Skip to main content

Showing 1–50 of 71 results for author: Abbasi, A

  1. arXiv:2410.11563  [pdf, other

    cs.CR

    Exploring Power Side-Channel Challenges in Embedded Systems Security

    Authors: Pouya Narimani, Meng Wang, Ulysse Planta, Ali Abbasi

    Abstract: Power side-channel (PSC) attacks are widely used in embedded microcontrollers, particularly in cryptographic applications, to extract sensitive information. However, expanding the applications of PSC attacks to broader security contexts in the embedded systems domain faces significant challenges. These include the need for specialized hardware setups to manage high noise levels in real-world targe… ▽ More

    Submitted 15 October, 2024; originally announced October 2024.

  2. arXiv:2409.03131  [pdf

    cs.CR cs.CL

    Well, that escalated quickly: The Single-Turn Crescendo Attack (STCA)

    Authors: Alan Aqrawi, Arian Abbasi

    Abstract: This paper introduces a new method for adversarial attacks on large language models (LLMs) called the Single-Turn Crescendo Attack (STCA). Building on the multi-turn crescendo attack method introduced by Russinovich, Salem, and Eldan (2024), which gradually escalates the context to provoke harmful responses, the STCA achieves similar outcomes in a single interaction. By condensing the escalation i… ▽ More

    Submitted 10 September, 2024; v1 submitted 4 September, 2024; originally announced September 2024.

  3. arXiv:2408.12762  [pdf

    cs.HC cs.AI

    Visual Verity in AI-Generated Imagery: Computational Metrics and Human-Centric Analysis

    Authors: Memoona Aziz, Umair Rehman, Syed Ali Safi, Amir Zaib Abbasi

    Abstract: The rapid advancements in AI technologies have revolutionized the production of graphical content across various sectors, including entertainment, advertising, and e-commerce. These developments have spurred the need for robust evaluation methods to assess the quality and realism of AI-generated images. To address this, we conducted three studies. First, we introduced and validated a questionnaire… ▽ More

    Submitted 1 September, 2024; v1 submitted 22 August, 2024; originally announced August 2024.

  4. arXiv:2408.08848  [pdf

    cs.CL

    PsychoLex: Unveiling the Psychological Mind of Large Language Models

    Authors: Mohammad Amin Abbasi, Farnaz Sadat Mirnezami, Hassan Naderi

    Abstract: This paper explores the intersection of psychology and artificial intelligence through the development and evaluation of specialized Large Language Models (LLMs). We introduce PsychoLex, a suite of resources designed to enhance LLMs' proficiency in psychological tasks in both Persian and English. Key contributions include the PsychoLexQA dataset for instructional content and the PsychoLexEval data… ▽ More

    Submitted 16 August, 2024; originally announced August 2024.

  5. arXiv:2406.19301  [pdf, other

    cs.LG

    MCNC: Manifold Constrained Network Compression

    Authors: Chayne Thrash, Ali Abbasi, Parsa Nooralinejad, Soroush Abbasi Koohpayegani, Reed Andreas, Hamed Pirsiavash, Soheil Kolouri

    Abstract: The outstanding performance of large foundational models across diverse tasks-from computer vision to speech and natural language processing-has significantly increased their demand. However, storing and transmitting these models pose significant challenges due to their massive size (e.g., 350GB for GPT-3). Recent literature has focused on compressing the original weights or reducing the number of… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

  6. arXiv:2406.03777  [pdf, other

    cs.LG cs.AI

    Empirical Guidelines for Deploying LLMs onto Resource-constrained Edge Devices

    Authors: Ruiyang Qin, Dancheng Liu, Chenhui Xu, Zheyu Yan, Zhaoxuan Tan, Zhenge Jia, Amir Nassereldine, Jiajie Li, Meng Jiang, Ahmed Abbasi, Jinjun Xiong, Yiyu Shi

    Abstract: The scaling laws have become the de facto guidelines for designing large language models (LLMs), but they were studied under the assumption of unlimited computing resources for both training and inference. As LLMs are increasingly used as personalized intelligent assistants, their customization (i.e., learning through fine-tuning) and deployment onto resource-constrained edge devices will become m… ▽ More

    Submitted 2 October, 2024; v1 submitted 6 June, 2024; originally announced June 2024.

