Skip to main content

Showing 1–50 of 57 results for author: Mahmoud, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.04493  [pdf, other

    cs.CV cs.CL

    CORU: Comprehensive Post-OCR Parsing and Receipt Understanding Dataset

    Authors: Abdelrahman Abdallah, Mahmoud Abdalla, Mahmoud SalahEldin Kasem, Mohamed Mahmoud, Ibrahim Abdelhalim, Mohamed Elkasaby, Yasser ElBendary, Adam Jatowt

    Abstract: In the fields of Optical Character Recognition (OCR) and Natural Language Processing (NLP), integrating multilingual capabilities remains a critical challenge, especially when considering languages with complex scripts such as Arabic. This paper introduces the Comprehensive Post-OCR Parsing and Receipt Understanding Dataset (CORU), a novel dataset specifically designed to enhance OCR and informati… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

  2. arXiv:2405.05900  [pdf, other

    cs.CV

    A Comprehensive Survey of Masked Faces: Recognition, Detection, and Unmasking

    Authors: Mohamed Mahmoud, Mahmoud SalahEldin Kasem, Hyun-Soo Kang

    Abstract: Masked face recognition (MFR) has emerged as a critical domain in biometric identification, especially by the global COVID-19 pandemic, which introduced widespread face masks. This survey paper presents a comprehensive analysis of the challenges and advancements in recognising and detecting individuals with masked faces, which has seen innovative shifts due to the necessity of adapting to new soci… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  3. arXiv:2403.17848  [pdf, other

    cs.CL cs.IR

    ArabicaQA: A Comprehensive Dataset for Arabic Question Answering

    Authors: Abdelrahman Abdallah, Mahmoud Kasem, Mahmoud Abdalla, Mohamed Mahmoud, Mohamed Elkasaby, Yasser Elbendary, Adam Jatowt

    Abstract: In this paper, we address the significant gap in Arabic natural language processing (NLP) resources by introducing ArabicaQA, the first large-scale dataset for machine reading comprehension and open-domain question answering in Arabic. This comprehensive dataset, consisting of 89,095 answerable and 3,701 unanswerable questions created by crowdworkers to look similar to answerable ones, along with… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

    Comments: Accepted at SIGIR 2024

  4. arXiv:2312.11812  [pdf, other

    cs.CV cs.AI

    Advancements and Challenges in Arabic Optical Character Recognition: A Comprehensive Survey

    Authors: Mahmoud SalahEldin Kasem, Mohamed Mahmoud, Hyun-Soo Kang

    Abstract: Optical character recognition (OCR) is a vital process that involves the extraction of handwritten or printed text from scanned or printed images, converting it into a format that can be understood and processed by machines. This enables further data processing activities such as searching and editing. The automatic extraction of text through OCR plays a crucial role in digitizing documents, enhan… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

  5. arXiv:2309.12325  [pdf

    cs.CY cs.AI cs.CV cs.LG

    FUTURE-AI: International consensus guideline for trustworthy and deployable artificial intelligence in healthcare

    Authors: Karim Lekadir, Aasa Feragen, Abdul Joseph Fofanah, Alejandro F Frangi, Alena Buyx, Anais Emelie, Andrea Lara, Antonio R Porras, An-Wen Chan, Arcadi Navarro, Ben Glocker, Benard O Botwe, Bishesh Khanal, Brigit Beger, Carol C Wu, Celia Cintas, Curtis P Langlotz, Daniel Rueckert, Deogratias Mzurikwao, Dimitrios I Fotiadis, Doszhan Zhussupov, Enzo Ferrante, Erik Meijering, Eva Weicken, Fabio A González , et al. (95 additional authors not shown)

    Abstract: Despite major advances in artificial intelligence (AI) for medicine and healthcare, the deployment and adoption of AI technologies remain limited in real-world clinical practice. In recent years, concerns have been raised about the technical, clinical, ethical and legal risks associated with medical AI. To increase real world adoption, it is essential that medical AI tools are trusted and accepted… ▽ More

    Submitted 8 July, 2024; v1 submitted 11 August, 2023; originally announced September 2023.

    ACM Class: I.2.0; I.4.0; I.5.0

  6. arXiv:2303.10628  [pdf, other

    cs.CR eess.SP

    Geometric Stability Estimates For 3D-Object Encryption Through Permutations and Rotations

    Authors: M. H. Annaby, M. E. Mahmoud, H. A. Abdusalam, H. A. Ayad, M. A. Rushdi

    Abstract: We compute precise estimates for dimensions of 3D-encryption techniques of 3D-point clouds which use permutations and rigid body motion, in which geometric stability is to be guaranteed. Few attempts are made in this direction. An attempt is established using the notions of dimensional and spatial stability by Jolfaei et al. (2015), who also proposed a 3D object encryption algorithm, claiming that… ▽ More

    Submitted 19 March, 2023; originally announced March 2023.

