Zum Hauptinhalt springen

Showing 1–50 of 70 results for author: Zamani, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.08497  [pdf, other

    eess.SY cs.MA

    Data-driven Construction of Finite Abstractions for Interconnected Systems: A Compositional Approach

    Authors: Daniel Ajeleye, Majid Zamani

    Abstract: Finite-state abstractions (a.k.a. symbolic models) present a promising avenue for the formal verification and synthesis of controllers in continuous-space control systems. These abstractions provide simplified models that capture the fundamental behaviors of the original systems. However, the creation of such abstractions typically relies on the availability of precise knowledge concerning system… ▽ More

    Submitted 15 August, 2024; originally announced August 2024.

    Comments: This manuscript of 19 pages and 7 figures is a preprint under review with a journal

  2. arXiv:2405.13735  [pdf, other

    eess.SY cs.AI cs.LG

    Transfer of Safety Controllers Through Learning Deep Inverse Dynamics Model

    Authors: Alireza Nadali, Ashutosh Trivedi, Majid Zamani

    Abstract: Control barrier certificates have proven effective in formally guaranteeing the safety of the control systems. However, designing a control barrier certificate is a time-consuming and computationally expensive endeavor that requires expert input in the form of domain knowledge and mathematical maturity. Additionally, when a system undergoes slight changes, the new controller and its correctness ce… ▽ More

    Submitted 24 May, 2024; v1 submitted 22 May, 2024; originally announced May 2024.

    Comments: Extended Version, submitted to ADHS 2024

  3. arXiv:2311.07695  [pdf, other

    cs.FL eess.SY

    Co-Buchi Barrier Certificates for Discrete-time Dynamical Systems

    Authors: Vishnu Murali, Ashutosh Trivedi, Majid Zamani

    Abstract: Barrier certificates provide functional overapproximations for the reachable set of dynamical systems and provide inductive guarantees on the safe evolution of the system. Formally a barrier certificate is a real-valued function over the state set that is required to be non-positive for the initial states, positive over the set of unsafe states and nonincreasing along the state transitions. These… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

  4. arXiv:2310.04546  [pdf, other

    cs.CR

    Privacy-Preserving Financial Anomaly Detection via Federated Learning & Multi-Party Computation

    Authors: Sunpreet Arora, Andrew Beams, Panagiotis Chatzigiannis, Sebastian Meiser, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Harshal Shah, Yizhen Wang, Yuhang Wu, Hao Yang, Mahdi Zamani

    Abstract: One of the main goals of financial institutions (FIs) today is combating fraud and financial crime. To this end, FIs use sophisticated machine-learning models trained using data collected from their customers. The output of machine learning models may be manually reviewed for critical use cases, e.g., determining the likelihood of a transaction being anomalous and the subsequent course of action.… ▽ More

    Submitted 6 October, 2023; originally announced October 2023.

    Comments: 12 pages

  5. arXiv:2306.10200  [pdf, other

    cs.CR

    Privacy-Enhancing Technologies for Financial Data Sharing

    Authors: Panagiotis Chatzigiannis, Wanyun Catherine Gu, Srinivasan Raghuraman, Peter Rindal, Mahdi Zamani

    Abstract: Today, financial institutions (FIs) store and share consumers' financial data for various reasons such as offering loans, processing payments, and protecting against fraud and financial crime. Such sharing of sensitive data have been subject to data breaches in the past decade. While some regulations (e.g., GDPR, FCRA, and CCPA) help to prevent institutions from freely sharing clients' sensitive… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

  6. arXiv:2305.17519  [pdf, ps, other

    cs.LO eess.SY

    Closure Certificates

    Authors: Vishnu Murali, Ashutosh Trivedi, Majid Zamani

    Abstract: A barrier certificate, defined over the states of a dynamical system, is a real-valued function whose zero level set characterizes an inductively verifiable state invariant separating reachable states from unsafe ones. When combined with powerful decision procedures such as sum-of-squares programming (SOS) or satisfiability-modulo-theory solvers (SMT) barrier certificates enable an automated deduc… ▽ More

    Submitted 5 March, 2024; v1 submitted 27 May, 2023; originally announced May 2023.

