Skip to main content

Showing 1–44 of 44 results for author: Sabokrou, M

.
  1. arXiv:2406.10617  [pdf, other

    cs.CV

    Enhancing Anomaly Detection Generalization through Knowledge Exposure: The Dual Effects of Augmentation

    Authors: Mohammad Akhavan Anvari, Ro**a Kashefi, Vahid Reza Khazaie, Mohammad Khalooei, Mohammad Sabokrou

    Abstract: Anomaly detection involves identifying instances within a dataset that deviate from the norm and occur infrequently. Current benchmarks tend to favor methods biased towards low diversity in normal data, which does not align with real-world scenarios. Despite advancements in these benchmarks, contemporary anomaly detection methods often struggle with out-of-distribution generalization, particularly… ▽ More

    Submitted 15 June, 2024; originally announced June 2024.

  2. arXiv:2311.16485  [pdf, other

    cs.LG cs.CV

    Class-Adaptive Sampling Policy for Efficient Continual Learning

    Authors: Hossein Rezaei, Mohammad Sabokrou

    Abstract: Continual learning (CL) aims to acquire new knowledge while preserving information from previous experiences without forgetting. Though buffer-based methods (i.e., retaining samples from previous tasks) have achieved acceptable performance, determining how to allocate the buffer remains a critical challenge. Most recent research focuses on refining these methods but often fails to sufficiently con… ▽ More

    Submitted 26 November, 2023; originally announced November 2023.

  3. arXiv:2311.06786  [pdf, other

    cs.CV

    Explainability of Vision Transformers: A Comprehensive Review and New Perspectives

    Authors: Ro**a Kashefi, Leili Barekatain, Mohammad Sabokrou, Fatemeh Aghaeipoor

    Abstract: Transformers have had a significant impact on natural language processing and have recently demonstrated their potential in computer vision. They have shown promising results over convolution neural networks in fundamental computer vision tasks. However, the scientific community has not fully grasped the inner workings of vision transformers, nor the basis for their decision-making, which undersco… ▽ More

    Submitted 12 November, 2023; originally announced November 2023.

    Comments: 20 pages,5 figures

  4. arXiv:2310.05263  [pdf, other

    cs.CR

    Confidence-driven Sampling for Backdoor Attacks

    Authors: Pengfei He, Han Xu, Yue Xing, Jie Ren, Yingqian Cui, Shenglai Zeng, Jiliang Tang, Makoto Yamada, Mohammad Sabokrou

    Abstract: Backdoor attacks aim to surreptitiously insert malicious triggers into DNN models, granting unauthorized control during testing scenarios. Existing methods lack robustness against defense strategies and predominantly focus on enhancing trigger stealthiness while randomly selecting poisoned samples. Our research highlights the overlooked drawbacks of random sampling, which make that attack detectab… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

  5. arXiv:2307.01473  [pdf, other

    cs.CV cs.AI

    Mitigating Bias: Enhancing Image Classification by Improving Model Explanations

    Authors: Raha Ahmadi, Mohammad Javad Rajabi, Mohammad Khalooie, Mohammad Sabokrou

    Abstract: Deep learning models have demonstrated remarkable capabilities in learning complex patterns and concepts from training data. However, recent findings indicate that these models tend to rely heavily on simple and easily discernible features present in the background of images rather than the main concepts or objects they are intended to classify. This phenomenon poses a challenge to image classifie… ▽ More

    Submitted 22 September, 2023; v1 submitted 4 July, 2023; originally announced July 2023.

    Comments: Accepted to ACML2023

  6. arXiv:2306.15755  [pdf, other

    cs.CV

    Adversarial Backdoor Attack by Naturalistic Data Poisoning on Trajectory Prediction in Autonomous Driving

    Authors: Mozhgan Pourkeshavarz, Mohammad Sabokrou, Amir Rasouli

    Abstract: In autonomous driving, behavior prediction is fundamental for safe motion planning, hence the security and robustness of prediction models against adversarial attacks are of paramount importance. We propose a novel adversarial backdoor attack against trajectory prediction models as a means of studying their potential vulnerabilities. Our attack affects the victim at training time via naturalistic,… ▽ More

    Submitted 22 November, 2023; v1 submitted 27 June, 2023; originally announced June 2023.

