Zum Hauptinhalt springen

Showing 1–36 of 36 results for author: Munir, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.05850  [pdf, other

    cs.CV cs.LG

    Scaling Graph Convolutions for Mobile Vision

    Authors: William Avery, Mustafa Munir, Radu Marculescu

    Abstract: To compete with existing mobile architectures, MobileViG introduces Sparse Vision Graph Attention (SVGA), a fast token-mixing operator based on the principles of GNNs. However, MobileViG scales poorly with model size, falling at most 1% behind models with similar latency. This paper introduces Mobile Graph Convolution (MGC), a new vision graph neural network (ViG) module that solves this scaling p… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

    Comments: Proceedings of the 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops

  2. arXiv:2406.04873  [pdf, other

    cs.CV cs.AI

    Ada-VE: Training-Free Consistent Video Editing Using Adaptive Motion Prior

    Authors: Tanvir Mahmud, Mustafa Munir, Radu Marculescu, Diana Marculescu

    Abstract: Video-to-video synthesis models face significant challenges, such as ensuring consistent character generation across frames, maintaining smooth temporal transitions, and preserving quality during fast motion. The introduction of joint fully cross-frame self-attention mechanisms has improved character consistency, but this comes at the cost of increased computational complexity. This full cross-fra… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: Tech Report

  3. arXiv:2405.16740  [pdf, other

    cs.CV

    PP-SAM: Perturbed Prompts for Robust Adaptation of Segment Anything Model for Polyp Segmentation

    Authors: Md Mostafijur Rahman, Mustafa Munir, Debesh Jha, Ulas Bagci, Radu Marculescu

    Abstract: The Segment Anything Model (SAM), originally designed for general-purpose segmentation tasks, has been used recently for polyp segmentation. Nonetheless, fine-tuning SAM with data from new imaging centers or clinics poses significant challenges. This is because this necessitates the creation of an expensive and time-intensive annotated dataset, along with the potential for variability in user prom… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

    Comments: 7 pages, 9 figures, Proceedings of the 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops

  4. arXiv:2405.14497  [pdf, other

    cs.CV

    Improving Single Domain-Generalized Object Detection: A Focus on Diversification and Alignment

    Authors: Muhammad Sohail Danish, Muhammad Haris Khan, Muhammad Akhtar Munir, M. Saquib Sarfraz, Mohsen Ali

    Abstract: In this work, we tackle the problem of domain generalization for object detection, specifically focusing on the scenario where only a single source domain is available. We propose an effective approach that involves two key steps: diversifying the source domain and aligning detections based on class prediction confidence and localization. Firstly, we demonstrate that by carefully selecting a set o… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  5. arXiv:2405.06880  [pdf, other

    eess.IV cs.CV

    EMCAD: Efficient Multi-scale Convolutional Attention Decoding for Medical Image Segmentation

    Authors: Md Mostafijur Rahman, Mustafa Munir, Radu Marculescu

    Abstract: An efficient and effective decoding mechanism is crucial in medical image segmentation, especially in scenarios with limited computational resources. However, these decoding mechanisms usually come with high computational costs. To address this concern, we introduce EMCAD, a new efficient multi-scale convolutional attention decoder, designed to optimize both performance and computational efficienc… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: 14 pages, 5 figures, 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)

  6. arXiv:2405.06849  [pdf, other

    cs.CV cs.AI cs.LG

    GreedyViG: Dynamic Axial Graph Construction for Efficient Vision GNNs

    Authors: Mustafa Munir, William Avery, Md Mostafijur Rahman, Radu Marculescu

    Abstract: Vision graph neural networks (ViG) offer a new avenue for exploration in computer vision. A major bottleneck in ViGs is the inefficient k-nearest neighbor (KNN) operation used for graph construction. To solve this issue, we propose a new method for designing ViGs, Dynamic Axial Graph Construction (DAGC), which is more efficient than KNN as it limits the number of considered graph connections made… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: Proceedings of the 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)

