Skip to main content

Showing 1–50 of 268 results for author: Hasan, S

.
  1. Syntax Is Easy, Semantics Is Hard: Evaluating LLMs for LTL Translation

    Authors: Priscilla Kyei Danso, Mohammad Saqib Hasan, Niranjan Balasubramanian, Omar Chowdhury

    Abstract: Propositional Linear Temporal Logic (LTL) is a popular formalism for specifying desirable requirements and security and privacy policies for software, networks, and systems. Yet expressing such requirements and policies in LTL remains challenging because of its intricate semantics. Since many security and privacy analysis tools require LTL formulas as input, this difficulty places them out of reac… ▽ More

    Submitted 8 April, 2026; originally announced April 2026.

    Comments: SecDev 2026 in Montreal, Canada, 10 pages, maximum 16 pages

    Journal ref: Proceedings of the 2026 ACM Secure Development Conference (SecDev 2026), July 05--06, 2026, Montreal, QC, Canada

  2. arXiv:2604.06266  [pdf, ps, other

    cs.CR cs.AI

    Attribution-Driven Explainable Intrusion Detection with Encoder-Based Large Language Models

    Authors: Umesh Biswas, Shafqat Hasan, Syed Mohammed Farhan, Nisha Pillai, Charan Gudla

    Abstract: Software-Defined Networking (SDN) improves network flexibility but also increases the need for reliable and interpretable intrusion detection. Large Language Models (LLMs) have recently been explored for cybersecurity tasks due to their strong representation learning capabilities; however, their lack of transparency limits their practical adoption in security-critical environments. Understanding h… ▽ More

    Submitted 6 April, 2026; originally announced April 2026.

  3. arXiv:2604.01505  [pdf, ps, other

    hep-ph hep-th

    Phase-space integrals through Mellin-Barnes representation

    Authors: Taushif Ahmed, Syed Mehedi Hasan, Andreas Rapakoulias

    Abstract: We compute angular phase-space integrals with three and four denominators analytically, working within dimensional regularisation via the Mellin-Barnes (MB) representation. The approach converts multifold MB integrals into real parametric integrals and expresses all results in terms of Goncharov polylogarithms (GPLs). For three denominators, all-massless results are obtained to $\mathcal{O}(ε^2)$… ▽ More

    Submitted 1 April, 2026; originally announced April 2026.

    Comments: 8 pages, 17th International Symposium on Radiative Corrections: Applications of Quantum Field Theory to Phenomenology (RADCOR2025)

  4. arXiv:2603.28368  [pdf, ps, other

    cond-mat.quant-gas physics.atom-ph

    Simulating cavity QED with spin-orbit coupled Bose-Einstein condensates revisited

    Authors: Muhammad S. Hasan, Karol Gietka

    Abstract: Simulating cavity quantum electrodynamics in synthetic platforms offers a promising route to exploring light-matter interactions without real photons, while enabling the transfer of cavity-based techniques to other systems. Among such platforms, Bose-Einstein condensates with synthetic spin-orbit coupling provide a controllable setting where internal and motional degrees of freedom become coupled,… ▽ More

    Submitted 30 March, 2026; originally announced March 2026.

    Comments: 10 pages, 4 figures

  5. arXiv:2603.23271  [pdf, ps, other

    cs.RO cs.AI

    A Multimodal Framework for Human-Multi-Agent Interaction

    Authors: Shaid Hasan, Breenice Lee, Sujan Sarker, Tariq Iqbal

    Abstract: Human-robot interaction is increasingly moving toward multi-robot, socially grounded environments. Existing systems struggle to integrate multimodal perception, embodied expression, and coordinated decision-making in a unified framework. This limits natural and scalable interaction in shared physical spaces. We address this gap by introducing a multimodal framework for human-multi-agent interactio… ▽ More

    Submitted 24 March, 2026; originally announced March 2026.

    Comments: 4 pages, 3 figures. Accepted at ACM/IEEE HRI 2026 Workshop (MAgicS-HRI)

    ACM Class: I.2.9

  6. arXiv:2603.13655  [pdf, ps, other

    cs.CL

    Privacy Preserving Topic-wise Sentiment Analysis of the Iran Israel USA Conflict Using Federated Transformer Models

    Authors: Md Saiful Islam, Tanjim Taharat Aurpa, Sharad Hasan, Farzana Akter

    Abstract: The recent escalation of the Iran Israel USA conflict in 2026 has triggered widespread global discussions across social media platforms. As people increasingly use these platforms for expressing opinions, analyzing public sentiment from these discussions can provide valuable insights into global public perception. This study aims to analyze global public sentiment regarding the Iran Israel USA con… ▽ More

    Submitted 13 March, 2026; originally announced March 2026.

  7. arXiv:2603.10267  [pdf, ps, other

    cs.CV

    A Robust Deep Learning Framework for Bangla License Plate Recognition Using YOLO and Vision-Language OCR

    Authors: Nayeb Hasin, Md. Arafath Rahman Nishat, Mainul Islam, Khandakar Shakib Al Hasan, Asif Newaz

    Abstract: An Automatic License Plate Recognition (ALPR) system constitutes a crucial element in an intelligent traffic management system. However, the detection of Bangla license plates remains challenging because of the complicated character scheme and uneven layouts. This paper presents a robust Bangla License Plate Recognition system that integrates a deep learning-based object detection model for licens… ▽ More

    Submitted 10 March, 2026; originally announced March 2026.

