Sitemap

A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.

Pages

Posts

Future Blog Post </a> </h2>

less than 1 minute read

Published:

This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.

</article> </div>

Blog Post number 4 </a> </h2>

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

</article> </div>

Blog Post number 3 </a> </h2>

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

</article> </div>

Blog Post number 2 </a> </h2>

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

</article> </div>

Blog Post number 1 </a> </h2>

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

</article> </div>

portfolio

Portfolio item number 1 </a> </h2>

Short description of portfolio item number 1

</article> </div>

Portfolio item number 2 </a> </h2>

Short description of portfolio item number 2

</article> </div>

publications

Interpretable Vulnerability Detection in LLMs: A BERT-Based Approach with SHAP Explanations </a> </h2>

Published in

Computers, Materials & Continua 2025

Paper Link

https://www.techscience.com/cmc/v85n2/63809

Submitted Date

2025-04-23

Accepted Date

2025-07-17

Published Date

2025-09-23

Doi URL

https://doi.org/10.32604/cmc.2025.067044

Doi

10.32604/cmc.2025.067044

Volume 85 (2) , pp. 3321--3334, IF: 1.7 (2025)

LLMs, Cybersecurity

Recommended citation:


         @Article{cmc.2025.067044, AUTHOR = {Nouman Ahmad, Changsheng Zhang}, TITLE = {Interpretable Vulnerability Detection in LLMs: A BERT-Based Approach with SHAP Explanations}, JOURNAL = {Computers, Materials \& Continua}, VOLUME = {85}, YEAR = {2025}, NUMBER = {2}, PAGES = {3321--3334}, URL = {http://www.techscience.com/cmc/v85n2/63809}, ISSN = {1546-2226}, ABSTRACT = {Source code vulnerabilities present significant security threats, necessitating effective detection techniques. Rigid rule-sets and pattern matching are the foundation of traditional static analysis tools, which drown developers in false positives and miss context-sensitive vulnerabilities. Large Language Models (LLMs) like BERT, in particular, are examples of artificial intelligence (AI) that exhibit promise but frequently lack transparency. In order to overcome the issues with model interpretability, this work suggests a BERT-based LLM strategy for vulnerability detection that incorporates Explainable AI (XAI) methods like SHAP and attention heatmaps. Furthermore, to ensure auditable and comprehensible choices, we present a transparency obligation structure that covers the whole LLM lifetime. Our experiments on a comprehensive and extensive source code DiverseVul dataset show that the proposed method outperform, attaining 92.3% detection accuracy and surpassing CodeT5 (89.4%), GPT-3.5 (85.1%), and GPT-4 (88.7%) under the same evaluation scenario. Through integrated SHAP analysis, this exhibits improved detection capabilities while preserving explainability, which is a crucial advantage over black-box LLM alternatives in security contexts. The XAI analysis discovers crucial predictive tokens such as susceptible and function through SHAP framework. Furthermore, the local token interactions that support the decision-making of the model process are graphically highlighted via attention heatmaps. This method provides a workable solution for reliable vulnerability identification in software systems by effectively fusing high detection accuracy with model explainability. Our findings imply that transparent AI models are capable of successfully detecting security flaws while preserving interpretability for human analysts.}, DOI = {10.32604/cmc.2025.067044} }
        

Download Paper

</article> </div>

Enhancing Code Optimization in LLMs with Dual Encoder Architecture for Syntax and Semantic Refinement </a> </h2>

Published in

2025 International Conference on Artificial Intelligence and Digital Ethics (ICAIDE)

Paper Link

https://ieeexplore.ieee.org/document/11189637

Submitted Date

2025-05-13

Accepted Date

2025-05-21

Published Date

2025-10-13

Doi URL

https://doi.org/10.1109/ICAIDE65466.2025.11189637

Doi

10.1109/ICAIDE65466.2025.11189637

, pp. 406-409 (2025)

LLMs

Recommended citation:


        @INPROCEEDINGS{11189637, author={Ahmad, Nouman and Zhang, Changsheng}, booktitle={2025 International Conference on Artificial Intelligence and Digital Ethics (ICAIDE)}, title={Enhancing Code Optimization in LLMs with Dual Encoder Architecture for Syntax and Semantic Refinement}, year={2025}, volume={}, number={}, pages={406-409}, keywords={Measurement;Adaptation models;Codes;Pipelines;Semantics;Retrieval augmented generation;Reinforcement learning;Syntactics;Routing;Optimization;component;BLEU Score, Code Optimization, CodeBERT, CodeLlama, Syntax Correction}, doi={10.1109/ICAIDE65466.2025.11189637}} 
        

Download Paper

</article> </div>

Enhancing LLMs Interactions for Python: A Smart API Framework for Extracting and Utilizing Semantic Code Information </a> </h2>

Published in

2025 5th International Conference on Artificial Intelligence, Big Data and Algorithms (CAIBDA)

Paper Link

https://ieeexplore.ieee.org/document/11189637

Submitted Date

2025-04-28

Accepted Date

2025-06-05

Published Date

2025-10-13

Doi URL

https://doi.org/10.1109/CAIBDA65784.2025.11182836

Doi

10.1109/CAIBDA65784.2025.11182836

, pp. 385-388 (2025)

LLMs

Recommended citation:


        @INPROCEEDINGS{11182836, author={Ahmad, Nouman and Zhang, Changsheng}, booktitle={2025 5th International Conference on Artificial Intelligence, Big Data and Algorithms (CAIBDA)}, title={Enhancing LLMs Interactions for Python: A Smart API Framework for Extracting and Utilizing Semantic Code Information}, year={2025}, volume={}, number={}, pages={385-388}, keywords={Measurement;Codes;Navigation;Large language models;Semantics;Manuals;Metadata;Data mining;Prompt engineering;Software development management;Prompt Engineering;Semantic Code Analysis;LLM Interactions}, doi={10.1109/CAIBDA65784.2025.11182836}} 
        