  7. arXiv:2403.06388  [pdf, other

    cs.CR cs.LG

    A Zero Trust Framework for Realization and Defense Against Generative AI Attacks in Power Grid

    Authors: Md. Shirajum Munir, Sravanthi Proddatoori, Manjushree Muralidhara, Walid Saad, Zhu Han, Sachin Shetty

    Abstract: Understanding the potential of generative AI (GenAI)-based attacks on the power grid is a fundamental challenge that must be addressed in order to protect the power grid by realizing and validating risk in new attack vectors. In this paper, a novel zero trust framework for a power grid supply chain (PGSC) is proposed. This framework facilitates early detection of potential GenAI-driven attack vect… ▽ More

    Submitted 10 March, 2024; originally announced March 2024.

    Comments: Accepted article by IEEE International Conference on Communications (ICC 2024), Copyright 2024 IEEE

  8. arXiv:2311.04815  [pdf, other

    cs.CV

    Domain Adaptive Object Detection via Balancing Between Self-Training and Adversarial Learning

    Authors: Muhammad Akhtar Munir, Muhammad Haris Khan, M. Saquib Sarfraz, Mohsen Ali

    Abstract: Deep learning based object detectors struggle generalizing to a new target domain bearing significant variations in object and background. Most current methods align domains by using image or instance-level adversarial feature alignment. This often suffers due to unwanted background and lacks class-specific alignment. A straightforward approach to promote class-level alignment is to use high confi… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

    Comments: Accepted for publication in IEEE Transactions on Pattern Analysis and Machine Intelligence (Volume: 45, Issue: 12, December 2023); Extended version of our conference paper, arXiv link: arXiv:2110.00249

  9. arXiv:2311.03570  [pdf, other

    cs.CV

    Cal-DETR: Calibrated Detection Transformer

    Authors: Muhammad Akhtar Munir, Salman Khan, Muhammad Haris Khan, Mohsen Ali, Fahad Shahbaz Khan

    Abstract: Albeit revealing impressive predictive performance for several computer vision tasks, deep neural networks (DNNs) are prone to making overconfident predictions. This limits the adoption and wider utilization of DNNs in many safety-critical applications. There have been recent efforts toward calibrating DNNs, however, almost all of them focus on the classification task. Surprisingly, very little at… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

    Comments: Accepted at NeurIPS 2023

  10. arXiv:2310.09021  [pdf, other

    cs.NI

    Generative AI-driven Semantic Communication Framework for NextG Wireless Network

    Authors: Avi Deb Raha, Md. Shirajum Munir, Apurba Adhikary, Yu Qiao, Choong Seon Hong

    Abstract: This work designs a novel semantic communication (SemCom) framework for the next-generation wireless network to tackle the challenges of unnecessary transmission of vast amounts that cause high bandwidth consumption, more latency, and experience with bad quality of services (QoS). In particular, these challenges hinder applications like intelligent transportation systems (ITS), metaverse, mixed re… ▽ More

    Submitted 13 October, 2023; originally announced October 2023.

  11. arXiv:2309.09236  [pdf, other

    cs.CV cs.AI cs.CY cs.LG

    Detection and Localization of Firearm Carriers in Complex Scenes for Improved Safety Measures

    Authors: Arif Mahmood, Abdul Basit, M. Akhtar Munir, Mohsen Ali

    Abstract: Detecting firearms and accurately localizing individuals carrying them in images or videos is of paramount importance in security, surveillance, and content customization. However, this task presents significant challenges in complex environments due to clutter and the diverse shapes of firearms. To address this problem, we propose a novel approach that leverages human-firearm interaction informat… ▽ More

    Submitted 17 September, 2023; originally announced September 2023.

    Comments: This paper is accepted in IEEE Transactions on Computational Social Systems

  12. arXiv:2307.00395  [pdf, other

    cs.CV cs.LG

    MobileViG: Graph-Based Sparse Attention for Mobile Vision Applications

    Authors: Mustafa Munir, William Avery, Radu Marculescu

    Abstract: Traditionally, convolutional neural networks (CNN) and vision transformers (ViT) have dominated computer vision. However, recently proposed vision graph neural networks (ViG) provide a new avenue for exploration. Unfortunately, for mobile applications, ViGs are computationally expensive due to the overhead of representing images as graph structures. In this work, we propose a new graph-based spars… ▽ More

    Submitted 1 July, 2023; originally announced July 2023.