  7. arXiv:2301.02911  [pdf, other

    cs.CV

    Towards early prediction of neurodevelopmental disorders: Computational model for Face Touch and Self-adaptors in Infants

    Authors: Bruno Tafur, Marwa Mahmoud, Staci Weiss

    Abstract: Infants' neurological development is heavily influenced by their motor skills. Evaluating a baby's movements is key to understanding possible risks of developmental disorders in their growth. Previous research in psychology has shown that measuring specific movements or gestures such as face touches in babies is essential to analyse how babies understand themselves and their context. This research… ▽ More

    Submitted 15 January, 2023; v1 submitted 7 January, 2023; originally announced January 2023.

  8. arXiv:2211.08469  [pdf, other

    cs.CV

    Deep learning for table detection and structure recognition: A survey

    Authors: Mahmoud Kasem, Abdelrahman Abdallah, Alexander Berendeyev, Ebrahem Elkady, Mahmoud Abdalla, Mohamed Mahmoud, Mohamed Hamada, Daniyar Nurseitov, Islam Taj-Eddin

    Abstract: Tables are everywhere, from scientific journals, papers, websites, and newspapers all the way to items we buy at the supermarket. Detecting them is thus of utmost importance to automatically understanding the content of a document. The performance of table detection has substantially increased thanks to the rapid development of deep learning networks. The goals of this survey are to provide a prof… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

  9. arXiv:2206.08405  [pdf, ps, other

    cs.CV

    Going Deeper than Tracking: a Survey of Computer-Vision Based Recognition of Animal Pain and Affective States

    Authors: Sofia Broomé, Marcelo Feighelstein, Anna Zamansky, Gabriel Carreira Lencioni, Pia Haubro Andersen, Francisca Pessanha, Marwa Mahmoud, Hedvig Kjellström, Albert Ali Salah

    Abstract: Advances in animal motion tracking and pose recognition have been a game changer in the study of animal behavior. Recently, an increasing number of works go 'deeper' than tracking, and address automated recognition of animals' internal states such as emotions and pain with the aim of improving animal welfare, making this a timely moment for a systematization of the field. This paper provides a com… ▽ More

    Submitted 16 June, 2022; originally announced June 2022.

  10. arXiv:2204.13666  [pdf, other

    cs.LG cs.AR

    Schrödinger's FP: Dynamic Adaptation of Floating-Point Containers for Deep Learning Training

    Authors: Miloš Nikolić, Enrique Torres Sanchez, Jiahui Wang, Ali Hadi Zadeh, Mostafa Mahmoud, Ameer Abdelhadi, Kareem Ibrahim, Andreas Moshovos

    Abstract: The transfer of tensors from/to memory during neural network training dominates time and energy. To improve energy efficiency and performance, research has been exploring ways to use narrower data representations. So far, these attempts relied on user-directed trial-and-error to achieve convergence. We present methods that relieve users from this responsibility. Our methods dynamically adjust the… ▽ More

    Submitted 16 May, 2024; v1 submitted 28 April, 2022; originally announced April 2022.

  11. Mokey: Enabling Narrow Fixed-Point Inference for Out-of-the-Box Floating-Point Transformer Models

    Authors: Ali Hadi Zadeh, Mostafa Mahmoud, Ameer Abdelhadi, Andreas Moshovos

    Abstract: Increasingly larger and better Transformer models keep advancing state-of-the-art accuracy and capability for Natural Language Processing applications. These models demand more computational power, storage, and energy. Mokey reduces the footprint of state-of-the-art 32-bit or 16-bit floating-point transformer models by quantizing all values to 4-bit indexes into dictionaries of representative 16-b… ▽ More

    Submitted 23 March, 2022; originally announced March 2022.

    Comments: Accepted at the 49th IEEE/ACM International Symposium on Computer Architecture (ISCA '22)

  12. arXiv:2201.08830  [pdf, other

    cs.AR cs.LG

    APack: Off-Chip, Lossless Data Compression for Efficient Deep Learning Inference

    Authors: Alberto Delmas Lascorz, Mostafa Mahmoud, Andreas Moshovos

    Abstract: Data accesses between on- and off-chip memories account for a large fraction of overall energy consumption during inference with deep learning networks. We present APack, a simple and effective, lossless, off-chip memory compression technique for fixed-point quantized models. APack reduces data widths by exploiting the non-uniform value distribution in deep learning applications. APack can be used… ▽ More

    Submitted 21 January, 2022; originally announced January 2022.

