Zum Hauptinhalt springen

Showing 1–28 of 28 results for author: Rajabi, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.16388  [pdf, other

    cs.HC cs.AI

    PenSLR: Persian end-to-end Sign Language Recognition Using Ensembling

    Authors: Amirparsa Salmankhah, Amirreza Rajabi, Negin Kheirmand, Ali Fadaeimanesh, Amirreza Tarabkhah, Amirreza Kazemzadeh, Hamed Farbeh

    Abstract: Sign Language Recognition (SLR) is a fast-growing field that aims to fill the communication gaps between the hearing-impaired and people without hearing loss. Existing solutions for Persian Sign Language (PSL) are limited to word-level interpretations, underscoring the need for more advanced and comprehensive solutions. Moreover, previous work on other languages mainly focuses on manipulating the… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

  2. arXiv:2402.08695  [pdf, other

    cs.CR cs.LG

    Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors

    Authors: Dinuka Sahabandu, Xiaojun Xu, Arezoo Rajabi, Luyao Niu, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran

    Abstract: We propose and analyze an adaptive adversary that can retrain a Trojaned DNN and is also aware of SOTA output-based Trojaned model detectors. We show that such an adversary can ensure (1) high accuracy on both trigger-embedded and clean samples and (2) bypass detection. Our approach is based on an observation that the high dimensionality of the DNN parameters provides sufficient degrees of freedom… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

  3. arXiv:2402.01114  [pdf, other

    cs.LG cs.AI cs.CR

    Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization

    Authors: Arezoo Rajabi, Reeya Pimple, Aiswarya Janardhanan, Surudhi Asokraj, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: Transfer learning (TL) has been demonstrated to improve DNN model performance when faced with a scarcity of training samples. However, the suitability of TL as a solution to reduce vulnerability of overfitted DNNs to privacy attacks is unexplored. A class of privacy attacks called membership inference attacks (MIAs) aim to determine whether a given sample belongs to the training dataset (member) o… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

  4. arXiv:2308.15673  [pdf, other

    cs.CR cs.LG

    MDTD: A Multi Domain Trojan Detector for Deep Neural Networks

    Authors: Arezoo Rajabi, Surudhi Asokraj, Fengqing Jiang, Luyao Niu, Bhaskar Ramasubramanian, Jim Ritcey, Radha Poovendran

    Abstract: Machine learning models that use deep neural networks (DNNs) are vulnerable to backdoor attacks. An adversary carrying out a backdoor attack embeds a predefined perturbation called a trigger into a small subset of input samples and trains the DNN such that the presence of the trigger in the input results in an adversary-desired output class. Such adversarial retraining however needs to ensure that… ▽ More

    Submitted 2 September, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

    Comments: Accepted to ACM Conference on Computer and Communications Security (ACM CCS) 2023

  5. arXiv:2304.10848  [pdf, other

    cs.NE cs.AI cs.DS

    How Well Does the Metropolis Algorithm Cope With Local Optima?

    Authors: Benjamin Doerr, Taha El Ghazi El Houssaini, Amirhossein Rajabi, Carsten Witt

    Abstract: The Metropolis algorithm (MA) is a classic stochastic local search heuristic. It avoids getting stuck in local optima by occasionally accepting inferior solutions. To better and in a rigorous manner understand this ability, we conduct a mathematical runtime analysis of the MA on the CLIFF benchmark. Apart from one local optimum, cliff functions are monotonically increasing towards the global optim… ▽ More

    Submitted 15 May, 2023; v1 submitted 21 April, 2023; originally announced April 2023.

    Comments: To appear in the proceedings of GECCO 2023. With appendix containing all proofs. 28 pages

  6. arXiv:2212.01688  [pdf, other

    cs.LG cs.CR

    LDL: A Defense for Label-Based Membership Inference Attacks

    Authors: Arezoo Rajabi, Dinuka Sahabandu, Luyao Niu, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: The data used to train deep neural network (DNN) models in applications such as healthcare and finance typically contain sensitive information. A DNN model may suffer from overfitting. Overfitted models have been shown to be susceptible to query-based attacks such as membership inference attacks (MIAs). MIAs aim to determine whether a sample belongs to the dataset used to train a classifier (membe… ▽ More

    Submitted 16 December, 2022; v1 submitted 3 December, 2022; originally announced December 2022.