    Comments: Proceedings of the 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops

  13. arXiv:2306.07993  [pdf, other

    cs.CR cs.AI cs.LG

    Trustworthy Artificial Intelligence Framework for Proactive Detection and Risk Explanation of Cyber Attacks in Smart Grid

    Authors: Md. Shirajum Munir, Sachin Shetty, Danda B. Rawat

    Abstract: The rapid growth of distributed energy resources (DERs), such as renewable energy sources, generators, consumers, and prosumers in the smart grid infrastructure, poses significant cybersecurity and trust challenges to the grid controller. Consequently, it is crucial to identify adversarial tactics and measure the strength of the attacker's DER. To enable a trustworthy smart grid controller, this w… ▽ More

    Submitted 11 June, 2023; originally announced June 2023.

    Comments: Submitted for peer review

  14. arXiv:2304.01950  [pdf, other

    cs.LG cs.AI cs.CV cs.DC

    MP-FedCL: Multiprototype Federated Contrastive Learning for Edge Intelligence

    Authors: Yu Qiao, Md. Shirajum Munir, Apurba Adhikary, Huy Q. Le, Avi Deb Raha, Chaoning Zhang, Choong Seon Hong

    Abstract: Federated learning-assisted edge intelligence enables privacy protection in modern intelligent services. However, not independent and identically distributed (non-IID) distribution among edge clients can impair the local model performance. The existing single prototype-based strategy represents a class by using the mean of the feature space. However, feature spaces are usually not clustered, and a… ▽ More

    Submitted 11 October, 2023; v1 submitted 1 April, 2023; originally announced April 2023.

    Comments: Accepted by IEEE Internet of Things

  15. arXiv:2303.14404  [pdf, other

    cs.CV

    Bridging Precision and Confidence: A Train-Time Loss for Calibrating Object Detection

    Authors: Muhammad Akhtar Munir, Muhammad Haris Khan, Salman Khan, Fahad Shahbaz Khan

    Abstract: Deep neural networks (DNNs) have enabled astounding progress in several vision-based problems. Despite showing high predictive accuracy, recently, several works have revealed that they tend to provide overconfident predictions and thus are poorly calibrated. The majority of the works addressing the miscalibration of DNNs fall under the scope of classification and consider only in-domain prediction… ▽ More

    Submitted 25 March, 2023; originally announced March 2023.

    Comments: Accepted at CVPR 2023

  16. arXiv:2210.06649  [pdf, other

    cs.AI cs.NI

    Neuro-symbolic Explainable Artificial Intelligence Twin for Zero-touch IoE in Wireless Network

    Authors: Md. Shirajum Munir, Ki Tae Kim, Apurba Adhikary, Walid Saad, Sachin Shetty, Seong-Bae Park, Choong Seon Hong

    Abstract: Explainable artificial intelligence (XAI) twin systems will be a fundamental enabler of zero-touch network and service management (ZSM) for sixth-generation (6G) wireless networks. A reliable XAI twin system for ZSM requires two composites: an extreme analytical ability for discretizing the physical behavior of the Internet of Everything (IoE) and rigorous methods for characterizing the reasoning… ▽ More

    Submitted 12 October, 2022; originally announced October 2022.

    Comments: Submitted to a journal for peer review

  17. arXiv:2209.07601  [pdf, other

    cs.CV

    Towards Improving Calibration in Object Detection Under Domain Shift

    Authors: Muhammad Akhtar Munir, Muhammad Haris Khan, M. Saquib Sarfraz, Mohsen Ali

    Abstract: With deep neural network based solution more readily being incorporated in real-world applications, it has been pressing requirement that predictions by such models, especially in safety-critical environments, be highly accurate and well-calibrated. Although some techniques addressing DNN calibration have been proposed, they are only limited to visual classification applications and in-domain pred… ▽ More

    Submitted 29 October, 2022; v1 submitted 15 September, 2022; originally announced September 2022.

