Zum Hauptinhalt springen

Showing 1–45 of 45 results for author: Talukder, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.05243  [pdf, other

    cs.LG cs.DC cs.IR cs.SI

    SocFedGPT: Federated GPT-based Adaptive Content Filtering System Leveraging User Interactions in Social Networks

    Authors: Sai Puppala, Ismail Hossain, Md Jahangir Alam, Sajedul Talukder

    Abstract: Our study presents a multifaceted approach to enhancing user interaction and content relevance in social media platforms through a federated learning framework. We introduce personalized GPT and Context-based Social Media LLM models, utilizing federated learning for privacy and security. Four client entities receive a base GPT-2 model and locally collected social media data, with federated aggrega… ▽ More

    Submitted 7 August, 2024; originally announced August 2024.

    Comments: This research paper is submitted to ASONAM 2024 conference on Advances in Social Networks Analysis and Mining and going to be published in Springer

  2. arXiv:2408.05242  [pdf, other

    cs.LG cs.DC cs.IR cs.SI

    FLASH: Federated Learning-Based LLMs for Advanced Query Processing in Social Networks through RAG

    Authors: Sai Puppala, Ismail Hossain, Md Jahangir Alam, Sajedul Talukder

    Abstract: Our paper introduces a novel approach to social network information retrieval and user engagement through a personalized chatbot system empowered by Federated Learning GPT. The system is designed to seamlessly aggregate and curate diverse social media data sources, including user posts, multimedia content, and trending news. Leveraging Federated Learning techniques, the GPT model is trained on dec… ▽ More

    Submitted 6 August, 2024; originally announced August 2024.

    Comments: This research paper is submitted to ASONAM 2024 conference on Advances in Social Networks Analysis and Mining and going to be published in Springer

  3. arXiv:2407.18387  [pdf, other

    cs.DC cs.AI cs.ET cs.LG cs.PF

    SCALE: Self-regulated Clustered federAted LEarning in a Homogeneous Environment

    Authors: Sai Puppala, Ismail Hossain, Md Jahangir Alam, Sajedul Talukder, Zahidur Talukder, Syed Bahauddin

    Abstract: Federated Learning (FL) has emerged as a transformative approach for enabling distributed machine learning while preserving user privacy, yet it faces challenges like communication inefficiencies and reliance on centralized infrastructures, leading to increased latency and costs. This paper presents a novel FL methodology that overcomes these limitations by eliminating the dependency on edge serve… ▽ More

    Submitted 25 July, 2024; originally announced July 2024.

    Comments: This research article got accepted in COMPSAC conference and going to be published to IEEE

  4. arXiv:2407.18358  [pdf, other

    cs.LG cs.AI cs.CR cs.DC

    Generative AI like ChatGPT in Blockchain Federated Learning: use cases, opportunities and future

    Authors: Sai Puppala, Ismail Hossain, Md Jahangir Alam, Sajedul Talukder, Jannatul Ferdaus, Mahedi Hasan, Sameera Pisupati, Shanmukh Mathukumilli

    Abstract: Federated learning has become a significant approach for training machine learning models using decentralized data without necessitating the sharing of this data. Recently, the incorporation of generative artificial intelligence (AI) methods has provided new possibilities for improving privacy, augmenting data, and customizing models. This research explores potential integrations of generative AI… ▽ More

    Submitted 25 July, 2024; originally announced July 2024.

    Comments: We are going to submit this research article into a conference which is best fit for this topic

  5. arXiv:2407.09747  [pdf, other

    cs.IR cs.LG cs.SI

    SocialRec: User Activity Based Post Weighted Dynamic Personalized Post Recommendation System in Social Media

    Authors: Ismail Hossain, Sai Puppala, Md Jahangir Alam, Sajedul Talukder

    Abstract: User activities can influence their subsequent interactions with a post, generating interest in the user. Typically, users interact with posts from friends by commenting and using reaction emojis, reflecting their level of interest on social media such as Facebook, Twitter, and Reddit. Our objective is to analyze user history over time, including their posts and engagement on various topics. Addit… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

    Comments: This research paper has been accepted in the Social Media Sway: Unraveling the Impact of Social Media on Human Behavior - SMS workshop, to be held in conjunction with the International Conference on Social Networks Analysis and Mining (ASONAM 2024) and will be published in Springer