    Comments: Benckmarking paper

  7. arXiv:2405.06569  [pdf, other

    cs.LG eess.SP

    Efficient Federated Low Rank Matrix Completion

    Authors: Ahmed Ali Abbasi, Namrata Vaswani

    Abstract: In this work, we develop and analyze a Gradient Descent (GD) based solution, called Alternating GD and Minimization (AltGDmin), for efficiently solving the low rank matrix completion (LRMC) in a federated setting. LRMC involves recovering an $n \times q$ rank-$r$ matrix $\Xstar$ from a subset of its entries when $r \ll \min(n,q)$. Our theoretical guarantees (iteration and sample complexity bounds)… ▽ More

    Submitted 30 September, 2024; v1 submitted 10 May, 2024; originally announced May 2024.

  8. arXiv:2404.15503  [pdf, other

    cs.LG cs.AI cs.DC

    FedGreen: Carbon-aware Federated Learning with Model Size Adaptation

    Authors: Ali Abbasi, Fan Dong, Xin Wang, Henry Leung, Jiayu Zhou, Steve Drew

    Abstract: Federated learning (FL) provides a promising collaborative framework to build a model from distributed clients, and this work investigates the carbon emission of the FL process. Cloud and edge servers hosting FL clients may exhibit diverse carbon footprints influenced by their geographical locations with varying power sources, offering opportunities to reduce carbon emissions by training local mod… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  9. On the Feasibility of CubeSats Application Sandboxing for Space Missions

    Authors: Gabriele Marra, Ulysse Planta, Philipp Wüstenberg, Ali Abbasi

    Abstract: This paper details our journey in designing and selecting a suitable application sandboxing mechanism for a satellite under development, with a focus on small satellites. Central to our study is the development of selection criteria for sandboxing and assessing its appropriateness for our satellite payload. We also test our approach on two already operational satellites, Suchai and SALSAT, to vali… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

    Comments: 8 pages, 5 figures, accepted to SpaceSec Workshop 2024 and to be published as post-conference proceedings with NDSS 2024

  10. arXiv:2403.07142  [pdf, other

    cs.CV cs.CL cs.LG

    One Category One Prompt: Dataset Distillation using Diffusion Models

    Authors: Ali Abbasi, Ashkan Shahbazi, Hamed Pirsiavash, Soheil Kolouri

    Abstract: The extensive amounts of data required for training deep neural networks pose significant challenges on storage and transmission fronts. Dataset distillation has emerged as a promising technique to condense the information of massive datasets into a much smaller yet representative set of synthetic samples. However, traditional dataset distillation approaches often struggle to scale effectively wit… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  11. arXiv:2403.00280  [pdf

    cs.CR

    SoK: Security of Programmable Logic Controllers

    Authors: Efrén López-Morales, Ulysse Planta, Carlos Rubio-Medrano, Ali Abbasi, Alvaro A. Cardenas

    Abstract: Billions of people rely on essential utility and manufacturing infrastructures such as water treatment plants, energy management, and food production. Our dependence on reliable infrastructures makes them valuable targets for cyberattacks. One of the prime targets for adversaries attacking physical infrastructures are Programmable Logic Controllers (PLCs) because they connect the cyber and physica… ▽ More

    Submitted 29 February, 2024; originally announced March 2024.

    Comments: 25 pages, 13 figures, Extended version February 2024, A shortened version is to be published in the 33rd USENIX Security Symposium, for more information, see https://efrenlopez.org/

  12. arXiv:2402.06696  [pdf, other

    cs.LG cs.AI

    FL-NAS: Towards Fairness of NAS for Resource Constrained Devices via Large Language Models

    Authors: Ruiyang Qin, Yuting Hu, Zheyu Yan, Jinjun Xiong, Ahmed Abbasi, Yiyu Shi

    Abstract: Neural Architecture Search (NAS) has become the de fecto tools in the industry in automating the design of deep neural networks for various applications, especially those driven by mobile and edge devices with limited computing resources. The emerging large language models (LLMs), due to their prowess, have also been incorporated into NAS recently and show some promising results. This paper conduc… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

    Comments: ASP-DAC 2024

  13. arXiv:2312.15713  [pdf

    cs.CL cs.AI

    PersianLLaMA: Towards Building First Persian Large Language Model

    Authors: Mohammad Amin Abbasi, Arash Ghafouri, Mahdi Firouzmandi, Hassan Naderi, Behrouz Minaei Bidgoli

    Abstract: Despite the widespread use of the Persian language by millions globally, limited efforts have been made in natural language processing for this language. The use of large language models as effective tools in various natural language processing tasks typically requires extensive textual data and robust hardware resources. Consequently, the scarcity of Persian textual data and the unavailability of… ▽ More

    Submitted 25 December, 2023; originally announced December 2023.