    Comments: To appear in NeurIPS 2022

  18. arXiv:2205.04712  [pdf, other

    cs.LG

    Knowledge Augmented Machine Learning with Applications in Autonomous Driving: A Survey

    Authors: Julian Wörmann, Daniel Bogdoll, Christian Brunner, Etienne Bührle, Han Chen, Evaristus Fuh Chuo, Kostadin Cvejoski, Ludger van Elst, Philip Gottschall, Stefan Griesche, Christian Hellert, Christian Hesels, Sebastian Houben, Tim Joseph, Niklas Keil, Johann Kelsch, Mert Keser, Hendrik Königshof, Erwin Kraft, Leonie Kreuser, Kevin Krone, Tobias Latka, Denny Mattern, Stefan Matthes, Franz Motzkus , et al. (27 additional authors not shown)

    Abstract: The availability of representative datasets is an essential prerequisite for many successful artificial intelligence and machine learning models. However, in real life applications these models often encounter scenarios that are inadequately represented in the data used for training. There are various reasons for the absence of sufficient data, ranging from time and cost constraints to ethical con… ▽ More

    Submitted 20 November, 2023; v1 submitted 10 May, 2022; originally announced May 2022.

    Comments: 111 pages, Added section on Run-time Network Verification

  19. arXiv:2203.02331  [pdf, other

    cs.CV

    F2DNet: Fast Focal Detection Network for Pedestrian Detection

    Authors: Abdul Hannan Khan, Mohsin Munir, Ludger van Elst, Andreas Dengel

    Abstract: Two-stage detectors are state-of-the-art in object detection as well as pedestrian detection. However, the current two-stage detectors are inefficient as they do bounding box regression in multiple steps i.e. in region proposal networks and bounding box heads. Also, the anchor-based region proposal networks are computationally expensive to train. We propose F2DNet, a novel two-stage detection arch… ▽ More

    Submitted 23 September, 2022; v1 submitted 4 March, 2022; originally announced March 2022.

    Comments: Accepted at ICPR 2022

    ACM Class: I.2.10; I.4.8; I.5.4

  20. arXiv:2201.10822  [pdf, other

    cs.AI cs.LG cs.NI

    An Explainable Artificial Intelligence Framework for Quality-Aware IoE Service Delivery

    Authors: Md. Shirajum Munir, Seong-Bae Park, Choong Seon Hong

    Abstract: One of the core envisions of the sixth-generation (6G) wireless networks is to accumulate artificial intelligence (AI) for autonomous controlling of the Internet of Everything (IoE). Particularly, the quality of IoE services delivery must be maintained by analyzing contextual metrics of IoE such as people, data, process, and things. However, the challenges incorporate when the AI model conceives a… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

    Comments: Accepted article by IEEE International Conference on Communications (ICC 2022), Copyright 2022 IEEE

  21. Evaluating Privacy-Preserving Machine Learning in Critical Infrastructures: A Case Study on Time-Series Classification

    Authors: Dominique Mercier, Adriano Lucieri, Mohsin Munir, Andreas Dengel, Sheraz Ahmed

    Abstract: With the advent of machine learning in applications of critical infrastructure such as healthcare and energy, privacy is a growing concern in the minds of stakeholders. It is pivotal to ensure that neither the model nor the data can be used to extract sensitive information used by attackers against individuals or to harm whole societies through the exploitation of critical infrastructure. The appl… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

    Comments: 9 pages, 4 figures. 6 tables

  22. arXiv:2110.14205  [pdf, other

    cs.LG

    FedPrune: Towards Inclusive Federated Learning

    Authors: Muhammad Tahir Munir, Muhammad Mustansar Saeed, Mahad Ali, Zafar Ayyub Qazi, Ihsan Ayyub Qazi

    Abstract: Federated learning (FL) is a distributed learning technique that trains a shared model over distributed data in a privacy-preserving manner. Unfortunately, FL's performance degrades when there is (i) variability in client characteristics in terms of computational and memory resources (system heterogeneity) and (ii) non-IID data distribution across clients (statistical heterogeneity). For example,… ▽ More

    Submitted 27 October, 2021; originally announced October 2021.

