Skip to main content

Showing 1–45 of 45 results for author: Chowdhury, J

  1. arXiv:2409.01531  [pdf, ps, other

    cs.LG cs.AI

    On the Design Space Between Transformers and Recursive Neural Nets

    Authors: Jishnu Ray Chowdhury, Cornelia Caragea

    Abstract: In this paper, we study two classes of models, Recursive Neural Networks (RvNNs) and Transformers, and show that a tight connection between them emerges from the recent development of two recent models - Continuous Recursive Neural Networks (CRvNN) and Neural Data Routers (NDR). On one hand, CRvNN pushes the boundaries of traditional RvNN, relaxing its discrete structure-wise composition and ends… ▽ More

    Submitted 2 September, 2024; originally announced September 2024.

  2. arXiv:2408.11664  [pdf, other

    cs.ET

    A Systematic Literature Review on the Use of Blockchain Technology in Transition to a Circular Economy

    Authors: Ishmam Abid, S. M. Zuhayer Anzum Fuad, Mohammad Jabed Morshed Chowdhury, Mehruba Sharmin Chowdhury, Md Sadek Ferdous

    Abstract: The circular economy has the potential to increase resource efficiency and minimize waste through the 4R framework of reducing, reusing, recycling, and recovering. Blockchain technology is currently considered a valuable aid in the transition to a circular economy. Its decentralized and tamper-resistant nature enables the construction of transparent and secure supply chain management systems, ther… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

  3. Prototype Smart Home Environment With Biofeedback

    Authors: Azmyin Md. Kamal, Mushfiqul Azad, Sumayia Jerin Chowdhury

    Abstract: In this paper we present a prototype of a smart home system which can actuate different peripherals based on the emotional "arousal" level of an user. The system is comprised of two embedded subsystems named "Wearable" and "Benchtop" which communicates with one another over UPD/IP protocol. The Wearable unit can differentiate the emotional arousal into three distinct classes (Normal, Medium and Hi… ▽ More

    Submitted 28 July, 2024; originally announced July 2024.

    Comments: 4 pages, published in 2020 IEEE Region 10 Symposium (TENSYMP)

  4. arXiv:2407.13355  [pdf, other

    cs.CR

    EarlyMalDetect: A Novel Approach for Early Windows Malware Detection Based on Sequences of API Calls

    Authors: Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury

    Abstract: In this work, we propose EarlyMalDetect, a novel approach for early Windows malware detection based on sequences of API calls. Our approach leverages generative transformer models and attention-guided deep recurrent neural networks to accurately identify and detect patterns of malicious behaviors in the early stage of malware execution. By analyzing the sequences of API calls invoked during execut… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

  5. arXiv:2407.08932  [pdf, other

    cs.AI cs.RO

    Deep Attention Driven Reinforcement Learning (DAD-RL) for Autonomous Decision-Making in Dynamic Environment

    Authors: Jayabrata Chowdhury, Venkataramanan Shivaraman, Sumit Dangi, Suresh Sundaram, P. B. Sujit

    Abstract: Autonomous Vehicle (AV) decision making in urban environments is inherently challenging due to the dynamic interactions with surrounding vehicles. For safe planning, AV must understand the weightage of various spatiotemporal interactions in a scene. Contemporary works use colossal transformer architectures to encode interactions mainly for trajectory prediction, resulting in increased computationa… ▽ More

    Submitted 28 September, 2024; v1 submitted 11 July, 2024; originally announced July 2024.

