Search Results for author: Hassan Ali

Found 13 papers, 5 papers with code

Comparing Apples to Oranges: LLM-powered Multimodal Intention Prediction in an Object Categorization Task

no code implementations12 Apr 2024 Hassan Ali, Philipp Allgeuer, Stefan Wermter

Intention-based Human-Robot Interaction (HRI) systems allow robots to perceive and interpret user actions to proactively interact with humans and adapt to their behavior.

Automatic Speech Recognition Automatic Speech Recognition (ASR) +3

Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally

no code implementations5 Oct 2023 Shawqi Al-Maliki, Adnan Qayyum, Hassan Ali, Mohamed Abdallah, Junaid Qadir, Dinh Thai Hoang, Dusit Niyato, Ala Al-Fuqaha

This paper encompasses a taxonomy that highlights the emergence of AdvML4G, a discussion of the differences and similarities between AdvML4G and AdvML, a taxonomy covering social good-related concepts and aspects, an exploration of the motivations behind the emergence of AdvML4G at the intersection of ML4G and AdvML, and an extensive summary of the works that utilize AdvML4G as an auxiliary tool for innovating pro-social applications.

Membership Inference Attacks on DNNs using Adversarial Perturbations

1 code implementation11 Jul 2023 Hassan Ali, Adnan Qayyum, Ala Al-Fuqaha, Junaid Qadir

Secondly, we utilize the framework to propose two novel attacks: (1) Adversarial Membership Inference Attack (AMIA) efficiently utilizes the membership and the non-membership information of the subjects while adversarially minimizing a novel loss function, achieving 6% TPR on both Fashion-MNIST and MNIST datasets; and (2) Enhanced AMIA (E-AMIA) combines EMIA and AMIA to achieve 8% and 4% TPRs on Fashion-MNIST and MNIST datasets respectively, at 1% FPR.

Inference Attack Membership Inference Attack

Consistent Valid Physically-Realizable Adversarial Attack against Crowd-flow Prediction Models

no code implementations5 Mar 2023 Hassan Ali, Muhammad Atif Butt, Fethi Filali, Ala Al-Fuqaha, Junaid Qadir

Although many works have studied these adversarial perturbations in general, the adversarial vulnerabilities of deep crowd-flow prediction models in particular have remained largely unexplored.

Adversarial Attack Management +1

Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR) for Metaverses

no code implementations24 Oct 2022 Adnan Qayyum, Muhammad Atif Butt, Hassan Ali, Muhammad Usman, Osama Halabi, Ala Al-Fuqaha, Qammer H. Abbasi, Muhammad Ali Imran, Junaid Qadir

Metaverse is expected to emerge as a new paradigm for the next-generation Internet, providing fully immersive and personalised experiences to socialize, work, and play in self-sustaining and hyper-spatio-temporal virtual world(s).

Visual Heart Rate Estimation from RGB Facial Video using Spectral Reflectance

no code implementations9 Aug 2022 Bharath Ramakrishnan, Ruijia Deng, Hassan Ali

Estimation of the Heart rate from the facial video has a number of applications in the medical and fitness industries.

Face Detection Heart rate estimation

Snapture -- A Novel Neural Architecture for Combined Static and Dynamic Hand Gesture Recognition

1 code implementation28 May 2022 Hassan Ali, Doreen Jirak, Stefan Wermter

Our architecture enables learning both static and dynamic gestures: by capturing a so-called "snapshot" of the gesture performance at its peak, we integrate the hand pose along with the dynamic movement.

Hand Gesture Recognition Hand-Gesture Recognition

HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios

no code implementations14 Dec 2020 Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay Jha

We have witnessed the continuing arms race between backdoor attacks and the corresponding defense strategies on Deep Neural Networks (DNNs).

Backdoor Attack

RED-Attack: Resource Efficient Decision based Attack for Machine Learning

1 code implementation29 Jan 2019 Faiq Khalid, Hassan Ali, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

To address this limitation, decision-based attacks have been proposed which can estimate the model but they require several thousand queries to generate a single untargeted attack image.

BIG-bench Machine Learning General Classification +1

SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters

1 code implementation4 Nov 2018 Hassan Ali, Faiq Khalid, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

In this paper, we introduce a novel technique based on the Secure Selective Convolutional (SSC) techniques in the training loop that increases the robustness of a given DNN by allowing it to learn the data distribution based on the important edges in the input image.

QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks

1 code implementation4 Nov 2018 Faiq Khalid, Hassan Ali, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique

Adversarial examples have emerged as a significant threat to machine learning algorithms, especially to the convolutional neural networks (CNNs).

Quantization

Cannot find the paper you are looking for? You can Submit a new open access paper.