Skip to main content

Showing 1–50 of 157 results for author: Hossain, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2604.06715  [pdf, ps, other

    cs.CV cs.AI

    HQF-Net: A Hybrid Quantum-Classical Multi-Scale Fusion Network for Remote Sensing Image Segmentation

    Authors: Md Aminur Hossain, Ayush V. Patel, Siddhant Gole, Sanjay K. Singh, Biplab Banerjee

    Abstract: Remote sensing semantic segmentation requires models that can jointly capture fine spatial details and high-level semantic context across complex scenes. While classical encoder-decoder architectures such as U-Net remain strong baselines, they often struggle to fully exploit global semantics and structured feature interactions. In this work, we propose HQF-Net, a hybrid quantum-classical multi-sca… ▽ More

    Submitted 8 April, 2026; originally announced April 2026.

    Comments: 17 pages

    Journal ref: IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2026

  2. arXiv:2604.06072  [pdf, ps, other

    math.QA cs.IT math.FA quant-ph

    A multigraph approach to confusability in quantum channels

    Authors: Sk Asfaq Hossain, Angshuman Bhattacharya

    Abstract: We introduce a new approach to confusability in a quantum channel, namely quantum confusability multigraph, which incorporates the output information into the graphical structure. By``counting" the edges between two vertices of this confusability multigraph, one recovers the traditional confusability ``single-edged" graph of the channel. With this physical motivation, we therefore develop a theory… ▽ More

    Submitted 7 April, 2026; originally announced April 2026.

    MSC Class: 46L07; 81P45; 46L08; 05C90

  3. arXiv:2604.05371  [pdf, ps, other

    cs.AI

    LLM-as-Judge for Semantic Judging of Powerline Segmentation in UAV Inspection

    Authors: Akram Hossain, Rabab Abdelfattah, Xiaofeng Wang, Kareem Abdelfatah

    Abstract: The deployment of lightweight segmentation models on drones for autonomous power line inspection presents a critical challenge: maintaining reliable performance under real-world conditions that differ from training data. Although compact architectures such as U-Net enable real-time onboard inference, their segmentation outputs can degrade unpredictably in adverse environments, raising safety conce… ▽ More

    Submitted 6 April, 2026; originally announced April 2026.

    Comments: 10 pages

  4. arXiv:2603.21359  [pdf, ps, other

    cs.CL cs.AI cs.CY

    Benchmarking Bengali Dialectal Bias: A Multi-Stage Framework Integrating RAG-Based Translation and Human-Augmented RLAIF

    Authors: K. M. Jubair Sami, Dipto Sumit, Ariyan Hossain, Farig Sadeque

    Abstract: Large language models (LLMs) frequently exhibit performance biases against regional dialects of low-resource languages. However, frameworks to quantify these disparities remain scarce. We propose a two-phase framework to evaluate dialectal bias in LLM question-answering across nine Bengali dialects. First, we translate and gold-label standard Bengali questions into dialectal variants adopting a re… ▽ More

    Submitted 22 March, 2026; originally announced March 2026.

    Comments: 12 pages, 1 figure, 5 tables

    ACM Class: I.2.7; K.4.2

  5. arXiv:2603.18238  [pdf, ps, other

    cs.RO

    ReDAG-RT: Global Rate-Priority Scheduling for Real-Time Multi-DAG Execution in ROS 2

    Authors: Md. Mehedi Hasan, Rafid Mostafiz, Bikash Kumar Paul, Md. Abir Hossain, Ziaur Rahman

    Abstract: ROS 2 has become a dominant middleware for robotic systems, where perception, estimation, planning, and control pipelines are structured as directed acyclic graphs of callbacks executed under a shared executor. However, default ROS 2 executors use best-effort dispatch without cross-DAG priority enforcement, leading to callback contention, structural priority inversion, and deadline instability und… ▽ More

    Submitted 18 March, 2026; originally announced March 2026.

    Comments: 12 pages, 6 figures

  6. arXiv:2602.07015  [pdf, ps, other

    cs.CV eess.IV

    Robust and Real-Time Bangladeshi Currency Recognition: A Dual-Stream MobileNet and EfficientNet Approach

    Authors: Subreena, Mohammad Amzad Hossain, Mirza Raquib, Saydul Akbar Murad, Farida Siddiqi Prity, Muhammad Hanif, Nick Rahimi

    Abstract: Accurate currency recognition is essential for assistive technologies, particularly for visually impaired individuals who rely on others to identify banknotes. This dependency puts them at risk of fraud and exploitation. To address these challenges, we first build a new Bangladeshi banknote dataset that includes both controlled and real-world scenarios, ensuring a more comprehensive and diverse re… ▽ More

    Submitted 13 February, 2026; v1 submitted 31 January, 2026; originally announced February 2026.

  7. arXiv:2601.06937  [pdf, ps, other

    cs.AI cs.LG

    mind_call: A Dataset for Mental Health Function Calling with Large Language Models

    Authors: Fozle Rabbi Shafi, M. Anwar Hossain, Salimur Choudhury

    Abstract: Large Language Model (LLM)-based systems increasingly rely on function calling to enable structured and controllable interaction with external data sources, yet existing datasets do not address mental health-oriented access to wearable sensor data. This paper presents a synthetic function-calling dataset designed for mental health assistance grounded in wearable health signals such as sleep, physi… ▽ More

    Submitted 11 January, 2026; originally announced January 2026.