    Comments: 14 pages, 5 figures. To appear in 27th ACM International Conference on Hybrid Systems: Computation and Control Hong-Kong, 13-16 May 2024

  7. arXiv:2304.07996  [pdf, other

    cs.IT cs.RO eess.SY

    Collaborative Bearing Estimation Using Set Membership Methods

    Authors: Mohammad Zamani, Jochen Trumpf, Chris Manzie

    Abstract: We consider the problem of collaborative bearing estimation using a method with historic roots in set theoretic estimation techniques. We refer to this method as the Convex Combination Ellipsoid (CCE) method and show that it provides a less conservative covariance estimate than the well known Covariance Intersection (CI) method. The CCE method does not introduce additional uncertainty that was not… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

    Comments: 7 pages, 6 figures, Fusion 2023 Conference

  8. arXiv:2211.04098  [pdf, other

    eess.SY cs.SC

    Abstraction-Based Verification of Approximate Pre-Opacity for Control Systems

    Authors: Junyao Hou, Siyuan Liu, Xiang Yin, Majid Zamani

    Abstract: In this paper, we consider the problem of verifying pre-opacity for discrete-time control systems. Pre-opacity is an important information-flow security property that secures the intention of a system to execute some secret behaviors in the future. Existing works on pre-opacity only consider non-metric discrete systems, where it is assumed that intruders can distinguish different output behaviors… ▽ More

    Submitted 8 November, 2022; originally announced November 2022.

    Comments: Discrete Event Systems, Opacity, Formal Abstractions

  9. arXiv:2210.10565  [pdf, other

    cs.HC cs.AR eess.SP q-bio.NC

    NET-TEN: a silicon neuromorphic network for low-latency detection of seizures in local field potentials

    Authors: Margherita Ronchini, Yasser Rezaeiyan, Milad Zamani, Gabriella Panuccio, Farshad Moradi

    Abstract: Therapeutic intervention in neurological disorders still relies heavily on pharmacological solutions, while the treatment of patients with drug resistance remains an open challenge. This is particularly true for patients with epilepsy, 30% of whom are refractory to medications. Implantable devices for chronic recording and electrical modulation of brain activity have proved a viable alternative in… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

    Comments: 14 pages, 6 figures

  10. arXiv:2210.01461  [pdf

    eess.SY cs.NE

    In the realm of hybrid Brain: Human Brain and AI

    Authors: Hoda Fares, Margherita Ronchini, Milad Zamani, Hooman Farkhani, Farshad Moradi

    Abstract: With the recent developments in neuroscience and engineering, it is now possible to record brain signals and decode them. Also, a growing number of stimulation methods have emerged to modulate and influence brain activity. Current brain-computer interface (BCI) technology is mainly on therapeutic outcomes, it already demonstrated its efficiency as assistive and rehabilitative technology for patien… ▽ More

    Submitted 17 January, 2024; v1 submitted 4 October, 2022; originally announced October 2022.

    Comments: 44 Pages, 12 Figures, In review

  11. arXiv:2209.12605  [pdf, other

    cs.LG cond-mat.mtrl-sci cs.AI

    MechProNet: Machine Learning Prediction of Mechanical Properties in Metal Additive Manufacturing

    Authors: Parand Akbari, Masoud Zamani, Amir Mostafaei

    Abstract: Predicting mechanical properties in metal additive manufacturing (MAM) is essential for ensuring the performance and reliability of printed parts, as well as their suitability for specific applications. However, conducting experiments to estimate mechanical properties in MAM processes can be laborious and expensive, and they are often limited to specific materials and processes. Machine learning (… ▽ More

    Submitted 17 March, 2024; v1 submitted 21 August, 2022; originally announced September 2022.

  12. arXiv:2202.06677  [pdf, other

    cs.CR eess.SY

    Secure-by-Construction Synthesis of Cyber-Physical Systems

    Authors: Siyuan Liu, Ashutosh Trivedi, Xiang Yin, Majid Zamani

    Abstract: Correct-by-construction synthesis is a cornerstone of the confluence of formal methods and control theory towards designing safety-critical systems. Instead of following the time-tested, albeit laborious (re)design-verify-validate loop, correct-by-construction methodology advocates the use of continual refinements of formal requirements -- connected by chains of formal proofs -- to build a system… ▽ More

    Submitted 14 February, 2022; originally announced February 2022.

  13. arXiv:2201.06747  [pdf, other

    cs.MA eess.SY

    Structural Consensus in Networks with Directed Topologies and Its Cryptographic Implementation

    Authors: Wentuo Fang, Zhiyong Chen, Mohsen Zamani

    Abstract: The existing cryptosystem based approaches for privacy-preserving consensus of networked systems are usually limited to those with undirected topologies. This paper proposes a new privacy-preserving algorithm for networked systems with directed topologies to reach confidential consensus. As a prerequisite for applying the algorithm, a structural consensus problem is formulated and the solvability… ▽ More

    Submitted 18 January, 2022; originally announced January 2022.