    Comments: Accepted at the 2026 IEEE International Conference on AI and Data Analytics (ICAD 2026). Final version will appear in IEEE Xplore

  8. arXiv:2603.06687  [pdf, ps, other

    cs.CV cs.CL cs.ET cs.MM cs.RO

    TimeSpot: Benchmarking Geo-Temporal Understanding in Vision-Language Models in Real-World Settings

    Authors: Azmine Toushik Wasi, Shahriyar Zaman Ridoy, Koushik Ahamed Tonmoy, Kinga Tshering, S. M. Muhtasimul Hasan, Wahid Faisal, Tasnim Mohiuddin, Md Rizwan Parvez

    Abstract: Geo-temporal understanding, the ability to infer location, time, and contextual properties from visual input alone, underpins applications such as disaster management, traffic planning, embodied navigation, world modeling, and geography education. Although recent vision-language models (VLMs) have advanced image geo-localization using cues like landmarks and road signs, their ability to reason abo… ▽ More

    Submitted 4 March, 2026; originally announced March 2026.

    Comments: 66 Pages. In Review

  9. arXiv:2603.00217  [pdf, ps, other

    cs.CV cs.AI cs.CR

    Physical Evaluation of Naturalistic Adversarial Patches for Camera-Based Traffic-Sign Detection

    Authors: Brianna D'Urso, Tahmid Hasan Sakib, Syed Rafay Hasan, Terry N. Guo

    Abstract: This paper studies how well Naturalistic Adversarial Patches (NAPs) transfer to a physical traffic sign setting when the detector is trained on a customized dataset for an autonomous vehicle (AV) environment. We construct a composite dataset, CompGTSRB (which is customized dataset for AV environment), by pasting traffic sign instances from the German Traffic Sign Recognition Benchmark (GTSRB) onto… ▽ More

    Submitted 27 February, 2026; originally announced March 2026.

    Comments: Accepted to the 2nd IEEE Conference on Secure and Trustworthy CyberInfrastructure for IoT and Microelectronics (SaTC 2026), Houston, Texas, USA, March 24 to 26, 2026

  10. arXiv:2602.23070  [pdf, ps, other

    cs.SD cs.AI cs.CL eess.AS

    Make It Hard to Hear, Easy to Learn: Long-Form Bengali ASR and Speaker Diarization via Extreme Augmentation and Perfect Alignment

    Authors: Sanjid Hasan, Risalat Labib, A H M Fuad, Bayazid Hasan

    Abstract: Although Automatic Speech Recognition (ASR) in Bengali has seen significant progress, processing long-duration audio and performing robust speaker diarization remain critical research gaps. To address the severe scarcity of joint ASR and diarization resources for this language, we introduce Lipi-Ghor-882, a comprehensive 882-hour multi-speaker Bengali dataset. In this paper, detailing our submissi… ▽ More

    Submitted 26 February, 2026; originally announced February 2026.

    Comments: 4 pages, 2 figures

  11. arXiv:2601.21102  [pdf, ps, other

    cs.SE

    The Quiet Contributions: Insights into AI-Generated Silent Pull Requests

    Authors: S M Mahedy Hasan, Md Fazle Rabbi, Minhaz Zibran

    Abstract: We present the first empirical study of AI-generated pull requests that are 'silent,' meaning no comments or discussions accompany them. This absence of any comments or discussions associated with such silent AI pull requests (SPRs) poses a unique challenge in understanding the rationale for their acceptance or rejection. Hence, we quantitatively study 4,762 SPRs of five AI agents made to popular… ▽ More

    Submitted 28 January, 2026; originally announced January 2026.

    Comments: 5 pages, 4 figures, accepted at MSR Mining Challenge 2026

  12. arXiv:2601.16312  [pdf, ps, other

    cs.CL cs.AI

    Teaching and Evaluating LLMs to Reason About Polymer Design Related Tasks

    Authors: Dikshya Mohanty, Mohammad Saqib Hasan, Syed Mostofa Monsur, Size Zheng, Benjamin Hsiao, Niranjan Balasubramanian

    Abstract: Research in AI4Science has shown promise in many science applications, including polymer design. However, current LLMs prove ineffective on this problem space because: (i) most models lack polymer-specific knowledge (ii) existing aligned models lack coverage of knowledge and capabilities relevant to polymer design. Addressing this, we introduce PolyBench, a large scale training and test benchmark… ▽ More

    Submitted 22 January, 2026; originally announced January 2026.

  13. arXiv:2601.14415  [pdf, ps, other

    cs.CR

    A Survey of Security Challenges and Solutions for Advanced Air Mobility and eVTOL Aircraft

    Authors: Mahyar Ghazanfari, Iman Sharifi, Peng Wei, Noah Dahle, Abel Diaz Gonzalez, Austin Coursey, Bryce Bjorkman, Cailani Lemieux-Mack, Robert Canady, Abenezer Taye, Bryan C. Ward, Xenofon Koutsoukos, Gautam Biswas, Maheed H. Ahmed, Hyeong Tae Kim, Mahsa Ghasemi, Vijay Gupta, Filippos Fotiadis, Ufuk Topcu, Junchi Lu, Alfred Chen, Abdul Kareem Ras, Nischal Aryal, Amer Ibrahim, Amir Shirkhodaie , et al. (3 additional authors not shown)

    Abstract: This survey reviews the existing and envisioned security vulnerabilities and defense mechanisms relevant to Advanced Air Mobility (AAM) systems, with a focus on electric vertical takeoff and landing (eVTOL) aircraft. Drawing from vulnerabilities in the avionics in commercial aviation and the automated unmanned aerial systems (UAS), the paper presents a taxonomy of attacks, analyzes mitigation stra… ▽ More

    Submitted 20 January, 2026; originally announced January 2026.