    Comments: 6 pages, 3 figures

  6. arXiv:2406.06293  [pdf, other

    eess.AS cs.SD eess.SP

    Sample Rate Independent Recurrent Neural Networks for Audio Effects Processing

    Authors: Alistair Carson, Alec Wright, Jatin Chowdhury, Vesa Välimäki, Stefan Bilbao

    Abstract: In recent years, machine learning approaches to modelling guitar amplifiers and effects pedals have been widely investigated and have become standard practice in some consumer products. In particular, recurrent neural networks (RNNs) are a popular choice for modelling non-linear devices such as vacuum tube amplifiers and distortion circuitry. One limitation of such models is that they are trained… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: Accepted for publication in Proc. DAFx24, Guildford, UK, September 2024

  7. arXiv:2406.00556  [pdf, other

    cs.IT eess.SP

    Lens-Type Redirective Intelligent Surfaces for Multi-User MIMO Communication

    Authors: Bamelak Tadele, Faouzi Bellili, Amine Mezghani, Md Jawwad Chowdhury, Haseeb Ur Rehman

    Abstract: This paper explores the idea of using redirective reconfigurable intelligent surfaces (RedRIS) to overcome many of the challenges associated with the conventional reflective RIS. We develop a framework for jointly optimizing the switching matrix of the lens-type RedRIS ports along with the active precoding matrix at the base station (BS) and the receive scaling factor. A joint non-convex optimizat… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

  8. arXiv:2403.09937  [pdf, ps, other

    cs.ET

    Blockchain-enabled Circular Economy -- Collaborative Responsibility in Solar Panel Recycling

    Authors: Mohammad Jabed Morshed Chowdhury, Naveed Ul Hassan, Wayes Tushar, Dustin Niyato, Tapan Saha, H Vincent Poor, Chau Yuen

    Abstract: The adoption of renewable energy resources, such as solar power, is on the rise. However, the excessive installation and lack of recycling facilities pose environmental risks. This paper suggests a circular economy approach to address the issue. By implementing blockchain technology, the end-of-life (EOL) of solar panels can be tracked, and responsibilities can be assigned to relevant stakeholders… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    Comments: Accepted in IEEE Industrial Electronics Magazine

  9. arXiv:2402.00976  [pdf, ps, other

    cs.LG cs.AI cs.NE

    Investigating Recurrent Transformers with Dynamic Halt

    Authors: Jishnu Ray Chowdhury, Cornelia Caragea

    Abstract: In this paper, we comprehensively study the inductive biases of two major approaches to augmenting Transformers with a recurrent mechanism: (1) the approach of incorporating a depth-wise recurrence similar to Universal Transformers; and (2) the approach of incorporating a chunk-wise temporal recurrence like Temporal Latent Bottleneck. Furthermore, we propose and investigate novel ways to extend an… ▽ More

    Submitted 2 September, 2024; v1 submitted 1 February, 2024; originally announced February 2024.

  10. arXiv:2312.11563  [pdf

    cs.SD cs.CL cs.LG eess.AS

    A review-based study on different Text-to-Speech technologies

    Authors: Md. Jalal Uddin Chowdhury, Ashab Hussan

    Abstract: This research paper presents a comprehensive review-based study on various Text-to-Speech (TTS) technologies. TTS technology is an important aspect of human-computer interaction, enabling machines to convert written text into audible speech. The paper examines the different TTS technologies available, including concatenative TTS, formant synthesis TTS, and statistical parametric TTS. The study foc… ▽ More

    Submitted 17 December, 2023; originally announced December 2023.

    Comments: 4 pages

  11. arXiv:2312.05784  [pdf, other

    cs.AI cs.RO

    Graph-based Prediction and Planning Policy Network (GP3Net) for scalable self-driving in dynamic environments using Deep Reinforcement Learning

    Authors: Jayabrata Chowdhury, Venkataramanan Shivaraman, Suresh Sundaram, P B Sujit

    Abstract: Recent advancements in motion planning for Autonomous Vehicles (AVs) show great promise in using expert driver behaviors in non-stationary driving environments. However, learning only through expert drivers needs more generalizability to recover from domain shifts and near-failure scenarios due to the dynamic behavior of traffic participants and weather conditions. A deep Graph-based Prediction an… ▽ More

    Submitted 10 December, 2023; originally announced December 2023.