  8. arXiv:2601.02928  [pdf, ps, other

    cs.CV

    HybridSolarNet: A Lightweight and Explainable EfficientNet-CBAM Architecture for Real-Time Solar Panel Fault Detection

    Authors: Md. Asif Hossain, G M Mota-Tahrin Tayef, Nabil Subhan

    Abstract: Manual inspections for solar panel systems are a tedious, costly, and error-prone task, making it desirable for Unmanned Aerial Vehicle (UAV) based monitoring. Though deep learning models have excellent fault detection capabilities, almost all methods either are too large and heavy for edge computing devices or involve biased estimation of accuracy due to ineffective learning techniques. We propos… ▽ More

    Submitted 6 January, 2026; originally announced January 2026.

    Comments: 5 page , 6 figures

  9. arXiv:2601.02766  [pdf

    cs.RO cs.AR

    Advancing Assistive Robotics: Multi-Modal Navigation and Biophysical Monitoring for Next-Generation Wheelchairs

    Authors: Md. Anowar Hossain, Mohd. Ehsanul Hoque

    Abstract: Assistive electric-powered wheelchairs (EPWs) have become essential mobility aids for people with disabilities such as amyotrophic lateral sclerosis (ALS), post-stroke hemiplegia, and dementia-related mobility impairment. This work presents a novel multi-modal EPW control system designed to prioritize patient needs while allowing seamless switching between control modes. Four complementary interfa… ▽ More

    Submitted 6 January, 2026; originally announced January 2026.

  10. arXiv:2601.02065  [pdf, ps, other

    cs.CL cs.AI

    Cost-Efficient Cross-Lingual Retrieval-Augmented Generation for Low-Resource Languages: A Case Study in Bengali Agricultural Advisory

    Authors: Md. Asif Hossain, Nabil Subhan, Mantasha Rahman Mahi, Jannatul Ferdous Nabila

    Abstract: Access to reliable agricultural advisory remains limited in many developing regions due to a persistent language barrier: authoritative agricultural manuals are predominantly written in English, while farmers primarily communicate in low-resource local languages such as Bengali. Although recent advances in Large Language Models (LLMs) enable natural language interaction, direct generation in low-r… ▽ More

    Submitted 5 January, 2026; originally announced January 2026.

    Comments: 5 pages, 3 figures, 1 table

  11. arXiv:2601.01689  [pdf, ps, other

    cs.CV

    Mitigating Longitudinal Performance Degradation in Child Face Recognition Using Synthetic Data

    Authors: Afzal Hossain, Stephanie Schuckers

    Abstract: Longitudinal face recognition in children remains challenging due to rapid and nonlinear facial growth, which causes template drift and increasing verification errors over time. This work investigates whether synthetic face data can act as a longitudinal stabilizer by improving temporal robustness of child face recognition models. Using an identity disjoint protocol on the Young Face Aging (YFA) d… ▽ More

    Submitted 4 January, 2026; originally announced January 2026.

  12. arXiv:2601.01680  [pdf, ps, other

    cs.CV

    Evaluating Deep Learning-Based Face Recognition for Infants and Toddlers: Impact of Age Across Developmental Stages

    Authors: Afzal Hossain, Mst Rumana Sumi, Stephanie Schuckers

    Abstract: Face recognition for infants and toddlers presents unique challenges due to rapid facial morphology changes, high inter-class similarity, and limited dataset availability. This study evaluates the performance of four deep learning-based face recognition models FaceNet, ArcFace, MagFace, and CosFace on a newly developed longitudinal dataset collected over a 24 month period in seven sessions involvi… ▽ More

    Submitted 4 January, 2026; originally announced January 2026.

    Comments: Accepted and presented at IEEE IJCB 2025 conference; final published version forthcoming

  13. arXiv:2601.00501  [pdf, ps, other

    cs.CV

    CPPO: Contrastive Perception for Vision Language Policy Optimization

    Authors: Ahmad Rezaei, Mohsen Gholami, Saeed Ranjbar Alvar, Kevin Cannons, Mohammad Asiful Hossain, Zhou Weimin, Shunbo Zhou, Yong Zhang, Mohammad Akbari

    Abstract: We introduce CPPO, a Contrastive Perception Policy Optimization method for finetuning vision-language models (VLMs). While reinforcement learning (RL) has advanced reasoning in language models, extending it to multimodal reasoning requires improving both the perception and reasoning aspects. Prior works tackle this challenge mainly with explicit perception rewards, but disentangling perception tok… ▽ More

    Submitted 1 January, 2026; originally announced January 2026.