  7. arXiv:2306.08336  [pdf, other

    cs.CV cs.AI

    Global-Local Processing in Convolutional Neural Networks

    Authors: Zahra Rezvani, Soroor Shekarizeh, Mohammad Sabokrou

    Abstract: Convolutional Neural Networks (CNNs) have achieved outstanding performance on image processing challenges. Actually, CNNs imitate the typically developed human brain structures at the micro-level (Artificial neurons). At the same time, they distance themselves from imitating natural visual perception in humans at the macro architectures (high-level cognition). Recently it has been investigated tha… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.

  8. arXiv:2306.06414  [pdf, other

    cs.CV

    Revealing Model Biases: Assessing Deep Neural Networks via Recovered Sample Analysis

    Authors: Mohammad Mahdi Mehmanchi, Mahbod Nouri, Mohammad Sabokrou

    Abstract: This paper proposes a straightforward and cost-effective approach to assess whether a deep neural network (DNN) relies on the primary concepts of training samples or simply learns discriminative, yet simple and irrelevant features that can differentiate between classes. The paper highlights that DNNs, as discriminative classifiers, often find the simplest features to discriminate between classes,… ▽ More

    Submitted 10 June, 2023; originally announced June 2023.

  9. arXiv:2306.03531  [pdf, other

    cs.CV cs.AI

    A Unified Concept-Based System for Local, Global, and Misclassification Explanations

    Authors: Fatemeh Aghaeipoor, Dorsa Asgarian, Mohammad Sabokrou

    Abstract: Explainability of Deep Neural Networks (DNNs) has been garnering increasing attention in recent years. Of the various explainability approaches, concept-based techniques stand out for their ability to utilize human-meaningful concepts instead of focusing solely on individual pixels. However, there is a scarcity of methods that consistently provide both local and global explanations. Moreover, most… ▽ More

    Submitted 4 October, 2023; v1 submitted 6 June, 2023; originally announced June 2023.

    ACM Class: I.2

  10. arXiv:2305.19424  [pdf, other

    cs.LG cs.CR cs.CV

    Quantifying Overfitting: Evaluating Neural Network Performance through Analysis of Null Space

    Authors: Hossein Rezaei, Mohammad Sabokrou

    Abstract: Machine learning models that are overfitted/overtrained are more vulnerable to knowledge leakage, which poses a risk to privacy. Suppose we download or receive a model from a third-party collaborator without knowing its training accuracy. How can we determine if it has been overfitted or overtrained on its training data? It's possible that the model was intentionally over-trained to make it vulner… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

  11. arXiv:2211.10892  [pdf, other

    cs.CV

    Towards Realistic Out-of-Distribution Detection: A Novel Evaluation Framework for Improving Generalization in OOD Detection

    Authors: Vahid Reza Khazaie, Anthony Wong, Mohammad Sabokrou

    Abstract: This paper presents a novel evaluation framework for Out-of-Distribution (OOD) detection that aims to assess the performance of machine learning models in more realistic settings. We observed that the real-world requirements for testing OOD detection methods are not satisfied by the current testing protocols. They usually encourage methods to have a strong bias towards a low level of diversity in… ▽ More

    Submitted 31 August, 2023; v1 submitted 20 November, 2022; originally announced November 2022.

  12. arXiv:2207.11031  [pdf

    cs.CV cs.LG cs.NE

    MobileDenseNet: A new approach to object detection on mobile devices

    Authors: Mohammad Hajizadeh, Mohammad Sabokrou, Adel Rahmani

    Abstract: Object detection problem solving has developed greatly within the past few years. There is a need for lighter models in instances where hardware limitations exist, as well as a demand for models to be tailored to mobile devices. In this article, we will assess the methods used when creating algorithms that address these issues. The main goal of this article is to increase accuracy in state-of-the-… ▽ More

    Submitted 22 July, 2022; originally announced July 2022.

  13. arXiv:2205.14297  [pdf, other

    cs.CV cs.LG

    Fake It Till You Make It: Towards Accurate Near-Distribution Novelty Detection

    Authors: Hossein Mirzaei, Mohammadreza Salehi, Sajjad Shahabi, Efstratios Gavves, Cees G. M. Snoek, Mohammad Sabokrou, Mohammad Hossein Rohban

    Abstract: We aim for image-based novelty detection. Despite considerable progress, existing models either fail or face a dramatic drop under the so-called "near-distribution" setting, where the differences between normal and anomalous samples are subtle. We first demonstrate existing methods experience up to 20% decrease in performance in the near-distribution setting. Next, we propose to exploit a score-ba… ▽ More

    Submitted 28 November, 2022; v1 submitted 27 May, 2022; originally announced May 2022.