    Comments: 24 pages, 7 figures. The paper has been submitted to ISA Transactions

  14. arXiv:2111.04902  [pdf, ps, other

    cs.FL cs.DM

    Modular Decomposition of Hierarchical Finite State Machines

    Authors: Oliver Biggar, Mohammad Zamani, Iman Shames

    Abstract: In this paper we develop an analogue of the graph-theoretic `modular decomposition' in automata theory. This decomposition allows us to identify hierarchical finite state machines (HFSMs) equivalent to a given finite state machine (FSM). We first define a module of an FSM, which is a collection of nodes which can be treated as a nested FSM. We then identify a natural subset of FSM modules called t… ▽ More

    Submitted 20 July, 2023; v1 submitted 8 November, 2021; originally announced November 2021.

    Comments: 28 pages, 5 figures. This version shortens and restructures the paper

  15. arXiv:2111.00631  [pdf, ps, other

    cs.LG eess.SY math.OC math.PR stat.ML

    Learning Safety Filters for Unknown Discrete-Time Linear Systems

    Authors: Farhad Farokhi, Alex S. Leong, Mohammad Zamani, Iman Shames

    Abstract: A learning-based safety filter is developed for discrete-time linear time-invariant systems with unknown models subject to Gaussian noises with unknown covariance. Safety is characterized using polytopic constraints on the states and control inputs. The empirically learned model and process noise covariance with their confidence bounds are used to construct a robust optimization problem for minima… ▽ More

    Submitted 8 May, 2023; v1 submitted 31 October, 2021; originally announced November 2021.

  16. Verification of Switched Stochastic Systems via Barrier Certificates

    Authors: Mahathi Anand, Pushpak Jagtap, Majid Zamani

    Abstract: The paper presents a methodology for temporal logic verification of continuous-time switched stochastic systems. Our goal is to find the lower bound on the probability that a complex temporal property is satisfied over a finite time horizon. The required temporal properties of the system are expressed using a fragment of linear temporal logic, called safe-LTL with respect to finite traces. Our app… ▽ More

    Submitted 25 September, 2021; originally announced September 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:1807.00064

    Journal ref: IEEE 58th Conference on Decision and Control (CDC), 2019, pp. 4373-4378

  17. arXiv:2109.12194  [pdf

    cs.CR cs.DC

    Universal Payment Channels: An Interoperability Platform for Digital Currencies

    Authors: Mihai Christodorescu, Erin English, Wanyun Catherine Gu, David Kreissman, Ranjit Kumaresan, Mohsen Minaei, Srinivasan Raghuraman, Cuy Sheffield, Arjuna Wijeyekoon, Mahdi Zamani

    Abstract: With the innovation of distributed ledger technology (DLT), often known as blockchain technology, there has been significant growth of digital tokens in the form of cryptocurrencies, stablecoins, and central bank digital currencies. As the number of DLT networks increases, each with varying design characteristics, the likelihood that transacting parties are on the same network decreases. Thus, it… ▽ More

    Submitted 28 September, 2021; v1 submitted 24 September, 2021; originally announced September 2021.

  18. arXiv:2108.06911  [pdf, ps, other

    cs.LG eess.SY

    Optimal Actor-Critic Policy with Optimized Training Datasets

    Authors: Chayan Banerjee, Zhiyong Chen, Nasimul Noman, Mohsen Zamani

    Abstract: Actor-critic (AC) algorithms are known for their efficacy and high performance in solving reinforcement learning problems, but they also suffer from low sampling efficiency. An AC based policy optimization process is iterative and needs to frequently access the agent-environment system to evaluate and update the policy by rolling out the policy, collecting rewards and states (i.e. samples), and le… ▽ More

    Submitted 1 December, 2021; v1 submitted 16 August, 2021; originally announced August 2021.

  19. arXiv:2107.12744  [pdf, other

    cs.CV

    Real-Time Activity Recognition and Intention Recognition Using a Vision-based Embedded System

    Authors: Sahar Darafsh, Saeed Shiry Ghidary, Morteza Saheb Zamani

    Abstract: With the rapid increase in digital technologies, most fields of study include recognition of human activity and intention recognition, which are essential in smart environments. In this study, we equipped the activity recognition system with the ability to recognize intentions by affecting the pace of movement of individuals in the representation of images. Using this technology in various environ… ▽ More

    Submitted 4 August, 2021; v1 submitted 27 July, 2021; originally announced July 2021.