  14. arXiv:2312.04718  [pdf, other

    eess.SP cs.LG

    Dynamic Online Modulation Recognition using Incremental Learning

    Authors: Ali Owfi, Ali Abbasi, Fatemeh Afghah, Jonathan Ashdown, Kurt Turck

    Abstract: Modulation recognition is a fundamental task in communication systems as the accurate identification of modulation schemes is essential for reliable signal processing, interference mitigation for coexistent communication technologies, and network optimization. Incorporating deep learning (DL) models into modulation recognition has demonstrated promising results in various scenarios. However, conve… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

    Comments: To be published in International Workshop on Computing, Networking and Communications (CNC) 2024

  15. arXiv:2311.14683  [pdf

    cs.CY cs.AI cs.SI

    Data Science for Social Good

    Authors: Ahmed Abbasi, Roger H. L. Chiang, Jennifer J. Xu

    Abstract: Data science has been described as the fourth paradigm for scientific discovery. The latest wave of data science research, pertaining to machine learning and artificial intelligence (AI), is growing exponentially and garnering millions of annual citations. However, this growth has been accompanied by a diminishing emphasis on social good challenges - our analysis reveals that the proportion of dat… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

  16. arXiv:2311.12999  [pdf, other

    cs.LG cs.AI

    CovarNav: Machine Unlearning via Model Inversion and Covariance Navigation

    Authors: Ali Abbasi, Chayne Thrash, Elaheh Akbari, Daniel Zhang, Soheil Kolouri

    Abstract: The rapid progress of AI, combined with its unprecedented public adoption and the propensity of large neural networks to memorize training data, has given rise to significant data privacy concerns. To address these concerns, machine unlearning has emerged as an essential technique to selectively remove the influence of specific training data points on trained models. In this paper, we approach the… ▽ More

    Submitted 21 November, 2023; originally announced November 2023.

  17. Enabling On-Device Large Language Model Personalization with Self-Supervised Data Selection and Synthesis

    Authors: Ruiyang Qin, Jun Xia, Zhenge Jia, Meng Jiang, Ahmed Abbasi, Peipei Zhou, Jingtong Hu, Yiyu Shi

    Abstract: After a large language model (LLM) is deployed on edge devices, it is desirable for these devices to learn from user-generated conversation data to generate user-specific and personalized responses in real-time. However, user-generated data usually contains sensitive and private information, and uploading such data to the cloud for annotation is not preferred if not prohibited. While it is possibl… ▽ More

    Submitted 16 April, 2024; v1 submitted 20 November, 2023; originally announced November 2023.

    Comments: Accepted by 2024 61th ACM/IEEE Design Automation Conference (DAC)

  18. arXiv:2311.11995  [pdf, other

    cs.LG cs.AI cs.CR

    BrainWash: A Poisoning Attack to Forget in Continual Learning

    Authors: Ali Abbasi, Parsa Nooralinejad, Hamed Pirsiavash, Soheil Kolouri

    Abstract: Continual learning has gained substantial attention within the deep learning community, offering promising solutions to the challenging problem of sequential learning. Yet, a largely unexplored facet of this paradigm is its susceptibility to adversarial attacks, especially with the aim of inducing forgetting. In this paper, we introduce "BrainWash," a novel data poisoning method tailored to impose… ▽ More

    Submitted 23 November, 2023; v1 submitted 20 November, 2023; originally announced November 2023.

  19. arXiv:2311.10395  [pdf, other

    cs.CL

    Bias A-head? Analyzing Bias in Transformer-Based Language Model Attention Heads

    Authors: Yi Yang, Hanyu Duan, Ahmed Abbasi, John P. Lalor, Kar Yan Tam

    Abstract: Transformer-based pretrained large language models (PLM) such as BERT and GPT have achieved remarkable success in NLP tasks. However, PLMs are prone to encoding stereotypical biases. Although a burgeoning literature has emerged on stereotypical bias mitigation in PLMs, such as work on debiasing gender and racial stereotyping, how such biases manifest and behave internally within PLMs remains large… ▽ More

    Submitted 15 June, 2024; v1 submitted 17 November, 2023; originally announced November 2023.

    Comments: 14 pages, 7 figures, 3 tables including references and appendices

  20. arXiv:2311.10367  [pdf, other

    cs.CL

    Exploring the Relationship between In-Context Learning and Instruction Tuning

    Authors: Hanyu Duan, Yixuan Tang, Yi Yang, Ahmed Abbasi, Kar Yan Tam

    Abstract: In-Context Learning (ICL) and Instruction Tuning (IT) are two primary paradigms of adopting Large Language Models (LLMs) to downstream applications. However, they are significantly different. In ICL, a set of demonstrations are provided at inference time but the LLM's parameters are not updated. In IT, a set of demonstrations are used to tune LLM's parameters in training time but no demonstrations… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