    Comments: to appear in ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2023)

  7. arXiv:2209.08648  [pdf, other

    cs.CV cs.AI

    Through a fair looking-glass: mitigating bias in image datasets

    Authors: Amirarsalan Rajabi, Mehdi Yazdani-Jahromi, Ozlem Ozmen Garibay, Gita Sukthankar

    Abstract: With the recent growth in computer vision applications, the question of how fair and unbiased they are has yet to be explored. There is abundant evidence that the bias present in training data is reflected in the models, or even amplified. Many previous methods for image dataset de-biasing, including models based on augmenting datasets, are computationally expensive to implement. In this study, we… ▽ More

    Submitted 18 September, 2022; originally announced September 2022.

  8. arXiv:2207.05937  [pdf, other

    cs.LG cs.CR cs.GT

    Game of Trojans: A Submodular Byzantine Approach

    Authors: Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: Machine learning models in the wild have been shown to be vulnerable to Trojan attacks during training. Although many detection mechanisms have been proposed, strong adaptive attackers have been shown to be effective against them. In this paper, we aim to answer the questions considering an intelligent and adaptive adversary: (i) What is the minimal amount of instances required to be Trojaned by a… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

    Comments: Submitted to GameSec 2022

  9. Simulated Annealing is a Polynomial-Time Approximation Scheme for the Minimum Spanning Tree Problem

    Authors: Benjamin Doerr, Amirhossein Rajabi, Carsten Witt

    Abstract: We prove that Simulated Annealing with an appropriate cooling schedule computes arbitrarily tight constant-factor approximations to the minimum spanning tree problem in polynomial time. This result was conjectured by Wegener (2005). More precisely, denoting by $n, m, w_{\max}$, and $w_{\min}$ the number of vertices and edges as well as the maximum and minimum edge weight of the MST instance, we pr… ▽ More

    Submitted 22 July, 2023; v1 submitted 5 April, 2022; originally announced April 2022.

    Comments: 19 pages. Extended version of a paper at GECCO 2022. This version is accepted for publication in Algorithmica

    Journal ref: Simulated annealing is a polynomial-time approximation scheme for the minimum spanning tree problem. Algorithmica. 2023

  10. arXiv:2203.15506  [pdf, other

    cs.CR cs.AI cs.LG

    Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning

    Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: Machine learning (ML) models that use deep neural networks are vulnerable to backdoor attacks. Such attacks involve the insertion of a (hidden) trigger by an adversary. As a consequence, any input that contains the trigger will cause the neural network to misclassify the input to a (single) target class, while classifying other inputs without a trigger correctly. ML models that contain a backdoor… ▽ More

    Submitted 24 March, 2022; originally announced March 2022.

    Comments: Submitted to conference

  11. arXiv:2203.10165  [pdf, other

    cs.LG cs.AI cs.CR eess.SY

    Privacy-Preserving Reinforcement Learning Beyond Expectation

    Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran

    Abstract: Cyber and cyber-physical systems equipped with machine learning algorithms such as autonomous cars share environments with humans. In such a setting, it is important to align system (or agent) behaviors with the preferences of one or more human users. We consider the case when an agent has to learn behaviors in an unknown environment. Our goal is to capture two defining characteristics of humans:… ▽ More

    Submitted 18 March, 2022; originally announced March 2022.

