no code implementations • 29 Mar 2022 • Arshi Parvaiz, Muhammad Anwaar Khalid, Rukhsana Zafar, Huma Ameer, Muhammad Ali, Muhammad Moazam Fraz
Among these algorithms, Vision Transformers are evolved as one of the most contemporary and dominant architectures that are being used in the field of computer vision.
no code implementations • 17 Feb 2022 • Muhammad Ali, Sayed Hashim
Finally, we conclude with a summary of the results and insights as well as highlighting open problems to be addressed and indicating various future directions.
1 code implementation • 8 Feb 2022 • Sayed Hashim, Muhammad Ali
The CNN trained on this pretext task will be used for the classification of images in the CIFAR-10 dataset as a downstream task.
1 code implementation • 3 Feb 2022 • Sayed Hashim, Muhammad Ali, Karthik Nandakumar, Mohammad Yaqub
In our project, we extend the idea of using a VAE model for low dimensional latent space extraction with the self-supervised learning technique of feature subsetting.
Ranked #1 on Cancer type classification on TCGA
no code implementations • 20 Sep 2021 • Muhammad Ali, Stavros Shiaeles, Nathan Clarke, Dimitrios Kontogeorgis
Digital investigators often get involved with cases, which seemingly point the responsibility to the person to which the computer belongs, but after a thorough examination malware is proven to be the cause, causing loss of precious time.
1 code implementation • ICCV 2021 • Youmin Kim, Jinbae Park, YounHo Jang, Muhammad Ali, Tae-Hyun Oh, Sung-Ho Bae
In prevalent knowledge distillation, logits in most image recognition models are computed by global average pooling, then used to learn to encode the high-level and task-relevant knowledge.
Ranked #29 on Knowledge Distillation on ImageNet
no code implementations • 15 Sep 2020 • Atom O. Watanabe, Muhammad Ali, Sk Yeahia Been Sayeed, Rao R. Tummala, P. Markondeya Raj
Increasing data rates, spectrum efficiency and energy efficiency have been driving major advances in the design and hardware integration of RF communication networks.
1 code implementation • 24 Oct 2019 • Muhammad Furqan Rafique, Muhammad Ali, Aqsa Saeed Qureshi, Asifullah Khan, Anwar Majid Mirza
The proposed DLMD technique uses both the byte and ASM files for feature engineering, thus classifying malware families.
no code implementations • 12 Mar 2019 • Muhammad Ali, Stavros Shiaeles, Maria Papadaki, Bogdan Ghita
Malicious software is detected and classified by either static analysis or dynamic analysis.