    Comments: 28 pages, 4 figures, 11 tables

  14. A Survey of Security Challenges and Solutions for UAS Traffic Management (UTM) and small Unmanned Aerial Systems (sUAS)

    Authors: Iman Sharifi, Mahyar Ghazanfari, Abenezer Taye, Peng Wei, Maheed H. Ahmed, Hyeong Tae Kim, Mahsa Ghasemi, Vijay Gupta, Noah Dahle, Robert Canady, Abel Diaz Gonzalez, Austin Coursey, Bryce Bjorkman, Cailani Lemieux-Mack, Bryan C. Ward, Xenofon Koutsoukos, Gautam Biswas, Heber Herencia-Zapana, Saqib Hasan, Isaac Amundson, Filippos Fotiadis, Ufuk Topcu, Junchi Lu, Qi Alfred Chen, Nischal Aryal , et al. (3 additional authors not shown)

    Abstract: The rapid growth of small Unmanned Aerial Systems (sUAS) for civil and commercial missions has intensified concerns about their resilience to cyber-security threats. Operating within the emerging UAS Traffic Management (UTM) framework, these lightweight and highly networked platforms depend on secure communication, navigation, and surveillance (CNS) subsystems that are vulnerable to spoofing, jamm… ▽ More

    Submitted 13 January, 2026; originally announced January 2026.

    Comments: 26 pages, 3 figures, 5 tables

  15. arXiv:2601.06664  [pdf, ps, other

    cs.LG cs.AI

    Reinforcement Learning-Guided Dynamic Multi-Graph Fusion for Evacuation Traffic Prediction

    Authors: Md Nafees Fuad Rafi, Samiul Hasan

    Abstract: Real-time traffic prediction is critical for managing transportation systems during hurricane evacuations. Although data-driven graph-learning models have demonstrated strong capabilities in capturing the complex spatiotemporal dynamics of evacuation traffic at a network level, they mostly consider a single dimension (e.g., travel-time or distance) to construct the underlying graph. Furthermore, t… ▽ More

    Submitted 10 January, 2026; originally announced January 2026.

  16. arXiv:2601.05814  [pdf, ps, other

    cs.LG

    A Dual Pipeline Machine Learning Framework for Automated Multi Class Sleep Disorder Screening Using Hybrid Resampling and Ensemble Learning

    Authors: Md Sultanul Islam Ovi, Muhsina Tarannum Munfa, G. M. M Miftahul Alam Adib, Syed Sabbir Hasan

    Abstract: Accurate classification of sleep disorders, particularly insomnia and sleep apnea, is important for reducing long term health risks and improving patient quality of life. However, clinical sleep studies are resource intensive and are difficult to scale for population level screening. This paper presents a Dual Pipeline Machine Learning Framework for multi class sleep disorder screening using the S… ▽ More

    Submitted 6 February, 2026; v1 submitted 9 January, 2026; originally announced January 2026.

    Comments: 32 pages, 5 figures, 14 tables

  17. arXiv:2601.04505  [pdf, ps, other

    cs.AI cs.CL eess.SY

    CircuitLM: A Multi-Agent LLM-Aided Design Framework for Generating Circuit Schematics from Natural Language Prompts

    Authors: Khandakar Shakib Al Hasan, Syed Rifat Raiyan, Hasin Mahtab Alvee, Wahid Sadik

    Abstract: Generating accurate circuit schematics from high-level natural language descriptions remains a persistent challenge in electronic design automation (EDA), as large language models (LLMs) frequently hallucinate components, violate strict physical constraints, and produce non-machine-readable outputs. To address this, we present CircuitLM, a multi-agent pipeline that translates user prompts into str… ▽ More

    Submitted 17 March, 2026; v1 submitted 7 January, 2026; originally announced January 2026.

    Comments: Under review, 10 pages, 8 figures, 6 tables

  18. arXiv:2512.18533  [pdf, ps, other

    cs.CL cs.LG

    Generalization Gaps in Political Fake News Detection: An Empirical Study on the LIAR Dataset

    Authors: S Mahmudul Hasan, Shaily Roy, Akib Jawad Nafis

    Abstract: The proliferation of linguistically subtle political disinformation poses a significant challenge to automated fact-checking systems. Despite increasing emphasis on complex neural architectures, the empirical limits of text-only linguistic modeling remain underexplored. We present a systematic diagnostic evaluation of nine machine learning algorithms on the LIAR benchmark. By isolating lexical fea… ▽ More

    Submitted 20 December, 2025; originally announced December 2025.

