no code implementations • 16 Jun 2023 • Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Deokseong Kim, Jae Kim, Carrie Spiker, Blake Harnden
Opportunistic routing relies on the broadcast capability of wireless networks.
no code implementations • 29 Nov 2021 • Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Kevin Larson, Anh Le, Alex Yahja, Jae H. Kim
To the best of our knowledge, this is the first successful application of the MADRL framework for the MANET routing problem that demonstrates a high degree of scalability and robustness even under environments that are outside the trained range of scenarios.
1 code implementation • 29 Aug 2021 • Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal
Seemingly dissimilar URLs are being used in an organized way to perform phishing attacks and distribute malware.
no code implementations • 9 Jan 2021 • Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Kevin A. Larson, Anh Le, Alex Yahja, Jae H. Kim
To the best of our knowledge, this is the first successful demonstration of MADRL for the MANET routing problem that achieves and maintains a high degree of scalability and robustness even in the environments that are outside the trained range of scenarios.
no code implementations • CVPR 2015 • Ejaz Ahmed, Michael Jones, Tim K. Marks
Novel elements of our architecture include a layer that computes cross-input neighborhood differences, which capture local relationships among mid-level features that were computed separately from the two input images.
no code implementations • CVPR 2014 • Ejaz Ahmed, Scott Cohen, Brian Price
With the tag provided by the user we do a text query of an image database to gather exemplars of the object.