  6. arXiv:2407.09691  [pdf, other

    cs.SI cs.IR cs.LG

    EVOLVE: Predicting User Evolution and Network Dynamics in Social Media Using Fine-Tuned GPT-like Model

    Authors: Ismail Hossain, Md Jahangir Alam, Sai Puppala, Sajedul Talukder

    Abstract: Social media platforms are extensively used for sharing personal emotions, daily activities, and various life events, keeping people updated with the latest happenings. From the moment a user creates an account, they continually expand their network of friends or followers, freely interacting with others by posting, commenting, and sharing content. Over time, user behavior evolves based on demogra… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

    Comments: This article has been accepted as a long paper in the MSNDS 2024 workshop, to be held in conjunction with the International Conference on Social Networks Analysis and Mining (ASONAM 2024), September 2-5, 2024. and will be published in Springer

  7. arXiv:2406.03044  [pdf, other

    cs.LG q-bio.NC

    Population Transformer: Learning Population-level Representations of Intracranial Activity

    Authors: Geeling Chau, Christopher Wang, Sabera Talukder, Vighnesh Subramaniam, Saraswati Soedarmadji, Yisong Yue, Boris Katz, Andrei Barbu

    Abstract: We present a self-supervised framework that learns population-level codes for intracranial neural recordings at scale, unlocking the benefits of representation learning for a key neuroscience recording modality. The Population Transformer (PopT) lowers the amount of data required for decoding experiments, while increasing accuracy, even on never-before-seen subjects and tasks. We address two key c… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

    Comments: 17 pages, 10 figures, submitted to NeurIPS 2024

  8. arXiv:2405.14875  [pdf

    eess.IV cs.AI cs.CV

    BloodCell-Net: A lightweight convolutional neural network for the classification of all microscopic blood cell images of the human body

    Authors: Sohag Kumar Mondal, Md. Simul Hasan Talukder, Mohammad Aljaidi, Rejwan Bin Sulaiman, Md Mohiuddin Sarker Tushar, Amjad A Alsuwaylimi

    Abstract: Blood cell classification and counting are vital for the diagnosis of various blood-related diseases, such as anemia, leukemia, and thrombocytopenia. The manual process of blood cell classification and counting is time-consuming, prone to errors, and labor-intensive. Therefore, we have proposed a DL based automated system for blood cell classification and counting from microscopic blood smear imag… ▽ More

    Submitted 1 April, 2024; originally announced May 2024.

    Comments: 24 pages, 7 tables and 13 Figures

  9. arXiv:2405.08755  [pdf, other

    cs.CR cs.AI cs.LG

    Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven Approach

    Authors: Syed Mhamudul Hasan, Alaa M. Alotaibi, Sajedul Talukder, Abdur R. Shahid

    Abstract: With the proliferation of edge devices, there is a significant increase in attack surface on these devices. The decentralized deployment of threat intelligence on edge devices, coupled with adaptive machine learning techniques such as the in-context learning feature of Large Language Models (LLMs), represents a promising paradigm for enhancing cybersecurity on resource-constrained edge devices. Th… ▽ More

    Submitted 26 May, 2024; v1 submitted 14 May, 2024; originally announced May 2024.

  10. arXiv:2404.01345  [pdf

    cs.CL cs.LG

    Enhancing Bangla Fake News Detection Using Bidirectional Gated Recurrent Units and Deep Learning Techniques

    Authors: Utsha Roy, Mst. Sazia Tahosin, Md. Mahedi Hassan, Taminul Islam, Fahim Imtiaz, Md Rezwane Sadik, Yassine Maleh, Rejwan Bin Sulaiman, Md. Simul Hasan Talukder

    Abstract: The rise of fake news has made the need for effective detection methods, including in languages other than English, increasingly important. The study aims to address the challenges of Bangla which is considered a less important language. To this end, a complete dataset containing about 50,000 news items is proposed. Several deep learning models have been tested on this dataset, including the bidir… ▽ More

    Submitted 31 March, 2024; originally announced April 2024.