  12. arXiv:2311.04449  [pdf, other

    cs.LG cs.CL

    Recursion in Recursion: Two-Level Nested Recursion for Length Generalization with Scalability

    Authors: Jishnu Ray Chowdhury, Cornelia Caragea

    Abstract: Binary Balanced Tree RvNNs (BBT-RvNNs) enforce sequence composition according to a preset balanced binary tree structure. Thus, their non-linear recursion depth is just $\log_2 n$ ($n$ being the sequence length). Such logarithmic scaling makes BBT-RvNNs efficient and scalable on long sequence tasks such as Long Range Arena (LRA). However, such computational efficiency comes at a cost because BBT-R… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: Accepted at NeurIPS 2023

  13. arXiv:2307.10779  [pdf, other

    cs.LG

    Efficient Beam Tree Recursion

    Authors: Jishnu Ray Chowdhury, Cornelia Caragea

    Abstract: Beam Tree Recursive Neural Network (BT-RvNN) was recently proposed as a simple extension of Gumbel Tree RvNN and it was shown to achieve state-of-the-art length generalization performance in ListOps while maintaining comparable performance on other tasks. However, although not the worst in its kind, BT-RvNN can be still exorbitantly expensive in memory usage. In this paper, we identify the main bo… ▽ More

    Submitted 7 November, 2023; v1 submitted 20 July, 2023; originally announced July 2023.

    Comments: Accepted in NeurIPS 2023

  14. Managing health insurance using blockchain technology

    Authors: Tajkia Nuri Ananna, Munshi Saifuzzaman, Mohammad Jabed Morshed Chowdhury, Md Sadek Ferdous

    Abstract: Health insurance plays a significant role in ensuring quality healthcare. In response to the escalating costs of the medical industry, the demand for health insurance is soaring. Additionally, those with health insurance are more likely to receive preventative care than those without health insurance. However, from granting health insurance to delivering services to insured individuals, the health… ▽ More

    Submitted 17 June, 2023; originally announced June 2023.

    Comments: 37 pages, 2 figures, 12 tables

    Journal ref: Healthcare Technologies, Chap. 4, pp. 89-125

  15. arXiv:2306.09055  [pdf, other

    cs.RO cs.AI cs.LG

    Predictive Maneuver Planning with Deep Reinforcement Learning (PMP-DRL) for comfortable and safe autonomous driving

    Authors: Jayabrata Chowdhury, Vishruth Veerendranath, Suresh Sundaram, Narasimhan Sundararajan

    Abstract: This paper presents a Predictive Maneuver Planning with Deep Reinforcement Learning (PMP-DRL) model for maneuver planning. Traditional rule-based maneuver planning approaches often have to improve their abilities to handle the variabilities of real-world driving scenarios. By learning from its experience, a Reinforcement Learning (RL)-based driving agent can adapt to changing driving conditions an… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

  16. arXiv:2305.20019  [pdf, ps, other

    cs.LG cs.AI cs.CL

    Monotonic Location Attention for Length Generalization

    Authors: Jishnu Ray Chowdhury, Cornelia Caragea

    Abstract: We explore different ways to utilize position-based cross-attention in seq2seq networks to enable length generalization in algorithmic tasks. We show that a simple approach of interpolating the original and reversed encoded representations combined with relative attention allows near-perfect length generalization for both forward and reverse lookup tasks or copy tasks that had been generally hard… ▽ More

    Submitted 31 May, 2023; originally announced May 2023.

    Comments: Accepted in ICML 2023

  17. arXiv:2305.19999  [pdf, other

    cs.LG cs.AI cs.CL

    Beam Tree Recursive Cells

    Authors: Jishnu Ray Chowdhury, Cornelia Caragea

    Abstract: We propose Beam Tree Recursive Cell (BT-Cell) - a backpropagation-friendly framework to extend Recursive Neural Networks (RvNNs) with beam search for latent structure induction. We further extend this framework by proposing a relaxation of the hard top-k operators in beam search for better propagation of gradient signals. We evaluate our proposed models in different out-of-distribution splits in b… ▽ More

    Submitted 20 June, 2023; v1 submitted 31 May, 2023; originally announced May 2023.

