Skip to main content

Showing 1–22 of 22 results for author: Akbari, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.14680  [pdf

    cs.CY cs.AI

    Trust in AI: Progress, Challenges, and Future Directions

    Authors: Saleh Afroogh, Ali Akbari, Evan Malone, Mohammadali Kargar, Hananeh Alambeigi

    Abstract: The increasing use of artificial intelligence (AI) systems in our daily life through various applications, services, and products explains the significance of trust/distrust in AI from a user perspective. AI-driven systems (as opposed to other technologies) have ubiquitously diffused in our life not only as some beneficial tools to be used by human agents but also are going to be substitutive agen… ▽ More

    Submitted 4 April, 2024; v1 submitted 12 March, 2024; originally announced March 2024.

  2. arXiv:2403.01903  [pdf, other

    cs.DC cs.CC math.PR quant-ph

    Online Locality Meets Distributed Quantum Computing

    Authors: Amirreza Akbari, Xavier Coiteux-Roy, Francesco d'Amore, François Le Gall, Henrik Lievonen, Darya Melnyk, Augusto Modanese, Shreyas Pai, Marc-Olivier Renou, Václav Rozhoň, Jukka Suomela

    Abstract: We extend the theory of locally checkable labeling problems (LCLs) from the classical LOCAL model to a number of other models that have been studied recently, including the quantum-LOCAL model, finitely-dependent processes, non-signaling model, dynamic-LOCAL model, and online-LOCAL model [e.g. STOC 2024, ICALP 2023]. First, we demonstrate the advantage that finitely-dependent processes have over… ▽ More

    Submitted 9 April, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

    Comments: 60 pages, 10 figures. This version corrects a mistake in v1

  3. arXiv:2402.09477  [pdf, other

    cs.CR cs.LG

    PANORAMIA: Privacy Auditing of Machine Learning Models without Retraining

    Authors: Mishaal Kazmi, Hadrien Lautraite, Alireza Akbari, Mauricio Soroco, Qiaoyue Tang, Tao Wang, Sébastien Gambs, Mathias Lécuyer

    Abstract: We introduce a privacy auditing scheme for ML models that relies on membership inference attacks using generated data as "non-members". This scheme, which we call PANORAMIA, quantifies the privacy leakage for large-scale ML models without control of the training process or model re-training and only requires access to a subset of the training data. To demonstrate its applicability, we evaluate our… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

    Comments: 19 pages

  4. arXiv:2312.00303  [pdf, other

    cs.NI cs.DC

    A Review of the In-Network Computing and Its Role in the Edge-Cloud Continuum

    Authors: Manel Gherari, Fatemeh Aghaali Akbari, Sama Habibi, Soukaina Ouledsidi Ali, Zakaria Ait Hmitti, Youcef Kardjadja, Muhammad Saqib, Adyson Magalhaes Maia, Marsa Rayani, Ece Gelal Soyak, Halima Elbiaze, Ozgur Ercetin, Yacine Ghamri-Doudane, Roch Glitho, Wessam Ajib

    Abstract: Future networks are anticipated to enable exciting applications and industrial services ranging from Multisensory Extended Reality to Holographic and Haptic communication. These services are accompanied by high bandwidth requirements and/or require low latency and low reliability, which leads to the need for scarce and expensive resources. Cloud and edge computing offer different functionalities t… ▽ More

    Submitted 4 August, 2023; originally announced December 2023.

  5. arXiv:2306.05329  [pdf

    cs.RO eess.SY math.NA math.OC

    Movement Optimization of Robotic Arms for Energy and Time Reduction using Evolutionary Algorithms

    Authors: Abolfazl Akbari, Saeed Mozaffari, Rajmeet Singh, Majid Ahmadi, Shahpour Alirezaee

    Abstract: Trajectory optimization of a robot manipulator consists of both optimization of the robot movement as well as optimization of the robot end-effector path. This paper aims to find optimum movement parameters including movement type, speed, and acceleration to minimize robot energy. Trajectory optimization by minimizing the energy would increase the longevity of robotic manipulators. We utilized the… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

  6. ExaASC: A General Target-Based Stance Detection Corpus in Arabic Language

    Authors: Mohammad Mehdi Jaziriyan, Ahmad Akbari, Hamed Karbasi

    Abstract: Target-based Stance Detection is the task of finding a stance toward a target. Twitter is one of the primary sources of political discussions in social media and one of the best resources to analyze Stance toward entities. This work proposes a new method toward Target-based Stance detection by using the stance of replies toward a most important and arguing target in source tweet. This target is de… ▽ More

    Submitted 29 April, 2022; originally announced April 2022.