  23. arXiv:2110.00249  [pdf, other

    cs.CV

    Synergizing between Self-Training and Adversarial Learning for Domain Adaptive Object Detection

    Authors: Muhammad Akhtar Munir, Muhammad Haris Khan, M. Saquib Sarfraz, Mohsen Ali

    Abstract: We study adapting trained object detectors to unseen domains manifesting significant variations of object appearance, viewpoints and backgrounds. Most current methods align domains by either using image or instance-level feature alignment in an adversarial fashion. This often suffers due to the presence of unwanted background and as such lacks class-specific alignment. A common remedy to promote c… ▽ More

    Submitted 1 October, 2021; originally announced October 2021.

    Comments: To appear in NeurIPS2021

  24. arXiv:2108.01466  [pdf, other

    cs.AI cs.CE cs.LG cs.MA

    Risk Adversarial Learning System for Connected and Autonomous Vehicle Charging

    Authors: Md. Shirajum Munir, Ki Tae Kim, Kyi Thar, Dusit Niyato, Choong Seon Hong

    Abstract: In this paper, the design of a rational decision support system (RDSS) for a connected and autonomous vehicle charging infrastructure (CAV-CI) is studied. In the considered CAV-CI, the distribution system operator (DSO) deploys electric vehicle supply equipment (EVSE) to provide an EV charging facility for human-driven connected vehicles (CVs) and autonomous vehicles (AVs). The charging request by… ▽ More

    Submitted 2 February, 2022; v1 submitted 1 August, 2021; originally announced August 2021.

    Comments: Accepted Article By IEEE Internet of Things Journal, DOI:10.1109/JIOT.2022.3149038 (In Press)

  25. arXiv:2105.06677  [pdf, other

    cs.AI cs.CV cs.HC cs.LG

    XAI Handbook: Towards a Unified Framework for Explainable AI

    Authors: Sebastian Palacio, Adriano Lucieri, Mohsin Munir, Jörn Hees, Sheraz Ahmed, Andreas Dengel

    Abstract: The field of explainable AI (XAI) has quickly become a thriving and prolific community. However, a silent, recurrent and acknowledged issue in this area is the lack of consensus regarding its terminology. In particular, each new contribution seems to rely on its own (and often intuitive) version of terms like "explanation" and "interpretation". Such disarray encumbers the consolidation of advances… ▽ More

    Submitted 14 May, 2021; originally announced May 2021.

    Journal ref: Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision (ICCV) Workshops

  26. arXiv:2008.10148  [pdf, other

    cs.HC cs.AI cs.LG eess.SY

    Drive Safe: Cognitive-Behavioral Mining for Intelligent Transportation Cyber-Physical System

    Authors: Md. Shirajum Munir, Sarder Fakhrul Abedin, Ki Tae Kim, Do Hyeon Kim, Md. Golam Rabiul Alam, Choong Seon Hong

    Abstract: This paper presents a cognitive behavioral-based driver mood repairment platform in intelligent transportation cyber-physical systems (IT-CPS) for road safety. In particular, we propose a driving safety platform for distracted drivers, namely \emph{drive safe}, in IT-CPS. The proposed platform recognizes the distracting activities of the drivers as well as their emotions for mood repair. Further,… ▽ More

    Submitted 23 August, 2020; originally announced August 2020.

