Skip to main content

Showing 1–7 of 7 results for author: Izadi, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18491  [pdf, other

    cs.LG cs.CR cs.DC

    Enhancing Federated Learning with Adaptive Differential Privacy and Priority-Based Aggregation

    Authors: Mahtab Talaei, Iman Izadi

    Abstract: Federated learning (FL), a novel branch of distributed machine learning (ML), develops global models through a private procedure without direct access to local datasets. However, it is still possible to access the model updates (gradient updates of deep neural networks) transferred between clients and servers, potentially revealing sensitive local information to adversaries using model inversion a… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

  2. arXiv:2406.05858  [pdf, ps, other

    cs.DC cs.CR cs.PF

    Comments on "Federated Learning with Differential Privacy: Algorithms and Performance Analysis"

    Authors: Mahtab Talaei, Iman Izadi

    Abstract: In the paper by Wei et al. ("Federated Learning with Differential Privacy: Algorithms and Performance Analysis"), the convergence performance of the proposed differential privacy algorithm in federated learning (FL), known as Noising before Model Aggregation FL (NbAFL), was studied. However, the presented convergence upper bound of NbAFL (Theorem 2) is incorrect. This comment aims to present the c… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

  3. arXiv:2401.02453  [pdf, other

    cs.CR cs.DC cs.LG

    Adaptive Differential Privacy in Federated Learning: A Priority-Based Approach

    Authors: Mahtab Talaei, Iman Izadi

    Abstract: Federated learning (FL) as one of the novel branches of distributed machine learning (ML), develops global models through a private procedure without direct access to local datasets. However, access to model updates (e.g. gradient updates in deep neural networks) transferred between clients and servers can reveal sensitive information to adversaries. Differential privacy (DP) offers a framework th… ▽ More

    Submitted 3 January, 2024; originally announced January 2024.

  4. arXiv:2208.01008  [pdf, other

    cs.NE

    CBAG: An Efficient Genetic Algorithm for the Graph Burning Problem

    Authors: Mahdi Nazeri, Ali Mollahosseini, Iman Izadi

    Abstract: Information spread is an intriguing topic to study in network science, which investigates how information, influence, or contagion propagate through networks. Graph burning is a simplified deterministic model for how information spreads within networks. The complicated NP-complete nature of the problem makes it computationally difficult to solve using exact algorithms. Accordingly, a number of heu… ▽ More

    Submitted 6 August, 2022; v1 submitted 1 August, 2022; originally announced August 2022.

    Comments: 10 pages, 6 figures, 4 tables. Source code used for this work is available online: see https://github.com/aloomya/CBAG

    MSC Class: 68W50; 68T05; 68T20; 90C59 ACM Class: I.2.8

  5. arXiv:2203.11321  [pdf, other

    eess.SY cs.LG

    Alarm-Based Root Cause Analysis in Industrial Processes Using Deep Learning

    Authors: Negin Javanbakht, Amir Neshastegaran, Iman Izadi

    Abstract: Alarm management systems have become indispensable in modern industry. Alarms inform the operator of abnormal situations, particularly in the case of equipment failures. Due to the interconnections between various parts of the system, each fault can affect other sections of the system operating normally. As a result, the fault propagates through faultless devices, increasing the number of alarms.… ▽ More

    Submitted 21 March, 2022; originally announced March 2022.

  6. arXiv:2201.07748  [pdf

    cs.LG eess.SY

    Detection of Correlated Alarms Using Graph Embedding

    Authors: Hossein Khaleghy, Iman Izadi

    Abstract: Industrial alarm systems have recently progressed considerably in terms of network complexity and the number of alarms. The increase in complexity and number of alarms presents challenges in these systems that decrease system efficiency and cause distrust of the operator, which might result in widespread damages. One contributing factor in alarm inefficiency is the correlated alarms. These alarms… ▽ More

    Submitted 17 January, 2022; originally announced January 2022.

  7. arXiv:2005.01615  [pdf, other

    cs.DB eess.SP eess.SY

    A Framework for Plant Topology Extraction Using Process Mining and Alarm Data

    Authors: Amir Neshastegaran, Ali Norouzifar, Iman Izadi

    Abstract: Industrial plants are prone to faults. To notify the operator of a fault occurrence, alarms are utilized as a basic part of modern computer-controlled plants. However, due to the interconnections of different parts of a plant, a single fault often propagates through the plant and triggers a (sometimes large) number of alarms. A graphical plant topology can help operators, process engineers and mai… ▽ More

    Submitted 30 April, 2020; originally announced May 2020.

    Comments: 8 pages, 7 figures