    Comments: Submitted to conference. arXiv admin note: text overlap with arXiv:2104.00540

  12. arXiv:2203.07593  [pdf, other

    cs.LG cs.AI

    Distraction is All You Need for Fairness

    Authors: Mehdi Yazdani-Jahromi, AmirArsalan Rajabi, Ali Khodabandeh Yalabadi, Aida Tayebi, Ozlem Ozmen Garibay

    Abstract: Bias in training datasets must be managed for various groups in classification tasks to ensure parity or equal treatment. With the recent growth in artificial intelligence models and their expanding role in automated decision-making, ensuring that these models are not biased is vital. There is an abundance of evidence suggesting that these models could contain or even amplify the bias present in t… ▽ More

    Submitted 4 November, 2023; v1 submitted 14 March, 2022; originally announced March 2022.

  13. Stagnation Detection Meets Fast Mutation

    Authors: Benjamin Doerr, Amirhossein Rajabi

    Abstract: Two mechanisms have recently been proposed that can significantly speed up finding distant improving solutions via mutation, namely using a random mutation rate drawn from a heavy-tailed distribution ("fast mutation", Doerr et al. (2017)) and increasing the mutation strength based on stagnation detection (Rajabi and Witt (2020)). Whereas the latter can obtain the asymptotically best probability of… ▽ More

    Submitted 3 May, 2022; v1 submitted 28 January, 2022; originally announced January 2022.

    Comments: 28 pages. Full version of a paper appearing at EvoCOP 2022

    Journal ref: Theoretical Computer Science 946: 113670 (2023)

  14. arXiv:2109.00666  [pdf, other

    cs.LG cs.AI

    TabFairGAN: Fair Tabular Data Generation with Generative Adversarial Networks

    Authors: Amirarsalan Rajabi, Ozlem Ozmen Garibay

    Abstract: With the increasing reliance on automated decision making, the issue of algorithmic fairness has gained increasing importance. In this paper, we propose a Generative Adversarial Network for tabular data generation. The model includes two phases of training. In the first phase, the model is trained to accurately generate synthetic data similar to the reference dataset. In the second phase we modify… ▽ More

    Submitted 1 September, 2021; originally announced September 2021.

  15. arXiv:2104.04395  [pdf, other

    cs.NE

    Stagnation Detection in Highly Multimodal Fitness Landscapes

    Authors: Amirhossein Rajabi, Carsten Witt

    Abstract: Stagnation detection has been proposed as a mechanism for randomized search heuristics to escape from local optima by automatically increasing the size of the neighborhood to find the so-called gap size, i.e., the distance to the next improvement. Its usefulness has mostly been considered in simple multimodal landscapes with few local optima that could be crossed one after another. In multimodal l… ▽ More

    Submitted 22 April, 2021; v1 submitted 9 April, 2021; originally announced April 2021.

    Comments: 28 pages. Full version of a paper appearing at GECCO 2021. arXiv admin note: text overlap with arXiv:2101.12054

  16. Stagnation Detection with Randomized Local Search

    Authors: Amirhossein Rajabi, Carsten Witt

    Abstract: Recently a mechanism called stagnation detection was proposed that automatically adjusts the mutation rate of evolutionary algorithms when they encounter local optima. The so-called $SD-(1+1)EA$ introduced by Rajabi and Witt (GECCO 2020) adds stagnation detection to the classical $(1+1)EA$ with standard bit mutation, which flips each bit independently with some mutation rate, and raises the mutati… ▽ More

    Submitted 8 February, 2021; v1 submitted 28 January, 2021; originally announced January 2021.

    Comments: 24 pages. Full version of a paper appearing at EvoCOP 2021

  17. arXiv:2011.09123  [pdf, other

    cs.CV

    Adversarial Profiles: Detecting Out-Distribution & Adversarial Samples in Pre-trained CNNs

    Authors: Arezoo Rajabi, Rakesh B. Bobba

    Abstract: Despite high accuracy of Convolutional Neural Networks (CNNs), they are vulnerable to adversarial and out-distribution examples. There are many proposed methods that tend to detect or make CNNs robust against these fooling examples. However, most such methods need access to a wide range of fooling examples to retrain the network or to tune detection parameters. Here, we propose a method to detect… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

    Comments: Accepted on DSN Workshop on Dependable and Secure Machine Learning 2019

    Journal ref: DSN Workshop on Dependable and Secure Machine Learning (DSML 2019)