  19. Prompt Searches for Very-High-Energy γ-Ray Counterparts to IceCube Astrophysical Neutrino Alerts

    Authors: J. Abhir, A. Biland, K. Brand, T. Bretz, D. Dorner, L. Eisenberger, D. Elsaesser, P. Günther, S. Hasan, D. Hildebrand, K. Mannheim, M. Linhoff, F. Pfeifle, W. Rhode, B. Schleicher, V. Sliusar, M. Vorbrugg, R. Walter, F. Aharonian, F. Ait Benkhali, J. Aschersleben, H. Ashkar, M. Backes, V. Barbosa Martins, R. Batzofin , et al. (809 additional authors not shown)

    Abstract: The search for sources of high-energy astrophysical neutrinos can be significantly advanced through a multi-messenger approach, which seeks to detect the gamma rays that accompany neutrinos as they are produced at their sources. Multi-messenger observations have so far provided the first evidence for a neutrino source, illustrated by the joint detection of the flaring blazar TXS 0506+056 in highen… ▽ More

    Submitted 18 December, 2025; originally announced December 2025.

    Comments: accepted for publication in ApJ

  20. Flow-Based Path Planning for Multiple Homogenous UAVs for Outdoor Formation-Flying

    Authors: Mahmud Suhaimi Ibrahim, Shantanu Rahman, Muhammad Samin Hasan, Minhaj Uddin Ahmad, Abdullah Abrar

    Abstract: Collision-free path planning is the most crucial component in multi-UAV formation-flying (MFF). We use unlabeled homogenous quadcopters (UAVs) to demonstrate the use of a flow network to create complete (inter-UAV) collision-free paths. This procedure has three main parts: 1) Creating a flow network graph from physical GPS coordinates, 2) Finding a path of minimum cost (least distance) using any g… ▽ More

    Submitted 24 November, 2025; originally announced November 2025.

    Comments: 9 pages, 15 figures, conference

    Journal ref: 2022 7th International Conference on Mechanical Engineering and Robotics Research (ICMERR)

  21. arXiv:2511.19248  [pdf, ps, other

    cs.CR cs.CV

    FedPoisonTTP: A Threat Model and Poisoning Attack for Federated Test-Time Personalization

    Authors: Md Akil Raihan Iftee, Syed Md. Ahnaf Hasan, Amin Ahsan Ali, AKM Mahbubur Rahman, Sajib Mistry, Aneesh Krishna

    Abstract: Test-time personalization in federated learning enables models at clients to adjust online to local domain shifts, enhancing robustness and personalization in deployment. Yet, existing federated learning work largely overlooks the security risks that arise when local adaptation occurs at test time. Heterogeneous domain arrivals, diverse adaptation algorithms, and limited cross-client visibility cr… ▽ More

    Submitted 24 November, 2025; originally announced November 2025.

    Comments: 13 pages, 3 figures, 2 tables

  22. arXiv:2511.18066  [pdf, ps, other

    cs.LG cs.CV

    pFedBBN: A Personalized Federated Test-Time Adaptation with Balanced Batch Normalization for Class-Imbalanced Data

    Authors: Md Akil Raihan Iftee, Syed Md. Ahnaf Hasan, Mir Sazzat Hossain, Rakibul Hasan Rajib, Amin Ahsan Ali, AKM Mahbubur Rahman, Sajib Mistry, Monowar Bhuyan

    Abstract: Test-time adaptation (TTA) in federated learning (FL) is crucial for handling unseen data distributions across clients, particularly when faced with domain shifts and skewed class distributions. Class Imbalance (CI) remains a fundamental challenge in FL, where rare but critical classes are often severely underrepresented in individual client datasets. Although prior work has addressed CI during tr… ▽ More

    Submitted 22 November, 2025; originally announced November 2025.

    Comments: 25 pages, 7 tables, 21 figures

  23. arXiv:2511.07830  [pdf, ps, other

    cond-mat.other eess.SY

    A Dual-Memory Ferroelectric Transistor Emulating Synaptic Metaplasticity for High-Speed Reservoir Computing

    Authors: Yifan Wang, Muhammad Sakib Shahriar, Salma Soliman, Noah Vaillancourt, Lance Fernandes, Andrea Padovani, Asif Islam Khan, Md Sakib Hasan, Raisul Islam

    Abstract: The exponential growth of edge artificial intelligence demands material-focused solutions to overcome energy consumption and latency limitations when processing real-time temporal data. Physical reservoir computing (PRC) offers an energy-efficient paradigm but faces challenges due to limited device scalability and reconfigurability. Additionally, reservoir and readout layers require memory of diff… ▽ More

    Submitted 10 November, 2025; originally announced November 2025.

  24. arXiv:2511.00402  [pdf, ps, other

    cs.SD cs.AI

    Emotion Detection in Speech Using Lightweight and Transformer-Based Models: A Comparative and Ablation Study

    Authors: Lucky Onyekwelu-Udoka, Md Shafiqul Islam, Md Shahedul Hasan

    Abstract: Emotion recognition from speech plays a vital role in the development of empathetic human-computer interaction systems. This paper presents a comparative analysis of lightweight transformer-based models, DistilHuBERT and PaSST, by classifying six core emotions from the CREMA-D dataset. We benchmark their performance against a traditional CNN-LSTM baseline model using MFCC features. DistilHuBERT de… ▽ More

    Submitted 1 November, 2025; originally announced November 2025.