    Comments: Accepted in ICML 2023

  18. arXiv:2305.17968  [pdf, other

    cs.CL

    Data Augmentation for Low-Resource Keyphrase Generation

    Authors: Krishna Garg, Jishnu Ray Chowdhury, Cornelia Caragea

    Abstract: Keyphrase generation is the task of summarizing the contents of any given article into a few salient phrases (or keyphrases). Existing works for the task mostly rely on large-scale annotated datasets, which are not easy to acquire. Very few works address the problem of keyphrase generation in low-resource settings, but they still rely on a lot of additional unlabeled data for pretraining and on au… ▽ More

    Submitted 29 May, 2023; originally announced May 2023.

    Comments: 9 pages, 8 tables, To appear at the Findings of the Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics, Toronto, Canada

  19. arXiv:2304.13883  [pdf, other

    cs.CL cs.IR

    Neural Keyphrase Generation: Analysis and Evaluation

    Authors: Tuhin Kundu, Jishnu Ray Chowdhury, Cornelia Caragea

    Abstract: Keyphrase generation aims at generating topical phrases from a given text either by copying from the original text (present keyphrases) or by producing new keyphrases (absent keyphrases) that capture the semantic meaning of the text. Encoder-decoder models are most widely used for this task because of their capabilities for absent keyphrase generation. However, there has been little to no analysis… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

  20. arXiv:2301.02243  [pdf, other

    cs.LG eess.SP stat.AP

    Machine Fault Classification using Hamiltonian Neural Networks

    Authors: Jeremy Shen, Jawad Chowdhury, Sourav Banerjee, Gabriel Terejanu

    Abstract: A new approach is introduced to classify faults in rotating machinery based on the total energy signature estimated from sensor measurements. The overall goal is to go beyond using black-box models and incorporate additional physical constraints that govern the behavior of mechanical systems. Observational data is used to train Hamiltonian neural networks that describe the conserved energy of the… ▽ More

    Submitted 4 January, 2023; originally announced January 2023.

    Comments: ICPRAM 2023

  21. arXiv:2301.01817  [pdf, other

    cs.LG cs.AI stat.ME

    Evaluation of Induced Expert Knowledge in Causal Structure Learning by NOTEARS

    Authors: Jawad Chowdhury, Rezaur Rashid, Gabriel Terejanu

    Abstract: Causal modeling provides us with powerful counterfactual reasoning and interventional mechanism to generate predictions and reason under various what-if scenarios. However, causal discovery using observation data remains a nontrivial task due to unobserved confounding factors, finite sampling, and changes in the data distribution. These can lead to spurious cause-effect relationships. To mitigate… ▽ More

    Submitted 4 January, 2023; originally announced January 2023.

    Comments: ICPRAM 2023

  22. arXiv:2211.04312  [pdf, ps, other

    cs.LG cs.AI stat.ME

    From Causal Pairs to Causal Graphs

    Authors: Rezaur Rashid, Jawad Chowdhury, Gabriel Terejanu

    Abstract: Causal structure learning from observational data remains a non-trivial task due to various factors such as finite sampling, unobserved confounding factors, and measurement errors. Constraint-based and score-based methods tend to suffer from high computational complexity due to the combinatorial nature of estimating the directed acyclic graph (DAG). Motivated by the `Cause-Effect Pair' NIPS 2013 W… ▽ More

    Submitted 8 November, 2022; originally announced November 2022.