    Comments: This paper is under consideration at Computer Vision and Image Understanding

  20. arXiv:2106.10038  [pdf, other

    cs.DL physics.soc-ph

    Anomalous diffusion in the citation time series of scientific publications

    Authors: Maryam Zamani, Erez Aghion, Peter Pollner, Tamas Vicsek, Holger Kantz

    Abstract: We analyze the citation time-series of manuscripts in three different fields of science; physics, social science and technology. The evolution of the time-series of the yearly number of citations, namely the citation trajectories, diffuse anomalously, their variance scales with time $\propto t^{2H}$, where $H\neq 1/2$. We provide detailed analysis of the various factors that lead to the anomalous… ▽ More

    Submitted 29 June, 2021; v1 submitted 18 June, 2021; originally announced June 2021.

    Comments: 12 pages, 12 figures

  21. arXiv:2104.07919  [pdf, ps, other

    cs.AI cs.RO

    An expressiveness hierarchy of Behavior Trees and related architectures

    Authors: Oliver Biggar, Mohammad Zamani, Iman Shames

    Abstract: In this paper we provide a formal framework for comparing the expressive power of Behavior Trees (BTs) to other action selection architectures. Taking inspiration from the analogous comparisons of structural programming methodologies, we formalise the concept of `expressiveness'. This leads us to an expressiveness hierarchy of control architectures, which includes BTs, Decision Trees (DTs), Teleo-… ▽ More

    Submitted 16 April, 2021; originally announced April 2021.

    Comments: 8 pages, 2 figures. Accepted to IEEE Robotics and Automation Letters

  22. arXiv:2104.05897  [pdf, other

    cs.RO eess.SY

    Inertial Collaborative Localisation for Autonomous Vehicles using a Minimum Energy Filter

    Authors: Jack Henderson, Mohammad Zamani, Robert Mahony, Jochen Trumpf

    Abstract: Collaborative Localisation has been studied extensively in recent years as a way to improve pose estimation of unmanned aerial vehicles in challenging environments. However little attention has been paid toward advancing the underlying filter design beyond standard Extended Kalman Filter-based approaches. In this paper, we detail a discrete-time collaborative localisation filter using the determin… ▽ More

    Submitted 12 April, 2021; originally announced April 2021.

    Comments: Submitted to IEEE 2021 Conference on Decision and Control (CDC2021)

  23. arXiv:2103.01413  [pdf, other

    cs.LG eess.SY math.OC stat.ML

    Safe Learning of Uncertain Environments

    Authors: Farhad Farokhi, Alex Leong, Iman Shames, Mohammad Zamani

    Abstract: In many learning based control methodologies, learning the unknown dynamic model precedes the control phase, while the aim is to control the system such that it remains in some safe region of the state space. In this work, our aim is to guarantee safety while learning and control proceed simultaneously. Specifically, we consider the problem of safe learning in nonlinear control-affine systems subj… ▽ More

    Submitted 13 May, 2021; v1 submitted 1 March, 2021; originally announced March 2021.

  24. arXiv:2101.07491  [pdf, ps, other

    cs.LO eess.SY

    Automated Verification and Synthesis of Stochastic Hybrid Systems: A Survey

    Authors: Abolfazl Lavaei, Sadegh Soudjani, Alessandro Abate, Majid Zamani

    Abstract: Stochastic hybrid systems have received significant attentions as a relevant modelling framework describing many systems, from engineering to the life sciences: they enable the study of numerous applications, including transportation networks, biological systems and chemical reaction networks, smart energy and power grids, and beyond. Automated verification and policy synthesis for stochastic hybr… ▽ More

    Submitted 10 March, 2022; v1 submitted 19 January, 2021; originally announced January 2021.

  25. arXiv:2101.06000  [pdf, other

    cs.CR cs.DC

    Horizon: A Gas-Efficient, Trustless Bridge for Cross-Chain Transactions

    Authors: Rongjian Lan, Ganesha Upadhyaya, Stephen Tse, Mahdi Zamani

    Abstract: With the rise of digital currency systems that rely on blockchain to ensure ledger security, the ability to perform cross-chain transactions is becoming a crucial interoperability requirement. Such transactions allow not only funds to be transferred from one blockchain to another (as done in atomic swaps), but also a blockchain to verify the inclusion of any event on another blockchain. Cross-chai… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

    Comments: 14 Pages

  26. arXiv:2012.08003  [pdf, other

    cs.CR cs.DC

    Towards a Two-Tier Hierarchical Infrastructure: An Offline Payment System for Central Bank Digital Currencies

    Authors: Mihai Christodorescu, Wanyun Catherine Gu, Ranjit Kumaresan, Mohsen Minaei, Mustafa Ozdayi, Benjamin Price, Srinivasan Raghuraman, Muhammad Saad, Cuy Sheffield, Minghua Xu, Mahdi Zamani