  13. arXiv:2112.04021  [pdf, other

    cs.CV

    A Robust Completed Local Binary Pattern (RCLBP) for Surface Defect Detection

    Authors: Nana Kankam Gyimah, Abenezer Girma, Mahmoud Nabil Mahmoud, Shamila Nateghi, Abdollah Homaifar, Daniel Opoku

    Abstract: In this paper, we present a Robust Completed Local Binary Pattern (RCLBP) framework for a surface defect detection task. Our approach uses a combination of Non-Local (NL) means filter with wavelet thresholding and Completed Local Binary Pattern (CLBP) to extract robust features which are fed into classifiers for surface defects detection. This paper combines three components: A denoising technique… ▽ More

    Submitted 7 December, 2021; originally announced December 2021.

    Comments: Accepted to IEEE SMC 2021 as a special invited session paper

  14. arXiv:2111.13157  [pdf, other

    cs.CV cs.AI

    DA$^{\textbf{2}}$-Net : Diverse & Adaptive Attention Convolutional Neural Network

    Authors: Abenezer Girma, Abdollah Homaifar, M Nabil Mahmoud, Xuyang Yan, Mrinmoy Sarkar

    Abstract: Standard Convolutional Neural Network (CNN) designs rarely focus on the importance of explicitly capturing diverse features to enhance the network's performance. Instead, most existing methods follow an indirect approach of increasing or tuning the networks' depth and width, which in many cases significantly increases the computational cost. Inspired by a biological visual system, we propose a Div… ▽ More

    Submitted 25 November, 2021; originally announced November 2021.

  15. arXiv:2104.02263  [pdf, other

    cs.CR cs.CY

    Efficient and Privacy-Preserving Infection Control System for Covid-19-Like Pandemics using Blockchain

    Authors: Seham A. Alansar, Mahmoud M. Badr, Mohamed Mahmoud, Waleed Alasmary

    Abstract: Contact tracing is a very effective way to control the COVID-19-like pandemics. It aims to identify individuals who closely contacted an infected person during the incubation period of the virus and notify them to quarantine. However, the existing systems suffer from privacy, security, and efficiency issues. To address these limitations, in this paper, we propose an efficient and privacy-preservin… ▽ More

    Submitted 5 April, 2021; originally announced April 2021.

  16. The Multimodal Driver Monitoring Database: A Naturalistic Corpus to Study Driver Attention

    Authors: Sumit Jha, Mohamed F. Marzban, Tiancheng Hu, Mohamed H. Mahmoud, Naofal Al-Dhahir, Carlos Busso

    Abstract: A smart vehicle should be able to monitor the actions and behaviors of the human driver to provide critical warnings or intervene when necessary. Recent advancements in deep learning and computer vision have shown great promise in monitoring human behaviors and activities. While these algorithms work well in a controlled environment, naturalistic driving conditions add new challenges such as illum… ▽ More

    Submitted 23 December, 2020; originally announced January 2021.

    Comments: 14 pages, 12 Figures, 3 tables

    MSC Class: 97P30

    Journal ref: IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 8, pp. 10736-10752, August 2022

  17. arXiv:2012.01983  [pdf, other

    cs.CR cs.LG

    Detection of False-Reading Attacks in the AMI Net-Metering System

    Authors: Mahmoud M. Badr, Mohamed I. Ibrahem, Mohamed Mahmoud, Mostafa M. Fouda, Waleed Alasmary

    Abstract: In smart grid, malicious customers may compromise their smart meters (SMs) to report false readings to achieve financial gains illegally. Reporting false readings not only causes hefty financial losses to the utility but may also degrade the grid performance because the reported readings are used for energy management. This paper is the first work that investigates this problem in the net-metering… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

  18. arXiv:2011.03814  [pdf, other

    cs.CR

    Privacy-Preserving and Efficient Data Collection Scheme for AMI Networks Using Deep Learning

    Authors: Mohamed I. Ibrahem, Mohamed Mahmoud, Mostafa M. Fouda, Fawaz Alsolami, Waleed Alasmary, Xuemin, Shen

    Abstract: In advanced metering infrastructure (AMI), smart meters (SMs), which are installed at the consumer side, send fine-grained power consumption readings periodically to the electricity utility for load monitoring and energy management. Change and transmit (CAT) is an efficient approach to collect these readings, where the readings are not transmitted when there is no enough change in consumption. How… ▽ More

    Submitted 7 November, 2020; originally announced November 2020.

