Skip to main content

Showing 1–3 of 3 results for author: Hajizadeh, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.00891  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    Large Language Models in Cybersecurity: State-of-the-Art

    Authors: Farzad Nourmohammadzadeh Motlagh, Mehrdad Hajizadeh, Mehryar Majd, Pejman Najafi, Feng Cheng, Christoph Meinel

    Abstract: The rise of Large Language Models (LLMs) has revolutionized our comprehension of intelligence bringing us closer to Artificial Intelligence. Since their introduction, researchers have actively explored the applications of LLMs across diverse fields, significantly elevating capabilities. Cybersecurity, traditionally resistant to data-driven solutions and slow to embrace machine learning, stands out… ▽ More

    Submitted 30 January, 2024; originally announced February 2024.

  2. arXiv:2207.11031  [pdf

    cs.CV cs.LG cs.NE

    MobileDenseNet: A new approach to object detection on mobile devices

    Authors: Mohammad Hajizadeh, Mohammad Sabokrou, Adel Rahmani

    Abstract: Object detection problem solving has developed greatly within the past few years. There is a need for lighter models in instances where hardware limitations exist, as well as a demand for models to be tailored to mobile devices. In this article, we will assess the methods used when creating algorithms that address these issues. The main goal of this article is to increase accuracy in state-of-the-… ▽ More

    Submitted 22 July, 2022; originally announced July 2022.

  3. arXiv:1909.03059  [pdf, other

    cs.NI cs.LG

    Destination-aware Adaptive Traffic Flow Rule Aggregation in Software-Defined Networks

    Authors: Trung V. Phan, Mehrdad Hajizadeh, Nguyen Tuan Khai, Thomas Bauschert

    Abstract: In this paper, we propose a destination-aware adaptive traffic flow rule aggregation (DATA) mechanism for facilitating traffic flow monitoring in SDN-based networks. This method adapts the number of flow table entries in SDN switches according to the level of detail of traffic flow information that other mechanisms (e.g. for traffic engineering, traffic monitoring, intrusion detection) require. It… ▽ More

    Submitted 7 September, 2019; originally announced September 2019.

    Comments: This paper was presented at NetSys conference 2019. arXiv admin note: text overlap with arXiv:1909.01544