    Abstract: Digital payments traditionally rely on online communications with several intermediaries such as banks, payment networks, and payment processors in order to authorize and process payment transactions. While these communication networks are designed to be highly available with continuous uptime, there may be times when an end-user experiences little or no access to network connectivity. The growi… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

    Comments: 21 pages

  27. arXiv:2010.05818  [pdf, other

    eess.SY cs.LG

    Control Barrier Functions for Unknown Nonlinear Systems using Gaussian Processes

    Authors: Pushpak Jagtap, George J. Pappas, Majid Zamani

    Abstract: This paper focuses on the controller synthesis for unknown, nonlinear systems while ensuring safety constraints. Our approach consists of two steps, a learning step that uses Gaussian processes and a controller synthesis step that is based on control barrier functions. In the learning step, we use a data-driven approach utilizing Gaussian processes to learn the unknown control affine nonlinear dyn… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

    Comments: 6 pages, 3 figures, accepted at 59th IEEE Conference on Decision and Control (CDC) 2020

  28. A Minimum Energy Filter for Localisation of an Unmanned Aerial Vehicle

    Authors: Jack Henderson, Mohammad Zamani, Robert Mahony, Jochen Trumpf

    Abstract: Accurate localisation of unmanned aerial vehicles is vital for the next generation of automation tasks. This paper proposes a minimum energy filter for velocity-aided pose estimation on the extended special Euclidean group. The approach taken exploits the Lie-group symmetry of the problem to combine Inertial Measurement Unit (IMU) sensor output with landmark measurements into a robust and high per… ▽ More

    Submitted 9 September, 2020; originally announced September 2020.

    Comments: To be presented at the 59th IEEE Conference on Decision and Control (CDC), 14-18 December 2020

  29. arXiv:2008.12515  [pdf, ps, other

    cs.AI cs.RO

    On modularity in reactive control architectures, with an application to formal verification

    Authors: Oliver Biggar, Mohammad Zamani, Iman Shames

    Abstract: Modularity is a central principle throughout the design process for cyber-physical systems. Modularity reduces complexity and increases reuse of behavior. In this paper we pose and answer the following question: how can we identify independent `modules' within the structure of reactive control architectures? To this end, we propose a graph-structured control architecture we call a decision structu… ▽ More

    Submitted 30 January, 2022; v1 submitted 28 August, 2020; originally announced August 2020.

    Comments: Accepted to ACM Transactions on Cyber-Physical Systems. 26 pages, 9 figures. Version 3 changes: accepted version, minor changes

  30. arXiv:2008.11906  [pdf, ps, other

    cs.AI cs.RO

    A principled analysis of Behavior Trees and their generalisations

    Authors: Oliver Biggar, Mohammad Zamani, Iman Shames

    Abstract: As complex autonomous robotic systems become more widespread, the need for transparent and reusable Artificial Intelligence (AI) designs becomes more apparent. In this paper we analyse how the principles behind Behavior Trees (BTs), an increasingly popular tree-structured control architecture, are applicable to these goals. Using structured programming as a guide, we analyse the BT principles of r… ▽ More

    Submitted 25 May, 2021; v1 submitted 27 August, 2020; originally announced August 2020.

    Comments: 13 pages, 11 figures. The content of the previous version is now split between this and arXiv:2104.07919, which have both been significantly updated

  31. A Minimum Energy Filter for Distributed Multirobot Localisation

    Authors: Jack Henderson, Jochen Trumpf, Mohammad Zamani

    Abstract: We present a new approach to the cooperative localisation problem by applying the theory of minimum energy filtering. We consider the problem of estimating the pose of a group of mobile robots in an environment where robots can perceive fixed landmarks and neighbouring robots as well as share information with others over a communication channel. Whereas the vast majority of the existing literature… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

    Comments: To be published at 21st IFAC World Congress, Berlin, Germany, July 12-17, 2020

  32. arXiv:2005.05040  [pdf, ps, other

    eess.SY cs.LG

    Data-Driven Verification under Signal Temporal Logic Constraints

    Authors: Ali Salamati, Sadegh Soudjani, Majid Zamani

    Abstract: We consider systems under uncertainty whose dynamics are partially unknown. Our aim is to study satisfaction of temporal logic properties by trajectories of such systems. We express these properties as signal temporal logic formulas and check if the probability of satisfying the property is at least a given threshold. Since the dynamics are parameterized and partially unknown, we collect data from… ▽ More

    Submitted 8 May, 2020; originally announced May 2020.