  14. arXiv:2202.00050  [pdf, other

    cs.CV

    Deep-Disaster: Unsupervised Disaster Detection and Localization Using Visual Data

    Authors: Soroor Shekarizadeh, Razieh Rastgoo, Saif Al-Kuwari, Mohammad Sabokrou

    Abstract: Social media plays a significant role in sharing essential information, which helps humanitarian organizations in rescue operations during and after disaster incidents. However, develo** an efficient method that can provide rapid analysis of social media images in the early hours of disasters is still largely an open problem, mainly due to the lack of suitable datasets and the sheer complexity o… ▽ More

    Submitted 31 January, 2022; originally announced February 2022.

  15. arXiv:2201.01609  [pdf, other

    cs.CV cs.CL

    All You Need In Sign Language Production

    Authors: Razieh Rastgoo, Kourosh Kiani, Sergio Escalera, Vassilis Athitsos, Mohammad Sabokrou

    Abstract: Sign Language is the dominant form of communication language used in the deaf and hearing-impaired community. To make an easy and mutual communication between the hearing-impaired and the hearing communities, building a robust system capable of translating the spoken language into sign language and vice versa is fundamental. To this end, sign language recognition and production are two necessary p… ▽ More

    Submitted 6 January, 2022; v1 submitted 5 January, 2022; originally announced January 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2103.15910

  16. arXiv:2110.14051  [pdf, other

    cs.CV cs.LG

    A Unified Survey on Anomaly, Novelty, Open-Set, and Out-of-Distribution Detection: Solutions and Future Challenges

    Authors: Mohammadreza Salehi, Hossein Mirzaei, Dan Hendrycks, Yixuan Li, Mohammad Hossein Rohban, Mohammad Sabokrou

    Abstract: Machine learning models often encounter samples that are diverged from the training distribution. Failure to recognize an out-of-distribution (OOD) sample, and consequently assign that sample to an in-class label significantly compromises the reliability of a model. The problem has gained significant attention due to its importance for safety deploying models in open-world settings. Detecting OOD… ▽ More

    Submitted 3 December, 2022; v1 submitted 26 October, 2021; originally announced October 2021.

    Comments: Published in Transaction on Machine Learning (TMLR)

  17. arXiv:2109.00796  [pdf, other

    cs.CV

    Multi-Modal Zero-Shot Sign Language Recognition

    Authors: Razieh Rastgoo, Kourosh Kiani, Sergio Escalera, Mohammad Sabokrou

    Abstract: Zero-Shot Learning (ZSL) has rapidly advanced in recent years. Towards overcoming the annotation bottleneck in the Sign Language Recognition (SLR), we explore the idea of Zero-Shot Sign Language Recognition (ZS-SLR) with no annotated visual examples, by leveraging their textual descriptions. In this way, we propose a multi-modal Zero-Shot Sign Language Recognition (ZS-SLR) model harnessing from th… ▽ More

    Submitted 2 September, 2021; originally announced September 2021.

    Comments: arXiv admin note: text overlap with arXiv:2108.10059

  18. arXiv:2103.15910  [pdf, other

    cs.CV

    Sign Language Production: A Review

    Authors: Razieh Rastgoo, Kourosh Kiani, Sergio Escalera, Mohammad Sabokrou

    Abstract: Sign Language is the dominant yet non-primary form of communication language used in the deaf and hearing-impaired community. To make an easy and mutual communication between the hearing-impaired and the hearing communities, building a robust system capable of translating the spoken language into sign language and vice versa is fundamental. To this end, sign language recognition and production are… ▽ More

    Submitted 29 March, 2021; originally announced March 2021.

  19. arXiv:2103.15486  [pdf, other

    cs.LG cs.CV

    ClaRe: Practical Class Incremental Learning By Remembering Previous Class Representations

    Authors: Bahram Mohammadi, Mohammad Sabokrou

    Abstract: This paper presents a practical and simple yet efficient method to effectively deal with the catastrophic forgetting for Class Incremental Learning (CIL) tasks. CIL tends to learn new concepts perfectly, but not at the expense of performance and accuracy for old data. Learning new knowledge in the absence of data instances from previous classes or even imbalance samples of both old and new classes… ▽ More

    Submitted 29 March, 2021; originally announced March 2021.