  18. arXiv:2009.01188  [pdf, other

    cs.SI cs.CL

    A Stance Data Set on Polarized Conversations on Twitter about the Efficacy of Hydroxychloroquine as a Treatment for COVID-19

    Authors: Ece Çiğdem Mutlu, Toktam A. Oghaz, Jasser Jasser, Ege Tütüncüler, Amirarsalan Rajabi, Aida Tayebi, Ozlem Ozmen, Ivan Garibay

    Abstract: At the time of this study, the SARS-CoV-2 virus that caused the COVID-19 pandemic has spread significantly across the world. Considering the uncertainty about policies, health risks, financial difficulties, etc. the online media, specially the Twitter platform, is experiencing a high volume of activity related to this pandemic. Among the hot topics, the polarized debates about unconfirmed medicine… ▽ More

    Submitted 5 September, 2020; v1 submitted 19 August, 2020; originally announced September 2020.

    Comments: 11 pages, 3 figures

  19. arXiv:2008.12723  [pdf, other

    cs.SI cs.IT

    CD-SEIZ: Cognition-Driven SEIZ Compartmental Model for the Prediction of Information Cascades on Twitter

    Authors: Ece Çiğdem Mutlu, Amirarsalan Rajabi, Ivan Garibay

    Abstract: Information spreading social media platforms has become ubiquitous in our lives due to viral information propagation regardless of its veracity. Some information cascades turn out to be viral since they circulated rapidly on the Internet. The uncontrollable virality of manipulated or disorientated true information (fake news) might be quite harmful, while the spread of the true news is advantageou… ▽ More

    Submitted 28 August, 2020; originally announced August 2020.

  20. Evolutionary Algorithms with Self-adjusting Asymmetric Mutation

    Authors: Amirhossein Rajabi, Carsten Witt

    Abstract: Evolutionary Algorithms (EAs) and other randomized search heuristics are often considered as unbiased algorithms that are invariant with respect to different transformations of the underlying search space. However, if a certain amount of domain knowledge is available the use of biased search operators in EAs becomes viable. We consider a simple (1+1) EA for binary search spaces and analyze an asym… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

    Comments: 16 pages. An extended abstract of this paper will be published in the proceedings of PPSN 2020

  21. arXiv:2005.08321  [pdf, other

    cs.LG cs.CR stat.ML

    Toward Adversarial Robustness by Diversity in an Ensemble of Specialized Deep Neural Networks

    Authors: Mahdieh Abbasi, Arezoo Rajabi, Christian Gagne, Rakesh B. Bobba

    Abstract: We aim at demonstrating the influence of diversity in the ensemble of CNNs on the detection of black-box adversarial instances and hardening the generation of white-box adversarial attacks. To this end, we propose an ensemble of diverse specialized CNNs along with a simple voting mechanism. The diversity in this ensemble creates a gap between the predictive confidences of adversaries and those of… ▽ More

    Submitted 17 May, 2020; originally announced May 2020.

    Comments: Published by Springer in the Lecture Notes in Artificial Intelligence

  22. Self-Adjusting Evolutionary Algorithms for Multimodal Optimization

    Authors: Amirhossein Rajabi, Carsten Witt

    Abstract: Recent theoretical research has shown that self-adjusting and self-adaptive mechanisms can provably outperform static settings in evolutionary algorithms for binary search spaces. However, the vast majority of these studies focuses on unimodal functions which do not require the algorithm to flip several bits simultaneously to make progress. In fact, existing self-adjusting algorithms are not desig… ▽ More

    Submitted 2 June, 2020; v1 submitted 7 April, 2020; originally announced April 2020.

    Comments: 26 pages. Full version of a paper appearing at GECCO 2020

  23. arXiv:2004.00379  [pdf, other

    cs.SI

    Resistance of communities against disinformation

    Authors: Amirarsalan Rajabi, Seyyedmilad Talebzadehhosseini, Ivan Garibay

    Abstract: The spread of disinformation is considered a big threat to societies and has recently received unprecedented attention. In this paper we propose an agent-based model to simulate dissemination of a conspiracy in a population. The model is able to compare the resistance of different network structures against the activity of conspirators. Results show that connectedness of network structure and cent… ▽ More

    Submitted 28 March, 2020; originally announced April 2020.