  33. arXiv:2004.00520  [pdf

    physics.hist-ph cs.DL physics.soc-ph

    Evolution and Transformation of Scientific Knowledge over the Sphaera Corpus: A Network Study

    Authors: Maryam Zamani, Alejandro Tejedor, Malte Vogl, Florian Krautli, Matteo Valleriani, Holger Kantz

    Abstract: We investigated the evolution and transformation of scientific knowledge in the early modern period, analyzing more than 350 different editions of textbooks used for teaching astronomy in European universities from the late fifteenth century to mid-seventeenth century. These historical sources constitute the Sphaera Corpus. By examining different semantic relations among individual parts of each e… ▽ More

    Submitted 1 April, 2020; originally announced April 2020.

    Comments: 19 pages, 9 figures

  34. arXiv:2003.00712  [pdf, ps, other

    eess.SY cs.LG

    Formal Controller Synthesis for Continuous-Space MDPs via Model-Free Reinforcement Learning

    Authors: Abolfazl Lavaei, Fabio Somenzi, Sadegh Soudjani, Ashutosh Trivedi, Majid Zamani

    Abstract: A novel reinforcement learning scheme to synthesize policies for continuous-space Markov decision processes (MDPs) is proposed. This scheme enables one to apply model-free, off-the-shelf reinforcement learning algorithms for finite MDPs to compute optimal strategies for the corresponding continuous-space MDPs without explicitly constructing the finite-state abstraction. The proposed approach is ba… ▽ More

    Submitted 2 March, 2020; originally announced March 2020.

    Comments: This work is accepted at the 11th ACM/IEEE Conference on Cyber-Physical Systems (ICCPS)

  35. arXiv:2002.04991  [pdf, other

    cs.LG cs.AI eess.SY stat.ML

    dtControl: Decision Tree Learning Algorithms for Controller Representation

    Authors: Pranav Ashok, Mathias Jackermeier, Pushpak Jagtap, Jan Křetínský, Maximilian Weininger, Majid Zamani

    Abstract: Decision tree learning is a popular classification technique most commonly used in machine learning applications. Recent work has shown that decision trees can be used to represent provably-correct controllers concisely. Compared to representations using lookup tables or binary decision diagrams, decision trees are smaller and more explainable. We present dtControl, an easily extensible tool for r… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

  36. arXiv:1909.10259  [pdf, other

    physics.soc-ph cs.SI

    Differences in structure and dynamics of networks retrieved from dark and public web forums

    Authors: Maryam Zamani, Fereshteh Rabbani, Attila Horicsányi, Anna Zafeiris, Tamas Vicsek

    Abstract: Humans make decisions based on the information they obtain from several major sources, among which the comments of others in Internet forums play an increasing role. Such forums cover a wide spectrum of topics and represent an essential tool in choosing the best products, manipulating views or optimizing our decisions regarding a number of aspects of our everyday life. However, many forums have ex… ▽ More

    Submitted 23 September, 2019; originally announced September 2019.

    Journal ref: Physica A: Statistical Mechanics and its Applications 525 (2019): 326-336

  37. arXiv:1902.11245  [pdf, other

    cs.CL cs.LG cs.SD eess.AS

    Incorporating End-to-End Speech Recognition Models for Sentiment Analysis

    Authors: Egor Lakomkin, Mohammad Ali Zamani, Cornelius Weber, Sven Magg, Stefan Wermter

    Abstract: Previous work on emotion recognition demonstrated a synergistic effect of combining several modalities such as auditory, visual, and transcribed text to estimate the affective state of a speaker. Among these, the linguistic modality is crucial for the evaluation of an expressed emotion. However, manually transcribed spoken text cannot be given as input to a system practically. We argue that using… ▽ More

    Submitted 28 February, 2019; originally announced February 2019.

    Comments: Accepted at the 2019 International Conference on Robotics and Automation (ICRA) will be held on May 20-24, 2019 in Montreal, Canada

  38. arXiv:1808.09479  [pdf, other

    cs.CL

    Residualized Factor Adaptation for Community Social Media Prediction Tasks

    Authors: Mohammadzaman Zamani, H. Andrew Schwartz, Veronica E. Lynn, Salvatore Giorgi, Niranjan Balasubramanian

    Abstract: Predictive models over social media language have shown promise in capturing community outcomes, but approaches thus far largely neglect the socio-demographic context (e.g. age, education rates, race) of the community from which the language originates. For example, it may be inaccurate to assume people in Mobile, Alabama, where the population is relatively older, will use words the same way as th… ▽ More

    Submitted 28 August, 2018; originally announced August 2018.