    Comments: 16 pages, 11 figures

  19. arXiv:2010.08065  [pdf, other

    cs.AR cs.AI

    FPRaker: A Processing Element For Accelerating Neural Network Training

    Authors: Omar Mohamed Awad, Mostafa Mahmoud, Isak Edo, Ali Hadi Zadeh, Ciaran Bannon, Anand Jayarajan, Gennady Pekhimenko, Andreas Moshovos

    Abstract: We present FPRaker, a processing element for composing training accelerators. FPRaker processes several floating-point multiply-accumulation operations concurrently and accumulates their result into a higher precision accumulator. FPRaker boosts performance and energy efficiency during training by taking advantage of the values that naturally appear during training. Specifically, it processes the… ▽ More

    Submitted 15 October, 2020; originally announced October 2020.

  20. TensorDash: Exploiting Sparsity to Accelerate Deep Neural Network Training and Inference

    Authors: Mostafa Mahmoud, Isak Edo, Ali Hadi Zadeh, Omar Mohamed Awad, Gennady Pekhimenko, Jorge Albericio, Andreas Moshovos

    Abstract: TensorDash is a hardware level technique for enabling data-parallel MAC units to take advantage of sparsity in their input operand streams. When used to compose a hardware accelerator for deep learning, TensorDash can speedup the training process while also increasing energy efficiency. TensorDash combines a low-cost, sparse input operand interconnect comprising an 8-input multiplexer per multipli… ▽ More

    Submitted 1 September, 2020; originally announced September 2020.

  21. arXiv:2007.15815  [pdf, other

    cs.CV cs.HC cs.LG

    Looking At The Body: Automatic Analysis of Body Gestures and Self-Adaptors in Psychological Distress

    Authors: Weizhe Lin, Indigo Orton, Qingbiao Li, Gabriela Pavarini, Marwa Mahmoud

    Abstract: Psychological distress is a significant and growing issue in society. Automatic detection, assessment, and analysis of such distress is an active area of research. Compared to modalities such as face, head, and vocal, research investigating the use of the body modality for these tasks is relatively sparse. This is, in part, due to the limited available datasets and difficulty in automatically extr… ▽ More

    Submitted 30 July, 2020; originally announced July 2020.

    Comments: 11 pages

  22. arXiv:2005.13813  [pdf, other

    cs.CR eess.SP

    Detection of Lying Electrical Vehicles in Charging Coordination Application Using Deep Learning

    Authors: Ahmed Shafee, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Abdulah J. Aljohani, Fathi Amsaad

    Abstract: The simultaneous charging of many electric vehicles (EVs) stresses the distribution system and may cause grid instability in severe cases. The best way to avoid this problem is by charging coordination. The idea is that the EVs should report data (such as state-of-charge (SoC) of the battery) to run a mechanism to prioritize the charging requests and select the EVs that should charge during this t… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

  23. arXiv:2005.13793  [pdf, other

    cs.CR

    Efficient Privacy-Preserving Electricity Theft Detection with Dynamic Billing and Load Monitoring for AMI Networks

    Authors: Mohamed I. Ibrahem, Mahmoud Nabil, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Fawaz Alsolami

    Abstract: In advanced metering infrastructure (AMI), smart meters (SMs) are installed at the consumer side to send fine-grained power consumption readings periodically to the system operator (SO) for load monitoring, energy management, billing, etc. However, fraudulent consumers launch electricity theft cyber-attacks by reporting false readings to reduce their bills illegally. These attacks do not only caus… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

    Comments: 14 pages, 6 figures

  24. arXiv:2005.05371  [pdf

    cs.CV

    A Parallel Hybrid Technique for Multi-Noise Removal from Grayscale Medical Images

    Authors: Nora Youssef, Abeer M. Mahmoud, El-Sayed M. El-Horbaty

    Abstract: Medical imaging is the technique used to create images of the human body or parts of it for clinical purposes. Medical images always have large sizes and they are commonly corrupted by single or multiple noise type at the same time, due to various reasons, these two reasons are the triggers for moving toward parallel image processing to find alternatives of image de-noising techniques. This paper… ▽ More

    Submitted 6 April, 2020; originally announced May 2020.

