Zum Hauptinhalt springen

Showing 1–29 of 29 results for author: Rahimi, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.11935  [pdf, other

    cs.LG cs.AI cs.HC

    Explainable Anomaly Detection: Counterfactual driven What-If Analysis

    Authors: Logan Cummins, Alexander Sommers, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jaboure, Thomas Arnold

    Abstract: There exists three main areas of study inside of the field of predictive maintenance: anomaly detection, fault diagnosis, and remaining useful life prediction. Notably, anomaly detection alerts the stakeholder that an anomaly is occurring. This raises two fundamental questions: what is causing the fault and how can we fix it? Inside of the field of explainable artificial intelligence, counterfactu… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

    Comments: 8 pages, 6 figures, 3 tables

  2. arXiv:2406.18812  [pdf, other

    cs.RO cs.AI

    A Survey on Privacy Attacks Against Digital Twin Systems in AI-Robotics

    Authors: Ivan A. Fernandez, Subash Neupane, Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, Nisha Pillai, Jingdao Chen, Shahram Rahimi

    Abstract: Industry 4.0 has witnessed the rise of complex robots fueled by the integration of Artificial Intelligence/Machine Learning (AI/ML) and Digital Twin (DT) technologies. While these technologies offer numerous benefits, they also introduce potential privacy and security risks. This paper surveys privacy attacks targeting robots enabled by AI and DT models. Exfiltration and data leakage of ML models… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    Comments: 10 pages, 3 figures, 1 table

  3. arXiv:2406.02322  [pdf, other

    cs.LG cs.AI

    A Survey of Transformer Enabled Time Series Synthesis

    Authors: Alexander Sommers, Logan Cummins, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jaboure, Thomas Arnold

    Abstract: Generative AI has received much attention in the image and language domains, with the transformer neural network continuing to dominate the state of the art. Application of these models to time series generation is less explored, however, and is of great utility to machine learning, privacy preservation, and explainability research. The present survey identifies this gap at the intersection of the… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  4. arXiv:2405.08120  [pdf, other

    cs.ET cs.AI

    From Questions to Insightful Answers: Building an Informed Chatbot for University Resources

    Authors: Subash Neupane, Elias Hossain, Jason Keith, Himanshu Tripathi, Farbod Ghiasi, Noorbakhsh Amiri Golilarz, Amin Amirlatifi, Sudip Mittal, Shahram Rahimi

    Abstract: This paper presents BARKPLUG V.2, a Large Language Model (LLM)-based chatbot system built using Retrieval Augmented Generation (RAG) pipelines to enhance the user experience and access to information within academic settings.The objective of BARKPLUG V.2 is to provide information to users about various campus resources, including academic departments, programs, campus facilities, and student resou… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

  5. arXiv:2404.13050  [pdf, other

    cs.CL cs.AI

    FlowMind: Automatic Workflow Generation with LLMs

    Authors: Zhen Zeng, William Watson, Nicole Cho, Saba Rahimi, Shayleen Reynolds, Tucker Balch, Manuela Veloso

    Abstract: The rapidly evolving field of Robotic Process Automation (RPA) has made significant strides in automating repetitive processes, yet its effectiveness diminishes in scenarios requiring spontaneous or unpredictable tasks demanded by users. This paper introduces a novel approach, FlowMind, leveraging the capabilities of Large Language Models (LLMs) such as Generative Pretrained Transformer (GPT), to… ▽ More

    Submitted 16 March, 2024; originally announced April 2024.