  14. arXiv:2512.22205  [pdf

    cs.CV cs.CL

    A CNN-Based Malaria Diagnosis from Blood Cell Images with SHAP and LIME Explainability

    Authors: Md. Ismiel Hossen Abir, Awolad Hossain

    Abstract: Malaria remains a prevalent health concern in regions with tropical and subtropical climates. The cause of malaria is the Plasmodium parasite, which is transmitted through the bites of infected female Anopheles mosquitoes. Traditional diagnostic methods, such as microscopic blood smear analysis, are low in sensitivity, depend on expert judgment, and require resources that may not be available in r… ▽ More

    Submitted 21 December, 2025; originally announced December 2025.

  15. arXiv:2512.17394  [pdf, ps, other

    cs.CL cs.CV cs.CY

    Are Vision Language Models Cross-Cultural Theory of Mind Reasoners?

    Authors: Zabir Al Nazi, GM Shahariar, Md. Abrar Hossain, Wei Peng

    Abstract: Theory of Mind (ToM) - the ability to attribute beliefs and intents to others - is fundamental for social intelligence, yet Vision-Language Model (VLM) evaluations remain largely Western-centric. In this work, we introduce CulturalToM-VQA, a benchmark of 5,095 visually situated ToM probes across diverse cultural contexts, rituals, and social norms. Constructed through a frontier proprietary MLLM,… ▽ More

    Submitted 7 January, 2026; v1 submitted 19 December, 2025; originally announced December 2025.

  16. arXiv:2512.14179  [pdf, ps, other

    cs.CL cs.AI cs.IR

    A Comparative Analysis of Retrieval-Augmented Generation Techniques for Bengali Standard-to-Dialect Machine Translation Using LLMs

    Authors: K. M. Jubair Sami, Dipto Sumit, Ariyan Hossain, Farig Sadeque

    Abstract: Translating from a standard language to its regional dialects is a significant NLP challenge due to scarce data and linguistic variation, a problem prominent in the Bengali language. This paper proposes and compares two novel RAG pipelines for standard-to-dialectal Bengali translation. The first, a Transcript-Based Pipeline, uses large dialect sentence contexts from audio transcripts. The second,… ▽ More

    Submitted 16 December, 2025; originally announced December 2025.

    Comments: Accepted to the Second Workshop on Bangla Language Processing (BLP) at IJCNLP-AACL 2025. 14 pages, 9 figures, 6 tables

    ACM Class: I.2.7

  17. arXiv:2512.05907  [pdf, ps, other

    cs.CE

    From Text to Returns: Using Large Language Models for Mutual Fund Portfolio Optimization and Risk-Adjusted Allocation

    Authors: Abrar Hossain, Mufakir Qamar Ansari, Haziq Jeelani, Monia Digra, Fayeq Jeelani Syed

    Abstract: Generative AI (GenAI) has enormous potential for improving two critical areas in investing, namely portfolio optimization (choosing the best combination of assets) and risk management (protecting those investments). Our study works at this intersection, using Large Language Models (LLMs) to upgrade how financial decisions are traditionally made. This research specifically tested how well advanced… ▽ More

    Submitted 5 December, 2025; originally announced December 2025.

  18. arXiv:2512.05277  [pdf, ps, other

    cs.CV cs.AI

    From Segments to Scenes: Temporal Understanding in Autonomous Driving via Vision-Language Model

    Authors: Kevin Cannons, Saeed Ranjbar Alvar, Mohammad Asiful Hossain, Ahmad Rezaei, Mohsen Gholami, Alireza Heidarikhazaei, Zhou Weimin, Yong Zhang, Mohammad Akbari

    Abstract: Temporal understanding in autonomous driving (AD) remains a significant challenge, even for recent state-of-the-art (SoTA) Vision-Language Models (VLMs). Prior work has introduced datasets and benchmarks aimed at improving temporal reasoning, but these have emphasized other video content, including sports, cooking, and movies. No existing benchmark focuses exclusively on the unique challenges of t… ▽ More

    Submitted 16 December, 2025; v1 submitted 4 December, 2025; originally announced December 2025.

  19. arXiv:2512.03943  [pdf, ps, other

    cs.CL cs.HC

    Is Lying Only Sinful in Islam? Exploring Religious Bias in Multilingual Large Language Models Across Major Religions

    Authors: Kazi Abrab Hossain, Jannatul Somiya Mahmud, Maria Hossain Tuli, Anik Mitra, S. M. Taiabul Haque, Farig Y. Sadeque

    Abstract: While recent developments in large language models have improved bias detection and classification, sensitive subjects like religion still present challenges because even minor errors can result in severe misunderstandings. In particular, multilingual models often misrepresent religions and have difficulties being accurate in religious contexts. To address this, we introduce BRAND: Bilingual Relig… ▽ More

    Submitted 3 December, 2025; originally announced December 2025.

    Comments: 18 pages, 7 figures

  20. arXiv:2512.00325  [pdf, ps, other

    cs.SE cs.AI cs.CL

    Progressive Code Integration for Abstractive Bug Report Summarization

    Authors: Shaira Sadia Karim, Abrar Mahmud Rahim, Lamia Alam, Ishmam Tashdeed, Lutfun Nahar Lota, Md. Abu Raihan M. Kamal, Md. Azam Hossain

    Abstract: Bug reports are often unstructured and verbose, making it challenging for developers to efficiently comprehend software issues. Existing summarization approaches typically rely on surface-level textual cues, resulting in incomplete or redundant summaries, and they frequently ignore associated code snippets, which are essential for accurate defect diagnosis. To address these limitations, we propose… ▽ More

    Submitted 29 November, 2025; originally announced December 2025.