  25. arXiv:2511.00140  [pdf, ps, other

    cs.CR cs.OS cs.RO eess.SY

    Supply Chain Exploitation of Secure ROS 2 Systems: A Proof-of-Concept on Autonomous Platform Compromise via Keystore Exfiltration

    Authors: Tahmid Hasan Sakib, Yago Romano Martinez, Carter Brady, Syed Rafay Hasan, Terry N. Guo

    Abstract: This paper presents a proof-of-concept supply chain attack against the Secure ROS 2 (SROS 2) framework, demonstrated on a Quanser QCar2 autonomous vehicle platform. A Trojan-infected Debian package modifies core ROS 2 security commands to exfiltrate newly generated keystore credentials via DNS in base64-encoded chunks to an attacker-controlled nameserver. Possession of these credentials enables th… ▽ More

    Submitted 31 October, 2025; originally announced November 2025.

    Comments: Author-accepted version (preprint). Presented at IEEE MILCOM 2025 Workshops, WS07: 2nd Workshop on Security, Resilience, and Robustness of Systems and Software (SRRSS), Los Angeles, Oct 2025. 6 pages. Primary: cs.CR; cross-lists: cs.RO, cs.OS. Program: https://milcom2025.ieee-milcom.org/workshop/ws07-2nd-workshop-security-resilient-and-robustness-systems-and-software/program

    Journal ref: MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM), Los Angeles, CA, USA, 2025, pp. 1-6

  26. arXiv:2510.20171  [pdf, ps, other

    cs.DC cs.AI cs.NI

    Collective Communication for 100k+ GPUs

    Authors: Min Si, Pavan Balaji, Yongzhou Chen, Ching-Hsiang Chu, Adi Gangidi, Saif Hasan, Subodh Iyengar, Dan Johnson, Bingzhe Liu, Regina Ren, Deep Shah, Ashmitha Jeevaraj Shetty, Greg Steinbrecher, Yulun Wang, Bruce Wu, Xinfeng Xie, Jingyi Yang, Mingran Yang, Kenny Yu, Minlan Yu, Cen Zhao, Wes Bland, Denis Boyda, Suman Gumudavelli, Prashanth Kannan , et al. (14 additional authors not shown)

    Abstract: The increasing scale of large language models (LLMs) necessitates highly efficient collective communication frameworks, particularly as training workloads extend to hundreds of thousands of GPUs. Traditional communication methods face significant throughput and latency limitations at this scale, hindering both the development and deployment of state-of-the-art models. This paper presents the NCCLX… ▽ More

    Submitted 9 January, 2026; v1 submitted 22 October, 2025; originally announced October 2025.

    ACM Class: C.2.4; I.2

  27. arXiv:2510.11211  [pdf, ps, other

    cs.DC

    An Explorative Study on Distributed Computing Techniques in Training and Inference of Large Language Models

    Authors: Sheikh Azizul Hakim, Saem Hasan

    Abstract: Large language models (LLM) are advanced AI systems trained on extensive textual data, leveraging deep learning techniques to understand and generate human-like language. Today's LLMs with billions of parameters are so huge that hardly any single computing node can train, fine-tune, or infer from them. Therefore, several distributed computing techniques are being introduced in the literature to pr… ▽ More

    Submitted 13 October, 2025; originally announced October 2025.

  28. arXiv:2510.05492  [pdf, ps, other

    cs.LG cs.AI

    High-Fidelity Synthetic ECG Generation via Mel-Spectrogram Informed Diffusion Training

    Authors: Zhuoyi Huang, Nutan Sahoo, Anamika Kumari, Girish Kumar, Kexuan Cai, Shixing Cao, Yue Kang, Tian Xia, Somya Chatterjee, Nicholas Hausman, Aidan Jay, Eric S. Rosenthal, Soundar Srinivasan, Sadid Hasan, Alex Fedorov, Sulaiman Vesal

    Abstract: The development of machine learning for cardiac care is severely hampered by privacy restrictions on sharing real patient electrocardiogram (ECG) data. Although generative AI offers a promising solution, the real-world use of existing model-synthesized ECGs is limited by persistent gaps in trustworthiness and clinical utility. In this work, we address two major shortcomings of current generative E… ▽ More

    Submitted 8 October, 2025; v1 submitted 6 October, 2025; originally announced October 2025.

  29. arXiv:2509.09782  [pdf, ps, other

    cs.LG

    One Head, Many Models: Cross-Attention Routing for Cost-Aware LLM Selection

    Authors: Roshini Pulishetty, Mani Kishan Ghantasala, Keerthy Kaushik Dasoju, Niti Mangwani, Vishal Garimella, Aditya Mate, Somya Chatterjee, Yue Kang, Ehi Nosakhare, Sadid Hasan, Soundar Srinivasan

    Abstract: The proliferation of large language models (LLMs) with varying computational costs and performance profiles presents a critical challenge for scalable, cost-effective deployment in real-world applications. We introduce a unified routing framework that leverages a single-head cross-attention mechanism to jointly model query and model embeddings, enabling dynamic selection of the optimal LLM for eac… ▽ More

    Submitted 11 September, 2025; originally announced September 2025.