    Comments: Accepted for publication in the 7th International Conference on Networking, Intelligent Systems & Security. The conference Proceedings will be published by ACM International Conference Proceeding Series (ICPS) ISBN N°: 979-8-4007-0019-4. 8 pages, 11 figures

  11. arXiv:2403.18870  [pdf

    cs.CV cs.AI cs.LG

    SugarcaneNet2024: An Optimized Weighted Average Ensemble Approach of LASSO Regularized Pre-trained Models for Sugarcane Disease Classification

    Authors: Md. Simul Hasan Talukder, Sharmin Akter, Abdullah Hafez Nur

    Abstract: Sugarcane, a key crop for the world's sugar industry, is prone to several diseases that have a substantial negative influence on both its yield and quality. To effectively manage and implement preventative initiatives, diseases must be detected promptly and accurately. In this study, we present a unique model called sugarcaneNet2024 that outperforms previous methods for automatically and quickly d… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

    Comments: 32 pages, 11 Figures, 13 Tables

  12. arXiv:2402.18546  [pdf, other

    cs.LG

    Generalizability Under Sensor Failure: Tokenization + Transformers Enable More Robust Latent Spaces

    Authors: Geeling Chau, Yujin An, Ahamed Raffey Iqbal, Soon-Jo Chung, Yisong Yue, Sabera Talukder

    Abstract: A major goal in neuroscience is to discover neural data representations that generalize. This goal is challenged by variability along recording sessions (e.g. environment), subjects (e.g. varying neural structures), and sensors (e.g. sensor noise), among others. Recent work has begun to address generalization across sessions and subjects, but few study robustness to sensor failure which is highly… ▽ More

    Submitted 19 March, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

    Comments: 9 pages, 8 figures

  13. arXiv:2402.16412  [pdf, other

    cs.LG

    TOTEM: TOkenized Time Series EMbeddings for General Time Series Analysis

    Authors: Sabera Talukder, Yisong Yue, Georgia Gkioxari

    Abstract: The field of general time series analysis has recently begun to explore unified modeling, where a common architectural backbone can be retrained on a specific task for a specific dataset. In this work, we approach unification from a complementary vantage point: unification across tasks and domains. To this end, we explore the impact of discrete, learnt, time series data representations that enable… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

  14. arXiv:2401.04411  [pdf, other

    cs.ET cs.CR

    Hiding Information for Secure and Covert Data Storage in Commercial ReRAM Chips

    Authors: Farah Ferdaus, B. M. S. Bahar Talukder, Md Tauhidur Rahman

    Abstract: This article introduces a novel, low-cost technique for hiding data in commercially available resistive-RAM (ReRAM) chips. The data is kept hidden in ReRAM cells by manipulating its analog physical properties through switching ($\textit{set/reset}$) operations. This hidden data, later, is retrieved by sensing the changes in cells' physical properties (i.e., $\textit{set/reset}$ time of the memory… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    Comments: arXiv admin note: text overlap with arXiv:2204.02104

  15. arXiv:2308.16857  [pdf

    cs.CR cs.AI

    IoMT-Blockchain based Secured Remote Patient Monitoring Framework for Neuro-Stimulation Device

    Authors: Md Sakib Ullah Sourav, Mohammad Sultan Mahmud, Md Simul Hasan Talukder, Rejwan Bin Sulaiman, Abdullah Yasin

    Abstract: Biomedical Engineering's Internet of Medical Things (IoMT) is helping to improve the accuracy, dependability, and productivity of electronic equipment in the healthcare business. Real-time sensory data from patients may be delivered and subsequently analyzed through rapid development of wearable IoMT devices, such as neuro-stimulation devices with a range of functions. Data from the Internet of Th… ▽ More

    Submitted 31 August, 2023; originally announced August 2023.

    Comments: 8 Figures and 2 Tables

  16. arXiv:2308.05765  [pdf

    cs.LG cs.AI

    Unleashing the Power of Extra-Tree Feature Selection and Random Forest Classifier for Improved Survival Prediction in Heart Failure Patients

    Authors: Md. Simul Hasan Talukder, Rejwan Bin Sulaiman, Mouli Bardhan Paul Angon

    Abstract: Heart failure is a life-threatening condition that affects millions of people worldwide. The ability to accurately predict patient survival can aid in early intervention and improve patient outcomes. In this study, we explore the potential of utilizing data pre-processing techniques and the Extra-Tree (ET) feature selection method in conjunction with the Random Forest (RF) classifier to improve su… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

    Comments: 7 page, 6 Table and 6 Figure

  17. arXiv:2308.05179  [pdf

    cs.CV

    JutePestDetect: An Intelligent Approach for Jute Pest Identification Using Fine-Tuned Transfer Learning