    Comments: ICMLA 2022

  23. arXiv:2211.02246  [pdf

    cs.CR

    DatChain -- Blockchain implementation in Data transfer for IoT Devices

    Authors: Om Rajput, Suyash Nigam, M. J. Chowdhury, Kayalvizhi Jayavel

    Abstract: Currently, the IoT ecosystem is comprised of fully connected smart devices that exchange data to provide more automated, precise, and fast decisions. This idealised situation can only be accomplished if a system for data transactions is processed efficiently and security is ensured with high scalability and practicability. The integrity of data must be maintained during the exchange or transfer of… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

    Comments: Keywords - Blockchain, Internet of Things, IOTA, Tangle, Data transfer, IoT Data Analytics

  24. arXiv:2209.03622  [pdf, other

    cs.CR

    Deep Learning Models for Detecting Malware Attacks

    Authors: Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury

    Abstract: Malware is one of the most common and severe cyber-attack today. Malware infects millions of devices and can perform several malicious activities including mining sensitive data, encrypting data, crippling system performance, and many more. Hence, malware detection is crucial to protect our computers and mobile devices from malware attacks. Deep learning (DL) is one of the emerging and promising t… ▽ More

    Submitted 29 January, 2024; v1 submitted 8 September, 2022; originally announced September 2022.

    Comments: Revised figures 2 and 3, revised title, remove typos page 17

  25. arXiv:2209.03547  [pdf, other

    cs.CR

    MalDetConv: Automated Behaviour-based Malware Detection Framework Based on Natural Language Processing and Deep Learning Techniques

    Authors: Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury

    Abstract: The popularity of Windows attracts the attention of hackers/cyber-attackers, making Windows devices the primary target of malware attacks in recent years. Several sophisticated malware variants and anti-detection methods have been significantly enhanced and as a result, traditional malware detection techniques have become less effective. This work presents MalBehavD-V1, a new behavioural dataset o… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

  26. arXiv:2205.10092  [pdf, other

    cs.RO

    An efficient Deep Spatio-Temporal Context Aware decision Network (DST-CAN) for Predictive Manoeuvre Planning

    Authors: Jayabrata Chowdhury, Suresh Sundaram, Nishanth Rao, Narasimhan Sundararajan

    Abstract: To ensure the safety and efficiency of its maneuvers, an Autonomous Vehicle (AV) should anticipate the future intentions of surrounding vehicles using its sensor information. If an AV can predict its surrounding vehicles' future trajectories, it can make safe and efficient manoeuvre decisions. In this paper, we present such a Deep Spatio-Temporal Context-Aware decision Network (DST-CAN) model for… ▽ More

    Submitted 8 July, 2024; v1 submitted 20 May, 2022; originally announced May 2022.

    Comments: 12 pages, 8 figures

  27. arXiv:2203.04464  [pdf, other

    cs.CL

    On the Evaluation of Answer-Agnostic Paragraph-level Multi-Question Generation

    Authors: Jishnu Ray Chowdhury, Debanjan Mahata, Cornelia Caragea

    Abstract: We study the task of predicting a set of salient questions from a given paragraph without any prior knowledge of the precise answer. We make two main contributions. First, we propose a new method to evaluate a set of predicted questions against the set of references by using the Hungarian algorithm to assign predicted questions to references before scoring the assigned pairs. We show that our prop… ▽ More

    Submitted 11 March, 2022; v1 submitted 8 March, 2022; originally announced March 2022.

  28. arXiv:2202.05629  [pdf, other

    cs.CR cs.PF

    BlockMeter: An Application Agnostic Performance Measurement Framework For Private Blockchain Platforms

    Authors: Ifteher Alom, Md Sadek Ferdous, Mohammad Jabed Morshed Chowdhury

    Abstract: Blockchain Technology is an emerging technology with the potential to disrupt a number of application domains. Though blockchain platforms like Bitcoin and Ethereum have seen immense success and acceptability, their nature of being public and anonymous make them unsuitable for many enterprise level use-cases. To address this issue, Linux Foundation has started an open source umbrella initiative, k… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

  29. arXiv:2202.00535  [pdf, ps, other

    cs.CL cs.AI

    Novelty Controlled Paraphrase Generation with Retrieval Augmented Conditional Prompt Tuning

    Authors: Jishnu Ray Chowdhury, Yong Zhuang, Shuyi Wang

    Abstract: Paraphrase generation is a fundamental and long-standing task in natural language processing. In this paper, we concentrate on two contributions to the task: (1) we propose Retrieval Augmented Prompt Tuning (RAPT) as a parameter-efficient method to adapt large pre-trained language models for paraphrase generation; (2) we propose Novelty Conditioned RAPT (NC-RAPT) as a simple model-agnostic method… ▽ More

    Submitted 12 March, 2022; v1 submitted 1 February, 2022; originally announced February 2022.