  21. arXiv:2511.18847  [pdf, ps, other

    cs.CV cs.AI

    Personalized Federated Segmentation with Shared Feature Aggregation and Boundary-Focused Calibration

    Authors: Ishmam Tashdeed, Md. Atiqur Rahman, Sabrina Islam, Md. Azam Hossain

    Abstract: Personalized federated learning (PFL) possesses the unique capability of preserving data confidentiality among clients while tackling the data heterogeneity problem of non-independent and identically distributed (Non-IID) data. Its advantages have led to widespread adoption in domains such as medical image segmentation. However, the existing approaches mostly overlook the potential benefits of lev… ▽ More

    Submitted 24 November, 2025; originally announced November 2025.

  22. arXiv:2511.18618  [pdf, ps, other

    cs.CL cs.AI

    A Unified BERT-CNN-BiLSTM Framework for Simultaneous Headline Classification and Sentiment Analysis of Bangla News

    Authors: Mirza Raquib, Munazer Montasir Akash, Tawhid Ahmed, Saydul Akbar Murad, Farida Siddiqi Prity, Mohammad Amzad Hossain, Asif Pervez Polok, Nick Rahimi

    Abstract: In our daily lives, newspapers are an essential information source that impacts how the public talks about present-day issues. However, effectively navigating the vast amount of news content from different newspapers and online news portals can be challenging. Newspaper headlines with sentiment analysis tell us what the news is about (e.g., politics, sports) and how the news makes us feel (positiv… ▽ More

    Submitted 23 November, 2025; originally announced November 2025.

  23. arXiv:2511.00519  [pdf, ps, other

    cs.CL

    Exploring and Mitigating Gender Bias in Encoder-Based Transformer Models

    Authors: Ariyan Hossain, Khondokar Mohammad Ahanaf Hannan, Rakinul Haque, Nowreen Tarannum Rafa, Humayra Musarrat, Shoaib Ahmed Dipu, Farig Yousuf Sadeque

    Abstract: Gender bias in language models has gained increasing attention in the field of natural language processing. Encoder-based transformer models, which have achieved state-of-the-art performance in various language tasks, have been shown to exhibit strong gender biases inherited from their training data. This paper investigates gender bias in contextualized word embeddings, a crucial component of tran… ▽ More

    Submitted 1 November, 2025; originally announced November 2025.

    Comments: 25 pages, 20 figures

    ACM Class: I.2.7; I.7.1; K.4.1

  24. arXiv:2510.24096  [pdf

    cs.CL

    RegSpeech12: A Regional Corpus of Bengali Spontaneous Speech Across Dialects

    Authors: Md. Rezuwan Hassan, Azmol Hossain, Kanij Fatema, Rubayet Sabbir Faruque, Tanmoy Shome, Ruwad Naswan, Trina Chakraborty, Md. Foriduzzaman Zihad, Tawsif Tashwar Dipto, Nazia Tasnim, Nazmuddoha Ansary, Md. Mehedi Hasan Shawon, Ahmed Imtiaz Humayun, Md. Golam Rabiul Alam, Farig Sadeque, Asif Sushmit

    Abstract: The Bengali language, spoken extensively across South Asia and among diasporic communities, exhibits considerable dialectal diversity shaped by geography, culture, and history. Phonological and pronunciation-based classifications broadly identify five principal dialect groups: Eastern Bengali, Manbhumi, Rangpuri, Varendri, and Rarhi. Within Bangladesh, further distinctions emerge through variation… ▽ More

    Submitted 28 October, 2025; originally announced October 2025.

    Comments: 26 pages

  25. arXiv:2510.23252   

    cs.CL

    Are ASR foundation models generalized enough to capture features of regional dialects for low-resource languages?

    Authors: Tawsif Tashwar Dipto, Azmol Hossain, Rubayet Sabbir Faruque, Md. Rezuwan Hassan, Kanij Fatema, Tanmoy Shome, Ruwad Naswan, Md. Foriduzzaman Zihad, Mohaymen Ul Anam, Nazia Tasnim, Hasan Mahmud, Md Kamrul Hasan, Md. Mehedi Hasan Shawon, Farig Sadeque, Tahsin Reasat

    Abstract: Conventional research on speech recognition modeling relies on the canonical form for most low-resource languages while automatic speech recognition (ASR) for regional dialects is treated as a fine-tuning task. To investigate the effects of dialectal variations on ASR we develop a 78-hour annotated Bengali Speech-to-Text (STT) corpus named Ben-10. Investigation from linguistic and data-driven pers… ▽ More

    Submitted 29 October, 2025; v1 submitted 27 October, 2025; originally announced October 2025.