    Journal ref: IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 5, Ver. V (Sep. - Oct. 2016), PP 121-128 www.iosrjournals.org

  25. Development of an Expert System for Diabetic Type-2 Diet

    Authors: Ibrahim M. Ahmed, Abeer M. Mahmoud

    Abstract: A successful intelligent control of patient food for treatment purpose must combines patient interesting food list and doctors efficient treatment food list. Actually, many rural communities in Sudan have extremely limited access to diabetic diet centers. People travel long distances to clinics or medical facilities, and there is a shortage of medical experts in most of these facilities. This resu… ▽ More

    Submitted 22 February, 2020; originally announced March 2020.

    Journal ref: International Journal of Computer Applications, 2014, 107(1)

  26. arXiv:1912.11210  [pdf, other

    cs.LG stat.ML

    On Sharing Models Instead of Data using Mimic learning for Smart Health Applications

    Authors: Mohamed Baza, Andrew Salazar, Mohamed Mahmoud, Mohamed Abdallah, Kemal Akkaya

    Abstract: Electronic health records (EHR) systems contain vast amounts of medical information about patients. These data can be used to train machine learning models that can predict health status, as well as to help prevent future diseases or disabilities. However, getting patients' medical data to obtain well-trained machine learning models is a challenging task. This is because sharing the patients' medi… ▽ More

    Submitted 24 December, 2019; originally announced December 2019.

    Comments: This paper is accepted in IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT'20)

  27. arXiv:1906.09968  [pdf, other

    cs.CR

    B-Ride: Ride Sharing with Privacy-preservation, Trust and Fair Payment atop Public Blockchain

    Authors: Mohamed Baza, Noureddine Lasla, Mohamed Mahmoud, Gautam Srivastava, Mohamed Abdallah

    Abstract: Ride-sharing is a service that enables drivers to share their trips with other riders, contributing to appealing benefits of shared travel costs. However, the majority of existing platforms rely on a central third party, which make them subject to a single point of failure and privacy disclosure issues. Moreover, they are vulnerable to DDoS and Sybil attacks due to malicious users involvement. Bes… ▽ More

    Submitted 13 November, 2019; v1 submitted 21 June, 2019; originally announced June 2019.

  28. arXiv:1905.05700  [pdf, ps, other

    cs.CL cs.AI cs.LG stat.ML

    Learning meters of Arabic and English poems with Recurrent Neural Networks: a step forward for language understanding and synthesis

    Authors: Waleed A. Yousef, Omar M. Ibrahime, Taha M. Madbouly, Moustafa A. Mahmoud

    Abstract: Recognizing a piece of writing as a poem or prose is usually easy for the majority of people; however, only specialists can determine which meter a poem belongs to. In this paper, we build Recurrent Neural Network (RNN) models that can classify poems according to their meters from plain text. The input text is encoded at the character level and directly fed to the models without feature handcrafti… ▽ More

    Submitted 7 May, 2019; originally announced May 2019.

  29. arXiv:1905.04666  [pdf, other

    cs.CR

    Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grid

    Authors: Mohamed Baza, Marbin Pazos-Revilla, Mahmoud Nabil, Ahmed Sherif, Mohamed Mahmoud, Waleed Alasmary

    Abstract: Energy storage units (ESUs) including EVs and home batteries enable several attractive features of the modern smart grids such as effective demand response and reduced electric bills. However, uncoordinated charging of ESUs stresses the power system. In this paper, we propose privacy-preserving and collusion-resistant charging coordination centralized and decentralized schemes for the smart grid.… ▽ More

    Submitted 20 February, 2020; v1 submitted 12 May, 2019; originally announced May 2019.

  30. arXiv:1905.00919  [pdf, other

    cs.CR cs.LG stat.ML

    Mimic Learning to Generate a Shareable Network Intrusion Detection Model

    Authors: Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud

    Abstract: Purveyors of malicious network attacks continue to increase the complexity and the sophistication of their techniques, and their ability to evade detection continues to improve as well. Hence, intrusion detection systems must also evolve to meet these increasingly challenging threats. Machine learning is often used to support this needed improvement. However, training a good prediction model can r… ▽ More

    Submitted 18 February, 2020; v1 submitted 2 May, 2019; originally announced May 2019.

  31. arXiv:1904.11105  [pdf, other

    cs.CR

    A Multi-Authority Attribute-Based Signcryption Scheme with Efficient Revocation for Smart Grid Downlink Communication

    Authors: Ahmad Alsharif, Ahmad Shafee, Mahmoud Nabil, Mohamed Mahmoud, Waleed S. Alasmary

    Abstract: In this paper, we propose a multi-authority attribute-based signcryption scheme with efficient revocation for smart grid downlink communications. In the proposed scheme, grid operators and electricity vendors can send multicast messages securely to different groups of consumers which is required in different applications such as firmware update distribution and sending direct load control messages… ▽ More

    Submitted 24 April, 2019; originally announced April 2019.