    Authors: Md. Simul Hasan Talukder, Mohammad Raziuddin Chowdhury, Md Sakib Ullah Sourav, Abdullah Al Rakin, Shabbir Ahmed Shuvo, Rejwan Bin Sulaiman, Musarrat Saberin Nipun, Muntarin Islam, Mst Rumpa Islam, Md Aminul Islam, Zubaer Haque

    Abstract: In certain Asian countries, Jute is one of the primary sources of income and Gross Domestic Product (GDP) for the agricultural sector. Like many other crops, Jute is prone to pest infestations, and its identification is typically made visually in countries like Bangladesh, India, Myanmar, and China. In addition, this method is time-consuming, challenging, and somewhat imprecise, which poses a subs… ▽ More

    Submitted 28 May, 2023; originally announced August 2023.

    Comments: 29 Pages, 7 Tables, 7 Figures, 5 Appendix

  18. arXiv:2308.05178  [pdf

    eess.IV cs.CV

    An Improved Model for Diabetic Retinopathy Detection by using Transfer Learning and Ensemble Learning

    Authors: Md. Simul Hasan Talukder, Ajay Kirshno Sarkar, Sharmin Akter, Md. Nuhi-Alamin

    Abstract: Diabetic Retinopathy (DR) is an ocular condition caused by a sustained high level of sugar in the blood, which causes the retinal capillaries to block and bleed, causing retinal tissue damage. It usually results in blindness. Early detection can help in lowering the risk of DR and its severity. The robust and accurate prediction and detection of diabetic retinopathy is a challenging task. This pap… ▽ More

    Submitted 3 June, 2023; originally announced August 2023.

    Comments: 22 pages, 7 Tables and 7 Figures

  19. arXiv:2308.05176  [pdf

    eess.SP cs.AI cs.LG

    Comparative Analysis of Epileptic Seizure Prediction: Exploring Diverse Pre-Processing Techniques and Machine Learning Models

    Authors: Md. Simul Hasan Talukder, Rejwan Bin Sulaiman

    Abstract: Epilepsy is a prevalent neurological disorder characterized by recurrent and unpredictable seizures, necessitating accurate prediction for effective management and patient care. Application of machine learning (ML) on electroencephalogram (EEG) recordings, along with its ability to provide valuable insights into brain activity during seizures, is able to make accurate and robust seizure prediction… ▽ More

    Submitted 6 August, 2023; originally announced August 2023.

    Comments: 14 pages, 4 Tables and 5 Figures

  20. arXiv:2306.06491  [pdf, other

    eess.IV cs.CV cs.LG physics.med-ph

    Online learning for X-ray, CT or MRI

    Authors: Mosabbir Bhuiyan, MD Abdullah Al Nasim, Sarwar Saif, Kishor Datta Gupta, Md Jahangir Alam, Sajedul Talukder

    Abstract: Medical imaging plays an important role in the medical sector in identifying diseases. X-ray, computed tomography (CT) scans, and magnetic resonance imaging (MRI) are a few examples of medical imaging. Most of the time, these imaging techniques are utilized to examine and diagnose diseases. Medical professionals identify the problem after analyzing the images. However, manual identification can be… ▽ More

    Submitted 10 June, 2023; originally announced June 2023.

    Comments: 14 pages, 17 figures, 1 table; Acceptance of the chapter for the Springer book "Data-driven approaches to medical imaging"

  21. arXiv:2306.06206  [pdf

    cs.CV cs.LG

    PotatoPestNet: A CTInceptionV3-RS-Based Neural Network for Accurate Identification of Potato Pests

    Authors: Md. Simul Hasan Talukder, Rejwan Bin Sulaiman, Mohammad Raziuddin Chowdhury, Musarrat Saberin Nipun, Taminul Islam

    Abstract: Potatoes are the third-largest food crop globally, but their production frequently encounters difficulties because of aggressive pest infestations. The aim of this study is to investigate the various types and characteristics of these pests and propose an efficient PotatoPestNet AI-based automatic potato pest identification system. To accomplish this, we curated a reliable dataset consisting of ei… ▽ More

    Submitted 15 July, 2023; v1 submitted 27 May, 2023; originally announced June 2023.

