overall data quality. Today real world datasets contains missing values due to human, operational error, hardware malfunctioning and many other factors. The quality of knowledge extracted, learning and decision prob… ▽ More

    Submitted 21 April, 2009; originally announced April 2009.

  16. arXiv:0904.3319  [pdf

    cs.DB cs.AI cs.DS

    Fast Algorithms for Mining Interesting Frequent Itemsets without Minimum Support

    Authors: Shariq Bashir, Zahoor Jan, Abdul Rauf Baig

    Abstract: Real world datasets are sparse, dirty and contain hundreds of items. In such situations, discovering interesting rules (results) using traditional frequent itemset mining approach by specifying a user defined input support threshold is not appropriate. Since without any domain knowledge, setting support threshold small or large can output nothing or a large number of redundant uninteresting resu… ▽ More

    Submitted 21 April, 2009; originally announced April 2009.

    Comments: 25 Pages

  17. arXiv:0904.3316  [pdf

    cs.DB cs.AI cs.DS

    Ramp: Fast Frequent Itemset Mining with Efficient Bit-Vector Projection Technique

    Authors: Shariq Bashir, Abdul Rauf Baig

    Abstract: Mining frequent itemset using bit-vector representation approach is very efficient for dense type datasets, but highly inefficient for sparse datasets due to lack of any efficient bit-vector projection technique. In this paper we present a novel efficient bit-vector projection technique, for sparse and dense datasets. To check the efficiency of our bit-vector projection technique, we present a n… ▽ More

    Submitted 21 April, 2009; originally announced April 2009.

  18. arXiv:0904.3312  [pdf

    cs.DB cs.AI cs.DS

    HybridMiner: Mining Maximal Frequent Itemsets Using Hybrid Database Representation Approach

    Authors: Shariq Bashir, Abdul Rauf Baig

    Abstract: In this paper we present a novel hybrid (arraybased layout and vertical bitmap layout) database representation approach for mining complete Maximal Frequent Itemset (MFI) on sparse and large datasets. Our work is novel in terms of scalability, item search order and two horizontal and vertical projection techniques. We also present a maximal algorithm using this hybrid database representation app… ▽ More

    Submitted 21 April, 2009; originally announced April 2009.

    Comments: 8 Pages In the proceedings of 9th IEEE-INMIC 2005, Karachi, Pakistan, 2005

  19. arXiv:0904.3310  [pdf

    cs.DB cs.AI cs.DS

    FastLMFI: An Efficient Approach for Local Maximal Patterns Propagation and Maximal Patterns Superset Checking

    Authors: Shariq Bashir, Abdul Rauf Baig

    Abstract: Maximal frequent patterns superset checking plays an important role in the efficient mining of complete Maximal Frequent Itemsets (MFI) and maximal search space pruning. In this paper we present a new indexing approach, FastLMFI for local maximal frequent patterns (itemset) propagation and maximal patterns superset checking. Experimental results on different sparse and dense datasets show that o… ▽ More

    Submitted 21 April, 2009; originally announced April 2009.

    Comments: 8 Pages, In the proceedings of 4th ACS/IEEE International Conference on Computer Systems and Applications 2006, March 8, 2006, Dubai/Sharjah, UAE, 2006, Page(s) 452-459