Download Paper

</article> </div>

Mitigating Adversarial Obfuscation in named entity recognition with Robust SecureBERT Finetuning </a> </h2>

Published in

Computers, Materials & Continua 2025

Paper Link

https://www.techscience.com/cmc/online/detail/25248

Submitted Date

2025-09-09

Accepted Date

2025-11-18

Published Date

2026-02-10

Doi URL

https://doi.org/10.32604/cmc.2025.073029

Doi

10.32604/cmc.2025.073029

Volume 87 (1) , pp. 32, IF: 1.7 (2026)

LLMs, Cybersecurity

Recommended citation:


         @Article{cmc.2025.073029, AUTHOR = {Nouman Ahmad, Changsheng Zhang, Uroosa Sehar}, TITLE = {Mitigating Adversarial Obfuscation in Named Entity Recognition with Robust SecureBERT Finetuning}, JOURNAL = {Computers, Materials \& Continua}, VOLUME = {87}, YEAR = {2025}, NUMBER = {1}, PAGES = {32}, URL = {http://www.techscience.com/cmc/online/detail/25248}, ISSN = {1546-2226}, ABSTRACT = {Although Named Entity Recognition (NER) in cybersecurity has historically concentrated on threat intelligence, vital security data can be found in a variety of sources, such as open-source intelligence and unprocessed tool outputs. When dealing with technical language, the coexistence of structured and unstructured data poses serious issues for traditional BERT-based techniques. We introduce a three-phase approach for improved NER in multi-source cybersecurity data that makes use of large language models (LLMs). To ensure thorough entity coverage, our method starts with an identification module that uses dynamic prompting techniques. To lessen hallucinations, the extraction module uses confidence-based self-assessment and cross-checking using regex validation. The tagging module links to knowledge bases for contextual validation and uses SecureBERT in conjunction with conditional random fields to detect entity boundaries precisely. Our framework creates efficient natural language segments by utilizing decoder-based LLMs with 10B parameters. When compared to baseline SecureBERT implementations, evaluation across four cybersecurity data sources shows notable gains, with a 9.4%–25.21% greater recall and a 6.38%–17.3% better F1-score. Our refined model matches larger models and achieves 2.6%–4.9% better F1-score for technical phrase recognition than the state-of-the-art alternatives Claude 3.5 Sonnet, Llama3-8B, and Mixtral-7B. The three-stage architecture identification-extraction-tagging pipeline tackles important cybersecurity NER issues. Through effective architectures, these developments preserve deployability while setting a new standard for entity extraction in challenging security scenarios. The findings show how specific enhancements in hybrid recognition, validation procedures, and prompt engineering raise NER performance above monolithic LLM approaches in cybersecurity applications, especially for technical entity extraction from heterogeneous sources where conventional techniques fall short. Because of its modular nature, the framework can be upgraded at the component level as new methods are developed.}, DOI = {10.32604/cmc.2025.073029} }
        

Download Paper

</article> </div>

MyoViTs-Net: Enhanced Vision Transformer-Based Segmentation Network for Heart Segmentation Using Cine-MRI Dataset </a> </h2>

Published in

International Conference on Machine Learning and Artificial Intelligence Applications (MLAIA 2025)

Paper Link

https://www.spiedigitallibrary.org/conference-proceedings-of-spie/14134/141340W/MyoViTs-Net--enhanced-vision-transformer-based-segmentation-network-for/10.1117/12.3110460.short

Submitted Date

2025-12-12

Accepted Date

Published Date

2026-03-09

Doi URL

https://doi.org/10.1117/12.3110460

Doi

10.1117/12.3110460

Volume 14134 , pp. 246-250 (2026)

Computer Vision, Medical Image Segmentation

Recommended citation:


         @inproceedings{Sehar2026MyoViTs, AUTHOR = {Uroosa Sehar and Nouman Ahmad and Jianhua Zhou and Zeeshan Tariq}, TITLE = {MyoViTs-Net: Enhanced Vision Transformer-Based Segmentation Network for Heart Segmentation Using Cine-MRI Dataset}, BOOKTITLE = {International Conference on Machine Learning and Artificial Intelligence Applications (MLAIA 2025)}, PUBLISHER = {SPIE}, VOLUME = {14134}, YEAR = {2026}, PAGES = {246--250}, ABSTRACT = {Cardiovascular disease (CVD) remains one of the leading causes of death worldwide, making early diagnosis and treatment critically important. Automated cardiovascular disease diagnosis using artificial intelligence techniques, particularly computer vision and medical image analysis, has become an effective approach to assist clinicians. Accurate heart segmentation plays a crucial role in enabling reliable cardiac analysis and surgical planning. However, existing deep learning-based segmentation approaches still struggle with capturing the complex three-dimensional structure of the heart. In this work, we propose MyoViTs-Net, an enhanced vision transformer-based segmentation network designed to improve heart segmentation performance using cine-MRI datasets. The proposed architecture leverages the global context modeling capability of vision transformers while preserving spatial details necessary for medical image segmentation. By effectively capturing the 3D spatial characteristics of cardiac structures, the model aims to achieve improved segmentation accuracy and robustness compared with traditional convolutional neural network-based methods. Experimental evaluation demonstrates that the proposed framework effectively handles the complex spatial structure of the heart and provides improved segmentation performance for cine-MRI data, supporting more reliable automated cardiac analysis and clinical decision-making.} }
        

Download Paper

</article> </div>

talks