    Comments: 6 pages, 1 figure, 4 tables. Accepted at ICCKE 2021

    Journal ref: 2021 11th International Conference on Computer Engineering and Knowledge (ICCKE)

  7. arXiv:2110.00274  [pdf, other

    cs.CR

    Enhancing Cold Wallet Security with Native Multi-Signature schemes in Centralized Exchanges

    Authors: Shahriar Ebrahimi, Parisa Hasanizadeh, Seyed Mohammad Aghamirmohammadali, Amirali Akbari

    Abstract: Currently, one of the most widely used protocols to secure cryptocurrency assets in centralized exchanges is categorizing wallets into cold and hot. While cold wallets hold user deposits, hot} wallets are responsible for addressing withdrawal requests. However, this method has some shortcomings such as: 1) availability of private keys in at least one cold device, and~2) exposure of all private key… ▽ More

    Submitted 1 October, 2021; originally announced October 2021.

    Comments: Nobitex Crypto-Exchange: https://www.nobitex.net, Available Online at: https://cdn.nobitex.net/security/nobitex-security-whitepaper.pdf

  8. arXiv:2109.06593  [pdf, other

    cs.DS cs.DC

    Locality in online, dynamic, sequential, and distributed graph algorithms

    Authors: Amirreza Akbari, Navid Eslami, Henrik Lievonen, Darya Melnyk, Joona Särkijärvi, Jukka Suomela

    Abstract: In this work, we give a unifying view of locality in four settings: distributed algorithms, sequential greedy algorithms, dynamic algorithms, and online algorithms. We introduce a new model of computing, called the online-LOCAL model: the adversary reveals the nodes of the input graph one by one, in the same way as in classical online algorithms, but for each new node we get to see its radius-T ne… ▽ More

    Submitted 12 November, 2022; v1 submitted 14 September, 2021; originally announced September 2021.

  9. arXiv:2108.12673  [pdf

    cs.CY

    Tracing app technology: An ethical review in the COVID-19 era and directions for post-COVID-19

    Authors: Saleh Afroogh, Amir Esmalian, Ali Mostafavi, Ali Akbari, Kambiz Rasoulkhani, Shahriar Esmaeili, Ehsan Hajiramezanali

    Abstract: We conducted a systematic literature review on the ethical considerations of the use of contact tracing app technology, which was extensively implemented during the COVID-19 pandemic. The rapid and extensive use of this technology during the COVID-19 pandemic, while benefiting the public well-being by providing information about people's mobility and movements to control the spread of the virus, r… ▽ More

    Submitted 23 October, 2021; v1 submitted 28 August, 2021; originally announced August 2021.

  10. arXiv:2108.09742  [pdf

    cs.CY

    A Resilient ICT4D Approach to ECO Countries' Education Response during COVID-19 Pandemic

    Authors: Azadeh Akbari

    Abstract: According to the United Nations, schools' closures have impacted up to 99 per cent of the student population in low and lower-middle-income countries. This research-in-progress report introduces a project on Emergency Remote Teaching (ERT) measures in the ten member states of the Economic Cooperation Organization (ECO) with a focus on the application of Information and Communication Technologies (… ▽ More

    Submitted 22 August, 2021; originally announced August 2021.

    Comments: In proceedings of the 1st Virtual Conference on Implications of Information and Digital Technologies for Development, 2021

  11. arXiv:2107.00693  [pdf, other

    eess.SP cs.LG

    Inter-Beat Interval Estimation with Tiramisu Model: A Novel Approach with Reduced Error

    Authors: Asiful Arefeen, Ali Akbari, Seyed Iman Mirzadeh, Roozbeh Jafari, Behrooz A. Shirazi, Hassan Ghasemzadeh

    Abstract: Inter-beat interval (IBI) measurement enables estimation of heart-rate variability (HRV) which, in turns, can provide early indication of potential cardiovascular diseases. However, extracting IBIs from noisy signals is challenging since the morphology of the signal is distorted in the presence of the noise. Electrocardiogram (ECG) of a person in heavy motion is highly corrupted with noise, known… ▽ More

    Submitted 1 July, 2021; originally announced July 2021.