  32. arXiv:1904.09703  [pdf, other

    cs.CR

    Privacy-Preserving Smart Parking System Using Blockchain and Private Information Retrieval

    Authors: Wesam Al Amiri, Mohamed Baza, Karim Banawan, Mohamed Mahmoud, Waleed Alasmary, Kemal Akkaya

    Abstract: Searching for available parking spaces is a major problem for drivers especially in big crowded cities, causing traffic congestion and air pollution, and wasting drivers' time. Smart parking systems are a novel solution to enable drivers to have real-time parking information for pre-booking. However, current smart parking requires drivers to disclose their private information, such as desired dest… ▽ More

    Submitted 27 January, 2021; v1 submitted 21 April, 2019; originally announced April 2019.

  33. arXiv:1904.05845  [pdf, other

    cs.CR

    Detecting Sybil Attacks using Proofs of Work and Location in VANETs

    Authors: Mohamed Baza, Mahmoud Nabil, Niclas Bewermeier, Kemal Fidan, Mohamed Mahmoud, Mohamed Abdallah

    Abstract: In this paper, we propose a Sybil attack detection scheme using proofs of work and location. The idea is that each road side unit (RSU) issues a signed time-stamped tag as a proof for the vehicle's anonymous location. Proofs sent from multiple consecutive RSUs is used to create vehicle trajectory which is used as vehicle anonymous identity. Also, one RSU is not able to issue trajectories for vehic… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

  34. arXiv:1812.04751  [pdf, other

    cs.CV

    Considering Race a Problem of Transfer Learning

    Authors: Akbir Khan, Marwa Mahmoud

    Abstract: As biometric applications are fielded to serve large population groups, issues of performance differences between individual sub-groups are becoming increasingly important. In this paper we examine cases where we believe race is one such factor. We look in particular at two forms of problem; facial classification and image synthesis. We take the novel approach of considering race as a boundary for… ▽ More

    Submitted 11 December, 2018; originally announced December 2018.

    Comments: Accepted for Oral presentation at DVPBA 2019

  35. arXiv:1812.03624  [pdf, ps, other

    cs.LO cs.PL

    Formalization of Metatheory of the Quipper Quantum Programming Language in a Linear Logic

    Authors: Mohamed Yousri Mahmoud, Amy P. Felty

    Abstract: We develop a linear logical framework within the Hybrid system and use it to reason about the type system of a quantum lambda calculus. In particular, we consider a practical version of the calculus called Proto-Quipper, which contains the core of Quipper. Quipper is a new quantum programming language under active development and recently has gained much popularity among the quantum computing comm… ▽ More

    Submitted 10 December, 2018; originally announced December 2018.

    Comments: 40 pages, 5 figures

  36. arXiv:1811.08398  [pdf, other

    cs.CV

    Shape-only Features for Plant Leaf Identification

    Authors: Charlie Hewitt, Marwa Mahmoud

    Abstract: This paper presents a novel feature set for shape-only leaf identification motivated by real-world, mobile deployment. The feature set includes basic shape features, as well as signal features extracted from local area integral invariants (LAIIs), similar to curvature maps, at multiple scales. The proposed methodology is evaluated on a number of publicly available leaf datasets with comparable res… ▽ More

    Submitted 20 November, 2018; originally announced November 2018.

  37. arXiv:1811.05905  [pdf, other

    cs.CY cs.CR

    Blockchain-based Firmware Update Scheme Tailored for Autonomous Vehicles

    Authors: Mohamed Baza, Mahmoud Nabil, Noureddine Lasla, Kemal Fidan, Mohamed Mahmoud, Mohamed Abdallah

    Abstract: Recently, Autonomous Vehicles (AVs) have gained extensive attention from both academia and industry. AVs are a complex system composed of many subsystems, making them a typical target for attackers. Therefore, the firmware of the different subsystems needs to be updated to the latest version by the manufacturer to fix bugs and introduce new features, e.g., using security patches. In this paper, we… ▽ More

    Submitted 14 November, 2018; originally announced November 2018.