    Comments: Accepted by AAAI 2022 (Oral)

  30. arXiv:2112.06776  [pdf, other

    cs.CL

    Keyphrase Generation Beyond the Boundaries of Title and Abstract

    Authors: Krishna Garg, Jishnu Ray Chowdhury, Cornelia Caragea

    Abstract: Keyphrase generation aims at generating important phrases (keyphrases) that best describe a given document. In scholarly domains, current approaches have largely used only the title and abstract of the articles to generate keyphrases. In this paper, we comprehensively explore whether the integration of additional information from the full text of a given article or from semantically similar articl… ▽ More

    Submitted 20 October, 2022; v1 submitted 13 December, 2021; originally announced December 2021.

    Comments: 9 pages, 1 figure, 7 tables

  31. arXiv:2112.01476  [pdf, other

    cs.CL

    KPDrop: Improving Absent Keyphrase Generation

    Authors: Jishnu Ray Chowdhury, Seoyeon Park, Tuhin Kundu, Cornelia Caragea

    Abstract: Keyphrase generation is the task of generating phrases (keyphrases) that summarize the main topics of a given document. Keyphrases can be either present or absent from the given document. While the extraction of present keyphrases has received much attention in the past, only recently a stronger focus has been placed on the generation of absent keyphrases. However, generating absent keyphrases is… ▽ More

    Submitted 24 October, 2022; v1 submitted 2 December, 2021; originally announced December 2021.

    Comments: Accepted in EMNLP Findings 2022

  32. arXiv:2109.10213  [pdf, other

    cs.CR cs.CY

    Blockchain-based Covid Vaccination Registration and Monitoring

    Authors: Shirajus Salekin Nabil, Md. Sabbir Alam Pran, Ali Abrar Al Haque, Narayan Ranjan Chakraborty, Mohammad Jabed Morshed Chowdhury, Md Sadek Ferdous

    Abstract: Covid-19 (SARS-CoV-2) has changed almost all the aspects of our living. Governments around the world have imposed lockdown to slow down the transmissions. In the meantime, researchers worked hard to find the vaccine. Fortunately, we have found the vaccine, in fact a good number of them. However, managing the testing and vaccination process of the total population is a mammoth job. There are multip… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

    Comments: 12 pages

  33. arXiv:2109.07334  [pdf, other

    cs.CR cs.CY

    A Systematic Literature Review on Wearable Health Data Publishing under Differential Privacy

    Authors: Munshi Saifuzzaman, Tajkia Nuri Ananna, Mohammad Jabed Morshed Chowdhury, Md Sadek Ferdous, Farida Chowdhury

    Abstract: Wearable devices generate different types of physiological data about the individuals. These data can provide valuable insights for medical researchers and clinicians that cannot be availed through traditional measures. Researchers have historically relied on survey responses or observed behavior. Interestingly, physiological data can provide a richer amount of user cognition than that obtained fr… ▽ More

    Submitted 15 September, 2021; originally announced September 2021.

    Comments: 25 pages

  34. arXiv:2106.06038  [pdf, ps, other

    cs.CL cs.AI cs.LG

    Modeling Hierarchical Structures with Continuous Recursive Neural Networks

    Authors: Jishnu Ray Chowdhury, Cornelia Caragea

    Abstract: Recursive Neural Networks (RvNNs), which compose sequences according to their underlying hierarchical syntactic structure, have performed well in several natural language processing tasks compared to similar models without structural biases. However, traditional RvNNs are incapable of inducing the latent structure in a plain text sequence on their own. Several extensions have been proposed to over… ▽ More

    Submitted 10 June, 2021; originally announced June 2021.