    Comments: Published in ACM ICAIF 2023

  6. arXiv:2404.08601  [pdf, ps, other

    cs.LG

    Generating Synthetic Time Series Data for Cyber-Physical Systems

    Authors: Alexander Sommers, Somayeh Bakhtiari Ramezani, Logan Cummins, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jaboure

    Abstract: Data augmentation is an important facilitator of deep learning applications in the time series domain. A gap is identified in the literature, demonstrating sparse exploration of the transformer, the dominant sequence model, for data augmentation in time series. A architecture hybridizing several successful priors is put forth and tested using a powerful time domain similarity metric. Results sugge… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

  7. arXiv:2403.08607  [pdf, other

    cs.CL cs.AI

    MedInsight: A Multi-Source Context Augmentation Framework for Generating Patient-Centric Medical Responses using Large Language Models

    Authors: Subash Neupane, Shaswata Mitra, Sudip Mittal, Noorbakhsh Amiri Golilarz, Shahram Rahimi, Amin Amirlatifi

    Abstract: Large Language Models (LLMs) have shown impressive capabilities in generating human-like responses. However, their lack of domain-specific knowledge limits their applicability in healthcare settings, where contextual and comprehensive responses are vital. To address this challenge and enable the generation of patient-centric responses that are contextually relevant and comprehensive, we propose Me… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

  8. arXiv:2402.17204  [pdf, other

    cs.CV

    Advancing Generative Model Evaluation: A Novel Algorithm for Realistic Image Synthesis and Comparison in OCR System

    Authors: Majid Memari, Khaled R. Ahmed, Shahram Rahimi, Noorbakhsh Amiri Golilarz

    Abstract: This research addresses a critical challenge in the field of generative models, particularly in the generation and evaluation of synthetic images. Given the inherent complexity of generative models and the absence of a standardized procedure for their comparison, our study introduces a pioneering algorithm to objectively assess the realism of synthetic images. This approach significantly enhances… ▽ More

    Submitted 1 March, 2024; v1 submitted 26 February, 2024; originally announced February 2024.

    Comments: The manuscript was submitted to IEEE Access on 29-Jan-2024 and is currently under review for publication in IEEE Access

  9. arXiv:2402.12608  [pdf, other

    cs.AI

    Patient-Centric Knowledge Graphs: A Survey of Current Methods, Challenges, and Applications

    Authors: Hassan S. Al Khatib, Subash Neupane, Harish Kumar Manchukonda, Noorbakhsh Amiri Golilarz, Sudip Mittal, Amin Amirlatifi, Shahram Rahimi

    Abstract: Patient-Centric Knowledge Graphs (PCKGs) represent an important shift in healthcare that focuses on individualized patient care by mapping the patient's health information in a holistic and multi-dimensional way. PCKGs integrate various types of health data to provide healthcare professionals with a comprehensive understanding of a patient's health, enabling more personalized and effective care. T… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

  10. arXiv:2401.10207  [pdf, other

    cs.CR cs.AI cs.LG

    Eclectic Rule Extraction for Explainability of Deep Neural Network based Intrusion Detection Systems

    Authors: Jesse Ables, Nathaniel Childers, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

    Abstract: This paper addresses trust issues created from the ubiquity of black box algorithms and surrogate explainers in Explainable Intrusion Detection Systems (X-IDS). While Explainable Artificial Intelligence (XAI) aims to enhance transparency, black box surrogate explainers, such as Local Interpretable Model-Agnostic Explanation (LIME) and SHapley Additive exPlanation (SHAP), are difficult to trust. Th… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  11. arXiv:2401.10036  [pdf, other

    cs.CR cs.AI cs.IR cs.LO

    LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge

    Authors: Shaswata Mitra, Subash Neupane, Trisha Chakraborty, Sudip Mittal, Aritran Piplai, Manas Gaur, Shahram Rahimi

    Abstract: Security Operations Center (SoC) analysts gather threat reports from openly accessible global threat databases and customize them manually to suit a particular organization's needs. These analysts also depend on internal repositories, which act as private local knowledge database for an organization. Credible cyber intelligence, critical operational details, and relevant organizational information… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  12. arXiv:2401.07871  [pdf, other

    cs.AI cs.HC cs.LG

    Explainable Predictive Maintenance: A Survey of Current Methods, Challenges and Opportunities

    Authors: Logan Cummins, Alex Sommers, Somayeh Bakhtiari Ramezani, Sudip Mittal, Joseph Jabour, Maria Seale, Shahram Rahimi