  20. arXiv:2103.12216  [pdf, other

    cs.CV

    ZS-IL: Looking Back on Learned Experiences For Zero-Shot Incremental Learning

    Authors: Mozhgan PourKeshavarz, Mohammad Sabokrou

    Abstract: Classical deep neural networks are limited in their ability to learn from emerging streams of training data. When trained sequentially on new or evolving tasks, their performance degrades sharply, making them inappropriate in real-world use cases. Existing methods tackle it by either storing old data samples or only updating a parameter set of DNNs, which, however, demands a large memory budget or… ▽ More

    Submitted 22 March, 2021; originally announced March 2021.

  21. arXiv:2103.10502   

    cs.CV

    Ano-Graph: Learning Normal Scene Contextual Graphs to Detect Video Anomalies

    Authors: Masoud Pourreza, Mohammadreza Salehi, Mohammad Sabokrou

    Abstract: Video anomaly detection has proved to be a challenging task owing to its unsupervised training procedure and high spatio-temporal complexity existing in real-world scenarios. In the absence of anomalous training samples, state-of-the-art methods try to extract features that fully grasp normal behaviors in both space and time domains using different approaches such as autoencoders, or generative ad… ▽ More

    Submitted 16 November, 2022; v1 submitted 18 March, 2021; originally announced March 2021.

    Comments: Inconsistencies in the results

  22. arXiv:2103.01739  [pdf, other

    cs.CV

    Image/Video Deep Anomaly Detection: A Survey

    Authors: Bahram Mohammadi, Mahmood Fathy, Mohammad Sabokrou

    Abstract: The considerable significance of Anomaly Detection (AD) problem has recently drawn the attention of many researchers. Consequently, the number of proposed methods in this research field has been increased steadily. AD strongly correlates with the important computer vision and image processing tasks such as image/video anomaly, irregularity and sudden event detection. More recently, Deep Neural Net… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

  23. arXiv:2009.11090  [pdf, other

    eess.IV cs.CV

    Robustification of Segmentation Models Against Adversarial Perturbations In Medical Imaging

    Authors: Hanwool Park, Amirhossein Bayat, Mohammad Sabokrou, Jan S. Kirschke, Bjoern H. Menze

    Abstract: This paper presents a novel yet efficient defense framework for segmentation models against adversarial attacks in medical imaging. In contrary to the defense methods against adversarial attacks for classification models which widely are investigated, such defense methods for segmentation models has been less explored. Our proposed method can be used for any deep learning models without revising t… ▽ More

    Submitted 23 September, 2020; originally announced September 2020.

  24. arXiv:2006.11629  [pdf, other

    cs.CV cs.LG

    G2D: Generate to Detect Anomaly

    Authors: Masoud Pourreza, Bahram Mohammadi, Mostafa Khaki, Samir Bouindour, Hichem Snoussi, Mohammad Sabokrou

    Abstract: In this paper, we propose a novel method for irregularity detection. Previous researches solve this problem as a One-Class Classification (OCC) task where they train a reference model on all of the available samples. Then, they consider a test sample as an anomaly if it has a diversion from the reference model. Generative Adversarial Networks (GANs) have achieved the most promising results for OCC… ▽ More

    Submitted 27 June, 2020; v1 submitted 20 June, 2020; originally announced June 2020.

  25. arXiv:2002.04821  [pdf, other

    cs.CV

    Deep-HR: Fast Heart Rate Estimation from Face Video Under Realistic Conditions

    Authors: Mohammad Sabokrou, Masoud Pourreza, Xiaobai Li, Mahmood Fathy, Guoying Zhao

    Abstract: This paper presents a novel method for remote heart rate (HR) estimation. Recent studies have proved that blood pum** by the heart is highly correlated to the intense color of face pixels, and surprisingly can be utilized for remote HR estimation. Researchers successfully proposed several methods for this task, but making it work in realistic situations is still a challenging problem in computer… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

  26. arXiv:2001.06099  [pdf, other

    cs.LG cs.CV stat.ML

    Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks

    Authors: Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we propose Code-Bridged Classifier (CBC), a framework for making a Convolutional Neural Network (CNNs) robust against adversarial attacks without increasing or even by decreasing the overall models' computational complexity. More specifically, we propose a stacked encoder-convolutional model, in which the input image is first encoded by the encoder module of a denoising auto-encoder… ▽ More

    Submitted 16 January, 2020; originally announced January 2020.

