Picture for Mohammad Masudur Rahman

Mohammad Masudur Rahman

A Scoping Review of Deep Learning for Urban Visual Pollution and Proposal of a Real-Time Monitoring Framework with a Visual Pollution Index

Add code
Feb 10, 2026
Viaarxiv icon

Improved Bug Localization with AI Agents Leveraging Hypothesis and Dynamic Cognition

Add code
Jan 18, 2026
Viaarxiv icon

Imitation Game: Reproducing Deep Learning Bugs Leveraging an Intelligent Agent

Add code
Dec 17, 2025
Viaarxiv icon

Taxonomy of Faults in Attention-Based Neural Networks

Add code
Aug 06, 2025
Viaarxiv icon

Can Hessian-Based Insights Support Fault Diagnosis in Attention-based Models?

Add code
Jun 09, 2025
Viaarxiv icon

Improved IR-based Bug Localization with Intelligent Relevance Feedback

Add code
Jan 17, 2025
Viaarxiv icon

Towards Enhancing the Reproducibility of Deep Learning Bugs: An Empirical Study

Add code
Jan 05, 2024
Figure 1 for Towards Enhancing the Reproducibility of Deep Learning Bugs: An Empirical Study
Figure 2 for Towards Enhancing the Reproducibility of Deep Learning Bugs: An Empirical Study
Figure 3 for Towards Enhancing the Reproducibility of Deep Learning Bugs: An Empirical Study
Figure 4 for Towards Enhancing the Reproducibility of Deep Learning Bugs: An Empirical Study
Viaarxiv icon

Predicting Line-Level Defects by Capturing Code Contexts with Hierarchical Transformers

Add code
Dec 19, 2023
Viaarxiv icon

A Systematic Literature Review of Automated Query Reformulations in Source Code Search

Add code
Aug 22, 2021
Figure 1 for A Systematic Literature Review of Automated Query Reformulations in Source Code Search
Figure 2 for A Systematic Literature Review of Automated Query Reformulations in Source Code Search
Figure 3 for A Systematic Literature Review of Automated Query Reformulations in Source Code Search
Figure 4 for A Systematic Literature Review of Automated Query Reformulations in Source Code Search
Viaarxiv icon

Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling

Add code
Aug 19, 2021
Figure 1 for Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling
Figure 2 for Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling
Figure 3 for Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling
Figure 4 for Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling
Viaarxiv icon