    Comments: Accepted in ICML 2021 (long talk)

  35. arXiv:2011.08846  [pdf, other

    cs.CR

    BONIK: A Blockchain Empowered Chatbot for Financial Transactions

    Authors: Md. Saiful Islam Bhuiyan, Abdur Razzak, Md Sadek Ferdous, Mohammad Jabed M. Chowdhury, Mohammad A. Hoque, Sasu Tarkoma

    Abstract: A Chatbot is a popular platform to enable users to interact with a software or website to gather information or execute actions in an automated fashion. In recent years, chatbots are being used for executing financial transactions, however, there are a number of security issues, such as secure authentication, data integrity, system availability and transparency, that must be carefully handled for… ▽ More

    Submitted 17 November, 2020; originally announced November 2020.

    Comments: Accepted at the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020)

  36. arXiv:2011.07262  [pdf, other

    cs.CR

    Modelling Attacks in Blockchain Systems using Petri Nets

    Authors: Md. Atik Shahriar, Faisal Haque Bappy, A. K. M. Fakhrul Hossain, Dayamoy Datta Saikat, Md Sadek Ferdous, Mohammad Jabed M. Chowdhury, Md Zakirul Alam Bhuiyan

    Abstract: Blockchain technology has evolved through many changes and modifications, such as smart-contracts since its inception in 2008. The popularity of a blockchain system is due to the fact that it offers a significant security advantage over other traditional systems. However, there have been many attacks in various blockchain systems, exploiting different vulnerabilities and bugs, which caused a signi… ▽ More

    Submitted 14 November, 2020; originally announced November 2020.

    Comments: Accepted for publication at the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2020)

  37. arXiv:2009.02833  [pdf, other

    eess.AS cs.SD

    A Comparison of Virtual Analog Modelling Techniques for Desktop and Embedded Implementations

    Authors: Jatin Chowdhury

    Abstract: We develop a virtual analog model of the Klon Centaur guitar pedal circuit, comparing various circuit modelling techniques. The techniques analyzed include traditional modelling techniques such as nodal analysis and Wave Digital Filters, as well as a machine learning technique using recurrent neural networks. We examine these techniques in the contexts of two use cases: an audio plug-in designed t… ▽ More

    Submitted 6 September, 2020; originally announced September 2020.

    Comments: 8 pages, 12 figures. For associated code, see https://github.com/jatinchowdhury18/KlonCentaur . For associated audio examples, see https://www.youtube.com/playlist?list=PLrcXtWXbPsj11cNBamVyMmDcWY1SXZHvz

  38. arXiv:2002.05205  [pdf, other

    cs.LG cs.AI

    Explainable Deep Modeling of Tabular Data using TableGraphNet

    Authors: Gabriel Terejanu, Jawad Chowdhury, Rezaur Rashid, Asif Chowdhury

    Abstract: The vast majority of research on explainability focuses on post-explainability rather than explainable modeling. Namely, an explanation model is derived to explain a complex black box model built with the sole purpose of achieving the highest performance possible. In part, this trend might be driven by the misconception that there is a trade-off between explainability and accuracy. Furthermore, th… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

  39. arXiv:2001.07091  [pdf, other

    cs.DC

    Blockchain Consensus Algorithms: A Survey

    Authors: Md Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Mohammad A. Hoque, Alan Colman

    Abstract: In recent years, blockchain technology has received unparalleled attention from academia, industry, and governments all around the world. It is considered a technological breakthrough anticipated to disrupt several application domains. This has resulted in a plethora of blockchain systems for various purposes. However, many of these blockchain systems suffer from serious shortcomings related to th… ▽ More

    Submitted 7 February, 2020; v1 submitted 20 January, 2020; originally announced January 2020.