  21. arXiv:2309.14488  [pdf, other

    cs.CL cs.AI

    When Automated Assessment Meets Automated Content Generation: Examining Text Quality in the Era of GPTs

    Authors: Marialena Bevilacqua, Kezia Oketch, Ruiyang Qin, Will Stamey, Xinyuan Zhang, Yi Gan, Kai Yang, Ahmed Abbasi

    Abstract: The use of machine learning (ML) models to assess and score textual data has become increasingly pervasive in an array of contexts including natural language processing, information retrieval, search and recommendation, and credibility assessment of online content. A significant disruption at the intersection of ML and text are text-generating large-language models such as generative pre-trained t… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

    Comments: Data available at: https://github.com/nd-hal/automated-ML-scoring-versus-generation

  22. arXiv:2305.16351  [pdf, other

    cs.LG cs.AI cs.DC

    Federated Learning Model Aggregation in Heterogenous Aerial and Space Networks

    Authors: Fan Dong, Ali Abbasi, Henry Leung, Xin Wang, Jiayu Zhou, Steve Drew

    Abstract: Federated learning offers a promising approach under the constraints of networking and data privacy constraints in aerial and space networks (ASNs), utilizing large-scale private edge data from drones, balloons, and satellites. Existing research has extensively studied the optimization of the learning process, computing efficiency, and communication overhead. An important yet often overlooked aspe… ▽ More

    Submitted 16 April, 2024; v1 submitted 24 May, 2023; originally announced May 2023.

    Comments: 6 pages, 7 figures, accepted by IEEE ICC workshop on emerging technologies in aerial and space networks 2024

    ACM Class: I.2.11; C.2.4

  23. arXiv:2303.03706  [pdf

    cs.CL cs.LG

    Classifying Text-Based Conspiracy Tweets related to COVID-19 using Contextualized Word Embeddings

    Authors: Abdul Rehman, Rabeeh Ayaz Abbasi, Irfan ul Haq Qureshi, Akmal Saeed Khattak

    Abstract: The FakeNews task in MediaEval 2022 investigates the challenge of finding accurate and high-performance models for the classification of conspiracy tweets related to COVID-19. In this paper, we used BERT, ELMO, and their combination for feature extraction and RandomForest as classifier. The results show that ELMO performs slightly better than BERT, however their combination at feature level reduce… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

    Comments: Published in Multimedia Benchmark Workshop 2022, Bergen, Norway and Online, 12-13 January 2023: https://2022.multimediaeval.com/

    MSC Class: 68T01 ACM Class: I.2.7

    Journal ref: Multimedia Benchmark Workshop, Bergen, Norway and Online, 12-13 January 2023

  24. arXiv:2303.03704  [pdf, other

    cs.SI

    Identifying Misinformation Spreaders: A Graph-Based Semi-Supervised Learning Approach

    Authors: Atta Ullah, Rabeeh Ayaz Abbasi, Akmal Saeed Khattak, Anwar Said

    Abstract: In this paper we proposed a Graph-Based conspiracy source detection method for the MediaEval task 2022 FakeNews: Corona Virus and Conspiracies Multimedia Analysis Task. The goal of this study was to apply SOTA graph neural network methods to the problem of misinformation spreading in online social networks. We explore three different Graph Neural Network models: GCN, GraphSAGE and DGCNN. Experimen… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

    Comments: Published in Multimedia Benchmark Workshop Proceedings 2022: https://2022.multimediaeval.com/

    MSC Class: 91D30 ACM Class: I.2.1

  25. arXiv:2211.07621  [pdf, other

    eess.SP cs.IT cs.LG math.PR

    Alternating minimization algorithm with initialization analysis for r-local and k-sparse unlabeled sensing

    Authors: Ahmed Abbasi, Abiy Tasissa, Shuchin Aeron

    Abstract: The unlabeled sensing problem is to recover an unknown signal from permuted linear measurements. We propose an alternating minimization algorithm with a suitable initialization for the widely considered k-sparse permutation model. Assuming either a Gaussian measurement matrix or a sub-Gaussian signal, we upper bound the initialization error for the r-local and k-sparse permutation models in terms… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

  26. arXiv:2208.07441  [pdf, ps, other

    cs.CV cs.CY

    WatchPed: Pedestrian Crossing Intention Prediction Using Embedded Sensors of Smartwatch

    Authors: Jibran Ali Abbasi, Navid Mohammad Imran, Lokesh Chandra Das, Myounggyu Won

    Abstract: The pedestrian crossing intention prediction problem is to estimate whether or not the target pedestrian will cross the street. State-of-the-art techniques heavily depend on visual data acquired through the front camera of the ego-vehicle to make a prediction of the pedestrian's crossing intention. Hence, the efficiency of current methodologies tends to decrease notably in situations where visual… ▽ More

    Submitted 15 March, 2023; v1 submitted 15 August, 2022; originally announced August 2022.