  30. arXiv:2509.08808  [pdf, ps, other

    cs.SE

    Handling Open-Vocabulary Constructs in Formalizing Specifications: Retrieval-Augmented Parsing with Expert Knowledge

    Authors: Mohammad Saqib Hasan, Sayontan Ghosh, Dhruv Verma, Geoff Kuenning, Erez Zadok, Scott A. Smolka, Niranjan Balasubramanian

    Abstract: We study the problem of Open-Vocabulary Constructs(OVCs) -- ones not known beforehand -- in the context of converting natural language (NL) specifications into formal languages (e.g., temporal logic or code). Models fare poorly on OVCs due to a lack of necessary knowledge a priori. In such situations, a domain expert can provide correct constructs at inference time based on their preferences or do… ▽ More

    Submitted 10 September, 2025; originally announced September 2025.

    Comments: Accepted to COLM 2024

  31. arXiv:2509.04508  [pdf, ps, other

    cs.CL

    ProST: Progressive Sub-task Training for Pareto-Optimal Multi-agent Systems Using Small Language Models

    Authors: Biddut Sarker Bijoy, Mohammad Saqib Hasan, Pegah Alipoormolabashi, Avirup Sil, Aruna Balasubramanian, Niranjan Balasubramanian

    Abstract: Multi-agent systems with smaller language models (SLMs) present a viable alternative to single agent systems powered by large language models (LLMs) for addressing complex problems. In this work, we study how these alternatives compare in terms of both effectiveness and efficiency. To study this trade-off, we instantiate single and multi-agent systems for the complex problems in the AppWorld envir… ▽ More

    Submitted 11 November, 2025; v1 submitted 2 September, 2025; originally announced September 2025.

  32. arXiv:2508.19475  [pdf, ps, other

    cs.CL cs.AI

    Automatic Question & Answer Generation Using Generative Large Language Model (LLM)

    Authors: Md. Alvee Ehsan, A. S. M Mehedi Hasan, Kefaya Benta Shahnoor, Syeda Sumaiya Tasneem

    Abstract: In the realm of education, student evaluation holds equal significance to imparting knowledge. To be evaluated, students usually need to go through text-based academic assessment methods. Instructors need to make a diverse set of questions that need to be fair for all students to prove their adequacy over a particular topic. This can prove to be quite challenging as they may need to manually go th… ▽ More

    Submitted 28 September, 2025; v1 submitted 26 August, 2025; originally announced August 2025.

  33. arXiv:2508.15952  [pdf, ps, other

    hep-ph hep-th math-ph

    Angular phase-space integrals with four denominators through Mellin--Barnes

    Authors: Taushif Ahmed, Syed Mehedi Hasan, Andreas Rapakoulias

    Abstract: We compute four-denominator angular phase-space integrals using the Mellin--Barnes (MB) technique in dimensional regularisation. Independent of the scattering process, an angular integral can be categorised based on the nature of the momenta appearing in the denominators. We address all scenarios involving fully massless and massive momenta. We present a partial fraction decomposition that relates… ▽ More

    Submitted 21 August, 2025; originally announced August 2025.

    Comments: 18 pages, 2 tables

  34. arXiv:2508.12133  [pdf, ps, other

    cs.NE q-bio.PE

    Improving MSA Estimation through Adaptive Weight Vectors in MOEA/D

    Authors: Saem Hasan, Muhammad Ali Nayeem, M. Sohel Rahman

    Abstract: Accurate phylogenetic inference from biological sequences depends critically on the quality of multiple sequence alignments, yet optimal alignment for many sequences is computationally intractable and sensitive to scoring choices. In this work we introduce MOEA/D-ADF, a novel variant of MOEA/D that adaptively adjusts subproblem weight vectors based on fitness variance to improve the exploration-ex… ▽ More

    Submitted 16 August, 2025; originally announced August 2025.

  35. arXiv:2508.11715  [pdf, ps, other

    cs.SE cs.AI

    Benchmark Dataset Generation and Evaluation for Excel Formula Repair with LLMs

    Authors: Ananya Singha, Harshita Sahijwani, Walt Williams, Emmanuel Aboah Boateng, Nick Hausman, Miguel Di Luca, Keegan Choudhury, Chaya Binet, Vu Le, Tianwei Chen, Oryan Rokeah Chen, Sulaiman Vesal, Sadid Hasan

    Abstract: Excel is a pervasive yet often complex tool, particularly for novice users, where runtime errors arising from logical mistakes or misinterpretations of functions pose a significant challenge. While large language models (LLMs) offer promising assistance by explaining formula errors, the automated correction of these semantic runtime errors remains an open problem. A primary challenge to advancing… ▽ More

    Submitted 14 August, 2025; originally announced August 2025.

    Comments: Accepted at the KDD workshop on Evaluation and Trustworthiness of Agentic and Generative AI Models

  36. arXiv:2508.05508  [pdf, ps, other

    cs.AI

    Auto-Eval Judge: Towards a General Agentic Framework for Task Completion Evaluation

    Authors: Roshita Bhonsle, Rishav Dutta, Sneha Vavilapalli, Harsh Seth, Abubakarr Jaye, Yapei Chang, Mukund Rungta, Emmanuel Aboah Boateng, Sadid Hasan, Ehi Nosakhare, Soundar Srinivasan

    Abstract: The increasing adoption of foundation models as agents across diverse domains necessitates a robust evaluation framework. Current methods, such as LLM-as-a-Judge, focus only on final outputs, overlooking the step-by-step reasoning that drives agentic decision-making. Meanwhile, existing Agent-as-a-Judge systems, where one agent evaluates another's task completion, are typically designed for narrow… ▽ More

    Submitted 7 August, 2025; originally announced August 2025.

