Zum Hauptinhalt springen

Showing 1–19 of 19 results for author: Taheri, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.03759  [pdf, other

    cs.CL cs.AI cs.LG cs.NI

    Convolutional vs Large Language Models for Software Log Classification in Edge-Deployable Cellular Network Testing

    Authors: Achintha Ihalage, Sayed M. Taheri, Faris Muhammad, Hamed Al-Raweshidy

    Abstract: Software logs generated by sophisticated network emulators in the telecommunications industry, such as VIAVI TM500, are extremely complex, often comprising tens of thousands of text lines with minimal resemblance to natural language. Only specialised expert engineers can decipher such logs and troubleshoot defects in test runs. While AI offers a promising solution for automating defect triage, pot… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  2. arXiv:2407.01110  [pdf

    cs.CR cs.AI cs.CY cs.LG

    SecGenAI: Enhancing Security of Cloud-based Generative AI Applications within Australian Critical Technologies of National Interest

    Authors: Christoforus Yoga Haryanto, Minh Hieu Vu, Trung Duc Nguyen, Emily Lomempow, Yulia Nurliana, Sona Taheri

    Abstract: The rapid advancement of Generative AI (GenAI) technologies offers transformative opportunities within Australia's critical technologies of national interest while introducing unique security challenges. This paper presents SecGenAI, a comprehensive security framework for cloud-based GenAI applications, with a focus on Retrieval-Augmented Generation (RAG) systems. SecGenAI addresses functional, in… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: 10 pages, 4 figures, 9 tables, submitted to the 2024 11th International Conference on Soft Computing & Machine Intelligence (ISCMI 2024)

  3. arXiv:2207.09627  [pdf, other

    cs.CR cs.AI cs.CV cs.LG eess.SY

    EVHA: Explainable Vision System for Hardware Testing and Assurance -- An Overview

    Authors: Md Mahfuz Al Hasan, Mohammad Tahsin Mostafiz, Thomas An Le, Jake Julia, Nidish Vashistha, Shayan Taheri, Navid Asadizanjani

    Abstract: Due to the ever-growing demands for electronic chips in different sectors the semiconductor companies have been mandated to offshore their manufacturing processes. This unwanted matter has made security and trustworthiness of their fabricated chips concerning and caused creation of hardware attacks. In this condition, different entities in the semiconductor supply chain can act maliciously and exe… ▽ More

    Submitted 19 July, 2022; originally announced July 2022.

    Comments: Please contact Dr. Shayan Taheri for any questions and/or comments regarding the paper arXiv submission at: "www.shayan-taheri.com". The Paper Initial Submission: The ACM Journal on Emerging Technologies in Computing Systems (JETC)

  4. arXiv:2202.08452  [pdf

    cs.CV

    PCB Component Detection using Computer Vision for Hardware Assurance

    Authors: Wenwei Zhao, Suprith Gurudu, Shayan Taheri, Shajib Ghosh, Mukhil Azhagan Mallaiyan Sathiaseelan, Navid Asadizanjani

    Abstract: Printed Circuit Board (PCB) assurance in the optical domain is a crucial field of study. Though there are many existing PCB assurance methods using image processing, computer vision (CV), and machine learning (ML), the PCB field is complex and increasingly evolving so new techniques are required to overcome the emerging problems. Existing ML-based methods outperform traditional CV methods, however… ▽ More

    Submitted 17 February, 2022; originally announced February 2022.

  5. arXiv:2105.11064  [pdf

    cs.DC cs.SE

    Automated Dynamic Concurrency Analysis for Go

    Authors: Saeed Taheri, Ganesh Gopalakrishnan

    Abstract: The concurrency features of the Go language have proven versatile in the development of a number of concurrency systems. However, correctness methods to address challenges in Go concurrency debugging have not received much attention. In this work, we present an automatic dynamic tracing mechanism that efficiently captures and helps analyze the whole-program concurrency model. Using an enhancement… ▽ More

    Submitted 23 May, 2021; originally announced May 2021.

  6. arXiv:2012.03323  [pdf, other

    cs.IR

    KATRec: Knowledge Aware aTtentive Sequential Recommendations

    Authors: Mehrnaz Amjadi, Seyed Danial Mohseni Taheri, Theja Tulabandhula

    Abstract: Sequential recommendation systems model dynamic preferences of users based on their historical interactions with platforms. Despite recent progress, modeling short-term and long-term behavior of users in such systems is nontrivial and challenging. To address this, we present a solution enhanced by a knowledge graph called KATRec (Knowledge Aware aTtentive sequential Recommendations). KATRec learns… ▽ More

    Submitted 5 July, 2021; v1 submitted 6 December, 2020; originally announced December 2020.

