Zum Hauptinhalt springen

Showing 1–8 of 8 results for author: Ghafouri, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.15713  [pdf

    cs.CL cs.AI

    PersianLLaMA: Towards Building First Persian Large Language Model

    Authors: Mohammad Amin Abbasi, Arash Ghafouri, Mahdi Firouzmandi, Hassan Naderi, Behrouz Minaei Bidgoli

    Abstract: Despite the widespread use of the Persian language by millions globally, limited efforts have been made in natural language processing for this language. The use of large language models as effective tools in various natural language processing tasks typically requires extensive textual data and robust hardware resources. Consequently, the scarcity of Persian textual data and the unavailability of… ▽ More

    Submitted 25 December, 2023; originally announced December 2023.

  2. arXiv:2304.11664  [pdf

    cs.CL cs.AI

    IslamicPCQA: A Dataset for Persian Multi-hop Complex Question Answering in Islamic Text Resources

    Authors: Arash Ghafouri, Hasan Naderi, Mohammad Aghajani asl, Mahdi Firouzmandi

    Abstract: Nowadays, one of the main challenges for Question Answering Systems is to answer complex questions using various sources of information. Multi-hop questions are a type of complex questions that require multi-step reasoning to answer. In this article, the IslamicPCQA dataset is introduced. This is the first Persian dataset for answering complex questions based on non-structured information sources… ▽ More

    Submitted 23 April, 2023; originally announced April 2023.

  3. arXiv:2201.08239  [pdf, other

    cs.CL cs.AI

    LaMDA: Language Models for Dialog Applications

    Authors: Romal Thoppilan, Daniel De Freitas, Jamie Hall, Noam Shazeer, Apoorv Kulshreshtha, Heng-Tze Cheng, Alicia Jin, Taylor Bos, Leslie Baker, Yu Du, YaGuang Li, Hongrae Lee, Huaixiu Steven Zheng, Amin Ghafouri, Marcelo Menegali, Yanping Huang, Maxim Krikun, Dmitry Lepikhin, James Qin, Dehao Chen, Yuanzhong Xu, Zhifeng Chen, Adam Roberts, Maarten Bosma, Vincent Zhao , et al. (35 additional authors not shown)

    Abstract: We present LaMDA: Language Models for Dialog Applications. LaMDA is a family of Transformer-based neural language models specialized for dialog, which have up to 137B parameters and are pre-trained on 1.56T words of public dialog data and web text. While model scaling alone can improve quality, it shows less improvements on safety and factual grounding. We demonstrate that fine-tuning with annotat… ▽ More

    Submitted 10 February, 2022; v1 submitted 20 January, 2022; originally announced January 2022.

  4. arXiv:1804.11022  [pdf, ps, other

    cs.AI

    Adversarial Regression for Detecting Attacks in Cyber-Physical Systems

    Authors: Amin Ghafouri, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: Attacks in cyber-physical systems (CPS) which manipulate sensor readings can cause enormous physical damage if undetected. Detection of attacks on sensors is crucial to mitigate this issue. We study supervised regression as a means to detect anomalous sensor readings, where each sensor's measurement is predicted as a function of other sensors. We show that several common learning approaches in thi… ▽ More

    Submitted 29 April, 2018; originally announced April 2018.

  5. Optimal Detection of Faulty Traffic Sensors Used in Route Planning

    Authors: Amin Ghafouri, Aron Laszka, Abhishek Dubey, Xenofon Koutsoukos

    Abstract: In a smart city, real-time traffic sensors may be deployed for various applications, such as route planning. Unfortunately, sensors are prone to failures, which result in erroneous traffic data. Erroneous data can adversely affect applications such as route planning, and can cause increased travel time. To minimize the impact of sensor failures, we must detect them promptly and accurately. However… ▽ More

    Submitted 16 March, 2017; v1 submitted 8 February, 2017; originally announced February 2017.

    Comments: Proceedings of The 2nd Workshop on Science of Smart City Operations and Platforms Engineering (SCOPE 2017), Pittsburgh, PA USA, April 2017, 6 pages

  6. arXiv:1606.06707  [pdf, other

    cs.GT cs.CR eess.SY

    Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments

    Authors: Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: In cyber-physical systems, malicious and resourceful attackers could penetrate the system through cyber means and cause significant physical damage. Consequently, detection of such attacks becomes integral towards making these systems resilient to attacks. To achieve this objective, intrusion detection systems (IDS) that are able to detect malicious behavior can be deployed. However, practical IDS… ▽ More

    Submitted 8 February, 2017; v1 submitted 21 June, 2016; originally announced June 2016.

    Comments: Decision and Game Theory for Security: 7th International Conference, GameSec 2016, New York, NY, USA

  7. arXiv:1606.06699  [pdf, other

    eess.SY cs.CR

    Resilient Supervisory Control of Autonomous Intersections in the Presence of Sensor Attacks

    Authors: Amin Ghafouri, Xenofon D. Koutsoukos

    Abstract: Cyber-physical systems (CPS), such as autonomous vehicles crossing an intersection, are vulnerable to cyber-attacks and their safety-critical nature makes them a target for malicious adversaries. This paper studies the problem of supervisory control of autonomous intersections in the presence of sensor attacks. Sensor attacks are performed when an adversary gains access to the transmission channel… ▽ More

    Submitted 21 June, 2016; originally announced June 2016.

    Comments: 8 pages, submitted to 55th IEEE Conference on Decision and Control (CDC 2016)

  8. arXiv:1606.06698  [pdf, other

    eess.SY cs.CR

    Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering

    Authors: Amin Ghafouri, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: Recent experimental studies have shown that traffic management systems are vulnerable to cyber-attacks on sensor data. This paper studies the vulnerability of fixed-time control of signalized intersections when sensors measuring traffic flow information are compromised and perturbed by an adversary. The problems are formulated by considering three malicious objectives: 1) worst-case network accumu… ▽ More

    Submitted 8 February, 2017; v1 submitted 21 June, 2016; originally announced June 2016.

    Journal ref: 9th International Symposium on Resilient Control Systems (ISRCS), Chicago, IL, pp. 130-135 (2016)