    Comments: Conference on Empirical Methods in Natural Language Processing (EMNLP 2018)

    Journal ref: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, pages 3560-3569, 2018

  39. Predicting Human Trustfulness from Facebook Language

    Authors: Mohammadzaman Zamani, Anneke Buffone, H. Andrew Schwartz

    Abstract: Trustfulness -- one's general tendency to have confidence in unknown people or situations -- predicts many important real-world outcomes such as mental health and likelihood to cooperate with others such as clinicians. While data-driven measures of interpersonal trust have previously been introduced, here, we develop the first language-based assessment of the personality trait of trustfulness by f… ▽ More

    Submitted 16 August, 2018; originally announced August 2018.

    Comments: CLPsych2018

    Journal ref: In Proceedings of the Fifth Workshop on Computational Linguistics and Clinical Psychology: From Keyboard to Clinic, pages 174-181, 2018

  40. SENSE: Abstraction-Based Synthesis of Networked Control Systems

    Authors: Mahmoud Khaled, Matthias Rungger, Majid Zamani

    Abstract: While many studies and tools target the basic stabilizability problem of networked control systems (NCS), nowadays modern systems require more sophisticated objectives such as those expressed as formulae in linear temporal logic or as automata on infinite strings. One general technique to achieve this is based on so-called symbolic models, where complex systems are approximated by finite abstracti… ▽ More

    Submitted 26 June, 2018; originally announced June 2018.

    Comments: In Proceedings MeTRiD 2018, arXiv:1806.09330

    Journal ref: EPTCS 272, 2018, pp. 65-78

  41. arXiv:1804.04053  [pdf, other

    cs.RO cs.CL cs.HC cs.LG

    EmoRL: Continuous Acoustic Emotion Classification using Deep Reinforcement Learning

    Authors: Egor Lakomkin, Mohammad Ali Zamani, Cornelius Weber, Sven Magg, Stefan Wermter

    Abstract: Acoustically expressed emotions can make communication with a robot more efficient. Detecting emotions like anger could provide a clue for the robot indicating unsafe/undesired situations. Recently, several deep neural network-based models have been proposed which establish new state-of-the-art results in affective state evaluation. These models typically start processing at the end of each uttera… ▽ More

    Submitted 3 April, 2018; originally announced April 2018.

    Comments: Accepted to the IEEE International Conference on Robotics and Automation (ICRA'18), Brisbane, Australia, May 21-25, 2018

  42. arXiv:1804.02727  [pdf, other

    cs.SI physics.soc-ph

    Locating the Source in Real-world Diffusion Network

    Authors: Shabnam Behzad, Arman Sepehr, Hamid Beigy, Mohammadzaman Zamani

    Abstract: The problem of identifying the source of a propagation based on limited observations has been studied significantly in recent years, as it can help reducing the damage caused by unwanted infections. In this paper we present an efficient approach to find the node that originally introduced a piece of information into the network, and infer the time when it is initiated. Labeling infected nodes dete… ▽ More

    Submitted 16 August, 2018; v1 submitted 8 April, 2018; originally announced April 2018.

    Comments: 4 pages, 2 figures

  43. arXiv:1804.02173  [pdf, other

    cs.RO cs.CL cs.HC cs.SD eess.AS

    On the Robustness of Speech Emotion Recognition for Human-Robot Interaction with Deep Neural Networks

    Authors: Egor Lakomkin, Mohammad Ali Zamani, Cornelius Weber, Sven Magg, Stefan Wermter

    Abstract: Speech emotion recognition (SER) is an important aspect of effective human-robot collaboration and received a lot of attention from the research community. For example, many neural network-based architectures were proposed recently and pushed the performance to a new level. However, the applicability of such neural SER models trained only on in-domain data to noisy conditions is currently under-re… ▽ More

    Submitted 6 April, 2018; originally announced April 2018.

    Comments: Submitted to IROS'18, Madrid, Spain

  44. arXiv:1802.03321  [pdf, ps, other

    cs.LO math.OC

    Opacity of nondeterministic transition systems: A (bi)simulation relation approach

    Authors: Kuize Zhang, Xiang Yin, Majid Zamani

    Abstract: In this paper, we propose several opacity-preserving (bi)simulation relations for general nondeterministic transition systems (NTS) in terms of initial-state opacity, current-state opacity, K-step opacity, and infinite-step opacity. We also show how one can leverage quotient construction to compute such relations. In addition, we use a two-way observer method to verify opacity of nondeterministic… ▽ More

    Submitted 13 September, 2018; v1 submitted 9 February, 2018; originally announced February 2018.

