no code implementations • 31 May 2024 • Muhammad Muneeb Saad, Mubashir Husain Rehmani, Ruairi O'Reilly
This is particularly prevalent in biomedical imagery, where training problems degrade the diversity and quality of synthetic images, and the high computational cost associated with training makes complex architectures increasingly inaccessible.
no code implementations • 21 Sep 2023 • Muhammad Muneeb Saad, Mubashir Husain Rehmani, Ruairi O'Reilly
In this paper, both varieties of the mode collapse problem are investigated, and their subsequent impact on the diversity of synthetic X-ray images is evaluated.
no code implementations • 23 Jul 2023 • Muhammad Muneeb Saad, Mubashir Husain Rehmani, Ruairi O'Reilly
Biomedical image features are sensitive to evaluating the efficacy of synthetic images.
no code implementations • 9 Oct 2022 • Muhammad Muneeb Saad, Mubashir Husain Rehmani, Ruairi O'Reilly
The proposed architecture is compared with the multi-scale gradient GAN (MSG-GAN) to assess the diversity of generated synthetic images.
no code implementations • 10 Aug 2022 • Cristina-Madalina Dragan, Muhammad Muneeb Saad, Mubashir Husain Rehmani, Ruairi O'Reilly
Furthermore, the metrics' capacity to indicate the quality and diversity of synthetic images and a correlation with classifier performance is undertaken.
no code implementations • 25 Jan 2022 • Muhammad Muneeb Saad, Mubashir Husain Rehmani, Ruairi O'Reilly
It is important to generate synthetic images that incorporate a diverse range of features to accurately represent the distribution of features present in the training imagery.
no code implementations • 19 Jan 2022 • Muhammad Muneeb Saad, Ruairi O'Reilly, Mubashir Husain Rehmani
This is due to deep learning models requiring large image datasets to provide high-level performance.
no code implementations • 18 Feb 2021 • Khadija Hafeez, Mubashir Husain Rehmani, Donna OShea
In this paper, we propose a technique - Differential Privacy with Noise Cancellation Technique (DPNCT) - to maximize utility in aggregated load monitoring and fair billing while preserving users privacy by using noise cancellation mechanism on differentially private data.
Cryptography and Security
no code implementations • 4 Feb 2021 • Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
After that, we analyze technical works that have developed blockchain based energy auctions from green perspective.
Cryptography and Security
no code implementations • 2 Feb 2021 • Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
Collectively, we propose a private decentralized VPP trading model and named it as Virtual Private Trading (VPT) model.
Cryptography and Security
no code implementations • 2 Feb 2021 • Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
In this context, usage based dynamic pricing strategies of DSM plays their role and provide users with specific incentives that help shaping their load curve according to the forecasted load.
Cryptography and Security
no code implementations • 9 Mar 2019 • Vishal Sharma, Navuday Sharma, Mubashir Husain Rehmani, Haris Pervaiz
Aerial Base Stations (ABSs) have gained significant importance in the next generation of wireless networks for accommodating mobile ground users and flash crowds with high convenience and quality.
1 code implementation • 6 Dec 2018 • Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT). With the provision of CPSs, the security and privacy threats associated to these systems are also increasing.
Cryptography and Security
1 code implementation • 23 Jul 2010 • Mubashir Husain Rehmani, Sidney Doria, Mustapha Reda Senouci
The Network Simulator (NS-2) is a most widely used network simulator.
Networking and Internet Architecture