  40. arXiv:2001.01323  [pdf, other

    cs.IR cs.CL cs.LG

    On Identifying Hashtags in Disaster Twitter Data

    Authors: Jishnu Ray Chowdhury, Cornelia Caragea, Doina Caragea

    Abstract: Tweet hashtags have the potential to improve the search for information during disaster events. However, there is a large number of disaster-related tweets that do not have any user-provided hashtags. Moreover, only a small number of tweets that contain actionable hashtags are useful for disaster response. To facilitate progress on automatic identification (or extraction) of disaster hashtags for… ▽ More

    Submitted 5 January, 2020; originally announced January 2020.

  41. arXiv:1910.09347  [pdf, other

    cs.LG stat.ML

    Approximate Sampling using an Accelerated Metropolis-Hastings based on Bayesian Optimization and Gaussian Processes

    Authors: Asif J. Chowdhury, Gabriel Terejanu

    Abstract: Markov Chain Monte Carlo (MCMC) methods have a drawback when working with a target distribution or likelihood function that is computationally expensive to evaluate, specially when working with big data. This paper focuses on Metropolis-Hastings (MH) algorithm for unimodal distributions. Here, an enhanced MH algorithm is proposed that requires less number of expensive function evaluations, has sho… ▽ More

    Submitted 21 October, 2019; originally announced October 2019.

  42. arXiv:1910.07897  [pdf, other

    cs.IR cs.CL cs.LG

    Keyphrase Extraction from Disaster-related Tweets

    Authors: Jishnu Ray Chowdhury, Cornelia Caragea, Doina Caragea

    Abstract: While keyphrase extraction has received considerable attention in recent years, relatively few studies exist on extracting keyphrases from social media platforms such as Twitter, and even fewer for extracting disaster-related keyphrases from such sources. During a disaster, keyphrases can be extremely useful for filtering relevant tweets that can enhance situational awareness. Previously, joint tr… ▽ More

    Submitted 17 October, 2019; originally announced October 2019.

    Comments: 12 pages, 7 figures

    Journal ref: In The World Wide Web Conference (WWW '19), Ling Liu and Ryen White (Eds.). ACM, New York, NY, USA, 1555-1566 (2019)

  43. arXiv:1910.00623  [pdf, other

    physics.chem-ph cs.LG

    A Multiple Filter Based Neural Network Approach to the Extrapolation of Adsorption Energies on Metal Surfaces for Catalysis Applications

    Authors: Asif J. Chowdhury, Wenqiang Yang, Kareem E. Abdelfatah, Mehdi Zare, Andreas Heyden, Gabriel Terejanu

    Abstract: Computational catalyst discovery involves the development of microkinetic reactor models based on estimated parameters determined from density functional theory (DFT). For complex surface chemistries, the cost of calculating the adsorption energies by DFT for a large number of reaction intermediates can become prohibitive. Here, we have identified appropriate descriptors and machine learning model… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: J. Chem. Theory Comput 16 (2020) 1105-1114

  44. arXiv:1810.08598  [pdf, other

    cs.CR

    Immutable Autobiography of Smart Cars

    Authors: Md Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Kamanashis Biswas, Niaz Chowdhury

    Abstract: The popularity of smart cars is increasing around the world as they offer a wide range of services and conveniences.These smart cars are equipped with a variety of sensors generating a large amount of data, many of which are sensitive. Besides, there are multiple parties involved in a lifespan of a smart car ,such as manufacturers, car owners, government agencies, and third-party service providers… ▽ More

    Submitted 19 October, 2018; originally announced October 2018.

    Comments: To be presented at the 3rd Symposium on Distributed Ledger Technology

  45. arXiv:1312.7444  [pdf

    cs.HC cs.CY

    CAPTCHA Based on Human Cognitive Factor

    Authors: Mohammad Jabed Morshed Chowdhury, Narayan Ranjan Chakraborty

    Abstract: A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is an automatic security mechanism used to determine whether the user is a human or a malicious computer program. It is a program that generates and grades tests that are human solvable, but intends to be beyond the capabilities of current computer programs. CAPTCHA should be designed to be very easy for humans… ▽ More

    Submitted 28 December, 2013; originally announced December 2013.

    Comments: International Journal of Advanced Computer Science and Applications, 2013