Skip to main content

Showing 1–5 of 5 results for author: Karami, S

.
  1. arXiv:2402.08157  [pdf, other

    physics.flu-dyn

    Direct numerical simulation of a thermal turbulent boundary layer: an analogy to simulate bushfires and a testbed for artificial intelligence remote sensing of bushfire propagation

    Authors: Julio Soria, Shahram Karami, Callum Atkinson, Minghang Li

    Abstract: Direct numerical simulation of a turbulent thermal boundary layer (TTBL) can perform the role of an analogy to simulate bushfires that can serve as a testbed for artificial intelligence (AI) enhanced remote sensing of bushfire propagation. By solving the Navier-Stokes equations for a turbulent flow, DNS predicts the flow field and allows for a detailed study of the interactions between the turbule… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

    Comments: 16 pages, 8 figures; aspects of this paper presented as a Plenary Lecture at: International Symposium on Unmanned Systems: AI, Design and Efficiency (ISUDEF23), June 7-9, 2023, KTH, Stockholm, Sweden

  2. arXiv:2210.10272  [pdf, other

    cs.LG cs.CR cs.CV

    Training set cleansing of backdoor poisoning by self-supervised representation learning

    Authors: H. Wang, S. Karami, O. Dia, H. Ritter, E. Emamjomeh-Zadeh, J. Chen, Z. Xiang, D. J. Miller, G. Kesidis

    Abstract: A backdoor or Trojan attack is an important type of data poisoning attack against deep neural network (DNN) classifiers, wherein the training dataset is poisoned with a small number of samples that each possess the backdoor pattern (usually a pattern that is either imperceptible or innocuous) and which are mislabeled to the attacker's target class. When trained on a backdoor-poisoned dataset, a DN… ▽ More

    Submitted 14 March, 2023; v1 submitted 18 October, 2022; originally announced October 2022.

  3. arXiv:2112.06324  [pdf, other

    cs.CR

    Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking

    Authors: Peter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi

    Abstract: We identify class of covert channels in browsers that are not mitigated by current defenses, which we call "pool-party" attacks. Pool-party attacks allow sites to create covert channels by manipulating limited-but-unpartitioned resource pools. These class of attacks have been known, but in this work we show that they are both more prevalent, more practical for exploitation, and allow exploitation… ▽ More

    Submitted 21 March, 2023; v1 submitted 12 December, 2021; originally announced December 2021.

  4. arXiv:2108.01558  [pdf, other

    math.NA

    Intra-Basis Multiplication of Polynomials Given in Various Polynomial Bases

    Authors: S. Karami, M. Ahmadnasab, M. Hadizadeh, A. Amiraslani

    Abstract: Multiplication of polynomials is among key operations in computer algebra which plays important roles in develo** techniques for other commonly used polynomial operations such as division, evaluation/interpolation, and factorization. In this work, we present formulas and techniques for polynomial multiplications expressed in a variety of well-known polynomial bases without any change of basis. I… ▽ More

    Submitted 1 June, 2022; v1 submitted 3 August, 2021; originally announced August 2021.

    MSC Class: 15B99; 08A40; 33C47; 80M10

  5. arXiv:2006.15780  [pdf, other

    econ.EM

    Treatment Effects in Interactive Fixed Effects Models with a Small Number of Time Periods

    Authors: Brantly Callaway, Sonia Karami

    Abstract: This paper considers identifying and estimating the Average Treatment Effect on the Treated (ATT) when untreated potential outcomes are generated by an interactive fixed effects model. That is, in addition to time-period and individual fixed effects, we consider the case where there is an unobserved time invariant variable whose effect on untreated potential outcomes may change over time and which… ▽ More

    Submitted 14 February, 2022; v1 submitted 28 June, 2020; originally announced June 2020.

    Comments: 49 pages, 4 figures