    Abstract: Predictive maintenance is a well studied collection of techniques that aims to prolong the life of a mechanical system by using artificial intelligence and machine learning to predict the optimal time to perform maintenance. The methods allow maintainers of systems and hardware to reduce financial and time costs of upkeep. As these methods are adopted for more serious and potentially life-threaten… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  13. arXiv:2310.08565  [pdf, other

    cs.RO cs.AI

    Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities

    Authors: Subash Neupane, Shaswata Mitra, Ivan A. Fernandez, Swayamjit Saha, Sudip Mittal, Jingdao Chen, Nisha Pillai, Shahram Rahimi

    Abstract: Robotics and Artificial Intelligence (AI) have been inextricably intertwined since their inception. Today, AI-Robotics systems have become an integral part of our daily lives, from robotic vacuum cleaners to semi-autonomous cars. These systems are built upon three fundamental architectural elements: perception, navigation and planning, and control. However, while the integration of AI-Robotics sys… ▽ More

    Submitted 25 January, 2024; v1 submitted 12 October, 2023; originally announced October 2023.

  14. arXiv:2308.11827  [pdf, other

    cs.CL cs.AI cs.LG

    Exploring the Effectiveness of GPT Models in Test-Taking: A Case Study of the Driver's License Knowledge Test

    Authors: Saba Rahimi, Tucker Balch, Manuela Veloso

    Abstract: Large language models such as Open AI's Generative Pre-trained Transformer (GPT) models are proficient at answering questions, but their knowledge is confined to the information present in their training data. This limitation renders them ineffective when confronted with questions about recent developments or non-public documents. Our research proposes a method that enables GPT models to answer qu… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

  15. arXiv:2306.13033  [pdf, other

    cs.CR cs.AI

    Impacts and Risk of Generative AI Technology on Cyber Defense

    Authors: Subash Neupane, Ivan A. Fernandez, Sudip Mittal, Shahram Rahimi

    Abstract: Generative Artificial Intelligence (GenAI) has emerged as a powerful technology capable of autonomously producing highly realistic content in various domains, such as text, images, audio, and videos. With its potential for positive applications in creative arts, content generation, virtual assistants, and data synthesis, GenAI has garnered significant attention and adoption. However, the increasin… ▽ More

    Submitted 22 June, 2023; originally announced June 2023.

  16. arXiv:2304.04912  [pdf, other

    cs.LG cs.AI econ.EM q-fin.CP

    Financial Time Series Forecasting using CNN and Transformer

    Authors: Zhen Zeng, Rachneet Kaur, Suchetha Siddagangappa, Saba Rahimi, Tucker Balch, Manuela Veloso

    Abstract: Time series forecasting is important across various domains for decision-making. In particular, financial time series such as stock prices can be hard to predict as it is difficult to model short-term and long-term temporal dependencies between data points. Convolutional Neural Networks (CNN) are good at capturing local patterns for modeling short-term dependencies. However, CNNs cannot learn long… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

    Comments: Published at AAAI 2023 - AI for Financial Services Bridge

  17. arXiv:2303.17387  [pdf, other

    cs.CR cs.AI cs.LG

    Explainable Intrusion Detection Systems Using Competitive Learning Techniques

    Authors: Jesse Ables, Thomas Kirby, Sudip Mittal, Ioana Banicescu, Shahram Rahimi, William Anderson, Maria Seale

    Abstract: The current state of the art systems in Artificial Intelligence (AI) enabled intrusion detection use a variety of black box methods. These black box methods are generally trained using Error Based Learning (EBL) techniques with a focus on creating accurate models. These models have high performative costs and are not easily explainable. A white box Competitive Learning (CL) based eXplainable Intru… ▽ More

    Submitted 30 March, 2023; originally announced March 2023.

  18. arXiv:2302.00152  [pdf, other

    cs.LG cs.AI cs.CY cs.NE

    TwinExplainer: Explaining Predictions of an Automotive Digital Twin

    Authors: Subash Neupane, Ivan A. Fernandez, Wilson Patterson, Sudip Mittal, Milan Parmar, Shahram Rahimi

    Abstract: Vehicles are complex Cyber Physical Systems (CPS) that operate in a variety of environments, and the likelihood of failure of one or more subsystems, such as the engine, transmission, brakes, and fuel, can result in unscheduled downtime and incur high maintenance or repair costs. In order to prevent these issues, it is crucial to continuously monitor the health of various subsystems and identify a… ▽ More

    Submitted 31 January, 2023; originally announced February 2023.