    Comments: 21 pages, partially presented at IEEE CDC 2017

  45. arXiv:1710.10237  [pdf, other

    cs.CR

    PriFi: Low-Latency Anonymity for Organizational Networks

    Authors: Ludovic Barman, Italo Dacosta, Mahdi Zamani, Ennan Zhai, Apostolos Pyrgelis, Bryan Ford, Jean-Pierre Hubaux, Joan Feigenbaum

    Abstract: Organizational networks are vulnerable to traffic-analysis attacks that enable adversaries to infer sensitive information from the network traffic - even if encryption is used. Typical anonymous communication networks are tailored to the Internet and are poorly suited for organizational networks. We present PriFi, an anonymous communication protocol for LANs, which protects users against eavesdrop… ▽ More

    Submitted 6 April, 2021; v1 submitted 27 October, 2017; originally announced October 2017.

    Comments: 25 pages

  46. arXiv:1709.04569  [pdf, other

    cs.CR cs.DC cs.GT

    REMOTEGATE: Incentive-Compatible Remote Configuration of Security Gateways

    Authors: Abhinav Aggarwal, Mahdi Zamani, Mihai Christodorescu

    Abstract: Imagine that a malicious hacker is trying to attack a server over the Internet and the server wants to block the attack packets as close to their point of origin as possible. However, the security gateway ahead of the source of attack is untrusted. How can the server block the attack packets through this gateway? In this paper, we introduce REMOTEGATE, a trustworthy mechanism for allowing any part… ▽ More

    Submitted 13 September, 2017; originally announced September 2017.

    Comments: Working manuscript

  47. arXiv:1708.03338  [pdf

    physics.soc-ph cs.SI

    Stability of glassy hierarchical networks

    Authors: Maryam Zamani, Leonardo Camargo-Forero, Tamas Vicsek

    Abstract: The structure of interactions in most of animals and human societies can be best represented by complex hierarchical networks. In order to maintain close to optimal functioning both stability and adaptability are necessary. Here we investigate the stability of hierarchical networks that emerge from the simulations of an organization-type having an efficiency function reminiscent of the Hamiltonian… ▽ More

    Submitted 18 August, 2017; v1 submitted 8 August, 2017; originally announced August 2017.

    Comments: 13 pages, 8 figures

    Journal ref: New Journal of Physics, 20 (2018) 023025

  48. Geometry-Based Optimization of One-Way Quantum Computation Measurement Patterns

    Authors: Maryam Eslamy, Mahboobeh Houshmand, Morteza Saheb Zamani, Mehdi Sedighi

    Abstract: In one-way quantum computation (1WQC) model, an initial highly entangled state called a graph state is used to perform universal quantum computations by a sequence of adaptive single-qubit measurements and post-measurement Pauli-X and Pauli-Z corrections. The needed computations are organized as measurement patterns, or simply patterns, in the 1WQC model. The entanglement operations in a pattern c… ▽ More

    Submitted 24 April, 2017; originally announced April 2017.

  49. arXiv:1608.00509  [pdf, other

    cs.CR cs.DC

    TorBricks: Blocking-Resistant Tor Bridge Distribution

    Authors: Mahdi Zamani, Jared Saia, Jedidiah Crandall

    Abstract: Tor is currently the most popular network for anonymous Internet access. It critically relies on volunteer nodes called bridges for relaying Internet traffic when a user's ISP blocks connections to Tor. Unfortunately, current methods for distributing bridges are vulnerable to malicious users who obtain and block bridge addresses. In this paper, we propose TorBricks, a protocol for distributing Tor… ▽ More

    Submitted 1 August, 2016; originally announced August 2016.

    Comments: 11 pages

  50. arXiv:1604.05659  [pdf

    cs.ET quant-ph

    One-Way Quantum Computer Simulation

    Authors: Eesa Nikahd, Mahboobeh Houshmand, Morteza Saheb Zamani, Mehdi Sedighi

    Abstract: In one-way quantum computation (1WQC) model, universal quantum computations are performed using measurements to designated qubits in a highly entangled state. The choices of bases for these measurements as well as the structure of the entanglements specify a quantum algorithm. As scalable and reliable quantum computers have not been implemented yet, quantum computation simulators are the only wide… ▽ More

    Submitted 10 December, 2015; originally announced April 2016.

    Comments: 27 pages, 9 figures

    Journal ref: International Journal of Microprocessors and Microsystems, Elsevier, Vol. 39, No. 3, pp. 210-222, May 2015