no code implementations • 15 Sep 2024 • Hao Jian Huang, Bekzod Iskandarov, Mizanur Rahman, Hakan T. Otal, M. Abdullah Canbaz
Our results show that while federated learning enhances data privacy and distributed learning, it remains vulnerable to poisoning attacks, which must be mitigated to ensure its reliability in real-world applications.
no code implementations • 18 Jul 2024 • Shaina Raza, Mizanur Rahman, Safiullah Kamawal, Armin Toroghi, Ananya Raval, Farshad Navah, Amirmohammad Kazemeini
Recommender Systems (RS) play an integral role in enhancing user experiences by providing personalized item suggestions.
1 code implementation • 4 Jul 2024 • Md Tahmid Rahman Laskar, Sawsan Alqahtani, M Saiful Bari, Mizanur Rahman, Mohammad Abdullah Matin Khan, Haidar Khan, Israt Jahan, Amran Bhuiyan, Chee Wei Tan, Md Rizwan Parvez, Enamul Hoque, Shafiq Joty, Jimmy Huang
To address this, we systematically review the primary challenges and limitations causing these inconsistencies and unreliable evaluations in various steps of LLM evaluation.
no code implementations • 6 Jun 2024 • Shaina Raza, Mizanur Rahman, Michael R. Zhang
We provide the BEADs dataset for detecting biases in various domains, and this dataset is readily usable for responsible AI development and application.
no code implementations • 9 May 2024 • Emrul Hasan, Mizanur Rahman, Chen Ding, Jimmy Xiangji Huang, Shaina Raza
Beyond these numerical ratings, textual reviews provide insights into users fine-grained preferences and item features.
no code implementations • 14 Mar 2024 • Shaina Raza, Tahniat Khan, Veronica Chatrath, Drai Paulen-Patterson, Mizanur Rahman, Oluwanifemi Bamgbose
Our objective is to provide the research community with adaptable and precise classification models adept at identifying fake news for the elections agenda.
no code implementations • 2 Jan 2024 • Sagar Dasgupta, Kazi Hassan Shakib, Mizanur Rahman
To collect data, a vehicle equipped with a GNSS receiver, along with Inertial Measurement Unit (IMU) is used.
no code implementations • 1 Dec 2023 • Shaina Raza, Mizanur Rahman, Shardul Ghuge
Despite increasing awareness and research around fake news, there is still a significant need for datasets that specifically target racial slurs and biases within North American political speeches.
no code implementations • 27 Nov 2023 • Tahniat Khan, Mizanur Rahman, Veronica Chatrath, Oluwanifemi Bamgbose, Shaina Raza
We have created a novel dataset of North American election-related news articles through a blend of advanced language models (LMs) and thorough human verification, for precision and relevance.
1 code implementation • 29 May 2023 • Md Tahmid Rahman Laskar, M Saiful Bari, Mizanur Rahman, Md Amran Hossen Bhuiyan, Shafiq Joty, Jimmy Xiangji Huang
The development of large language models (LLMs) such as ChatGPT has brought a lot of attention recently.
Ranked #8 on
Natural Language Inference
on ANLI test
no code implementations • 31 Mar 2023 • Md Tahmid Rahman Laskar, Mizanur Rahman, Israt Jahan, Enamul Hoque, Jimmy Huang
Debatepedia is a publicly available dataset consisting of arguments and counter-arguments on controversial topics that has been widely used for the single-document query-focused abstractive summarization task in recent years.
no code implementations • 31 Oct 2022 • Muhammad Sami Irfan, Mizanur Rahman, Travis Atkison, Sagar Dasgupta, Alexander Hainen
Specifically, an RL agent is trained to learn an optimal rate of sybil vehicle injection to create congestion for an approach(s).
no code implementations • 9 Sep 2022 • Finley Walden, Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam
Although visual sensors of an AV, such as camera, lidar, and radar, help to see its surrounding environment, an AV cannot see beyond those sensors line of sight.
no code implementations • 9 Sep 2022 • Sagar Dasgupta, Kazi Shakib, Mizanur Rahman, Silvana V Croope, Steven Jones
The objective of this study is to develop an innovative audio analytics-based human trafficking detection framework for autonomous vehicles.
no code implementations • 29 Dec 2021 • M Sabbir Salek, Mashrur Chowdhury, Mizanur Rahman, Kakan Dey, Md Rafiul Islam
The novelty of the asymmetric LBCM is that using this model all the follower vehicles in a platoon can adjust their acceleration and deceleration to closely follow a constant desired time gap to improve platoon operational efficiency while maintaining local and string stability.