  22. arXiv:2306.04750  [pdf, other

    cs.AI

    AutoML Systems For Medical Imaging

    Authors: Tasmia Tahmida Jidney, Angona Biswas, MD Abdullah Al Nasim, Ismail Hossain, Md Jahangir Alam, Sajedul Talukder, Mofazzal Hossain, Md Azim Ullah

    Abstract: The integration of machine learning in medical image analysis can greatly enhance the quality of healthcare provided by physicians. The combination of human expertise and computerized systems can result in improved diagnostic accuracy. An automated machine learning approach simplifies the creation of custom image recognition models by utilizing neural architecture search and transfer learning tech… ▽ More

    Submitted 17 June, 2023; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: 11 pages, 4 figures; Acceptance of the chapter for the Springer book "Data-driven approaches to medical imaging"

  23. arXiv:2306.02055  [pdf, other

    cs.AI

    Case Studies on X-Ray Imaging, MRI and Nuclear Imaging

    Authors: Shuvra Sarker, Angona Biswas, MD Abdullah Al Nasim, Md Shahin Ali, Sai Puppala, Sajedul Talukder

    Abstract: The field of medical imaging is an essential aspect of the medical sciences, involving various forms of radiation to capture images of the internal tissues and organs of the body. These images provide vital information for clinical diagnosis, and in this chapter, we will explore the use of X-ray, MRI, and nuclear imaging in detecting severe illnesses. However, manual evaluation and storage of thes… ▽ More

    Submitted 17 June, 2023; v1 submitted 3 June, 2023; originally announced June 2023.

    Comments: 15 pages, 3 figures, 4 tables; Acceptance of the chapter for the Springer book "Data-driven approaches to medical imaging"

  24. arXiv:2306.02019  [pdf, other

    cs.AI

    Generative Adversarial Networks for Data Augmentation

    Authors: Angona Biswas, MD Abdullah Al Nasim, Al Imran, Anika Tabassum Sejuty, Fabliha Fairooz, Sai Puppala, Sajedul Talukder

    Abstract: One way to expand the available dataset for training AI models in the medical field is through the use of Generative Adversarial Networks (GANs) for data augmentation. GANs work by employing a generator network to create new data samples that are then assessed by a discriminator network to determine their similarity to real samples. The discriminator network is taught to differentiate between actu… ▽ More

    Submitted 7 June, 2023; v1 submitted 3 June, 2023; originally announced June 2023.

    Comments: 13 pages, 6 figures, 1 table; Acceptance of the chapter for the Springer book "Data-driven approaches to medical imaging"

  25. arXiv:2306.00421  [pdf, other

    eess.IV cs.CV cs.LG

    Introduction to Medical Imaging Informatics

    Authors: Md. Zihad Bin Jahangir, Ruksat Hossain, Riadul Islam, MD Abdullah Al Nasim, Md. Mahim Anjum Haque, Md Jahangir Alam, Sajedul Talukder

    Abstract: Medical imaging informatics is a rapidly growing field that combines the principles of medical imaging and informatics to improve the acquisition, management, and interpretation of medical images. This chapter introduces the basic concepts of medical imaging informatics, including image processing, feature engineering, and machine learning. It also discusses the recent advancements in computer vis… ▽ More

    Submitted 17 June, 2023; v1 submitted 1 June, 2023; originally announced June 2023.

    Comments: 18 pages, 11 figures, 2 tables; Acceptance of the chapter for the Springer book "Data-driven approaches to medical imaging"

  26. arXiv:2305.17156  [pdf

    cs.LG cs.AI

    An Improved Model Ensembled of Different Hyper-parameter Tuned Machine Learning Algorithms for Fetal Health Prediction

    Authors: Md. Simul Hasan Talukder, Sharmin Akter

    Abstract: Fetal health is a critical concern during pregnancy as it can impact the well-being of both the mother and the baby. Regular monitoring and timely interventions are necessary to ensure the best possible outcomes. While there are various methods to monitor fetal health in the mother's womb, the use of artificial intelligence (AI) can improve the accuracy, efficiency, and speed of diagnosis. In this… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

    Comments: 23 pages, 6 Tables, 5 Figures

    MSC Class: 14J60 (Primary) 14F05; 14J26 (Secondary) ACM Class: I.2.10

  27. arXiv:2206.08094  [pdf, ps, other

    cs.LG cs.NE q-bio.NC stat.ML

    Deep Neural Imputation: A Framework for Recovering Incomplete Brain Recordings

    Authors: Sabera Talukder, Jennifer J. Sun, Matthew Leonard, Bingni W. Brunton, Yisong Yue

    Abstract: Neuroscientists and neuroengineers have long relied on multielectrode neural recordings to study the brain. However, in a typical experiment, many factors corrupt neural recordings from individual electrodes, including electrical noise, movement artifacts, and faulty manufacturing. Currently, common practice is to discard these corrupted recordings, reducing already limited data that is difficult… ▽ More

    Submitted 16 June, 2022; originally announced June 2022.