  24. arXiv:1910.08650  [pdf, other

    cs.LG cs.CV stat.ML

    Toward Metrics for Differentiating Out-of-Distribution Sets

    Authors: Mahdieh Abbasi, Changjian Shui, Arezoo Rajabi, Christian Gagne, Rakesh Bobba

    Abstract: Vanilla CNNs, as uncalibrated classifiers, suffer from classifying out-of-distribution (OOD) samples nearly as confidently as in-distribution samples. To tackle this challenge, some recent works have demonstrated the gains of leveraging available OOD sets for training end-to-end calibrated CNNs. However, a critical question remains unanswered in these works: how to differentiate OOD sets for selec… ▽ More

    Submitted 19 November, 2020; v1 submitted 18 October, 2019; originally announced October 2019.

    Comments: Workshop on Safety and Robustness in Decision Making, NeurIPS 2019

    Journal ref: ECAI 2020 : 24th European Conference on Artificial Intelligence

  25. Review on Learning and Extracting Graph Features for Link Prediction

    Authors: Ece C. Mutlu, Toktam A. Oghaz, Amirarsalan Rajabi, Ivan Garibay

    Abstract: Link prediction in complex networks has attracted considerable attention from interdisciplinary research communities, due to its ubiquitous applications in biological networks, social networks, transportation networks, telecommunication networks, and, recently, knowledge graphs. Numerous studies utilized link prediction approaches in order sto find missing links or predict the likelihood of future… ▽ More

    Submitted 20 December, 2020; v1 submitted 10 January, 2019; originally announced January 2019.

    Comments: 29 pages, 7 figures

  26. arXiv:1808.08282  [pdf, other

    cs.CV cs.AI

    Controlling Over-generalization and its Effect on Adversarial Examples Generation and Detection

    Authors: Mahdieh Abbasi, Arezoo Rajabi, Azadeh Sadat Mozafari, Rakesh B. Bobba, Christian Gagne

    Abstract: Convolutional Neural Networks (CNNs) significantly improve the state-of-the-art for many applications, especially in computer vision. However, CNNs still suffer from a tendency to confidently classify out-distribution samples from unknown classes into pre-defined known classes. Further, they are also vulnerable to adversarial examples. We are relating these two issues through the tendency of CNNs… ▽ More

    Submitted 3 October, 2018; v1 submitted 20 August, 2018; originally announced August 2018.

  27. arXiv:1804.08794  [pdf, other

    cs.CR cs.LG

    Towards Dependable Deep Convolutional Neural Networks (CNNs) with Out-distribution Learning

    Authors: Mahdieh Abbasi, Arezoo Rajabi, Christian Gagné, Rakesh B. Bobba

    Abstract: Detection and rejection of adversarial examples in security sensitive and safety-critical systems using deep CNNs is essential. In this paper, we propose an approach to augment CNNs with out-distribution learning in order to reduce misclassification rate by rejecting adversarial examples. We empirically show that our augmented CNNs can either reject or classify correctly most adversarial examples… ▽ More

    Submitted 16 May, 2018; v1 submitted 23 April, 2018; originally announced April 2018.

  28. arXiv:1706.00941  [pdf, other

    cs.SI

    DANI: A Fast Diffusion Aware Network Inference Algorithm

    Authors: Maryam Ramezani, Hamid R. Rabiee, Maryam Tahani, Arezoo Rajabi

    Abstract: The fast growth of social networks and their privacy requirements in recent years, has lead to increasing difficulty in obtaining complete topology of these networks. However, diffusion information over these networks is available and many algorithms have been proposed to infer the underlying networks by using this information. The previously proposed algorithms only focus on inferring more links… ▽ More

    Submitted 3 June, 2017; originally announced June 2017.