    Comments: 6 pages, Accepted and to appear in ISQED 2020

  27. arXiv:1911.03306  [pdf, other

    cs.LG cs.CR stat.ML

    AutoIDS: Auto-encoder Based Method for Intrusion Detection System

    Authors: Mohammed Gharib, Bahram Mohammadi, Shadi Hejareh Dastgerdi, Mohammad Sabokrou

    Abstract: Intrusion Detection System (IDS) is one of the most effective solutions for providing primary security services. IDSs are generally working based on attack signatures or by detecting anomalies. In this paper, we have presented AutoIDS, a novel yet efficient solution for IDS, based on a semi-supervised machine learning technique. AutoIDS can distinguish abnormal packet flows from normal ones by tak… ▽ More

    Submitted 8 November, 2019; originally announced November 2019.

  28. arXiv:1908.10455  [pdf, other

    cs.CV

    Self-Supervised Representation Learning via Neighborhood-Relational Encoding

    Authors: Mohammad Sabokrou, Mohammad Khalooei, Ehsan Adeli

    Abstract: In this paper, we propose a novel self-supervised representation learning by taking advantage of a neighborhood-relational encoding (NRE) among the training data. Conventional unsupervised learning methods only focused on training deep networks to understand the primitive characteristics of the visual data, mainly to be able to reconstruct the data from a latent space. They often neglected the rel… ▽ More

    Submitted 27 August, 2019; originally announced August 2019.

    Comments: Accepted in International Conference on Computer Vision (ICCV) 2019

  29. arXiv:1907.05640  [pdf, other

    cs.CV

    AVD: Adversarial Video Distillation

    Authors: Mohammad Tavakolian, Mohammad Sabokrou, Abdenour Hadid

    Abstract: In this paper, we present a simple yet efficient approach for video representation, called Adversarial Video Distillation (AVD). The key idea is to represent videos by compressing them in the form of realistic images, which can be used in a variety of video-based scene analysis applications. Representing a video as a single image enables us to address the problem of video analysis by image analysi… ▽ More

    Submitted 12 July, 2019; originally announced July 2019.

  30. arXiv:1904.11577  [pdf, other

    cs.LG cs.CR stat.ML

    End-to-End Adversarial Learning for Intrusion Detection in Computer Networks

    Authors: Bahram Mohammadi, Mohammad Sabokrou

    Abstract: This paper presents a simple yet efficient method for an anomaly-based Intrusion Detection System (IDS). In reality, IDSs can be defined as a one-class classification system, where the normal traffic is the target class. The high diversity of network attacks in addition to the need for generalization, motivate us to propose a semi-supervised method. Inspired by the successes of Generative Adversar… ▽ More

    Submitted 25 April, 2019; originally announced April 2019.

  31. arXiv:1806.09986  [pdf

    cs.CV

    Online Signature Verification using Deep Representation: A new Descriptor

    Authors: Mohammad Hajizadeh Saffar, Mohsen Fayyaz, Mohammad Sabokrou, Mahmood Fathy

    Abstract: This paper presents an accurate method for verifying online signatures. The main difficulty of signature verification come from: (1) Lacking enough training samples (2) The methods must be spatial change invariant. To deal with these difficulties and modeling the signatures efficiently, we propose a method that a one-class classifier per each user is built on discriminative features. First, we pre… ▽ More

    Submitted 23 June, 2018; originally announced June 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1505.08153

  32. arXiv:1806.06172  [pdf

    cs.CV

    Semantic Video Segmentation: A Review on Recent Approaches

    Authors: Mohammad Hajizadeh Saffar, Mohsen Fayyaz, Mohammad Sabokrou, Mahmood Fathy

    Abstract: This paper gives an overview on semantic segmentation consists of an explanation of this field, it's status and relation with other vision fundamental tasks, different datasets and common evaluation parameters that have been used by researchers. This survey also includes an overall review on a variety of recent approaches (RDF, MRF, CRF, etc.) and their advantages and challenges and shows the supe… ▽ More

    Submitted 15 June, 2018; originally announced June 2018.