  27. Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms

    Authors: Muhammad Fahad Khan, Khalid Saleem, Mohammed Alotaibi, Mohammad Mazyad Hazzazi, Eid Rehman, Aaqif Afzaal Abbasi, Muhammad Asif Gondal

    Abstract: Internet of Things is an ecosystem of interconnected devices that are accessible through the internet. The recent research focuses on adding more smartness and intelligence to these edge devices. This makes them susceptible to various kinds of security threats. These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field. In… ▽ More

    Submitted 19 June, 2022; originally announced June 2022.

    Comments: 15 pages, 3 figuers, Journal Paper

    Report number: https://www.techscience.com/cmc/v73n2/48337 MSC Class: 68P25 ACM Class: E.3

    Journal ref: Computers, Materials & Continua, 2022

  28. arXiv:2206.08464  [pdf, other

    cs.LG

    PRANC: Pseudo RAndom Networks for Compacting deep models

    Authors: Parsa Nooralinejad, Ali Abbasi, Soroush Abbasi Koohpayegani, Kossar Pourahmadi Meibodi, Rana Muhammad Shahroz Khan, Soheil Kolouri, Hamed Pirsiavash

    Abstract: We demonstrate that a deep model can be reparametrized as a linear combination of several randomly initialized and frozen deep models in the weight space. During training, we seek local minima that reside within the subspace spanned by these random models (i.e., `basis' networks). Our framework, PRANC, enables significant compaction of a deep model. The model can be reconstructed using a single sc… ▽ More

    Submitted 28 August, 2023; v1 submitted 16 June, 2022; originally announced June 2022.

  29. arXiv:2205.14029  [pdf

    eess.IV cs.CV

    Lesion classification by model-based feature extraction: A differential affine invariant model of soft tissue elasticity

    Authors: Weiguo Cao, Marc J. Pomeroy, Zhengrong Liang, Yongfeng Gao, Yongyi Shi, Jiaxing Tan, Fangfang Han, Jing Wang, Jianhua Ma, Hongbin Lu, Almas F. Abbasi, Perry J. Pickhardt

    Abstract: The elasticity of soft tissues has been widely considered as a characteristic property to differentiate between healthy and vicious tissues and, therefore, motivated several elasticity imaging modalities, such as Ultrasound Elastography, Magnetic Resonance Elastography, and Optical Coherence Elastography. This paper proposes an alternative approach of modeling the elasticity using Computed Tomogra… ▽ More

    Submitted 27 May, 2022; originally announced May 2022.

    Comments: 12 pages, 4 figures, 3 tables

  30. arXiv:2203.06514  [pdf, other

    cs.LG cs.AI cs.CV

    Sparsity and Heterogeneous Dropout for Continual Learning in the Null Space of Neural Activations

    Authors: Ali Abbasi, Parsa Nooralinejad, Vladimir Braverman, Hamed Pirsiavash, Soheil Kolouri

    Abstract: Continual/lifelong learning from a non-stationary input data stream is a cornerstone of intelligence. Despite their phenomenal performance in a wide variety of applications, deep neural networks are prone to forgetting their previously learned information upon learning new ones. This phenomenon is called "catastrophic forgetting" and is deeply rooted in the stability-plasticity dilemma. Overcoming… ▽ More

    Submitted 8 July, 2022; v1 submitted 12 March, 2022; originally announced March 2022.

  31. arXiv:2202.04104  [pdf, other

    cs.LG

    Teaching Networks to Solve Optimization Problems

    Authors: Xinran Liu, Yuzhe Lu, Ali Abbasi, Meiyi Li, Javad Mohammadi, Soheil Kolouri

    Abstract: Leveraging machine learning to facilitate the optimization process is an emerging field that holds the promise to bypass the fundamental computational bottleneck caused by classic iterative solvers in critical applications requiring near-real-time optimization. The majority of existing approaches focus on learning data-driven optimizers that lead to fewer iterations in solving an optimization. In… ▽ More

    Submitted 15 July, 2022; v1 submitted 8 February, 2022; originally announced February 2022.

  32. arXiv:2111.10634  [pdf, other

    cs.CV

    Identity-Preserving Pose-Robust Face Hallucination Through Face Subspace Prior

    Authors: Ali Abbasi, Mohammad Rahmati

    Abstract: Over the past few decades, numerous attempts have been made to address the problem of recovering a high-resolution (HR) facial image from its corresponding low-resolution (LR) counterpart, a task commonly referred to as face hallucination. Despite the impressive performance achieved by position-patch and deep learning-based methods, most of these techniques are still unable to recover identity-spe… ▽ More

    Submitted 20 November, 2021; originally announced November 2021.