    Comments: The manuscript has to be withdrawn to address an authorship and intellectual property clarification

  26. arXiv:2510.22628  [pdf, ps, other

    cs.CR cs.AI

    Sentra-Guard: A Multilingual Human-AI Framework for Real-Time Defense Against Adversarial LLM Jailbreaks

    Authors: Md. Mehedi Hasan, Ziaur Rahman, Rafid Mostafiz, Md. Abir Hossain

    Abstract: This paper presents a real-time modular defense system named Sentra-Guard. The system detects and mitigates jailbreak and prompt injection attacks targeting large language models (LLMs). The framework uses a hybrid architecture with FAISS-indexed SBERT embedding representations that capture the semantic meaning of prompts, combined with fine-tuned transformer classifiers, which are machine learnin… ▽ More

    Submitted 26 October, 2025; originally announced October 2025.

    Comments: 11 pages, 5 figures. Preprint version under review in the area of Artificial Intelligence (cs.AI)

  27. arXiv:2510.22609  [pdf, ps, other

    cs.AI

    CLIN-LLM: A Safety-Constrained Hybrid Framework for Clinical Diagnosis and Treatment Generation

    Authors: Md. Mehedi Hasan, Rafid Mostafiz, Md. Abir Hossain, Bikash Kumar Paul

    Abstract: Accurate symptom-to-disease classification and clinically grounded treatment recommendations remain challenging, particularly in heterogeneous patient settings with high diagnostic risk. Existing large language model (LLM)-based systems often lack medical grounding and fail to quantify uncertainty, resulting in unsafe outputs. We propose CLIN-LLM, a safety-constrained hybrid pipeline that integrat… ▽ More

    Submitted 26 October, 2025; originally announced October 2025.

    Comments: 13 pages, 9 figures. Preprint version under review in the area of Artificial Intelligence (cs.CR)

  28. arXiv:2510.20611  [pdf, ps, other

    cs.LG cs.AI

    PSO-XAI: A PSO-Enhanced Explainable AI Framework for Reliable Breast Cancer Detection

    Authors: Mirza Raquib, Niloy Das, Farida Siddiqi Prity, Arafath Al Fahim, Saydul Akbar Murad, Mohammad Amzad Hossain, MD Jiabul Hoque, Mohammad Ali Moni

    Abstract: Breast cancer is considered the most critical and frequently diagnosed cancer in women worldwide, leading to an increase in cancer-related mortality. Early and accurate detection is crucial as it can help mitigate possible threats while improving survival rates. In terms of prediction, conventional diagnostic methods are often limited by variability, cost, and, most importantly, risk of misdiagnos… ▽ More

    Submitted 23 October, 2025; originally announced October 2025.

  29. arXiv:2510.18519  [pdf, ps, other

    cs.SE

    Mining Service Behavior for Stateful Service Emulation

    Authors: Md Arafat Hossain, Jun Han, Muhammad Ashad Kabir, Steve Versteeg, Jean-Guy Schneider, Jiaojiao Jiang

    Abstract: Enterprise software systems are increasingly integrating with diverse services to meet expanding business demands. Testing these highly interconnected systems presents a challenge due to the need for access to the connected services. Service virtualization has emerged as a widely used technique to derive service models from recorded interactions, for service response generation during system testi… ▽ More

    Submitted 21 October, 2025; originally announced October 2025.

    Comments: 19 pages

  30. arXiv:2510.10121  [pdf, ps, other

    cs.CV

    Multi Class Parkinson Disease Detection Based on Finger Tapping Using Attention Enhanced CNN BiLSTM

    Authors: Abu Saleh Musa Miah, Najmul Hassan, Md Maruf Al Hossain, Yuichi Okuyama, Jungpil Shin

    Abstract: Accurate evaluation of Parkinsons disease (PD) severity is essential for effective clinical management and intervention development. Despite the proposal of several gesture based PD recognition systems, including those using the finger tapping task to assess Parkinsonian symptoms, their performance remains unsatisfactory. In this study, we present a multi class PD detection system based on finger-… ▽ More

    Submitted 11 November, 2025; v1 submitted 11 October, 2025; originally announced October 2025.

  31. arXiv:2510.08084  [pdf

    cs.CR cs.AI cs.LG

    A Novel Ensemble Learning Approach for Enhanced IoT Attack Detection: Redefining Security Paradigms in Connected Systems

    Authors: Hikmat A. M. Abdeljaber, Md. Alamgir Hossain, Sultan Ahmad, Ahmed Alsanad, Md Alimul Haque, Sudan Jha, Jabeen Nazeer

    Abstract: The rapid expansion of Internet of Things (IoT) devices has transformed industries and daily life by enabling widespread connectivity and data exchange. However, this increased interconnection has introduced serious security vulnerabilities, making IoT systems more exposed to sophisticated cyber attacks. This study presents a novel ensemble learning architecture designed to improve IoT attack dete… ▽ More

    Submitted 9 October, 2025; originally announced October 2025.

