Search Results for author: Mubashir Husain Rehmani

Found 13 papers, 2 papers with code

Adaptive Input-image Normalization for Solving the Mode Collapse Problem in GAN-based X-ray Images

no code implementations21 Sep 2023 Muhammad Muneeb Saad, Mubashir Husain Rehmani, Ruairi O'Reilly

In this paper, both varieties of the mode collapse problem are investigated, and their subsequent impact on the diversity of synthetic X-ray images is evaluated.

Data Augmentation

A Self-attention Guided Multi-scale Gradient GAN for Diversified X-ray Image Synthesis

no code implementations9 Oct 2022 Muhammad Muneeb Saad, Mubashir Husain Rehmani, Ruairi O'Reilly

The proposed architecture is compared with the multi-scale gradient GAN (MSG-GAN) to assess the diversity of generated synthetic images.

Image Generation MS-SSIM +1

Evaluating the Quality and Diversity of DCGAN-based Generatively Synthesized Diabetic Retinopathy Imagery

no code implementations10 Aug 2022 Cristina-Madalina Dragan, Muhammad Muneeb Saad, Mubashir Husain Rehmani, Ruairi O'Reilly

Furthermore, the metrics' capacity to indicate the quality and diversity of synthetic images and a correlation with classifier performance is undertaken.

MS-SSIM SSIM

Addressing the Intra-class Mode Collapse Problem using Adaptive Input Image Normalization in GAN-based X-ray Images

no code implementations25 Jan 2022 Muhammad Muneeb Saad, Mubashir Husain Rehmani, Ruairi O'Reilly

It is important to generate synthetic images that incorporate a diverse range of features to accurately represent the distribution of features present in the training imagery.

A Survey on Training Challenges in Generative Adversarial Networks for Biomedical Image Analysis

no code implementations19 Jan 2022 Muhammad Muneeb Saad, Ruairi O'Reilly, Mubashir Husain Rehmani

This is due to deep learning models requiring large image datasets to provide high-level performance.

DPNCT: A Differential Private Noise Cancellation Scheme for Load Monitoring and Billing for Smart Meters

no code implementations18 Feb 2021 Khadija Hafeez, Mubashir Husain Rehmani, Donna OShea

In this paper, we propose a technique - Differential Privacy with Noise Cancellation Technique (DPNCT) - to maximize utility in aggregated load monitoring and fair billing while preserving users privacy by using noise cancellation mechanism on differentially private data.

Cryptography and Security

Optimizing Blockchain Based Smart Grid Auctions: A Green Revolution

no code implementations4 Feb 2021 Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

After that, we analyze technical works that have developed blockchain based energy auctions from green perspective.

Cryptography and Security

VPT: Privacy Preserving Energy Trading and Block Mining Mechanism for Blockchain based Virtual Power Plants

no code implementations2 Feb 2021 Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Collectively, we propose a private decentralized VPP trading model and named it as Virtual Private Trading (VPT) model.

Cryptography and Security

Differentially Private Demand Side Management for Incentivized Dynamic Pricing in Smart Grid

no code implementations2 Feb 2021 Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

In this context, usage based dynamic pricing strategies of DSM plays their role and provide users with specific incentives that help shaping their load curve according to the forecasted load.

Cryptography and Security

Control over Skies: Survivability, Coverage, and Mobility Laws for Hierarchical Aerial Base Stations

no code implementations9 Mar 2019 Vishal Sharma, Navuday Sharma, Mubashir Husain Rehmani, Haris Pervaiz

Aerial Base Stations (ABSs) have gained significant importance in the next generation of wireless networks for accommodating mobile ground users and flash crowds with high convenience and quality.

Management

Differential Privacy Techniques for Cyber Physical Systems: A Survey

1 code implementation6 Dec 2018 Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT). With the provision of CPSs, the security and privacy threats associated to these systems are also increasing.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.