Skip to main content

Showing 1–6 of 6 results for author: Hashemi, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.06427  [pdf, other

    cs.LG cs.AI eess.SP

    In-Distribution and Out-of-Distribution Self-supervised ECG Representation Learning for Arrhythmia Detection

    Authors: Sahar Soltanieh, Javad Hashemi, Ali Etemad

    Abstract: This paper presents a systematic investigation into the effectiveness of Self-Supervised Learning (SSL) methods for Electrocardiogram (ECG) arrhythmia detection. We begin by conducting a novel analysis of the data distributions on three popular ECG-based arrhythmia datasets: PTB-XL, Chapman, and Ribeiro. To the best of our knowledge, our study is the first to quantitatively explore and characteriz… ▽ More

    Submitted 26 March, 2024; v1 submitted 13 April, 2023; originally announced April 2023.

    Comments: This paper has been published in the IEEE Journal of Biomedical and Health Informatics (JBHI). Copyright IEEE. Please cite as: S. Soltanieh, J. Hashemi and A. Etemad, "In-Distribution and Out-of-Distribution Self-Supervised ECG Representation Learning for Arrhythmia Detection," in IEEE Journal of Biomedical and Health Informatics, vol. 28, no. 2, pp. 789-800, Feb. 2024

  2. arXiv:2206.07656  [pdf, other

    eess.SP cs.AI cs.LG

    Analysis of Augmentations for Contrastive ECG Representation Learning

    Authors: Sahar Soltanieh, Ali Etemad, Javad Hashemi

    Abstract: This paper systematically investigates the effectiveness of various augmentations for contrastive self-supervised learning of electrocardiogram (ECG) signals and identifies the best parameters. The baseline of our proposed self-supervised framework consists of two main parts: the contrastive learning and the downstream task. In the first stage, we train an encoder using a number of augmentations t… ▽ More

    Submitted 30 May, 2022; originally announced June 2022.

    Comments: This paper has been accepted to IJCNN 2022 conference

  3. arXiv:2012.13028  [pdf, other

    cs.LG cs.CR cs.CV

    General Domain Adaptation Through Proportional Progressive Pseudo Labeling

    Authors: Mohammad J. Hashemi, Eric Keller

    Abstract: Domain adaptation helps transfer the knowledge gained from a labeled source domain to an unlabeled target domain. During the past few years, different domain adaptation techniques have been published. One common flaw of these approaches is that while they might work well on one input type, such as images, their performance drops when applied to others, such as text or time-series. In this paper, w… ▽ More

    Submitted 23 December, 2020; originally announced December 2020.

    Comments: Published at 2020 IEEE International Conference on Big Data (Big Data)

  4. arXiv:2008.03677  [pdf, other

    cs.CR cs.LG cs.NI

    Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems

    Authors: Mohammad J. Hashemi, Eric Keller

    Abstract: The increase of cyber attacks in both the numbers and varieties in recent years demands to build a more sophisticated network intrusion detection system (NIDS). These NIDS perform better when they can monitor all the traffic traversing through the network like when being deployed on a Software-Defined Network (SDN). Because of the inability to detect zero-day attacks, signature-based NIDS which we… ▽ More

    Submitted 9 August, 2020; originally announced August 2020.

    Comments: Submitted to 6th IEEE Conference on Network Functions Virtualization and Software Defined Networks (IEEE NFV-SDN 2020)

  5. arXiv:1810.10031  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial Examples Against Gradient Obfuscation Defenses

    Authors: Mohammad Hashemi, Greg Cusack, Eric Keller

    Abstract: It has been shown that adversaries can craft example inputs to neural networks which are similar to legitimate inputs but have been created to purposely cause the neural network to misclassify the input. These adversarial examples are crafted, for example, by calculating gradients of a carefully defined loss function with respect to the input. As a countermeasure, some researchers have tried to de… ▽ More

    Submitted 23 October, 2018; originally announced October 2018.

    Comments: Accepted by AISec '18: 11th ACM Workshop on Artificial Intelligence and Security. Source code at https://github.com/S-Mohammad-Hashemi/SST

  6. arXiv:1210.7014  [pdf, other

    cs.CV

    Computer vision tools for the non-invasive assessment of autism-related behavioral markers

    Authors: Jordan Hashemi, Thiago Vallin Spina, Mariano Tepper, Amy Esler, Vassilios Morellas, Nikolaos Papanikolopoulos, Guillermo Sapiro

    Abstract: The early detection of developmental disorders is key to child outcome, allowing interventions to be initiated that promote development and improve prognosis. Research on autism spectrum disorder (ASD) suggests behavioral markers can be observed late in the first year of life. Many of these studies involved extensive frame-by-frame video observation and analysis of a child's natural behavior. Alth… ▽ More

    Submitted 7 November, 2012; v1 submitted 25 October, 2012; originally announced October 2012.