    Comments: Submitted to IEEE Transactions on Intelligent Transportation Systems, Special Issue on Technologies for risk mitigation and support of impaired drivers

  27. Controlling the Outbreak of COVID-19: A Noncooperative Game Perspective

    Authors: Anupam Kumar Bairagi, Mehedi Masud, Do Hyeon Kim, Md. Shirajum Munir, Abdullah Al Nahid, Sarder Fakhrul Abedin, Kazi Masudul Alam, Sujit Biswas, Sultan S Alshamrani, Zhu Han, Choong Seon Hong

    Abstract: COVID-19 is a global epidemic. Till now, there is no remedy for this epidemic. However, isolation and social distancing are seemed to be effective preventive measures to control this pandemic. Therefore, in this paper, an optimization problem is formulated that accommodates both isolation and social distancing features of the individuals. To promote social distancing, we solve the formulated probl… ▽ More

    Submitted 26 November, 2020; v1 submitted 27 July, 2020; originally announced July 2020.

    Comments: Accepted article by IEEE Access. DOI: 10.1109/ACCESS.2020.3040821

  28. arXiv:2005.09329  [pdf, other

    cs.CV

    Localizing Firearm Carriers by Identifying Human-Object Pairs

    Authors: Abdul Basit, Muhammad Akhtar Munir, Mohsen Ali, Arif Mahmood

    Abstract: Visual identification of gunmen in a crowd is a challenging problem, that requires resolving the association of a person with an object (firearm). We present a novel approach to address this problem, by defining human-object interaction (and non-interaction) bounding boxes. In a given image, human and firearms are separately detected. Each detected human is paired with each detected firearm, allow… ▽ More

    Submitted 20 May, 2020; v1 submitted 19 May, 2020; originally announced May 2020.

    Comments: 5 pages, accepted in IEEE ICIP 2020

  29. arXiv:2003.04816  [pdf, other

    eess.SP cs.LG cs.NI eess.SY stat.ML

    Data Freshness and Energy-Efficient UAV Navigation Optimization: A Deep Reinforcement Learning Approach

    Authors: Sarder Fakhrul Abedin, Md. Shirajum Munir, Nguyen H. Tran, Zhu Han, Choong Seon Hong

    Abstract: In this paper, we design a navigation policy for multiple unmanned aerial vehicles (UAVs) where mobile base stations (BSs) are deployed to improve the data freshness and connectivity to the Internet of Things (IoT) devices. First, we formulate an energy-efficient trajectory optimization problem in which the objective is to maximize the energy efficiency by optimizing the UAV-BS trajectory policy.… ▽ More

    Submitted 21 February, 2020; originally announced March 2020.

    Comments: Submitted to IEEE Transactions on Intelligent Transportation Systems, Special Issue on Unmanned Aircraft System Traffic Management

  30. arXiv:2003.04551  [pdf, other

    cs.NI eess.SP

    Coexistence Mechanism between eMBB and uRLLC in 5G Wireless Networks

    Authors: Anupam Kumar Bairagi, Md. Shirajum Munir, Madyan Alsenwi, Nguyen H. Tran, Sultan S Alshamrani, Mehedi Masud, Zhu Han, Choong Seon Hong

    Abstract: uRLLC and eMBB are two influential services of the emerging 5G cellular network. Latency and reliability are major concerns for uRLLC applications, whereas eMBB services claim for the maximum data rates. Owing to the trade-off among latency, reliability and spectral efficiency, sharing of radio resources between eMBB and uRLLC services, heads to a challenging scheduling dilemma. In this paper, we… ▽ More

    Submitted 10 March, 2020; originally announced March 2020.

    Comments: 30 pages, 11 figures, IEEE Transactions on Communications

  31. arXiv:2003.02157  [pdf, other

    physics.soc-ph cs.LG eess.SP stat.ML

    Risk-Aware Energy Scheduling for Edge Computing with Microgrid: A Multi-Agent Deep Reinforcement Learning Approach

    Authors: Md. Shirajum Munir, Sarder Fakhrul Abedin, Nguyen H. Tran, Zhu Han, Eui-Nam Huh, Choong Seon Hong

    Abstract: In recent years, multi-access edge computing (MEC) is a key enabler for handling the massive expansion of Internet of Things (IoT) applications and services. However, energy consumption of a MEC network depends on volatile tasks that induces risk for energy demand estimations. As an energy supplier, a microgrid can facilitate seamless energy supply. However, the risk associated with energy supply… ▽ More

    Submitted 5 January, 2021; v1 submitted 20 February, 2020; originally announced March 2020.