  28. arXiv:2205.07815  [pdf

    cs.NI

    Vehicle Collision Detection & Prevention Using VANET Based IoT With V2V

    Authors: Shafin Talukder, SK. Tasnim Bari Ira, Aseya Khanom, Prantika Biswas Sneha, Wardah Saleh

    Abstract: EMERGENCY alert in case of any accident is vitally necessitated to rescue the victims. And so, this paper is made to present the results of a major analysis relating to emergency alert conditions at the time of collision (automobile). In this study, the authors have investigated modern Internet of Things (IoT) and VANET (Vehicular Ad hoc Networks) technologies and developed a collection of modern… ▽ More

    Submitted 16 May, 2022; originally announced May 2022.

    Comments: 10 pages, 5 figures , 2 tables

  29. Watermarked ReRAM: A Technique to Prevent Counterfeit Memory Chips

    Authors: Farah Ferdaus, B. M. S. Bahar Talukder, Md Tauhidur Rahman

    Abstract: Electronic counterfeiting is a longstanding problem with adverse long-term effects for many sectors, remaining on the rise. This article presents a novel low-cost technique to embed watermarking in devices with resistive-RAM (ReRAM) by manipulating its analog physical characteristics through switching (set/reset) operation to prevent counterfeiting. We develop a system-level framework to control m… ▽ More

    Submitted 5 April, 2022; originally announced April 2022.

  30. arXiv:2111.09488  [pdf, other

    cs.CR cs.LG

    Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation

    Authors: Mehdi Sadi, B. M. S. Bahar Talukder, Kaniz Mishty, Md Tauhidur Rahman

    Abstract: Universal Adversarial Perturbations are image-agnostic and model-independent noise that when added with any image can mislead the trained Deep Convolutional Neural Networks into the wrong prediction. Since these Universal Adversarial Perturbations can seriously jeopardize the security and integrity of practical Deep Learning applications, existing techniques use additional neural networks to detec… ▽ More

    Submitted 17 November, 2021; originally announced November 2021.

  31. arXiv:2109.05710  [pdf, other

    cs.LG eess.SY

    Robust Stability of Neural Network-controlled Nonlinear Systems with Parametric Variability

    Authors: Soumyabrata Talukder, Ratnesh Kumar

    Abstract: Stability certification and identifying a safe and stabilizing initial set are two important concerns in ensuring operational safety, stability, and robustness of dynamical systems. With the advent of machine-learning tools, these issues need to be addressed for the systems with machine-learned components in the feedback loop. To develop a general theory for stability and stabilizability of a neur… ▽ More

    Submitted 31 August, 2022; v1 submitted 13 September, 2021; originally announced September 2021.

    Comments: 12 pages, 6 figures

  32. arXiv:2107.09199  [pdf, other

    cs.CR

    A Non-invasive Technique to Detect Authentic/Counterfeit SRAM Chips

    Authors: B. M. S. Bahar Talukder, Farah Ferdaus, Md Tauhidur Rahman

    Abstract: Many commercially available memory chips are fabricated worldwide in untrusted facilities. Therefore, a counterfeit memory chip can easily enter into the supply chain in different formats. Deploying these counterfeit memory chips into an electronic system can severely affect security and reliability domains because of their sub-standard quality, poor performance, and shorter lifespan. Therefore, a… ▽ More

    Submitted 5 May, 2023; v1 submitted 19 July, 2021; originally announced July 2021.

    Journal ref: ACM Journal on Emerging Technologies in Computing Systems, 2023

  33. Approximate MRAM: High-performance and Power-efficient Computing with MRAM Chips for Error-tolerant Applications

    Authors: Farah Ferdaus, B. M. S. Bahar Talukder, Md Tauhidur Rahman

    Abstract: Approximate computing (AC) leverages the inherent error resilience and is used in many big-data applications from various domains such as multimedia, computer vision, signal processing, and machine learning to improve systems performance and power consumption. Like many other approximate circuits and algorithms, the memory subsystem can also be used to enhance performance and save power significan… ▽ More

    Submitted 14 March, 2022; v1 submitted 28 May, 2021; originally announced May 2021.