  38. arXiv:1811.02001  [pdf, other

    cs.CR

    Blockchain-based Charging Coordination Mechanism for Smart Grid Energy Storage Units

    Authors: Mohamed Baza, Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Erchin Serpedin, Mohammad Rahman

    Abstract: Energy storage units (ESUs) enable several attractive features of modern smart grids such as enhanced grid resilience, effective demand response, and reduced bills. However, uncoordinated charging of ESUs stresses the power system and can lead to a blackout. On the other hand, existing charging coordination mechanisms suffer from several limitations. First, the need for a central charging coordina… ▽ More

    Submitted 2 April, 2019; v1 submitted 5 November, 2018; originally announced November 2018.

  39. arXiv:1810.01851  [pdf, other

    cs.CR

    EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks

    Authors: Ahmad Alsharif, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, Kemal Akkaya

    Abstract: In Advanced Metering Infrastructure (AMI) networks, smart meters should send fine-grained power consumption readings to electric utilities to perform real-time monitoring and energy management. However, these readings can leak sensitive information about consumers' activities. Various privacy-preserving schemes for collecting fine-grained readings have been proposed for AMI networks. These schemes… ▽ More

    Submitted 3 October, 2018; originally announced October 2018.

  40. arXiv:1809.07314  [pdf, other

    cs.CR

    Efficient and Privacy-Preserving Ride Sharing Organization for Transferable and Non-Transferable Services

    Authors: Mahmoud Nabil, Ahmed Sherif, Mohamed Mahmoud, Ahmad Alsharif, Mohamed Abdallah

    Abstract: Ride-sharing allows multiple persons to share their trips together in one vehicle instead of using multiple vehicles. This can reduce the number of vehicles in the street, which consequently can reduce air pollution, traffic congestion and transportation cost. However, a ride-sharing organization requires passengers to report sensitive location information about their trips to a trip organizing se… ▽ More

    Submitted 24 May, 2019; v1 submitted 19 September, 2018; originally announced September 2018.

  41. Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys

    Authors: Sharon Shasha, Moustafa Mahmoud, Mohammad Mannan, Amr Youssef

    Abstract: Smart toys have captured an increasing share of the toy market, and are growing ubiquitous in households with children. Smart toys are a subset of Internet of Things (IoT) devices, containing sensors, actuators, and/or artificial intelligence capabilities. They frequently have internet connectivity, directly or indirectly through companion apps, and collect information about their users and enviro… ▽ More

    Submitted 25 October, 2018; v1 submitted 14 September, 2018; originally announced September 2018.

    Comments: IEEE Internet of Things Journal, accepted Oct 2018 (early access URL: https://ieeexplore.ieee.org/document/8502818)

  42. arXiv:1809.04579  [pdf, other

    cs.CR

    Privacy-preserving mHealth Data Release with Pattern Consistency

    Authors: Mohammad Hadian, Xiaohui Liang, Thamer Altuwaiyan, Mohamed M E A Mahmoud

    Abstract: Mobile healthcare system integrating wearable sensing and wireless communication technologies continuously monitors the users' health status. However, the mHealth system raises a severe privacy concern as the data it collects are private information, such as heart rate and blood pressure. In this paper, we propose an efficient and privacy-preserving mHealth data release approach for the statistic… ▽ More

    Submitted 12 September, 2018; originally announced September 2018.

  43. arXiv:1809.01774  [pdf, other

    cs.LG cs.CR stat.ML

    Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters

    Authors: Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Mostafa Shahin, Khalid Qaraqe, Erchin Serpedin

    Abstract: Modern smart grids rely on advanced metering infrastructure (AMI) networks for monitoring and billing purposes. However, such an approach suffers from electricity theft cyberattacks. Different from the existing research that utilizes shallow, static, and customer-specific-based electricity theft detectors, this paper proposes a generalized deep recurrent neural network (RNN)-based electricity thef… ▽ More

    Submitted 5 September, 2018; originally announced September 2018.

  44. arXiv:1805.04513  [pdf, ps, other

    cs.NE cs.AR cs.LG

    Laconic Deep Learning Computing

    Authors: Sayeh Sharify, Mostafa Mahmoud, Alberto Delmas Lascorz, Milos Nikolic, Andreas Moshovos

    Abstract: We motivate a method for transparently identifying ineffectual computations in unmodified Deep Learning models and without affecting accuracy. Specifically, we show that if we decompose multiplications down to the bit level the amount of work performed during inference for image classification models can be consistently reduced by two orders of magnitude. In the best case studied of a sparse varia… ▽ More

    Submitted 10 May, 2018; originally announced May 2018.