  19. arXiv:2211.14732  [pdf, other

    cs.LG cs.AI cs.CV

    Deep representation learning: Fundamentals, Perspectives, Applications, and Open Challenges

    Authors: Kourosh T. Baghaei, Amirreza Payandeh, Pooya Fayyazsanavi, Shahram Rahimi, Zhiqian Chen, Somayeh Bakhtiari Ramezani

    Abstract: Machine Learning algorithms have had a profound impact on the field of computer science over the past few decades. These algorithms performance is greatly influenced by the representations that are derived from the data in the learning process. The representations learned in a successful learning process should be concise, discrete, meaningful, and able to be applied across a variety of tasks. A r… ▽ More

    Submitted 27 November, 2022; originally announced November 2022.

  20. arXiv:2210.14018  [pdf, other

    cs.CR cs.AI cs.LG

    A White-Box Adversarial Attack Against a Digital Twin

    Authors: Wilson Patterson, Ivan Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi

    Abstract: Recent research has shown that Machine Learning/Deep Learning (ML/DL) models are particularly vulnerable to adversarial perturbations, which are small changes made to the input data in order to fool a machine learning classifier. The Digital Twin, which is typically described as consisting of a physical entity, a virtual counterpart, and the data connections in between, is increasingly being inves… ▽ More

    Submitted 25 October, 2022; originally announced October 2022.

    Journal ref: 38th ACM Annual Computer Security Applications Conference 2023 (ACM ACSAC '23)

  21. arXiv:2209.06828  [pdf, other

    cs.LG cs.AI cs.NE

    A Temporal Anomaly Detection System for Vehicles utilizing Functional Working Groups and Sensor Channels

    Authors: Subash Neupane, Ivan A. Fernandez, Wilson Patterson, Sudip Mittal, Shahram Rahimi

    Abstract: A modern vehicle fitted with sensors, actuators, and Electronic Control Units (ECUs) can be divided into several operational subsystems called Functional Working Groups (FWGs). Examples of these FWGs include the engine system, transmission, fuel system, brakes, etc. Each FWG has associated sensor-channels that gauge vehicular operating conditions. This data rich environment is conducive to the dev… ▽ More

    Submitted 14 September, 2022; originally announced September 2022.

    Journal ref: IEEE International Conference on Collaboration and Internet Computing 2022 (IEEE CIC 2022)

  22. arXiv:2208.07801  [pdf, other

    cs.CR cs.NE

    Designing an Artificial Immune System inspired Intrusion Detection System

    Authors: William Anderson, Kaneesha Moore, Jesse Ables, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

    Abstract: The Human Immune System (HIS) works to protect a body from infection, illness, and disease. This system can inspire cybersecurity professionals to design an Artificial Immune System (AIS) based Intrusion Detection System (IDS). These biologically inspired algorithms using Self/Nonself and Danger Theory can directly augmentIDS designs and implementations. In this paper, we include an examination in… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

  23. arXiv:2207.07465  [pdf, other

    cs.CR cs.AI cs.LG

    Creating an Explainable Intrusion Detection System Using Self Organizing Maps

    Authors: Jesse Ables, Thomas Kirby, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

    Abstract: Modern Artificial Intelligence (AI) enabled Intrusion Detection Systems (IDS) are complex black boxes. This means that a security analyst will have little to no explanation or clarification on why an IDS model made a particular prediction. A potential solution to this problem is to research and develop Explainable Intrusion Detection Systems (X-IDS) based on current capabilities in Explainable Art… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

  24. arXiv:2207.06236  [pdf, other

    cs.CR cs.AI

    Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities

    Authors: Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

    Abstract: The application of Artificial Intelligence (AI) and Machine Learning (ML) to cybersecurity challenges has gained traction in industry and academia, partially as a result of widespread malware attacks on critical systems such as cloud infrastructures and government institutions. Intrusion Detection Systems (IDS), using some forms of AI, have received widespread adoption due to their ability to hand… ▽ More

    Submitted 13 July, 2022; originally announced July 2022.