  33. arXiv:1805.09521  [pdf, other

    cs.CV

    AVID: Adversarial Visual Irregularity Detection

    Authors: Mohammad Sabokrou, Masoud Pourreza, Mohsen Fayyaz, Rahim Entezari, Mahmood Fathy, Jürgen Gall, Ehsan Adeli

    Abstract: Real-time detection of irregularities in visual data is very invaluable and useful in many prospective applications including surveillance, patient monitoring systems, etc. With the surge of deep learning methods in the recent years, researchers have tried a wide spectrum of methods for different applications. However, for the case of irregularity or anomaly detection in videos, training an end-to… ▽ More

    Submitted 17 July, 2018; v1 submitted 24 May, 2018; originally announced May 2018.

  34. arXiv:1802.09088  [pdf, other

    cs.CV

    Adversarially Learned One-Class Classifier for Novelty Detection

    Authors: Mohammad Sabokrou, Mohammad Khalooei, Mahmood Fathy, Ehsan Adeli

    Abstract: Novelty detection is the process of identifying the observation(s) that differ in some respect from the training observations (the target class). In reality, the novelty class is often absent during training, poorly sampled or not well defined. Therefore, one-class classifiers can efficiently model such problems. However, due to the unavailability of data from the novelty class, training an end-to… ▽ More

    Submitted 24 May, 2018; v1 submitted 25 February, 2018; originally announced February 2018.

    Comments: CVPR 2018 Paper

  35. arXiv:1802.06205  [pdf, other

    cs.CV

    Towards Principled Design of Deep Convolutional Networks: Introducing SimpNet

    Authors: Seyyed Hossein Hasanpour, Mohammad Rouhani, Mohsen Fayyaz, Mohammad Sabokrou, Ehsan Adeli

    Abstract: Major winning Convolutional Neural Networks (CNNs), such as VGGNet, ResNet, DenseNet, \etc, include tens to hundreds of millions of parameters, which impose considerable computation and memory overheads. This limits their practical usage in training and optimizing for real-world applications. On the contrary, light-weight architectures, such as SqueezeNet, are being proposed to address this issue.… ▽ More

    Submitted 17 February, 2018; originally announced February 2018.

    Comments: The Submitted version to the IEEE TIP on December 2017, replaced high resolution images with low-res counterparts due to arXiv size limitation, 19 pages

  36. arXiv:1609.00866  [pdf, other

    cs.CV

    Deep-Anomaly: Fully Convolutional Neural Network for Fast Anomaly Detection in Crowded Scenes

    Authors: Mohammad Sabokrou, Mohsen Fayyaz, Mahmood Fathy, Zahra Moayedd, Reinhard klette

    Abstract: The detection of abnormal behaviours in crowded scenes has to deal with many challenges. This paper presents an efficient method for detection and localization of anomalies in videos. Using fully convolutional neural networks (FCNs) and temporal data, a pre-trained supervised FCN is transferred into an unsupervised FCN ensuring the detection of (global) anomalies in scenes. High performance in ter… ▽ More

    Submitted 30 April, 2017; v1 submitted 3 September, 2016; originally announced September 2016.

  37. arXiv:1608.06037  [pdf, other

    cs.CV cs.NE

    Lets keep it simple, Using simple architectures to outperform deeper and more complex architectures

    Authors: Seyyed Hossein Hasanpour, Mohammad Rouhani, Mohsen Fayyaz, Mohammad Sabokrou

    Abstract: Major winning Convolutional Neural Networks (CNNs), such as AlexNet, VGGNet, ResNet, GoogleNet, include tens to hundreds of millions of parameters, which impose considerable computation and memory overhead. This limits their practical use for training, optimization and memory efficiency. On the contrary, light-weight architectures, being proposed to address this issue, mainly suffer from low accur… ▽ More

    Submitted 27 April, 2023; v1 submitted 21 August, 2016; originally announced August 2016.

    Comments: Added the long-overdue ImageNet results and updated the missed cifar10/100 results from 2018

  38. arXiv:1608.05971  [pdf, other

    cs.CV

    STFCN: Spatio-Temporal FCN for Semantic Video Segmentation

    Authors: Mohsen Fayyaz, Mohammad Hajizadeh Saffar, Mohammad Sabokrou, Mahmood Fathy, Reinhard Klette, Fay Huang

    Abstract: This paper presents a novel method to involve both spatial and temporal features for semantic video segmentation. Current work on convolutional neural networks(CNNs) has shown that CNNs provide advanced spatial features supporting a very good performance of solutions for both image and video analysis, especially for the semantic segmentation task. We investigate how involving temporal features als… ▽ More

    Submitted 2 September, 2016; v1 submitted 21 August, 2016; originally announced August 2016.