  45. arXiv:1803.03688  [pdf, other

    cs.NE

    Bit-Tactical: Exploiting Ineffectual Computations in Convolutional Neural Networks: Which, Why, and How

    Authors: Alberto Delmas, Patrick Judd, Dylan Malone Stuart, Zissis Poulos, Mostafa Mahmoud, Sayeh Sharify, Milos Nikolic, Andreas Moshovos

    Abstract: We show that, during inference with Convolutional Neural Networks (CNNs), more than 2x to $8x ineffectual work can be exposed if instead of targeting those weights and activations that are zero, we target different combinations of value stream properties. We demonstrate a practical application with Bit-Tactical (TCL), a hardware accelerator which exploits weight sparsity, per layer precision varia… ▽ More

    Submitted 9 March, 2018; originally announced March 2018.

    Comments: An earlier version of this work titled "JaZ: Enabling Innovation Towards Chaff-Free Deep Learning Computing" was submitted for blind review

  46. A Survey on Behavioral Biometric Authentication on Smartphones

    Authors: Ahmed Mahfouz, Tarek M. Mahmoud, Ahmed Sharaf Eldin

    Abstract: Recent research has shown the possibility of using smartphones' sensors and accessories to extract some behavioral attributes such as touch dynamics, keystroke dynamics and gait recognition. These attributes are known as behavioral biometrics and could be used to verify or identify users implicitly and continuously on smartphones. The authentication systems that have been built based on these beha… ▽ More

    Submitted 28 January, 2018; originally announced January 2018.

    Journal ref: Journal of Information Security and Applications. 2017 Dec 31;37:28-37

  47. arXiv:1711.08058  [pdf, other

    cs.LG cs.CL cs.SD eess.AS

    Multiple-Instance, Cascaded Classification for Keyword Spotting in Narrow-Band Audio

    Authors: Ahmad AbdulKader, Kareem Nassar, Mohamed Mahmoud, Daniel Galvez, Chetan Patil

    Abstract: We propose using cascaded classifiers for a keyword spotting (KWS) task on narrow-band (NB), 8kHz audio acquired in non-IID environments --- a more challenging task than most state-of-the-art KWS systems face. We present a model that incorporates Deep Neural Networks (DNNs), cascading, multiple-feature representations, and multiple-instance learning. The cascaded classifiers handle the task's clas… ▽ More

    Submitted 21 November, 2017; originally announced November 2017.

    Comments: To be published in the proceedings of NIPS 2017

  48. Memory Controller Design Under Cloud Workloads

    Authors: Mostafa Mahmoud, Andreas Moshovos

    Abstract: This work studies the behavior of state-of-the-art memory controller designs when executing scale-out workloads. It considers memory scheduling techniques, memory page management policies, the number of memory channels, and the address mapping scheme used. Experimental measurements demonstrate: 1)~Several recently proposed memory scheduling policies are not a good match for these scale-out workloa… ▽ More

    Submitted 30 November, 2016; originally announced November 2016.

    Journal ref: 2016 IEEE International Symposium on Workload Characterization (IISWC)

  49. arXiv:1407.6384  [pdf

    cs.OH

    Solving container terminals problems using computer-based modeling

    Authors: Gamal Abd El-Nasser A. Said, Abeer M. Mahmoud, El-Sayed M. El-Horbaty

    Abstract: This paper addresses the applications of different techniques for solving container terminals problems. We have built a simulation model that can be used to analyze the performance of container terminal operations. The proposed approach is intended to be applied for a real case study in Alexandria Container Terminal (ACT) at Alexandria port. The implementation of our approach shows that a proposed… ▽ More

    Submitted 21 July, 2014; originally announced July 2014.

    Comments: 11 pages, 6 figures. arXiv admin note: substantial text overlap with arXiv:1407.6257

    Journal ref: International Journal of Computer Science and Engineering(IJCSE), Vol.3, Issue 3,2014, pp.91-100

  50. arXiv:1407.6257  [pdf

    cs.OH

    Simulation and optimization of container terminal operations: a case study

    Authors: Gamal Abd El-Nasser A. Said, Abeer M. Mahmoud, El-Sayed M. El-Horbaty

    Abstract: Container terminals are facing a set of interrelated problems. Container handling problems at container terminals are NP-hard problems. The docking time of container ships at the port must be optimized. In this paper we have built a simulation model that integrates all the activities of a container terminal. The proposed approach is applied on a real case study data of container terminal at El-Dek… ▽ More

    Submitted 21 July, 2014; originally announced July 2014.

    Comments: 10 pages, 3 figures

    Journal ref: International Journal of Computer Science Engineering and Information Technology Research(IJCSEITR),Vol.4,Issue 4,2014,pp.85-94