  37. A Study of Gender Classification Techniques Based on Iris Images: A Deep Survey and Analysis

    Authors: Basna Mohammed Salih Hasan, Ramadhan J. Mstafa

    Abstract: Gender classification is attractive in a range of applications, including surveillance and monitoring, corporate profiling, and human-computer interaction. Individuals' identities may be gleaned from information about their gender, which is a kind of soft biometric. Over the years, several methods for determining a person's gender have been devised. Some of the most well-known ones are based on ph… ▽ More

    Submitted 8 August, 2025; v1 submitted 7 August, 2025; originally announced August 2025.

    Comments: 13 Pages, 8 Figures, 1 Table

    Journal ref: Science Journal of University of Zakho, Vol. 10 No. 4 (2022)

  38. arXiv:2508.04165  [pdf, ps, other

    cs.LG

    Semi-Supervised Deep Domain Adaptation for Predicting Solar Power Across Different Locations

    Authors: Md Shazid Islam, A S M Jahid Hasan, Md Saydur Rahman, Md Saiful Islam Sajol

    Abstract: Accurate solar generation prediction is essential for proper estimation of renewable energy resources across diverse geographic locations. However, geographical and weather features vary from location to location which introduces domain shift - a major bottleneck to develop location-agnostic prediction model. As a result, a machine-learning model which can perform well to predict solar power in on… ▽ More

    Submitted 6 August, 2025; originally announced August 2025.

  39. arXiv:2508.00135  [pdf

    cs.CV cs.AI cs.LG

    Exploring the Feasibility of Deep Learning Techniques for Accurate Gender Classification from Eye Images

    Authors: Basna Mohammed Salih Hasan, Ramadhan J. Mstafa

    Abstract: Gender classification has emerged as a crucial aspect in various fields, including security, human-machine interaction, surveillance, and advertising. Nonetheless, the accuracy of this classification can be influenced by factors such as cosmetics and disguise. Consequently, our study is dedicated to addressing this concern by concentrating on gender classification using color images of the periocu… ▽ More

    Submitted 7 August, 2025; v1 submitted 31 July, 2025; originally announced August 2025.

    Comments: 12 pages, 18 figures, 5 tables

  40. arXiv:2506.23368  [pdf

    eess.SP

    Optimizing Solar Energy Production in the USA: Time-Series Analysis Using AI for Smart Energy Management

    Authors: Istiaq Ahmed, Md Asif Ul Hoq Khan, MD Zahedul Islam, Md Sakibul Hasan, Tanaya Jakir, Arat Hossain, Joynal Abed, Muhammad Hasanuzzaman, Sadia Sharmeen Shatyi, Kazi Nehal Hasnain

    Abstract: As the US rapidly moves towards cleaner energy sources, solar energy is fast becoming the pillar of its renewable energy mix. Even while solar energy is increasingly being used, its variability is a key hindrance to grid stability, storage efficiency, and system stability overall. Solar energy has emerged as one of the fastest-growing renewable energy sources in the United States, adding noticeabl… ▽ More

    Submitted 29 June, 2025; originally announced June 2025.

  41. arXiv:2506.22440  [pdf, other

    cs.CY cs.LG cs.MA econ.GN

    From Model Design to Organizational Design: Complexity Redistribution and Trade-Offs in Generative AI

    Authors: Sharique Hasan, Alexander Oettl, Sampsa Samila

    Abstract: This paper introduces the Generality-Accuracy-Simplicity (GAS) framework to analyze how large language models (LLMs) are reshaping organizations and competitive strategy. We argue that viewing AI as a simple reduction in input costs overlooks two critical dynamics: (a) the inherent trade-offs among generality, accuracy, and simplicity, and (b) the redistribution of complexity across stakeholders.… ▽ More

    Submitted 10 June, 2025; originally announced June 2025.

  42. arXiv:2506.04585  [pdf, ps, other

    cs.CL

    MuSciClaims: Multimodal Scientific Claim Verification

    Authors: Yash Kumar Lal, Manikanta Bandham, Mohammad Saqib Hasan, Apoorva Kashi, Mahnaz Koupaee, Niranjan Balasubramanian

    Abstract: Assessing scientific claims requires identifying, extracting, and reasoning with multimodal data expressed in information-rich figures in scientific literature. Despite the large body of work in scientific QA, figure captioning, and other multimodal reasoning tasks over chart-based data, there are no readily usable multimodal benchmarks that directly test claim verification abilities. To remedy th… ▽ More

    Submitted 29 July, 2025; v1 submitted 4 June, 2025; originally announced June 2025.

  43. arXiv:2506.03870  [pdf, ps, other

    cs.LG cs.CR

    Evaluating Apple Intelligence's Writing Tools for Privacy Against Large Language Model-Based Inference Attacks: Insights from Early Datasets

    Authors: Mohd. Farhan Israk Soumik, Syed Mhamudul Hasan, Abdur R. Shahid

    Abstract: The misuse of Large Language Models (LLMs) to infer emotions from text for malicious purposes, known as emotion inference attacks, poses a significant threat to user privacy. In this paper, we investigate the potential of Apple Intelligence's writing tools, integrated across iPhone, iPad, and MacBook, to mitigate these risks through text modifications such as rewriting and tone adjustment. By deve… ▽ More

    Submitted 4 June, 2025; originally announced June 2025.