    Comments: 16 pages, 14 figures

  12. arXiv:2103.03503  [pdf

    cs.CV cs.LG

    NPT-Loss: A Metric Loss with Implicit Mining for Face Recognition

    Authors: Syed Safwan Khalid, Muhammad Awais, Chi-Ho Chan, Zhenhua Feng, Ammarah Farooq, Ali Akbari, Josef Kittler

    Abstract: Face recognition (FR) using deep convolutional neural networks (DCNNs) has seen remarkable success in recent years. One key ingredient of DCNN-based FR is the appropriate design of a loss function that ensures discrimination between various identities. The state-of-the-art (SOTA) solutions utilise normalised Softmax loss with additive and/or multiplicative margins. Despite being popular, these Sof… ▽ More

    Submitted 5 March, 2021; originally announced March 2021.

  13. arXiv:2012.15236  [pdf

    cs.RO eess.SY

    Design, Characterization, and Control of a Size Adaptable In-pipe Robot for Water Distribution Systems

    Authors: Saber Kazeminasab, Ali Akbari, Roozbeh Jafari, M. Katherine Banks

    Abstract: Leak detection and water quality monitoring are requirements and challenging tasks in Water Distribution Systems (WDS). In-line robots are designed for this aim. In our previous work, we designed an in-pipe robot [1]. In this research, we present the design of the central processor, characterize and control the robot based on the condition of operation in a highly pressurized environment of pipeli… ▽ More

    Submitted 17 January, 2021; v1 submitted 30 December, 2020; originally announced December 2020.

  14. arXiv:2010.10368  [pdf, other

    cs.CV cs.AI

    A Flatter Loss for Bias Mitigation in Cross-dataset Facial Age Estimation

    Authors: Ali Akbari, Muhammad Awais, Zhen-Hua Feng, Ammarah Farooq, Josef Kittler

    Abstract: The most existing studies in the facial age estimation assume training and test images are captured under similar shooting conditions. However, this is rarely valid in real-world applications, where training and test sets usually have different characteristics. In this paper, we advocate a cross-dataset protocol for age estimation benchmarking. In order to improve the cross-dataset age estimation… ▽ More

    Submitted 26 October, 2020; v1 submitted 20 October, 2020; originally announced October 2020.

  15. arXiv:2003.00808  [pdf, other

    cs.CV cs.LG stat.ML

    A Convolutional Baseline for Person Re-Identification Using Vision and Language Descriptions

    Authors: Ammarah Farooq, Muhammad Awais, Fei Yan, Josef Kittler, Ali Akbari, Syed Safwan Khalid

    Abstract: Classical person re-identification approaches assume that a person of interest has appeared across different cameras and can be queried by one of the existing images. However, in real-world surveillance scenarios, frequently no visual information will be available about the queried person. In such scenarios, a natural language description of the person by a witness will provide the only source of… ▽ More

    Submitted 20 February, 2020; originally announced March 2020.

    Comments: 12 pages including references, currently under review in IEEE transactions on Image Processing

  16. arXiv:2001.02946  [pdf, other

    cs.DM math.CO

    Independent Domination in Subcubic Graphs

    Authors: A. Akbari, S. Akbari, A. Doosthosseini, Z. Hadizadeh, Michael A. Henning, A. Naraghi

    Abstract: A set $S$ of vertices in a graph $G$ is a dominating set if every vertex not in $S$ is adjacent to a vertex in $S$. If, in addition, $S$ is an independent set, then $S$ is an independent dominating set. The independent domination number $i(G)$ of $G$ is the minimum cardinality of an independent dominating set in $G$. In 2013 Goddard and Henning [Discrete Math 313 (2013), 839--854] conjectured that… ▽ More

    Submitted 9 January, 2020; originally announced January 2020.

