Abdur R. Shahid
YOU?
Author Swipe
View article: Adaptive and Robust Data Poisoning Detection and Sanitization in Wearable IoT Systems using Large Language Models
Adaptive and Robust Data Poisoning Detection and Sanitization in Wearable IoT Systems using Large Language Models Open
The widespread integration of wearable sensing devices in Internet of Things (IoT) ecosystems, particularly in healthcare, smart homes, and industrial applications, has required robust human activity recognition (HAR) techniques to improve…
View article: A Comprehensive Survey of Large Language Models for Human Activity Recognition: Opportunities, Challenges, and Future Directions
A Comprehensive Survey of Large Language Models for Human Activity Recognition: Opportunities, Challenges, and Future Directions Open
View article: How Reliable Are Large Language Models? Zero-Shot Detection of Construction Hazards
How Reliable Are Large Language Models? Zero-Shot Detection of Construction Hazards Open
View article: Development of a Hand-Arm Vibration Syndrome (HAVS) Detection Tool for Construction Workers
Development of a Hand-Arm Vibration Syndrome (HAVS) Detection Tool for Construction Workers Open
View article: Evaluating Apple Intelligence's Writing Tools for Privacy Against Large Language Model-Based Inference Attacks: Insights from Early Datasets
Evaluating Apple Intelligence's Writing Tools for Privacy Against Large Language Model-Based Inference Attacks: Insights from Early Datasets Open
The misuse of Large Language Models (LLMs) to infer emotions from text for malicious purposes, known as emotion inference attacks, poses a significant threat to user privacy. In this paper, we investigate the potential of Apple Intelligenc…
View article: Digital Forensic Investigation of the ChatGPT Windows Application
Digital Forensic Investigation of the ChatGPT Windows Application Open
The ChatGPT Windows application offers better user interaction in the Windows operating system (OS) by enhancing productivity and streamlining the workflow of ChatGPT's utilization. However, there are potential misuses associated with this…
View article: Benchmarking Large-Language Models for Resource-Efficient Medical AI for Edge Deployment
Benchmarking Large-Language Models for Resource-Efficient Medical AI for Edge Deployment Open
Large-Language Models (LLMs) are rapidly emerging as transformative tools across diverse domains, leveraging extensive training on vast and heterogeneous datasets to capture nuanced knowledge and transcend traditional boundaries of underst…
View article: Exploring Audio Editing Features as User-Centric Privacy Defenses Against Large Language Model(LLM) Based Emotion Inference Attacks
Exploring Audio Editing Features as User-Centric Privacy Defenses Against Large Language Model(LLM) Based Emotion Inference Attacks Open
The rapid proliferation of speech-enabled technologies, including virtual assistants, video conferencing platforms, and wearable devices, has raised significant privacy concerns, particularly regarding the inference of sensitive emotional …
View article: TriplePlay: Enhancing Federated Learning with CLIP for Non-IID Data and Resource Efficiency
TriplePlay: Enhancing Federated Learning with CLIP for Non-IID Data and Resource Efficiency Open
The rapid advancement and increasing complexity of pretrained models, exemplified by CLIP, offer significant opportunities as well as challenges for Federated Learning (FL), a critical component of privacy-preserving artificial intelligenc…
View article: Large Language Model Integrated Healthcare Cyber-Physical Systems Architecture
Large Language Model Integrated Healthcare Cyber-Physical Systems Architecture Open
Cyber-physical systems have become an essential part of the modern healthcare industry. The healthcare cyber-physical systems (HCPS) combine physical and cyber components to improve the healthcare industry. While HCPS has many advantages, …
View article: Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven Approach
Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven Approach Open
With the proliferation of edge devices, there is a significant increase in\nattack surface on these devices. The decentralized deployment of threat\nintelligence on edge devices, coupled with adaptive machine learning techniques\nsuch as t…
View article: Large Language Model Integrated Healthcare Cyber-Physical Systems Architecture
Large Language Model Integrated Healthcare Cyber-Physical Systems Architecture Open
Cyber-physical systems have become an essential part of the modern healthcare industry. The healthcare cyber-physical systems (HCPS) combine physical and cyber components to improve the healthcare industry. While HCPS has many advantages, …
View article: Sticks and stones may break my bones, but words will never hurt me!—Navigating the cybersecurity risks of generative AI
Sticks and stones may break my bones, but words will never hurt me!—Navigating the cybersecurity risks of generative AI Open
View article: Towards Sustainable SecureML: Quantifying Carbon Footprint of Adversarial Machine Learning
Towards Sustainable SecureML: Quantifying Carbon Footprint of Adversarial Machine Learning Open
The widespread adoption of machine learning (ML) across various industries has raised sustainability concerns due to its substantial energy usage and carbon emissions. This issue becomes more pressing in adversarial ML, which focuses on en…
View article: From Early Adoption to Ethical Adoption: A Diffusion of Innovation Perspective on ChatGPT and Large Language Models in the Classroom
From Early Adoption to Ethical Adoption: A Diffusion of Innovation Perspective on ChatGPT and Large Language Models in the Classroom Open
This paper presents a comprehensive framework and actionable recommendations for the ethical integration of ChatGPT and other Large Language Models (LLMs) into the academic environment from a Diffusion of Innovation Theory perspective. It …
View article: Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System
Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System Open
Human Activity Recognition (HAR) is a problem of interpreting sensor data to human movement using an efficient machine learning (ML) approach. The HAR systems rely on data from untrusted users, making them susceptible to data poisoning att…
View article: Cyberbullying of High School Students in Bangladesh: An Exploratory Study
Cyberbullying of High School Students in Bangladesh: An Exploratory Study Open
This study explores the cyberbullying experience of the high school students in Bangladesh. The motivation of the work is to identify the internet usage and online activities that may cause cyberbullying victimization of the students of th…
View article: Cyberbullying of High School Students in Bangladesh: An Exploratory\n Study
Cyberbullying of High School Students in Bangladesh: An Exploratory\n Study Open
This study explores the cyberbullying experience of the high school students\nin Bangladesh. The motivation of the work is to identify the internet usage and\nonline activities that may cause cyberbullying victimization of the students of\…
View article: Diffeomorphism Spline
Diffeomorphism Spline Open
Conventional splines offer powerful means for modeling surfaces and volumes in three-dimensional Euclidean space. A one-dimensional quaternion spline has been applied for animation purpose, where the splines are defined to model a one-dime…