    Comments: A shorter version of this paper has been submitted to IEEE Transactions on Image Processing

  33. arXiv:2111.04522  [pdf, other

    cs.IT eess.SP

    Terahertz Wireless Channels: A Holistic Survey on Measurement, Modeling, and Analysis

    Authors: Chong Han, Yiqin Wang, Yuanbo Li, Yi Chen, Naveed A. Abbasi, Thomas Kürner, Andreas F. Molisch

    Abstract: Terahertz (0.1-10 THz) communications are envisioned as a key technology for sixth generation (6G) wireless systems. The study of underlying THz wireless propagation channels provides the foundations for the development of reliable THz communication systems and their applications. This article provides a comprehensive overview of the study of THz wireless channels. First, the three most popular TH… ▽ More

    Submitted 9 June, 2022; v1 submitted 8 November, 2021; originally announced November 2021.

    Comments: to appear in IEEE Communications Surveys and Tutorials

  34. Nyx-Net: Network Fuzzing with Incremental Snapshots

    Authors: Sergej Schumilo, Cornelius Aschermann, Andrea Jemmett, Ali Abbasi, Thorsten Holz

    Abstract: Coverage-guided fuzz testing ("fuzzing") has become mainstream and we have observed lots of progress in this research area recently. However, it is still challenging to efficiently test network services with existing coverage-guided fuzzing methods. In this paper, we introduce the design and implementation of Nyx-Net, a novel snapshot-based fuzzing approach that can successfully fuzz a wide range… ▽ More

    Submitted 4 November, 2021; originally announced November 2021.

    Journal ref: EuroSys '22, Proceedings of the Seventeenth European Conference on Computer Systems, March 2022, Pages 166-180

  35. r-local sensing: Improved algorithm and applications

    Authors: Ahmed Ali Abbasi, Abiy Tasissa, Shuchin Aeron

    Abstract: The unlabeled sensing problem is to solve a noisy linear system of equations under unknown permutation of the measurements. We study a particular case of the problem where the permutations are restricted to be r-local, i.e. the permutation matrix is block diagonal with r x r blocks. Assuming a Gaussian measurement matrix, we argue that the r-local permutation model is more challenging compared to… ▽ More

    Submitted 14 February, 2022; v1 submitted 26 October, 2021; originally announced October 2021.

  36. arXiv:2106.08913  [pdf, other

    cs.CR

    Technical Report: Hardening Code Obfuscation Against Automated Attacks

    Authors: Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi

    Abstract: Software obfuscation is a crucial technology to protect intellectual property and manage digital rights within our society. Despite its huge practical importance, both commercial and academic state-of-the-art obfuscation methods are vulnerable to a plethora of automated deobfuscation attacks, such as symbolic execution, taint analysis, or program synthesis. While several enhanced obfuscation techn… ▽ More

    Submitted 17 June, 2022; v1 submitted 16 June, 2021; originally announced June 2021.

  37. arXiv:2103.13546  [pdf, other

    cs.CL

    Benchmarking Modern Named Entity Recognition Techniques for Free-text Health Record De-identification

    Authors: Abdullah Ahmed, Adeel Abbasi, Carsten Eickhoff

    Abstract: Electronic Health Records (EHRs) have become the primary form of medical data-keeping across the United States. Federal law restricts the sharing of any EHR data that contains protected health information (PHI). De-identification, the process of identifying and removing all PHI, is crucial for making EHR data publicly available for scientific research. This project explores several deep learning-b… ▽ More

    Submitted 24 March, 2021; originally announced March 2021.

    Comments: Presented at AMIA Informatics Summit 2021

  38. A Cooperative Dynamic Task Assignment Framework for COTSBot AUVs

    Authors: Amin Abbasi, Somaiyeh MahmoudZadeh, Amirmehdi Yazdani

    Abstract: This paper presents a cooperative dynamic task assignment framework for a certain class of Autonomous Underwater Vehicles (AUVs) employed to control outbreak of Crown-Of-Thorns Starfish (COTS) in Australia's Great Barrier Reef. The problem of monitoring and controlling the COTS is transcribed into a constrained task assignment problem in which eradicating clusters of COTS, by the injection system… ▽ More

    Submitted 10 January, 2021; originally announced January 2021.