  34. arXiv:2104.00198  [pdf, other

    cs.ET

    True Random Number Generation using Latency Variations of Commercial MRAM Chips

    Authors: Farah Ferdaus, B. M. S. Bahar Talukder, Mehdi Sadi, Md Tauhidur Rahman

    Abstract: The emerging magneto-resistive RAM (MRAM) has considerable potential to become a universal memory technology because of its several advantages: unlimited endurance, lower read/write latency, ultralow-power operation, high-density, and CMOS compatibility, etc. This paper will demonstrate an effective technique to generate random numbers from energy-efficient consumer-off-the-shelf (COTS) MRAM chips… ▽ More

    Submitted 31 March, 2021; originally announced April 2021.

    Journal ref: 22nd International Symposium for Quality in Electronic Design (ISQED), CA, USA, 2021

  35. arXiv:2011.07191  [pdf, other

    cs.LG cs.AI

    On the Benefits of Early Fusion in Multimodal Representation Learning

    Authors: George Barnum, Sabera Talukder, Yisong Yue

    Abstract: Intelligently reasoning about the world often requires integrating data from multiple modalities, as any individual modality may contain unreliable or incomplete information. Prior work in multimodal learning fuses input modalities only after significant independent processing. On the other hand, the brain performs multimodal processing almost immediately. This divide between conventional multimod… ▽ More

    Submitted 13 November, 2020; originally announced November 2020.

  36. arXiv:2011.02712  [pdf, other

    cs.LG cs.AI

    Architecture Agnostic Neural Networks

    Authors: Sabera Talukder, Guruprasad Raghavan, Yisong Yue

    Abstract: In this paper, we explore an alternate method for synthesizing neural network architectures, inspired by the brain's stochastic synaptic pruning. During a person's lifetime, numerous distinct neuronal architectures are responsible for performing the same tasks. This indicates that biological neural networks are, to some degree, architecture agnostic. However, artificial networks rely on their fine… ▽ More

    Submitted 11 December, 2020; v1 submitted 5 November, 2020; originally announced November 2020.

  37. arXiv:2007.04109  [pdf, other

    cs.CY cs.CR

    Giving Up Privacy For Security: A Survey On Privacy Trade-off During Pandemic Emergency

    Authors: Sajedul Talukder, Md. Iftekharul Islam Sakib, Zahidur Talukder

    Abstract: While the COVID-19 pandemic continues to be as complex as ever, the collection and exchange of data in the light of fighting coronavirus poses a major challenge for privacy systems around the globe. The disease's size and magnitude is not uncommon but it appears to be at the point of hysteria surrounding it. Consequently, in a very short time, extreme measures for dealing with the situation appear… ▽ More

    Submitted 1 July, 2020; originally announced July 2020.

    Comments: 20 pages, 1 figure, 1 table

  38. arXiv:2002.06819   

    cs.CR

    Tools and Techniques for Malware Detection and Analysis

    Authors: Sajedul Talukder

    Abstract: One of the major and serious threats that the Internet faces today is the vast amounts of data and files which need to be evaluated for potential malicious intent. Malicious software, often referred to as a malware that are designed by attackers are polymorphic and metamorphic in nature which have the capability to change their code as they spread. Moreover, the diversity and volume of their varia… ▽ More

    Submitted 30 June, 2020; v1 submitted 17 February, 2020; originally announced February 2020.

    Comments: arXiv admin note: submission has been withdrawn by arXiv administrators due to inappropriate overlap with external sources

  39. Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin

    Authors: B. M. S. Bahar Talukder, Vineetha Menon, Biswajit Ray, Tempestt Neal, Md Tauhidur Rahman

    Abstract: Due to the globalization in the semiconductor supply chain, counterfeit dynamic random-access memory (DRAM) chips/modules have been spreading worldwide at an alarming rate. Deploying counterfeit DRAM modules into an electronic system can have severe consequences on security and reliability domains because of their sub-standard quality, poor performance, and shorter life span. Besides, studies sugg… ▽ More

    Submitted 8 November, 2019; originally announced November 2019.