  44. arXiv:2506.00419  [pdf, ps, other

    cs.CR cs.SE

    Teaching an Old LLM Secure Coding: Localized Preference Optimization on Distilled Preferences

    Authors: Mohammad Saqib Hasan, Saikat Chakraborty, Santu Karmaker, Niranjan Balasubramanian

    Abstract: LLM generated code often contains security issues. We address two key challenges in improving secure code generation. First, obtaining high quality training data covering a broad set of security issues is critical. To address this, we introduce a method for distilling a preference dataset of insecure and secure code pairs from frontier LLMs, along with a security reasoning that explains the issues… ▽ More

    Submitted 10 September, 2025; v1 submitted 31 May, 2025; originally announced June 2025.

    Comments: Accepted to ACL 2025 (Main)

  45. arXiv:2505.23938  [pdf, other

    cs.CR

    Digital Forensic Investigation of the ChatGPT Windows Application

    Authors: Malithi Wanniarachchi Kankanamge, Nick McKenna, Santiago Carmona, Syed Mhamudul Hasan, Abdur R. Shahid, Ahmed Imteaj

    Abstract: The ChatGPT Windows application offers better user interaction in the Windows operating system (OS) by enhancing productivity and streamlining the workflow of ChatGPT's utilization. However, there are potential misuses associated with this application that require rigorous forensic analysis. This study presents a holistic forensic analysis of the ChatGPT Windows application, focusing on identifyin… ▽ More

    Submitted 29 May, 2025; originally announced May 2025.

  46. arXiv:2505.18845  [pdf, ps, other

    cs.CL

    Multi-Party Conversational Agents: A Survey

    Authors: Sagar Sapkota, Mohammad Saqib Hasan, Mubarak Shah, Santu Karmaker

    Abstract: Multi-party Conversational Agents (MPCAs) are systems designed to engage in dialogue with more than two participants simultaneously. Unlike traditional two-party agents, designing MPCAs faces additional challenges due to the need to interpret both utterance semantics and social dynamics. This survey explores recent progress in MPCAs by addressing three key questions: 1) Can agents model each parti… ▽ More

    Submitted 24 May, 2025; originally announced May 2025.

  47. arXiv:2505.12651  [pdf, ps, other

    cs.AI

    $\texttt{DIAMONDs}$: A Dataset for $\mathbb{D}$ynamic $\mathbb{I}$nformation $\mathbb{A}$nd $\mathbb{M}$ental modeling $\mathbb{O}$f $\mathbb{N}$umeric $\mathbb{D}$iscussions

    Authors: Sayontan Ghosh, Mahnaz Koupaee, Yash Kumar Lal, Pegah Alipoormolabashi, Mohammad Saqib Hasan, Jun Seok Kang, Niranjan Balasubramanian

    Abstract: Understanding multiparty conversations demands robust Theory of Mind (ToM) capabilities, including the ability to track dynamic information, manage knowledge asymmetries, and distinguish relevant information across extended exchanges. To advance ToM evaluation in such settings, we present a carefully designed scalable methodology for generating high-quality benchmark conversation-question pairs wi… ▽ More

    Submitted 18 May, 2025; originally announced May 2025.

  48. arXiv:2505.06454  [pdf, ps, other

    cs.LG cs.CR

    Sponge Attacks on Sensing AI: Energy-Latency Vulnerabilities and Defense via Model Pruning

    Authors: Syed Mhamudul Hasan, Hussein Zangoti, Iraklis Anagnostopoulos, Abdur R. Shahid

    Abstract: Recent studies have shown that sponge attacks can significantly increase the energy consumption and inference latency of deep neural networks (DNNs). However, prior work has focused primarily on computer vision and natural language processing tasks, overlooking the growing use of lightweight AI models in sensing-based applications on resource-constrained devices, such as those in Internet of Thing… ▽ More

    Submitted 9 May, 2025; originally announced May 2025.

  49. arXiv:2505.03593  [pdf, other

    cs.CY

    A Unifying Bias-aware Multidisciplinary Framework for Investigating Socio-Technical Issues

    Authors: Sacha Hasan, Mehdi Rizvi, Yingfang Yuan, Kefan Chen, Lynne Baillie, Wei Pang

    Abstract: This paper aims to bring together the disciplines of social science (SS) and computer science (CS) in the design and implementation of a novel multidisciplinary framework for systematic, transparent, ethically-informed, and bias-aware investigation of socio-technical issues. For this, various analysis approaches from social science and machine learning (ML) were applied in a structured sequence to… ▽ More

    Submitted 6 May, 2025; originally announced May 2025.

    Comments: First two authors with equal contribution

  50. arXiv:2505.02128  [pdf, ps, other

    math.NT

    Four new classes of permutation trinomials and their compositional inverses

    Authors: Sartaj Ul Hasan, Ramandeep Kaur, Hridesh Kumar

    Abstract: We construct four new classes of permutation trinomials over the cubic extension of a finite field with even characteristic. Additionally, we explicitly provide the compositional inverse of each class of permutation trinomials in polynomial form. Furthermore, we derive the compositional inverse of the permutation trinomial $αX^{q(q^2 - q + 1)} + βX^{q^2 - q + 1} + 2X$ for $α= 1$ and $β= 1$, origin… ▽ More

    Submitted 4 May, 2025; originally announced May 2025.