    Comments: 14 pages, 5 fiugres, 7 tables

    Report number: 2510.08084

    Journal ref: Human-centric Computing and Information Sciences, 2026

  32. CST-AFNet: A dual attention-based deep learning framework for intrusion detection in IoT networks

    Authors: Waqas Ishtiaq, Ashrafun Zannat, A. H. M. Shahariar Parvez, Md. Alamgir Hossain, Muntasir Hasan Kanchan, Muhammad Masud Tarek

    Abstract: The rapid expansion of the Internet of Things (IoT) has revolutionized modern industries by enabling smart automation and real time connectivity. However, this evolution has also introduced complex cybersecurity challenges due to the heterogeneous, resource constrained, and distributed nature of these environments. To address these challenges, this research presents CST AFNet, a novel dual attenti… ▽ More

    Submitted 3 October, 2025; originally announced October 2025.

    Comments: 9 pages, 9 figures, 5 tables

    Report number: 2510.02717

    Journal ref: CST-AFNet: A dual attention-based deep learning framework for intrusion detection in IoT networks, Array, volume = 27, year = 2025

  33. arXiv:2510.02711  [pdf

    cs.LG cs.AI cs.CR

    A Novel Unified Lightweight Temporal-Spatial Transformer Approach for Intrusion Detection in Drone Networks

    Authors: Tarun Kumar Biswas, Ashrafun Zannat, Waqas Ishtiaq, Md. Alamgir Hossain

    Abstract: The growing integration of drones across commercial, industrial, and civilian domains has introduced significant cybersecurity challenges, particularly due to the susceptibility of drone networks to a wide range of cyberattacks. Existing intrusion detection mechanisms often lack the adaptability, efficiency, and generalizability required for the dynamic and resource constrained environments in whi… ▽ More

    Submitted 3 October, 2025; originally announced October 2025.

    Comments: 21 pages, 18 figures, 5 tables

    Report number: 2510.02711

    Journal ref: Scientific Reports, 2026

  34. Similarity-Based Assessment of Computational Reproducibility in Jupyter Notebooks

    Authors: A S M Shahadat Hossain, Colin Brown, David Koop, Tanu Malik

    Abstract: Computational reproducibility refers to obtaining consistent results when rerunning an experiment. Jupyter Notebook, a web-based computational notebook application, facilitates running, publishing, and sharing computational experiments along with their results. However, rerunning a Jupyter Notebook may not always generate identical results due to various factors, such as randomness, changes in lib… ▽ More

    Submitted 28 September, 2025; originally announced September 2025.

    Comments: 10 pages

    Report number: RADIANT-25-03

    Journal ref: ACM Conference on Reproducibility and Replicability, 2025

  35. arXiv:2509.22873  [pdf, ps, other

    cs.CR

    AntiFLipper: A Secure and Efficient Defense Against Label-Flipping Attacks in Federated Learning

    Authors: Aashnan Rahman, Abid Hasan, Sherajul Arifin, Faisal Haque Bappy, Tahrim Hossain, Tariqul Islam, Abu Raihan Mostofa Kamal, Md. Azam Hossain

    Abstract: Federated learning (FL) enables privacy-preserving model training by keeping data decentralized. However, it remains vulnerable to label-flipping attacks, where malicious clients manipulate labels to poison the global model. Despite their simplicity, these attacks can severely degrade model performance, and defending against them remains challenging. We introduce AntiFLipper, a novel and computati… ▽ More

    Submitted 30 September, 2025; v1 submitted 26 September, 2025; originally announced September 2025.

    Comments: 6 pages

  36. A Comparative Analysis of Ensemble-Based Machine Learning Approaches with Explainable AI for Multi-Class Intrusion Detection in Drone Networks

    Authors: Md. Alamgir Hossain, Waqas Ishtiaq, Md. Samiul Islam

    Abstract: The growing integration of drones into civilian, commercial, and defense sectors introduces significant cybersecurity concerns, particularly with the increased risk of network-based intrusions targeting drone communication protocols. Detecting and classifying these intrusions is inherently challenging due to the dynamic nature of drone traffic and the presence of multiple sophisticated attack vect… ▽ More

    Submitted 22 September, 2025; originally announced September 2025.

    Comments: 27 pages, 18 figures, 10 tables

    Report number: 2509.20391

    Journal ref: SECURITY AND PRIVACY, 2025

  37. arXiv:2509.14285  [pdf, ps, other

    cs.CR cs.LG

    A Multi-Agent LLM Defense Pipeline Against Prompt Injection Attacks

    Authors: S M Asif Hossain, Ruksat Khan Shayoni, Mohd Ruhul Ameen, Akif Islam, M. F. Mridha, Jungpil Shin

    Abstract: Prompt injection attacks represent a major vulnerability in Large Language Model (LLM) deployments, where malicious instructions embedded in user inputs can override system prompts and induce unintended behaviors. This paper presents a novel multi-agent defense framework that employs specialized LLM agents in coordinated pipelines to detect and neutralize prompt injection attacks in real-time. We… ▽ More

    Submitted 17 December, 2025; v1 submitted 16 September, 2025; originally announced September 2025.

