Skip to main content

Showing 1–9 of 9 results for author: Heidari, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.16058  [pdf, other

    cs.LG cs.CL cs.CV

    AnyMAL: An Efficient and Scalable Any-Modality Augmented Language Model

    Authors: Seungwhan Moon, Andrea Madotto, Zhaojiang Lin, Tushar Nagarajan, Matt Smith, Shashank Jain, Chun-Fu Yeh, Prakash Murugesan, Peyman Heidari, Yue Liu, Kavya Srinet, Babak Damavandi, Anuj Kumar

    Abstract: We present Any-Modality Augmented Language Model (AnyMAL), a unified model that reasons over diverse input modality signals (i.e. text, image, video, audio, IMU motion sensor), and generates textual responses. AnyMAL inherits the powerful text-based reasoning abilities of the state-of-the-art LLMs including LLaMA-2 (70B), and converts modality-specific signals to the joint textual space through a… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

  2. arXiv:2308.09171  [pdf, other

    cs.CR cs.AI cs.LG cs.NI

    Forensic Data Analytics for Anomaly Detection in Evolving Networks

    Authors: Li Yang, Abdallah Moubayed, Abdallah Shami, Amine Boukhtouta, Parisa Heidari, Stere Preda, Richard Brunner, Daniel Migault, Adel Larabi

    Abstract: In the prevailing convergence of traditional infrastructure-based deployment (i.e., Telco and industry operational networks) towards evolving deployments enabled by 5G and virtualization, there is a keen interest in elaborating effective security controls to protect these deployments in-depth. By considering key enabling technologies like 5G and virtualization, evolving networks are democratized,… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: Electronic version of an article published as [Book Series: World Scientific Series in Digital Forensics and Cybersecurity, Volume 2, Innovations in Digital Forensics, 2023, Pages 99-137] [DOI:10.1142/9789811273209_0004] \c{opyright} copyright World Scientific Publishing Company [https://doi.org/10.1142/9789811273209_0004]

    MSC Class: 68T01 ACM Class: I.2.6; C.2.0

  3. arXiv:2210.01371  [pdf, other

    cs.IR cs.CL

    A Study on the Efficiency and Generalization of Light Hybrid Retrievers

    Authors: Man Luo, Shashank Jain, Anchit Gupta, Arash Einolghozati, Barlas Oguz, Debojeet Chatterjee, Xilun Chen, Chitta Baral, Peyman Heidari

    Abstract: Hybrid retrievers can take advantage of both sparse and dense retrievers. Previous hybrid retrievers leverage indexing-heavy dense retrievers. In this work, we study "Is it possible to reduce the indexing memory of hybrid retrievers without sacrificing performance"? Driven by this question, we leverage an indexing-efficient dense retriever (i.e. DrBoost) and introduce a LITE retriever that further… ▽ More

    Submitted 23 May, 2023; v1 submitted 4 October, 2022; originally announced October 2022.

    Comments: accepted to ACL23

  4. arXiv:2209.03300  [pdf, ps, other

    eess.IV cs.CV

    Spach Transformer: Spatial and Channel-wise Transformer Based on Local and Global Self-attentions for PET Image Denoising

    Authors: Se-In Jang, Tinsu Pan, Ye Li, Pedram Heidari, Junyu Chen, Quanzheng Li, Kuang Gong

    Abstract: Position emission tomography (PET) is widely used in clinics and research due to its quantitative merits and high sensitivity, but suffers from low signal-to-noise ratio (SNR). Recently convolutional neural networks (CNNs) have been widely used to improve PET image quality. Though successful and efficient in local feature extraction, CNN cannot capture long-range dependencies well due to its limit… ▽ More

    Submitted 10 December, 2023; v1 submitted 7 September, 2022; originally announced September 2022.

    Comments: 15 pages

  5. arXiv:2107.11514  [pdf, other

    cs.CR cs.AI cs.LG cs.NI

    Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection

    Authors: Li Yang, Abdallah Moubayed, Abdallah Shami, Parisa Heidari, Amine Boukhtouta, Adel Larabi, Richard Brunner, Stere Preda, Daniel Migault

    Abstract: Content delivery networks (CDNs) provide efficient content distribution over the Internet. CDNs improve the connectivity and efficiency of global communications, but their caching mechanisms may be breached by cyber-attackers. Among the security mechanisms, effective anomaly detection forms an important part of CDN security enhancement. In this work, we propose a multi-perspective unsupervised lea… ▽ More

    Submitted 23 July, 2021; originally announced July 2021.

    Comments: Accepted and to Appear in IEEE Transactions on Network and Service Management

    MSC Class: 68T01 ACM Class: I.2.6; C.2.0

  6. arXiv:2011.03877  [pdf, other

    cs.CL

    Best Practices for Data-Efficient Modeling in NLG:How to Train Production-Ready Neural Models with Less Data

    Authors: Ankit Arun, Soumya Batra, Vikas Bhardwaj, Ashwini Challa, Pinar Donmez, Peyman Heidari, Hakan Inan, Shashank Jain, Anuj Kumar, Shawn Mei, Karthik Mohan, Michael White

    Abstract: Natural language generation (NLG) is a critical component in conversational systems, owing to its role of formulating a correct and natural text response. Traditionally, NLG components have been deployed using template-based solutions. Although neural network solutions recently developed in the research community have been shown to provide several benefits, deployment of such model-based solutions… ▽ More

    Submitted 7 November, 2020; originally announced November 2020.

    Comments: Accepted for publication in COLING 2020

  7. arXiv:2010.07223  [pdf, other

    cs.NI eess.SP

    Cost-optimal V2X Service Placement in Distributed Cloud/Edge Environment

    Authors: Abdallah Moubayed, Abdallah Shami, Parisa Heidari, Adel Larabi, Richard Brunner

    Abstract: Deploying V2X services has become a challenging task. This is mainly due to the fact that such services have strict latency requirements. To meet these requirements, one potential solution is adopting mobile edge computing (MEC). However, this presents new challenges including how to find a cost efficient placement that meets other requirements such as latency. In this work, the problem of cost-op… ▽ More

    Submitted 14 October, 2020; originally announced October 2020.

    Comments: 6 pages, 4 figures, 1 table, 1 algorithm pseudocode, Accepted & presented in IEEE 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2020)

  8. arXiv:2001.07787  [pdf, other

    eess.SP cs.LG cs.NI stat.ML

    Machine Learning for Performance-Aware Virtual Network Function Placement

    Authors: Dimitrios Michael Manias, Manar Jammal, Hassan Hawilo, Abdallah Shami, Parisa Heidari, Adel Larabi, Richard Brunner

    Abstract: With the growing demand for data connectivity, network service providers are faced with the task of reducing their capital and operational expenses while simultaneously improving network performance and addressing the increased connectivity demand. Although Network Function Virtualization (NFV) has been identified as a solution, several challenges must be addressed to ensure its feasibility. In th… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

    Comments: 6 pages, 6 figures, 1 table, 9 equations, 18 references, Conference

  9. Edge-enabled V2X Service Placement for Intelligent Transportation Systems

    Authors: Abdallah Moubayed, Abdallah Shami, Parisa Heidari, Adel Larabi, Richard Brunner

    Abstract: Vehicle-to-everything (V2X) communication and services have been garnering significant interest from different stakeholders as part of future intelligent transportation systems (ITSs). This is due to the many benefits they offer. However, many of these services have stringent performance requirements, particularly in terms of the delay/latency. Multi-access/mobile edge computing (MEC) has been pro… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

    Comments: 13 pages, 16 figures (including 5 bio pictures), accepted and to be published in IEEE Transactions on Mobile Computing