  25. arXiv:1606.04929  [pdf, ps, other

    cs.HC

    Designing a Human-Machine Hybrid Computing System for Unstructured Data Analytics

    Authors: Koushik Sinha, Geetha Manjunath, Bidyut Gupta, Shahram Rahimi

    Abstract: Current machine algorithms for analysis of unstructured data typically show low accuracies due to the need for human-like intelligence. Conversely, though humans are much better than machine algorithms on analyzing unstructured data, they are unpredictable, slower and can be erroneous or even malicious as computing agents. Therefore, a hybrid platform that can intelligently orchestrate machine and… ▽ More

    Submitted 15 June, 2016; originally announced June 2016.

    Comments: conference pre-print version in Proc. 31st Intl. Conf. on Computers and Their Applications (CATA), Las Vegas, USA, April 4-6, 2016

  26. arXiv:1606.04928  [pdf

    cs.NI

    Locality based Core Selection for Multicore Shared Tree Multicasting

    Authors: Koushik Sinha, Bidyut Gupta, Shahram Rahimi, Ashraf Alyanbaawi

    Abstract: Multicasting can be done in two different ways: source based tree approach and shared tree approach. Protocols such as Core Based Tree (CBT), Protocol Independent Multicasting Sparse Mode (PIM-SM) use shared tree approach. Shared tree approach is preferred over source-based tree approach because in the later construction of minimum cost tree per source is needed unlike a single shared tree in the… ▽ More

    Submitted 15 June, 2016; originally announced June 2016.

    Comments: Conference pre-print version in Proc. 31st Intl. Conf. on Computers and Their Applications (CATA), Las Vegas, USA, April 4-6, 2016

  27. arXiv:1404.4740  [pdf

    cs.CL

    Challenges in Persian Electronic Text Analysis

    Authors: Behrang QasemiZadeh, Saeed Rahimi, Mehdi Safaee Ghalati

    Abstract: Farsi, also known as Persian, is the official language of Iran and Tajikistan and one of the two main languages spoken in Afghanistan. Farsi enjoys a unified Arabic script as its writing system. In this paper we briefly introduce the writing standards of Farsi and highlight problems one would face when analyzing Farsi electronic texts, especially during development of Farsi corpora regarding to tr… ▽ More

    Submitted 18 April, 2014; originally announced April 2014.

    Comments: Appeared in a Local conference 2006, available for the first time

    MSC Class: 68T50 ACM Class: I.2.7

  28. arXiv:1404.4572  [pdf

    cs.CL

    The First Parallel Multilingual Corpus of Persian: Toward a Persian BLARK

    Authors: Behrang Qasemizadeh, Saeed Rahimi, Behrooz Mahmoodi Bakhtiari

    Abstract: In this article, we have introduced the first parallel corpus of Persian with more than 10 other European languages. This article describes primary steps toward preparing a Basic Language Resources Kit (BLARK) for Persian. Up to now, we have proposed morphosyntactic specification of Persian based on EAGLE/MULTEXT guidelines and specific resources of MULTEXT-East. The article introduces Persian Lan… ▽ More

    Submitted 17 April, 2014; originally announced April 2014.

    MSC Class: 68T50 ACM Class: I.2.7

  29. Case study: Class diagram restructuring

    Authors: K. Lano, S. Kolahdouz Rahimi

    Abstract: This case study is an update-in-place refactoring transformation on UML class diagrams. Its aim is to remove clones of attributes from a class diagram, and to identify new classes which abstract groups of classes that share common data features. It is used as one of a general collection of transformations (such as the removal of redundant inheritance, or multiple inheritance) which aim to impro… ▽ More

    Submitted 2 December, 2013; v1 submitted 2 September, 2013; originally announced September 2013.

    Comments: In Proceedings TTC 2013, arXiv:1311.7536

    Journal ref: EPTCS 135, 2013, pp. 8-15