    Comments: Accepted at the 11th IEEE WIECON-ECE 2025

  38. arXiv:2508.17985  [pdf, ps, other

    cs.RO

    Integration of Computer Vision with Adaptive Control for Autonomous Driving Using ADORE

    Authors: Abu Shad Ahammed, Md Shahi Amran Hossain, Sayeri Mukherjee, Roman Obermaisser, Md. Ziaur Rahman

    Abstract: Ensuring safety in autonomous driving requires a seamless integration of perception and decision making under uncertain conditions. Although computer vision (CV) models such as YOLO achieve high accuracy in detecting traffic signs and obstacles, their performance degrades in drift scenarios caused by weather variations or unseen objects. This work presents a simulated autonomous driving system tha… ▽ More

    Submitted 2 September, 2025; v1 submitted 25 August, 2025; originally announced August 2025.

  39. arXiv:2508.17975  [pdf, ps, other

    cs.CV math.LO

    Enhanced Drift-Aware Computer Vision Architecture for Autonomous Driving

    Authors: Md Shahi Amran Hossain, Abu Shad Ahammed, Sayeri Mukherjee, Roman Obermaisser

    Abstract: The use of computer vision in automotive is a trending research in which safety and security are a primary concern. In particular, for autonomous driving, preventing road accidents requires highly accurate object detection under diverse conditions. To address this issue, recently the International Organization for Standardization (ISO) released the 8800 norm, providing structured frameworks for ma… ▽ More

    Submitted 25 August, 2025; originally announced August 2025.

  40. arXiv:2508.06617  [pdf, ps, other

    cs.LG cs.AI cs.PF

    Generalizing Scaling Laws for Dense and Sparse Large Language Models

    Authors: Md Arafat Hossain, Xingfu Wu, Valerie Taylor, Ali Jannesari

    Abstract: Despite recent advancements of large language models (LLMs), optimally predicting the model size for LLM pretraining or allocating optimal resources still remains a challenge. Several efforts have addressed the challenge by proposing different empirical scaling laws, but almost all of them are architecture-specific (dense or sparse). In this work we revisit existing empirical scaling laws and prop… ▽ More

    Submitted 9 February, 2026; v1 submitted 8 August, 2025; originally announced August 2025.

    Comments: 8 pages, 8 figures

  41. arXiv:2508.06321  [pdf, ps, other

    cs.SD cs.HC cs.LG

    EmoAugNet: A Signal-Augmented Hybrid CNN-LSTM Framework for Speech Emotion Recognition

    Authors: Durjoy Chandra Paul, Gaurob Saha, Md Amjad Hossain

    Abstract: Recognizing emotional signals in speech has a significant impact on enhancing the effectiveness of human-computer interaction (HCI). This study introduces EmoAugNet, a hybrid deep learning framework, that incorporates Long Short-Term Memory (LSTM) layers with one-dimensional Convolutional Neural Networks (1D-CNN) to enable reliable Speech Emotion Recognition (SER). The quality and variety of the f… ▽ More

    Submitted 6 August, 2025; originally announced August 2025.

    Comments: To be published in ICCCNT 2025 (16th International Conference on Computing Communication and Networking Technologies)

  42. arXiv:2508.02947  [pdf, ps, other

    cs.RO cs.AI

    AeroSafe: Mobile Indoor Air Purification using Aerosol Residence Time Analysis and Robotic Cough Emulator Testbed

    Authors: M Tanjid Hasan Tonmoy, Rahath Malladi, Kaustubh Singh, Forsad Al Hossain, Rajesh Gupta, Andrés E. Tejada-Martínez, Tauhidur Rahman

    Abstract: Indoor air quality plays an essential role in the safety and well-being of occupants, especially in the context of airborne diseases. This paper introduces AeroSafe, a novel approach aimed at enhancing the efficacy of indoor air purification systems through a robotic cough emulator testbed and a digital-twins-based aerosol residence time analysis. Current portable air filters often overlook the co… ▽ More

    Submitted 4 August, 2025; originally announced August 2025.

    Comments: Accepted at IEEE International Conference on Robotics and Automation (ICRA) 2025. Author Accepted Manuscript

  43. arXiv:2508.01422  [pdf

    cs.CR

    AI-Driven Cybersecurity Threat Detection: Building Resilient Defense Systems Using Predictive Analytics

    Authors: Biswajit Chandra Das, M Saif Sartaz, Syed Ali Reza, Arat Hossain, Md Nasiruddin, Kanchon Kumar Bishnu, Kazi Sharmin Sultana, Sadia Sharmeen Shatyi, MD Azam Khan, Joynal Abed

    Abstract: This study examines how Artificial Intelligence can aid in identifying and mitigating cyber threats in the U.S. across four key areas: intrusion detection, malware classification, phishing detection, and insider threat analysis. Each of these problems has its quirks, meaning there needs to be different approaches to each, so we matched the models to the shape of the problem. For intrusion detectio… ▽ More

    Submitted 2 August, 2025; originally announced August 2025.

