Skip to main content

Showing 1–7 of 7 results for author: Osia, S A

.
  1. arXiv:2203.13655  [pdf, other

    cs.LG

    Gransformer: Transformer-based Graph Generation

    Authors: Ahmad Khajenezhad, Seyed Ali Osia, Mahmood Karimian, Hamid Beigy

    Abstract: Transformers have become widely used in various tasks, such as natural language processing and machine vision. This paper proposes Gransformer, an algorithm based on Transformer for generating graphs. We modify the Transformer encoder to exploit the structural information of the given graph. The attention mechanism is adapted to consider the presence or absence of edges between each pair of nodes.… ▽ More

    Submitted 30 May, 2024; v1 submitted 25 March, 2022; originally announced March 2022.

  2. RC-RNN: Reconfigurable Cache Architecture for Storage Systems Using Recurrent Neural Networks

    Authors: Shahriar Ebrahimi, Reza Salkhordeh, Seyed Ali Osia, Ali Taheri, Hamid Reza Rabiee, Hossein Asadi

    Abstract: Solid-State Drives (SSDs) have significant performance advantages over traditional Hard Disk Drives (HDDs) such as lower latency and higher throughput. Significantly higher price per capacity and limited lifetime, however, prevents designers to completely substitute HDDs by SSDs in enterprise storage systems. SSD-based caching has recently been suggested for storage systems to benefit from higher… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

    Comments: Date of Publication: 09 August 2021

    Journal ref: IEEE Transactions on Emerging Topics in Computing (2021)

  3. arXiv:1902.00329  [pdf, other

    cs.IT cs.CR

    Privacy Against Brute-Force Inference Attacks

    Authors: Seyed Ali Osia, Borzoo Rassouli, Hamed Haddadi, Hamid R. Rabiee, Deniz Gündüz

    Abstract: Privacy-preserving data release is about disclosing information about useful data while retaining the privacy of sensitive data. Assuming that the sensitive data is threatened by a brute-force adversary, we define Guessing Leakage as a measure of privacy, based on the concept of guessing. After investigating the properties of this measure, we derive the optimal utility-privacy trade-off via a line… ▽ More

    Submitted 1 February, 2019; originally announced February 2019.

  4. arXiv:1802.03151  [pdf, other

    stat.ML cs.CR cs.CV cs.IT cs.LG

    Deep Private-Feature Extraction

    Authors: Seyed Ali Osia, Ali Taheri, Ali Shahin Shamsabadi, Kleomenis Katevas, Hamed Haddadi, Hamid R. Rabiee

    Abstract: We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is trained and evaluated based on information theoretic constraints. Using the selective exchange of information between a user's device and a service provider, DPFE enables the user to prevent certain sensitive information from being shared with a service provider, while allowing them to extract approved information… ▽ More

    Submitted 28 February, 2018; v1 submitted 9 February, 2018; originally announced February 2018.

  5. arXiv:1710.01727  [pdf, ps, other

    cs.CV cs.AI cs.CR

    Privacy-Preserving Deep Inference for Rich User Data on The Cloud

    Authors: Seyed Ali Osia, Ali Shahin Shamsabadi, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, Hamed Haddadi

    Abstract: Deep neural networks are increasingly being used in a variety of machine learning applications applied to rich user data on the cloud. However, this approach introduces a number of privacy and efficiency challenges, as the cloud operator can perform secondary inferences on the available data. Recently, advances in edge processing have paved the way for more efficient, and private, data processing… ▽ More

    Submitted 11 October, 2017; v1 submitted 4 October, 2017; originally announced October 2017.

    Comments: arXiv admin note: substantial text overlap with arXiv:1703.02952

  6. A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics

    Authors: Seyed Ali Osia, Ali Shahin Shamsabadi, Sina Sajadmanesh, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, Hamed Haddadi

    Abstract: Internet of Things (IoT) devices and applications are being deployed in our homes and workplaces. These devices often rely on continuous data collection to feed machine learning models. However, this approach introduces several privacy and efficiency challenges, as the service operator can perform unwanted inferences on the available data. Recently, advances in edge processing have paved the way f… ▽ More

    Submitted 26 December, 2019; v1 submitted 8 March, 2017; originally announced March 2017.

    Comments: To appear in IEEE Internet of Things Journal

    Journal ref: IEEE Internet of Things Journal, May 2020

  7. arXiv:1610.08469  [pdf, other

    cs.CY cs.AI cs.SI

    Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web

    Authors: Sina Sajadmanesh, Sina Jafarzadeh, Seyed Ali Osia, Hamid R. Rabiee, Hamed Haddadi, Yelena Mejova, Mirco Musolesi, Emiliano De Cristofaro, Gianluca Stringhini

    Abstract: Food and nutrition occupy an increasingly prevalent space on the web, and dishes and recipes shared online provide an invaluable mirror into culinary cultures and attitudes around the world. More specifically, ingredients, flavors, and nutrition information become strong signals of the taste preferences of individuals and civilizations. However, there is little understanding of these palate variet… ▽ More

    Submitted 25 April, 2017; v1 submitted 26 October, 2016; originally announced October 2016.

    Comments: In the Web Science Track of 26th International World Wide Web Conference (WWW 2017)