    Comments: Accepted Article BY IEEE Transactions on Network and Service Management, DOI: 10.1109/TNSM.2021.3049381

  32. arXiv:2002.08567  [pdf, other

    cs.LG cs.MA eess.SP stat.ML

    Multi-Agent Meta-Reinforcement Learning for Self-Powered and Sustainable Edge Computing Systems

    Authors: Md. Shirajum Munir, Nguyen H. Tran, Walid Saad, Choong Seon Hong

    Abstract: The stringent requirements of mobile edge computing (MEC) applications and functions fathom the high capacity and dense deployment of MEC hosts to the upcoming wireless networks. However, operating such high capacity MEC hosts can significantly increase energy consumption. Thus, a base station (BS) unit can act as a self-powered BS. In this paper, an effective energy dispatch mechanism for self-po… ▽ More

    Submitted 9 February, 2021; v1 submitted 19 February, 2020; originally announced February 2020.

    Comments: Accepted article by IEEE Transactions on Network and Service Management, DOI: 10.1109/TNSM.2021.3057960. Copyright 2021 IEEE

  33. TSXplain: Demystification of DNN Decisions for Time-Series using Natural Language and Statistical Features

    Authors: Mohsin Munir, Shoaib Ahmed Siddiqui, Ferdinand Küsters, Dominique Mercier, Andreas Dengel, Sheraz Ahmed

    Abstract: Neural networks (NN) are considered as black-boxes due to the lack of explainability and transparency of their decisions. This significantly hampers their deployment in environments where explainability is essential along with the accuracy of the system. Recently, significant efforts have been made for the interpretability of these deep networks with the aim to open up the black-box. However, most… ▽ More

    Submitted 15 May, 2019; originally announced May 2019.

    Comments: Pre-print

  34. arXiv:1904.10032  [pdf, other

    cs.CV

    Leveraging Orientation for Weakly Supervised Object Detection with Application to Firearm Localization

    Authors: Javed Iqbal, Muhammad Akhtar Munir, Arif Mahmood, Afsheen Rafaqat Ali, Mohsen Ali

    Abstract: Automatic detection of firearms is important for enhancing the security and safety of people, however, it is a challenging task owing to the wide variations in shape, size, and appearance of firearms. Also, most of the generic object detectors process axis-aligned rectangular areas though, a thin and long rifle may actually cover only a small percentage of that area and the rest may contain irrele… ▽ More

    Submitted 29 January, 2021; v1 submitted 22 April, 2019; originally announced April 2019.

    Comments: Accepted for Publication in Neurocomputing

  35. TSViz: Demystification of Deep Learning Models for Time-Series Analysis

    Authors: Shoaib Ahmed Siddiqui, Dominik Mercier, Mohsin Munir, Andreas Dengel, Sheraz Ahmed

    Abstract: This paper presents a novel framework for demystification of convolutional deep learning models for time-series analysis. This is a step towards making informed/explainable decisions in the domain of time-series, powered by deep learning. There have been numerous efforts to increase the interpretability of image-centric deep neural network models, where the learned features are more intuitive to v… ▽ More

    Submitted 5 May, 2020; v1 submitted 8 February, 2018; originally announced February 2018.

    Comments: 7 Pages (6 + 1 for references), 7 figures

    Report number: ACCESS.2019.2912823

    Journal ref: IEEE Access 2019 PP(99):1-1

  36. arXiv:1402.0247  [pdf

    cs.CE cs.CR

    Secure Debit Card Device Model

    Authors: Ms. Rumaisah Munir

    Abstract: The project envisages the implementation of an e-payment system utilizing FIPS-201 Smart Card. The system combines hardware and software modules. The hardware module takes data insertions (e.g. currency notes), processes the data and then creates connection with the smart card using serial/USB ports to perform further mathematical manipulations. The hardware interacts with servers at the back for… ▽ More

    Submitted 2 February, 2014; originally announced February 2014.

    Comments: Royal Institute of Technology, KTH