no code implementations • 19 Aug 2021 • Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
Data from multiple low-cost in-vehicle sensors (i. e., accelerometer, steering angle sensor, speed sensor, and GNSS) are fused and fed into a recurrent neural network model, which is a long short-term memory (LSTM) network for predicting the location shift, i. e., the distance that an AV travels between two consecutive timestamps.
no code implementations • 19 Aug 2021 • Sagar Dasgupta, Tonmoy Ghosh, Mizanur Rahman
We find that the accuracy of the RL model ranges from 99. 99% to 100%, and the recall value is 100%.
no code implementations • 19 Aug 2021 • Sagar Dasgupta, Courtland Hollis, Mizanur Rahman, Travis Atkison
Thus, the objectives of this paper are to: (i) develop a "slow poisoning" attack generation strategy for an ATSC, and (ii) develop a prediction-based "slow poisoning" attack detection strategy using a recurrent neural network -- i. e., long short-term memory model.
no code implementations • 5 Jun 2021 • Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
In this study, a sensor fusion based GNSS spoofing attack detection framework is presented that consists of three concurrent strategies for an autonomous vehicle (AV): (i) prediction of location shift, (ii) detection of turns (left or right), and (iii) recognition of motion state (including standstill state).
no code implementations • 16 Oct 2020 • Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
A spoofed attack is difficult to detect as a spoofer (attacker who performs spoofing attack) can mimic the GNSS signal and transmit inaccurate location coordinates to an AV.
no code implementations • 5 Mar 2020 • Gurcan Comert, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
Connected vehicle (CV) systems are cognizant of potential cyber attacks because of increasing connectivity between its different components such as vehicles, roadside infrastructure, and traffic management centers.
no code implementations • 29 Jan 2020 • Mizanur Rahman, Mhafuzul Islam, Jon C. Calhoun, Mashrur Chowdhury
The objective of this study is to develop a real-time error-bounded lossy compression (EBLC) strategy to dynamically change the video compression level depending on different environmental conditions in order to maintain a high pedestrian detection accuracy.
no code implementations • 29 Dec 2019 • Gurcan Comert, Zadid Khan, Mizanur Rahman, Mashrur Chowdhury
Thus, the objective of this study is to develop queue length prediction models for signalized intersections that can be leveraged by ASCS using four variations of Grey systems: (i) the first order single variable Grey model (GM(1, 1)); (ii) GM(1, 1) with Fourier error corrections; (iii) the Grey Verhulst model (GVM), and (iv) GVM with Fourier error corrections.
no code implementations • 2 Jul 2019 • Mhafuzul Islam, Mizanur Rahman, Mashrur Chowdhury, Gurcan Comert, Eshaa Deepak Sood, Amy Apon
The contribution of this paper lies in the development of a system using a vision-based deep learning model that is able to generate personal safety messages (PSMs) in real-time (every 100 milliseconds).
no code implementations • 24 Jun 2019 • Zadid Khan, Mashrur Chowdhury, Mhafuzul Islam, Chin-Ya Huang, Mizanur Rahman
This attack detection model can detect false information with an accuracy, precision and recall of 95%, 95% and 87%, respectively, while satisfying the real-time communication and computational requirements.
1 code implementation • 2 Dec 2018 • Mhafuzul Islam, Mizanur Rahman, Sakib Mahmud Khan, Mashrur Chowdhury, Lipika Deka
Connected vehicle (CV) application developers need a development platform to build, test and debug CV applications, such as safety, mobility, and environmental applications, in an edge-centric Cyber-Physical Systems.
Networking and Internet Architecture
no code implementations • 30 Nov 2018 • Gurcan Comert, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
Connected vehicle (CV) systems are cognizant of potential cyber attacks because of increasing connectivity between its different components such as vehicles, roadside infrastructure and traffic management centers.
Cryptography and Security
no code implementations • 8 Nov 2018 • Mizanur Rahman, Mashrur Chowdhury, Jerome McClendon
This estimated traffic flow parameters from low penetration of connected vehicles become noisy compared to 100 percent penetration of CVs, and such noise reduces the real time prediction accuracy of a machine learning model, such as the accuracy of long short term memory (LSTM) model in terms of predicting traffic flow parameters.
no code implementations • 27 Aug 2018 • Mizanur Rahman, Mhafuzul Islam, Jon Calhoun, Mashrur Chowdhury
We utilize a lossy compression technique on traffic camera data to determine the tradeoff between the reduction of the communication bandwidth requirements and a defined object detection accuracy.
1 code implementation • 8 Feb 2018 • Rahul Potharaju, Mizanur Rahman, Bogdan Carbunar
Our results show that a high number of these apps have not been updated over the monitoring interval.
Social and Information Networks Computers and Society