    Journal ref: IEEE Hardware-Oriented Security and Trust Symposium (HOST), 2020

  40. PreLatPUF: Exploiting DRAM Latency Variations for Generating Robust Device Signatures

    Authors: B. M. S. Bahar Talukder, Biswajit Ray, Domenic Forte, Md Tauhidur Rahman

    Abstract: Physically Unclonable Functions (PUFs) are potential security blocks to generate unique and more secure keys in low-cost cryptographic applications. Dynamic random-access memory (DRAM) has been proposed as one of the promising candidates for generating robust keys. Unfortunately, the existing techniques of generating device signatures from DRAM is very slow, destructive (destroy the current data),… ▽ More

    Submitted 31 July, 2019; v1 submitted 7 August, 2018; originally announced August 2018.

    Journal ref: IEEE Access, vol. 7, pp. 81106-81120, 2019

  41. Exploiting DRAM Latency Variations for Generating True Random Numbers

    Authors: B. M. S. Bahar Talukder, Joseph Kerns, Biswajit Ray, Thomas Morris, Md Tauhidur Rahman

    Abstract: True random number generator (TRNG) plays a vital role in a variety of security applications and protocols. The security and privacy of an asset rely on the encryption, which solely depends on the quality of random numbers. Memory chips are widely used for generating random numbers because of their prevalence in modern electronic systems. Unfortunately, existing Dynamic Random-access Memory (DRAM)… ▽ More

    Submitted 7 November, 2018; v1 submitted 6 August, 2018; originally announced August 2018.

  42. arXiv:1807.11086  [pdf, other

    cs.CR cs.CY

    Mobile Technology in Healthcare Environment: Security Vulnerabilities and Countermeasures

    Authors: Sajedul Talukder, Shalisha Witherspoon, Kanishk Srivastava, Ryan Thompson

    Abstract: Mobile devices and technologies offer a tremendous amount of benefits to users, although it is also understood that it introduces a set of challenges when it comes to security, compliance, and risks. More and more healthcare organizations have been seeking to update their outdated technology, and have considered the adoption of mobile devices to meet these needs. However, introducing mobile device… ▽ More

    Submitted 29 July, 2018; originally announced July 2018.

    Comments: Technical Report

  43. arXiv:1804.10354  [pdf, other

    cs.NI

    Attacks and Defenses in Mobile IP: Modeling with Stochastic Game Petri Net

    Authors: Sajedul Talukder, Md. Iftekharul Islam Sakib, Md. Faruk Hossen, Zahidur Rahim Talukder, Md. Shohrab Hossain

    Abstract: The urging need for seamless connectivity in mobile environment has contributed to the rapid expansion of Mobile IP. Mobile IP uses wireless transmission medium, thereby making it subject to many security threats during various phases of route optimization. Modeling Mobile IP attacks reasonably and efficiently is the basis for defending against those attacks, which requires quantitative analysis a… ▽ More

    Submitted 27 April, 2018; originally announced April 2018.

    Comments: IEEE International Conference on Current Trends in Computer, Electrical, Electronics and Communication (ICCTCEEC'17)

  44. arXiv:1804.10159  [pdf, other

    cs.SI

    AbuSniff: Automatic Detection and Defenses Against Abusive Facebook Friends

    Authors: Sajedul Talukder, Bogdan Carbunar

    Abstract: Adversaries leverage social network friend relationships to collect sensitive data from users and target them with abuse that includes fake news, cyberbullying, malware, and propaganda. Case in point, 71 out of 80 user study participants had at least 1 Facebook friend with whom they never interact, either in Facebook or in real life, or whom they believe is likely to abuse their posted photos or s… ▽ More

    Submitted 26 April, 2018; originally announced April 2018.

    Comments: 12TH INTERNATIONAL AAAI CONFERENCE ON WEB AND SOCIAL MEDIA (ICWSM-18), 10 pages

  45. arXiv:cs/0605062  [pdf

    cs.NI

    QoSIP: A QoS Aware IP Routing Ptotocol for Multimedia Data

    Authors: Al-Mukaddim Khan Pathan, Md. Golam Shagadul Amin Talukder

    Abstract: Conventional IP routing protocols are not suitable for multimedia applications which have very stringent Quality-of-Service (QoS) demands and they require a connection oriented service. For multimedia applications it is expected that the router should be able to forward the packet according to the demand of the packet and it is necessary to find a path that satisfies the specific demands of a pa… ▽ More

    Submitted 15 May, 2006; originally announced May 2006.

    Comments: 8th International Conference of Advanced Communication Technology (ICACT 2006)