  7. arXiv:2002.00511  [pdf, other

    cs.HC

    Investigating usability of MSstatsQC software

    Authors: Sara Mohammad Taheri, Omkar Terse, Eralp Dogu, Magy Seif El-Nasr, Olga Vitek

    Abstract: MSstatsQC [3] is an open-source software that provides longitudinal system suitability monitoring tools in the form of control charts for proteomic experiments. It includes simultaneous tools for the mean and dispersion of suitability metrics and presents alternative methods of monitoring through different tabs that are designed in the interface. This research focuses on investigating the usabilit… ▽ More

    Submitted 2 February, 2020; originally announced February 2020.

    Comments: 19 pages

  8. arXiv:1910.07776  [pdf

    cs.DC cs.PF cs.SE

    A Tool for Automatically Suggesting Source-Code Optimizations for Complex GPU Kernels

    Authors: Saeed Taheri, Apan Qasem, Martin Burtscher

    Abstract: Future computing systems, from handhelds to supercomputers, will undoubtedly be more parallel and heterogeneous than todays systems to provide more performance and energy efficiency. Thus, GPUs are increasingly being used to accelerate general purpose applications, including applications with data dependent, irregular control flow and memory access patterns. However, the growing complexity, expose… ▽ More

    Submitted 17 October, 2019; originally announced October 2019.

    Journal ref: proceedings of the 2015 International Conference on Parallel and Distributed Processing Techniques and Applications, page 589-599 : WORLDCOMP'15, July 27-30, 2015, Las Vegas, Nevada

  9. arXiv:1812.04697  [pdf

    cs.LG cs.CR cs.CV stat.ML

    Anomaly Generation using Generative Adversarial Networks in Host Based Intrusion Detection

    Authors: Milad Salem, Shayan Taheri, Jiann Shiun Yuan

    Abstract: Generative adversarial networks have been able to generate striking results in various domains. This generation capability can be general while the networks gain deep understanding regarding the data distribution. In many domains, this data distribution consists of anomalies and normal data, with the anomalies commonly occurring relatively less, creating datasets that are imbalanced. The capabilit… ▽ More

    Submitted 11 December, 2018; originally announced December 2018.

    Comments: Accepted and presented at IEEE Annual Ubiquitous Computing, Electronics, and Mobile Communications Conference (IEEE UEMCON) on 8th-10th November 2018

  10. arXiv:1812.04693  [pdf

    cs.LG cs.CV stat.ML

    ECG Arrhythmia Classification Using Transfer Learning from 2-Dimensional Deep CNN Features

    Authors: Milad Salem, Shayan Taheri, Jiann Shiun-Yuan

    Abstract: Due to the recent advances in the area of deep learning, it has been demonstrated that a deep neural network, trained on a huge amount of data, can recognize cardiac arrhythmias better than cardiologists. Moreover, traditionally feature extraction was considered an integral part of ECG pattern recognition; however, recent findings have shown that deep neural networks can carry out the task of feat… ▽ More

    Submitted 11 December, 2018; originally announced December 2018.

    Comments: Accepted and presented for IEEE Biomedical Circuits and Systems (BioCAS) on 17th-19th October 2018 in Ohio, USA

  11. arXiv:1804.02513  [pdf, other

    cs.DC cs.DS

    Distributed Maximal Independent Set on Scale-Free Networks

    Authors: Hasan Heydari, S. Mahmoud Taheri, Kaveh Kavousi

    Abstract: The problem of distributed maximal independent set (MIS) is investigated on inhomogeneous random graphs with power-law weights by which the scale-free networks can be produced. Such a particular problem has been solved on graphs with $n$ vertices by state-of-the-art algorithms with the time complexity of $O(\log{n})$. We prove that for a scale-free network with power-law exponent $β> 3$, the induc… ▽ More

    Submitted 11 June, 2018; v1 submitted 7 April, 2018; originally announced April 2018.

  12. arXiv:1712.09818  [pdf

    cs.AR

    Automated Formal Equivalence Verification of Pipelined Nested Loops in Datapath Designs

    Authors: Payman Behnam, Bijan Alizadeh, Sajjad Taheri

    Abstract: In this paper, we present an efficient formal approach to check the equivalence of synthesized RTL against the high-level specification in the presence of pipelining transformations. To increase the scalability of our proposed method, we dynamically divide the designs into several smaller parts called segments by introducing cut-points. Then we employ Modular Horner Expansion Diagram (M-HED) to ch… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

    Comments: 14 pages, 20 figures

  13. Security Protection for Magnetic Tunnel Junction

    Authors: Shayan Taheri, Jiann-Shiun Yuan

    Abstract: Energy efficiency is one of the most important parameters for designing and building a computing system nowadays. Introduction of new transistor and memory technologies to the integrated circuits design have brought hope for low energy very large scale integration (VLSI) circuit design. This excellency is pleasant if the computing system is secure and the energy is not wasted through execution of… ▽ More

    Submitted 27 April, 2017; originally announced April 2017.