    Comments: Submitted to Discrete Applied Mathematics Journal, 08 Jan 2020

  17. arXiv:1901.10629  [pdf

    eess.AS cs.LG cs.SD

    A Convolutional Neural Network model based on Neutrosophy for Noisy Speech Recognition

    Authors: Elyas Rashno, Ahmad Akbari, Babak Nasersharif

    Abstract: Convolutional neural networks are sensitive to unknown noisy condition in the test phase and so their performance degrades for the noisy data classification task including noisy speech recognition. In this research, a new convolutional neural network (CNN) model with data uncertainty handling; referred as NCNN (Neutrosophic Convolutional Neural Network); is proposed for classification task. Here,… ▽ More

    Submitted 28 February, 2019; v1 submitted 27 January, 2019; originally announced January 2019.

    Comments: International conference on Pattern Recognition and Image Analysis (IPRIA 2019)

  18. arXiv:1811.07028  [pdf, other

    cs.CR

    A Trust Management Scheme for IoT-Enabled Environmental Health/Accessibility Monitoring Services

    Authors: Behshid Shayesteh, Vesal Hakami, Ahmad Akbari

    Abstract: One rapidly growing application of Internet of Things (IoT) is the protection of public health and well-being through enabling environmental monitoring services. In particular, an IoT-enabled health/accessibility monitoring service (HAMS) can be consulted by its users to query about the status of different areas so as to optimize their trip throughout a geographic region. Given the high cost assoc… ▽ More

    Submitted 16 November, 2018; originally announced November 2018.

  19. arXiv:1710.00419  [pdf, ps, other

    cs.RO

    Physics-based Motion Planning with Temporal Logic Specifications

    Authors: Muhayyuddin, Aliakbar Akbari, Jan Rosell

    Abstract: One of the main foci of robotics is nowadays centered in providing a great degree of autonomy to robots. A fundamental step in this direction is to give them the ability to plan in discrete and continuous spaces to find the required motions to complete a complex task. In this line, some recent approaches describe tasks with Linear Temporal Logic (LTL) and reason on discrete actions to guide sampli… ▽ More

    Submitted 1 October, 2017; originally announced October 2017.

    Comments: The 20th World Congress of the International Federation of Automatic Control, 9-14 July 2017

  20. $κ$-PMP: Enhancing Physics-based Motion Planners with Knowledge-based Reasoning

    Authors: Muhayyuddin, Aliakbar Akbari, Jan Rosell

    Abstract: Physics-based motion planning is a challenging task, since it requires the computation of the robot motions while allowing possible interactions with (some of) the obstacles in the environment. Kinodynamic motion planners equipped with a dynamic engine acting as state propagator are usually used for that purpose. The difficulties arise in the setting of the adequate forces for the interactions and… ▽ More

    Submitted 30 September, 2017; originally announced October 2017.

    Comments: Journal of Intelligent and Robotic Systems: Theory and Applications 2017

  21. Physics-based Motion Planning: Evaluation Criteria and Benchmarking

    Authors: Muhayyuddin, Aliakbar Akbari, Jan Rosell

    Abstract: Motion planning has evolved from co** with simply geometric problems to physics-based ones that incorporate the kinodynamic and the physical constraints imposed by the robot and the physical world. Therefore, the criteria for evaluating physics-based motion planners goes beyond the computational complexity (e.g. in terms of planning time) usually used as a measure for evaluating geometrical plan… ▽ More

    Submitted 30 September, 2017; originally announced October 2017.

    Comments: Robot2015 - Second Iberian Robotics Conference

  22. arXiv:1709.09271  [pdf, ps, other

    cs.RO

    Ontological Physics-based Motion Planning for Manipulation

    Authors: M Muhayyuddin, Aliakbar Akbari, Jan Rosell

    Abstract: Robotic manipulation involves actions where contacts occur between the robot and the objects. In this scope, the availability of physics-based engines allows motion planners to comprise dynamics between rigid bodies, which is necessary for planning this type of actions. However, physics-based motion planning is computationally intensive due to the high dimensionality of the state space and the nee… ▽ More

    Submitted 29 October, 2017; v1 submitted 26 September, 2017; originally announced September 2017.

    Comments: IEEE 20th Conference on Emerging Technologies Factory Automation (ETFA) 2015