    Journal ref: IEEE Transactions on Automation Science and Engineering 2020

  39. arXiv:2101.03693  [pdf

    cs.RO

    Exploiting a Fleet of UAVs for Monitoring and Data Acquisition of a Distributed Sensor Network

    Authors: S. MahmoudZadeh, A. Yazdani, A. Elmi, A. Abbasi, P. Ghanooni

    Abstract: This study proposes an efficient data collection strategy exploiting a team of Unmanned Aerial Vehicles (UAVs) to monitor and collect the data of a large distributed sensor network usually used for environmental monitoring, meteorology, agriculture, and renewable energy applications. The study develops a collaborative mission planning system that enables a team of UAVs to conduct and complete the… ▽ More

    Submitted 10 January, 2021; originally announced January 2021.

  40. arXiv:2012.13605  [pdf

    eess.IV cs.CV cs.LG

    COVIDX: Computer-aided diagnosis of Covid-19 and its severity prediction with raw digital chest X-ray images

    Authors: Wajid Arshad Abbasi, Syed Ali Abbas, Saiqa Andleeb

    Abstract: Coronavirus disease (COVID-19) is a contagious infection caused by severe acute respiratory syndrome coronavirus-2 (SARS-COV-2) and it has infected and killed millions of people across the globe. In the absence of specific drugs or vaccines for the treatment of COVID-19 and the limitation of prevailing diagnostic techniques, there is a requirement for some alternate automatic screening systems tha… ▽ More

    Submitted 25 December, 2020; originally announced December 2020.

    Comments: 19 pages, 3 figures, 5 tables

    Journal ref: Quantitative Biology, 10(2), 208-220, 2022

  41. arXiv:2012.05391  [pdf

    cs.RO

    Feasibility Assessment of a Cost-Effective Two-Wheel Kian-I Mobile Robot for Autonomous Navigation

    Authors: Amin Abbasi, Somaiyeh MahmoudZadeh, Amirmehdi Yazdani, Ata Jahangir Moshayedi

    Abstract: A two-wheeled mobile robot, namely Kian-I, is designed and prototyped in this research. The Kian-I is comparable with Khepera-IV in terms of dimensional specifications, mounted sensors, and performance capabilities and can be used for educational purposes and cost-effective experimental tests. A motion control architecture is designed for Kian-I in this study to facilitate accurate navigation for… ▽ More

    Submitted 9 December, 2020; originally announced December 2020.

    Journal ref: Robotics and Autonomous System 2020

  42. arXiv:2009.08869  [pdf

    q-bio.BM cs.AI cs.LG stat.ML

    PANDA: Predicting the change in proteins binding affinity upon mutations using sequence information

    Authors: Wajid Arshad Abbasi, Syed Ali Abbas, Saiqa Andleeb

    Abstract: Accurately determining a change in protein binding affinity upon mutations is important for the discovery and design of novel therapeutics and to assist mutagenesis studies. Determination of change in binding affinity upon mutations requires sophisticated, expensive, and time-consuming wet-lab experiments that can be aided with computational methods. Most of the computational prediction techniques… ▽ More

    Submitted 16 September, 2020; originally announced September 2020.

    Journal ref: Journal of Bioinformatics and Computational Biology, 2021

  43. arXiv:2008.06940  [pdf, other

    cs.LG cs.SI

    TempNodeEmb:Temporal Node Embedding considering temporal edge influence matrix

    Authors: Khushnood Abbas, Alireza Abbasi, Dong Shi, Niu Ling, Mingsheng Shang, Chen Liong, Bolun Chen

    Abstract: Understanding the evolutionary patterns of real-world evolving complex systems such as human interactions, transport networks, biological interactions, and computer networks has important implications in our daily lives. Predicting future links among the nodes in such networks reveals an important aspect of the evolution of temporal networks. To analyse networks, they are mapped to adjacency matri… ▽ More

    Submitted 16 August, 2020; originally announced August 2020.

    Comments: IEEE double column 6 pages

  44. arXiv:2007.12969  [pdf

    cs.CL cs.CY

    Constructing a Testbed for Psychometric Natural Language Processing

    Authors: Ahmed Abbasi, David G. Dobolyi, Richard G. Netemeyer

    Abstract: Psychometric measures of ability, attitudes, perceptions, and beliefs are crucial for understanding user behaviors in various contexts including health, security, e-commerce, and finance. Traditionally, psychometric dimensions have been measured and collected using survey-based methods. Inferring such constructs from user-generated text could afford opportunities for timely, unobtrusive, collectio… ▽ More

    Submitted 25 July, 2020; originally announced July 2020.