  44. arXiv:2507.15915  [pdf, ps, other

    cs.CV

    An empirical study for the early detection of Mpox from skin lesion images using pretrained CNN models leveraging XAI technique

    Authors: Mohammad Asifur Rahim, Muhammad Nazmul Arefin, Md. Mizanur Rahman, Md Ali Hossain, Ahmed Moustafa

    Abstract: Context: Mpox is a zoonotic disease caused by the Mpox virus, which shares similarities with other skin conditions, making accurate early diagnosis challenging. Artificial intelligence (AI), especially Deep Learning (DL), has a strong tool for medical image analysis; however, pre-trained models like CNNs and XAI techniques for mpox detection is underexplored. Objective: This study aims to evaluate… ▽ More

    Submitted 21 July, 2025; originally announced July 2025.

  45. arXiv:2507.14322  [pdf, ps, other

    cs.LG cs.CR cs.DC

    FedStrategist: A Meta-Learning Framework for Adaptive and Robust Aggregation in Federated Learning

    Authors: Md Rafid Haque, Abu Raihan Mostofa Kamal, Md. Azam Hossain

    Abstract: Federated Learning (FL) offers a paradigm for privacy-preserving collaborative AI, but its decentralized nature creates significant vulnerabilities to model poisoning attacks. While numerous static defenses exist, their effectiveness is highly context-dependent, often failing against adaptive adversaries or in heterogeneous data environments. This paper introduces FedStrategist, a novel meta-learn… ▽ More

    Submitted 28 July, 2025; v1 submitted 18 July, 2025; originally announced July 2025.

    Comments: 24 pages, 8 figures. This work is intended for a journal submission

    ACM Class: I.2.11; C.2.4; K.6.5

  46. arXiv:2507.08165  [pdf, ps, other

    cs.CV cs.RO

    An Embedded Real-time Object Alert System for Visually Impaired: A Monocular Depth Estimation based Approach through Computer Vision

    Authors: Jareen Anjom, Rashik Iram Chowdhury, Tarbia Hasan, Md. Ishan Arefin Hossain

    Abstract: Visually impaired people face significant challenges in their day-to-day commutes in the urban cities of Bangladesh due to the vast number of obstructions on every path. With many injuries taking place through road accidents on a daily basis, it is paramount for a system to be developed that can alert the visually impaired of objects at close distance beforehand. To overcome this issue, a novel al… ▽ More

    Submitted 10 July, 2025; originally announced July 2025.

  47. arXiv:2507.01971  [pdf, ps, other

    q-fin.ST cs.AI cs.CE cs.LG

    DeepSupp: Attention-Driven Correlation Pattern Analysis for Dynamic Time Series Support and Resistance Levels Identification

    Authors: Boris Kriuk, Logic Ng, Zarif Al Hossain

    Abstract: Support and resistance (SR) levels are central to technical analysis, guiding traders in entry, exit, and risk management. Despite widespread use, traditional SR identification methods often fail to adapt to the complexities of modern, volatile markets. Recent research has introduced machine learning techniques to address the following challenges, yet most focus on price prediction rather than str… ▽ More

    Submitted 22 June, 2025; originally announced July 2025.

    Comments: 7 pages, 4 figures, 1 table

  48. arXiv:2506.08486  [pdf

    cs.AI

    RHealthTwin: Towards Responsible and Multimodal Digital Twins for Personalized Well-being

    Authors: Rahatara Ferdousi, M Anwar Hossain

    Abstract: The rise of large language models (LLMs) has created new possibilities for digital twins in healthcare. However, the deployment of such systems in consumer health contexts raises significant concerns related to hallucination, bias, lack of transparency, and ethical misuse. In response to recommendations from health authorities such as the World Health Organization (WHO), we propose Responsible Hea… ▽ More

    Submitted 10 June, 2025; originally announced June 2025.

    Comments: 18 pages, 12 figures, IEEE EMBS JBHI

    MSC Class: 68T50; 92C50; 68T01 68T50; 92C50; 68T01 68T50; 92C50; 68T01 ACM Class: I.2.7; J.3; I.5.1

  49. arXiv:2506.01221  [pdf, other

    eess.IV cs.LG

    Flexible Mixed Precision Quantization for Learned Image Compression

    Authors: Md Adnan Faisal Hossain, Zhihao Duan, Fengqing Zhu

    Abstract: Despite its improvements in coding performance compared to traditional codecs, Learned Image Compression (LIC) suffers from large computational costs for storage and deployment. Model quantization offers an effective solution to reduce the computational complexity of LIC models. However, most existing works perform fixed-precision quantization which suffers from sub-optimal utilization of resource… ▽ More

    Submitted 1 June, 2025; originally announced June 2025.

  50. Optimizing DDoS Detection in SDNs Through Machine Learning Models

    Authors: Md. Ehsanul Haque, Amran Hossain, Md. Shafiqul Alam, Ahsan Habib Siam, Sayed Md Fazle Rabbi, Md. Muntasir Rahman

    Abstract: The emergence of Software-Defined Networking (SDN) has changed the network structure by separating the control plane from the data plane. However, this innovation has also increased susceptibility to DDoS attacks. Existing detection techniques are often ineffective due to data imbalance and accuracy issues; thus, a considerable research gap exists regarding DDoS detection methods suitable for SDN… ▽ More

    Submitted 14 May, 2025; originally announced May 2025.

    Comments: Published Paper of CICN2024