  39. An Evolvable Fuzzy Logic System for handoff management in heterogeneous Wireless Networks

    Authors: Hossein Fayyazi, Mohammad Sabokrou

    Abstract: One of the features of the Next Generation Wireless Networks (NGWNs) is its heterogeneous communication environment. Heterogeneous networks are ranging from wireless WAN, LAN, MAN and PAN. The most important parameters in this regard are different data rates and coverage of these networks. In this paper, we propose an evolvable fuzzy logic-based algorithm for managing handover process in heterogen… ▽ More

    Submitted 8 March, 2016; originally announced March 2016.

  40. arXiv:1511.07425   

    cs.CV

    Real-Time Anomalous Behavior Detection and Localization in Crowded Scenes

    Authors: Mohammad Sabokrou, Mahmood Fathy, Mojtaba Hosseini

    Abstract: In this paper, we propose an accurate and real-time anomaly detection and localization in crowded scenes, and two descriptors for representing anomalous behavior in video are proposed. We consider a video as being a set of cubic patches. Based on the low likelihood of an anomaly occurrence, and the redundancy of structures in normal patches in videos, two (global and local) views are considered fo… ▽ More

    Submitted 2 January, 2016; v1 submitted 21 November, 2015; originally announced November 2015.

    Comments: This paper has been withdrawn by the author due to some error in experimental result. There are some mistakes

  41. arXiv:1511.06936  [pdf, other

    cs.CV

    Real-Time Anomaly Detection and Localization in Crowded Scenes

    Authors: Mohammad Sabokrou, Mahmood Fathy, Mojtaba Hosseini, Reinhard Klette

    Abstract: In this paper, we propose a method for real-time anomaly detection and localization in crowded scenes. Each video is defined as a set of non-overlap** cubic patches, and is described using two local and global descriptors. These descriptors capture the video properties from different aspects. By incorporating simple and cost-effective Gaussian classifiers, we can distinguish normal activities an… ▽ More

    Submitted 21 November, 2015; originally announced November 2015.

    Comments: CVPRw 2015

  42. arXiv:1508.03710  [pdf

    cs.CV

    A Novel Approach For Finger Vein Verification Based on Self-Taught Learning

    Authors: Mohsen Fayyaz, Masoud PourReza, Mohammad Hajizadeh Saffar, Mohammad Sabokrou, Mahmood Fathy

    Abstract: In this paper, we propose a method for user Finger Vein Authentication (FVA) as a biometric system. Using the discriminative features for classifying theses finger veins is one of the main tips that make difference in related works, Thus we propose to learn a set of representative features, based on autoencoders. We model the user finger vein using a Gaussian distribution. Experimental results sho… ▽ More

    Submitted 15 August, 2015; originally announced August 2015.

    Comments: 4 pages, 4 figures, Submitted Iranian Conference on Machine Vision and Image Processing

  43. arXiv:1506.00122   

    cs.NI cs.NE

    IDSA: Intelligent Distributed Sensor Activation Algorithm For Target Tracking With Wireless Sensor Network

    Authors: Mohammad Sabokrou, Mahmood Fathy, Mojtaba Hoseini

    Abstract: One important application of the Wireless Sensor Network(WSN) is target tracking, the aim of this application is converging to an event or object in an area. In this paper, we propose an energy-efficient distributed sensor activation protocol based on predicted location technique, called Intelligent Distributed Sensor Activation Algorithm (IDSA). The proposed algorithm predicts the location of tar… ▽ More

    Submitted 15 February, 2017; v1 submitted 30 May, 2015; originally announced June 2015.

    Comments: We have found several mistake in this our paper. (1) The English writing of paper must improved (2) the experimental results especially Figure 9, 10 and 12 are wrong (3) Some references must revised. We are providing new version of paper. We are concern about, this version make confusion for readers

  44. Feature Representation for Online Signature Verification

    Authors: Mohsen Fayyaz, Mohammad Hajizadeh_Saffar, Mohammad Sabokrou, Mahmood Fathy

    Abstract: Biometrics systems have been used in a wide range of applications and have improved people authentication. Signature verification is one of the most common biometric methods with techniques that employ various specifications of a signature. Recently, deep learning has achieved great success in many fields, such as image, sounds and text processing. In this paper, deep learning method has been used… ▽ More

    Submitted 29 May, 2015; originally announced May 2015.

    Comments: 10 pages, 10 figures, Submitted to IEEE Transactions on Information Forensics and Security