Skip to main content

Showing 1–6 of 6 results for author: Abyaneh, A

.
  1. arXiv:2403.04118  [pdf, other

    cs.RO cs.LG

    Globally Stable Neural Imitation Policies

    Authors: Amin Abyaneh, Mariana Sosa Guzmán, Hsiu-Chin Lin

    Abstract: Imitation learning presents an effective approach to alleviate the resource-intensive and time-consuming nature of policy learning from scratch in the solution space. Even though the resulting policy can mimic expert demonstrations reliably, it often lacks predictability in unexplored regions of the state-space, giving rise to significant safety concerns in the face of perturbations. To address th… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

  2. arXiv:2310.20605  [pdf, other

    cs.RO eess.SY

    Learning Lyapunov-Stable Polynomial Dynamical Systems Through Imitation

    Authors: Amin Abyaneh, Hsiu-Chin Lin

    Abstract: Imitation learning is a paradigm to address complex motion planning problems by learning a policy to imitate an expert's behavior. However, relying solely on the expert's data might lead to unsafe actions when the robot deviates from the demonstrated trajectories. Stability guarantees have previously been provided utilizing nonlinear dynamical systems, acting as high-level motion planners, in conj… ▽ More

    Submitted 14 February, 2024; v1 submitted 31 October, 2023; originally announced October 2023.

    Comments: In 7th Annual Conference on Robot Learning 2023 Aug 30

  3. arXiv:2211.03846  [pdf, other

    cs.LG cs.MA stat.ME

    Federated Causal Discovery From Interventions

    Authors: Amin Abyaneh, Nino Scherrer, Patrick Schwab, Stefan Bauer, Bernhard Schölkopf, Arash Mehrjou

    Abstract: Causal discovery serves a pivotal role in mitigating model uncertainty through recovering the underlying causal mechanisms among variables. In many practical domains, such as healthcare, access to the data gathered by individual entities is limited, primarily for privacy and regulatory constraints. However, the majority of existing causal discovery methods require the data to be available in a cen… ▽ More

    Submitted 11 February, 2024; v1 submitted 7 November, 2022; originally announced November 2022.

  4. arXiv:2103.15561  [pdf, other

    q-bio.PE cs.AI cs.LG cs.MA eess.SY

    Pyfectious: An individual-level simulator to discover optimal containment polices for epidemic diseases

    Authors: Arash Mehrjou, Ashkan Soleymani, Amin Abyaneh, Samir Bhatt, Bernhard Schölkopf, Stefan Bauer

    Abstract: Simulating the spread of infectious diseases in human communities is critical for predicting the trajectory of an epidemic and verifying various policies to control the devastating impacts of the outbreak. Many existing simulators are based on compartment models that divide people into a few subsets and simulate the dynamics among those subsets using hypothesized differential equations. However, t… ▽ More

    Submitted 20 April, 2021; v1 submitted 24 March, 2021; originally announced March 2021.

  5. arXiv:2007.13491  [pdf

    cs.OH eess.SP eess.SY

    Automatic Parking in Smart Cities

    Authors: Arezou Abyaneh, Vanessa Fakhoury, Nizar Zorba

    Abstract: The objective behind this project is to maximize the efficiency of land space, to decrease the driver stress and frustration, along with a considerable reduction in air pollution. Our contribution is in the form of an automatic parking system that is controlled by cellular phones. The structure is a hexagon shape that uses conveyor belts, to transport the vehicles from the entrance into the parkin… ▽ More

    Submitted 17 June, 2020; originally announced July 2020.

    Comments: 5 pages, 6 figures, To be published in conference proceedings of 10th IEEE GCC conference and exhibition

  6. arXiv:1812.04715  [pdf, other

    cs.NI cs.CR cs.LG eess.SP stat.ML

    Deep Neural Networks Meet CSI-Based Authentication

    Authors: Amirhossein Yazdani Abyaneh, Ali Hosein Gharari Foumani, Vahid Pourahmadi

    Abstract: The first step of a secure communication is authenticating legible users and detecting the malicious ones. In the last recent years, some promising schemes proposed using wireless medium network's features, in particular, channel state information (CSI) as a means for authentication. These schemes mainly compare user's previous CSI with the new received CSI to determine if the user is in fact what… ▽ More

    Submitted 26 November, 2018; originally announced December 2018.

    Comments: 7 pages, 14 Figures, 2 tables