    Comments: 7 pages, 9 figures

  45. arXiv:2007.02307  [pdf, ps, other

    cs.CR

    Challenges in Designing Exploit Mitigations for Deeply Embedded Systems

    Authors: Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle

    Abstract: Memory corruption vulnerabilities have been around for decades and rank among the most prevalent vulnerabilities in embedded systems. Yet this constrained environment poses unique design and implementation challenges that significantly complicate the adoption of common hardening techniques. Combined with the irregular and involved nature of embedded patch management, this results in prolonged vuln… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

    Comments: Published in 4th IEEE European Symposium on Security and Privacy (EuroS&P'19)

  46. arXiv:2005.12855  [pdf, other

    eess.IV cs.CV cs.LG

    COVID-Net S: Towards computer-aided severity assessment via training and validation of deep neural networks for geographic extent and opacity extent scoring of chest X-rays for SARS-CoV-2 lung disease severity

    Authors: Alexander Wong, Zhong Qiu Lin, Linda Wang, Audrey G. Chung, Beiyi Shen, Almas Abbasi, Mahsa Hoshmand-Kochi, Timothy Q. Duong

    Abstract: Background: A critical step in effective care and treatment planning for severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), the cause of the COVID-19 pandemic, is the assessment of the severity of disease progression. Chest x-rays (CXRs) are often used to assess SARS-CoV-2 severity, with two important assessment metrics being extent of lung involvement and degree of opacity. In this pro… ▽ More

    Submitted 16 April, 2021; v1 submitted 26 May, 2020; originally announced May 2020.

    Comments: 8 pages

  47. arXiv:2005.11856  [pdf, other

    eess.IV cs.LG q-bio.QM stat.AP

    Predicting COVID-19 Pneumonia Severity on Chest X-ray with Deep Learning

    Authors: Joseph Paul Cohen, Lan Dao, Paul Morrison, Karsten Roth, Yoshua Bengio, Beiyi Shen, Almas Abbasi, Mahsa Hoshmand-Kochi, Marzyeh Ghassemi, Haifang Li, Tim Q Duong

    Abstract: Purpose: The need to streamline patient management for COVID-19 has become more pressing than ever. Chest X-rays provide a non-invasive (potentially bedside) tool to monitor the progression of the disease. In this study, we present a severity score prediction model for COVID-19 pneumonia for frontal chest X-ray images. Such a tool can gauge severity of COVID-19 lung infections (and pneumonia in ge… ▽ More

    Submitted 30 June, 2020; v1 submitted 24 May, 2020; originally announced May 2020.

  48. arXiv:2004.11842  [pdf

    eess.SP cs.LG cs.NI cs.SI

    A Mobile Cloud-Based eHealth Scheme

    Authors: Yihe Liu, Aaqif Afzaal Abbasi, Atefeh Aghaei, Almas Abbasi, Amir Mosavi, Shahab Shamshirband, Mohammed A. A. Al-qaness

    Abstract: Mobile cloud computing is an emerging field that is gaining popularity across borders at a rapid pace. Similarly, the field of health informatics is also considered as an extremely important field. This work observes the collaboration between these two fields to solve the traditional problem of extracting Electrocardiogram signals from trace reports and then performing analysis. The developed syst… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

    Comments: 9 pages, 3 figures

    MSC Class: 68T05

  49. Information and Communication Theoretical Understanding and Treatment of Spinal Cord Injuries: State-of-the-art and Research Challenges

    Authors: Ozgur B. Akan, Hamideh Ramezani, Meltem Civas, Oktay Cetinkaya, Bilgesu A. Bilgin, Naveed A. Abbasi

    Abstract: Among the various key networks in the human body, the nervous system occupies central importance. The debilitating effects of spinal cord injuries (SCI) impact a significant number of people throughout the world, and to date, there is no satisfactory method to treat them. In this paper, we review the major treatment techniques for SCI that include promising solutions based on information and commu… ▽ More

    Submitted 11 March, 2021; v1 submitted 26 March, 2020; originally announced March 2020.

    Comments: IEEE Reviews in Biomedical Engineering

  50. arXiv:2003.11265  [pdf, other

    cs.CV eess.IV

    Multiscale Sparsifying Transform Learning for Image Denoising

    Authors: Ashkan Abbasi, Amirhassan Monadjemi, Leyuan Fang, Hossein Rabbani, Neda Noormohammadi, Yi Zhang

    Abstract: The data-driven sparse methods such as synthesis dictionary learning (e.g., K-SVD) and sparsifying transform learning have been proven effective in image denoising. However, they are intrinsically single-scale which can lead to suboptimal results. We propose two methods developed based on wavelet subbands mixing to efficiently combine the merits of both single and multiscale methods. We show that… ▽ More

    Submitted 25 July, 2021; v1 submitted 25 March, 2020; originally announced March 2020.