    Comments: This document is another version (i.e. the IEEE journal style) of a published work in International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering (IJIREEICE)

  14. arXiv:1704.07878  [pdf

    cs.CR

    Security Analysis of Tunnel Field-Effect Transistor for Low Power Hardware

    Authors: Shayan Taheri, Jiann-Shiun Yuan

    Abstract: Security and energy are considered as the most important parameters for designing and building a computing system nowadays. Today's attacks target different layers of the computing system (i.e. software and hardware). Introduction of new transistor technologies to the integrated circuits design is beneficial, especially for low energy requirements. The new devices have unique features and properti… ▽ More

    Submitted 25 April, 2017; originally announced April 2017.

  15. arXiv:1612.01511  [pdf, other

    cs.SI cs.CY physics.soc-ph

    HellRank: A Hellinger-based Centrality Measure for Bipartite Social Networks

    Authors: Seyed Mohammad Taheri, Hamidreza Mahyar, Mohammad Firouzi, Elahe Ghalebi K., Radu Grosu, Ali Movaghar

    Abstract: Measuring centrality in a social network, especially in bipartite mode, poses several challenges such as requirement of full knowledge of the network topology and lack of properly detection of top-k behavioral representative users. In this paper, to overcome the aforementioned challenging issues, we propose an accurate centrality measure, called HellRank, to identify central nodes in bipartite soc… ▽ More

    Submitted 17 March, 2017; v1 submitted 5 December, 2016; originally announced December 2016.

    Journal ref: Soc. Netw. Anal. Min. (2017) 7: 22

  16. Extracting Implicit Social Relation for Social Recommendation Techniques in User Rating Prediction

    Authors: Seyed Mohammad Taheri, Hamidreza Mahyar, Mohammad Firouzi, Elahe Ghalebi K., Radu Grosu, Ali Movaghar

    Abstract: Recommendation plays an increasingly important role in our daily lives. Recommender systems automatically suggest items to users that might be interesting for them. Recent studies illustrate that incorporating social trust in Matrix Factorization methods demonstrably improves accuracy of rating prediction. Such approaches mainly use the trust scores explicitly expressed by users. However, it is of… ▽ More

    Submitted 17 March, 2017; v1 submitted 5 December, 2016; originally announced December 2016.

  17. Impact of Physical Activity on Sleep:A Deep Learning Based Exploration

    Authors: Aarti Sathyanarayana, Shafiq Joty, Luis Fernandez-Luque, Ferda Ofli, Jaideep Srivastava, Ahmed Elmagarmid, Shahrad Taheri, Teresa Arora

    Abstract: The importance of sleep is paramount for maintaining physical, emotional and mental wellbeing. Though the relationship between sleep and physical activity is known to be important, it is not yet fully understood. The explosion in popularity of actigraphy and wearable devices, provides a unique opportunity to understand this relationship. Leveraging this information source requires new tools to be… ▽ More

    Submitted 24 July, 2016; originally announced July 2016.

    Journal ref: JMIR Mhealth Uhealth 2016;4(4):e125

  18. Robust Automated Human Activity Recognition and its Application to Sleep Research

    Authors: Aarti Sathyanarayana, Ferda Ofli, Luis Fernandes-Luque, Jaideep Srivastava, Ahmed Elmagarmid, Teresa Arora, Shahrad Taheri

    Abstract: Human Activity Recognition (HAR) is a powerful tool for understanding human behaviour. Applying HAR to wearable sensors can provide new insights by enriching the feature set in health studies, and enhance the personalisation and effectiveness of health, wellness, and fitness applications. Wearable devices provide an unobtrusive platform for user monitoring, and due to their increasing market penet… ▽ More

    Submitted 19 July, 2016; v1 submitted 17 July, 2016; originally announced July 2016.

  19. arXiv:1607.02974  [pdf

    cs.DL cs.CY

    BioInfoBase : A Bioinformatics Resourceome

    Authors: Saeid Kadkhodaei, Fatemeh Barantalab, Sima Taheri, Majid Foroughi, Farahnaz Golestan Hashemi, Mahmood Reza Shabanimofrad, Hossein Hosseinimonfared, Morvarid Akhavan Rezaei, Ali Ranjbarfard, Mahbod Sahebi, Parisa Azizi, Maryam Dadar, Rambod Abiri, Mohammad Fazel Harighi, Nahid Kalhori, Mohammad Reza Etemadi, Ali Baradaran, Mahmoud Danaee, Iman Zare, Ahmad Ghafarpour, Zahra Azhdari, Hamid Rajabi Memari, Vajiheh Safavi, Naser Tajabadi, Faruku Bande

    Abstract: Over the past decade there has been a significant growth in bioinformatics databases, tools and resources. Although, bioinformatics is becoming more specific, increasing the number of bioinformatics-wares has made it difficult for researchers to find the most appropriate databases, tools or methods which match their needs. Our coordinated effort has been planned to establish a reference website in… ▽ More

    Submitted 20 November, 2016; v1 submitted 11 July, 2016; originally announced July 2016.

    Comments: 16 pages, 5 figures, International Association for Plant Biotechnology, IAPB Congress, Melbourne, Australia

    ACM Class: H.2.8