Skip to main content

Showing 1–35 of 35 results for author: Kazemi, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10209  [pdf, other

    cs.CL

    Be like a Goldfish, Don't Memorize! Mitigating Memorization in Generative LLMs

    Authors: Abhimanyu Hans, Yuxin Wen, Neel Jain, John Kirchenbauer, Hamid Kazemi, Prajwal Singhania, Siddharth Singh, Gowthami Somepalli, Jonas Gei**, Abhinav Bhatele, Tom Goldstein

    Abstract: Large language models can memorize and repeat their training data, causing privacy and copyright risks. To mitigate memorization, we introduce a subtle modification to the next-token training objective that we call the goldfish loss. During training, a randomly sampled subset of tokens are excluded from the loss computation. These dropped tokens are not memorized by the model, which prevents verba… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    Comments: 9.5 pages, 8 figures, and 1 table in the main body. Code available at https://github.com/ahans30/goldfish-loss

  2. arXiv:2403.16365  [pdf, other

    cs.LG cs.CR cs.CV

    Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion

    Authors: Hossein Souri, Arpit Bansal, Hamid Kazemi, Liam Fowl, Aniruddha Saha, Jonas Gei**, Andrew Gordon Wilson, Rama Chellappa, Tom Goldstein, Micah Goldblum

    Abstract: Modern neural networks are often trained on massive datasets that are web scraped with minimal human inspection. As a result of this insecure curation pipeline, an adversary can poison or backdoor the resulting model by uploading malicious data to the internet and waiting for a victim to scrape and train on it. Existing approaches for creating poisons and backdoors start with randomly sampled clea… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

  3. arXiv:2403.02580  [pdf, other

    cs.CV cs.LG

    What do we learn from inverting CLIP models?

    Authors: Hamid Kazemi, Atoosa Chegini, Jonas Gei**, Soheil Feizi, Tom Goldstein

    Abstract: We employ an inversion-based approach to examine CLIP models. Our examination reveals that inverting CLIP models results in the generation of images that exhibit semantic alignment with the specified target prompts. We leverage these inverted images to gain insights into various aspects of CLIP models, such as their ability to blend concepts and inclusion of gender biases. We notably observe insta… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: Warning: This paper contains sexually explicit images and language, offensive visuals and terminology, discussions on pornography, gender bias, and other potentially unsettling, distressing, and/or offensive content for certain readers

  4. arXiv:2401.12070  [pdf, other

    cs.CL cs.AI cs.LG

    Spotting LLMs With Binoculars: Zero-Shot Detection of Machine-Generated Text

    Authors: Abhimanyu Hans, Avi Schwarzschild, Valeriia Cherepanova, Hamid Kazemi, Aniruddha Saha, Micah Goldblum, Jonas Gei**, Tom Goldstein

    Abstract: Detecting text generated by modern large language models is thought to be hard, as both LLMs and humans can exhibit a wide range of complex behaviors. However, we find that a score based on contrasting two closely related language models is highly accurate at separating human-generated and machine-generated text. Based on this mechanism, we propose a novel LLM detector that only requires simple ca… ▽ More

    Submitted 1 July, 2024; v1 submitted 22 January, 2024; originally announced January 2024.

    Comments: 20 pages, code available at https://github.com/ahans30/Binoculars

  5. arXiv:2312.14075  [pdf, other

    cs.CC quant-ph

    Where Quantum Complexity Helps Classical Complexity

    Authors: Arash Vaezi, Seyed Mohammad Hussein Kazemi, Negin Bagheri Noghrehy, Seyed Mohsen Kazemi, Ali Movaghar, Mohammad Ghodsi

    Abstract: Scientists have demonstrated that quantum computing has presented novel approaches to address computational challenges, each varying in complexity. Adapting problem-solving strategies is crucial to harness the full potential of quantum computing. Nonetheless, there are defined boundaries to the capabilities of quantum computing. This paper concentrates on aggregating prior research efforts dedicat… ▽ More

    Submitted 13 January, 2024; v1 submitted 16 December, 2023; originally announced December 2023.

  6. arXiv:2305.18997  [pdf

    cs.HC cs.AI cs.CL

    GPT Models in Construction Industry: Opportunities, Limitations, and a Use Case Validation

    Authors: Abdullahi Saka, Ridwan Taiwo, Nurudeen Saka, Babatunde Salami, Saheed Ajayi, Kabiru Akande, Hadi Kazemi

    Abstract: Large Language Models(LLMs) trained on large data sets came into prominence in 2018 after Google introduced BERT. Subsequently, different LLMs such as GPT models from OpenAI have been released. These models perform well on diverse tasks and have been gaining widespread applications in fields such as business and education. However, little is known about the opportunities and challenges of using LL… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: 58 pages, 20 figures

  7. arXiv:2212.14830  [pdf, other

    cs.IT eess.SP

    Design and Optimisation of High-Speed Receivers for 6G Optical Wireless Networks

    Authors: Elham Sarbazi, Hossein Kazemi, Michael Crisp, Taisir El-Gorashi, Jaafar Elmirghani, Richard Penty, Ian White, Majid Safari, Harald Haas

    Abstract: To achieve multi-Gb/s data rates in 6G optical wireless access networks based on narrow infrared (IR) laser beams, a high-speed receiver with two key specifications is needed: a sufficiently large aperture to collect the required optical power and a wide field of view (FOV) to avoid strict alignment issues. This paper puts forward the systematic design and optimisation of multi-tier non-imaging an… ▽ More

    Submitted 30 December, 2022; originally announced December 2022.

  8. arXiv:2212.06727  [pdf, other

    cs.CV

    What do Vision Transformers Learn? A Visual Exploration

    Authors: Amin Ghiasi, Hamid Kazemi, Eitan Borgnia, Steven Reich, Manli Shu, Micah Goldblum, Andrew Gordon Wilson, Tom Goldstein

    Abstract: Vision transformers (ViTs) are quickly becoming the de-facto architecture for computer vision, yet we understand very little about why they work and what they learn. While existing studies visually analyze the mechanisms of convolutional neural networks, an analogous exploration of ViTs remains challenging. In this paper, we first address the obstacles to performing visualizations on ViTs. Assiste… ▽ More

    Submitted 13 December, 2022; originally announced December 2022.

  9. arXiv:2210.10750  [pdf, other

    cs.LG cs.CR

    Canary in a Coalmine: Better Membership Inference with Ensembled Adversarial Queries

    Authors: Yuxin Wen, Arpit Bansal, Hamid Kazemi, Eitan Borgnia, Micah Goldblum, Jonas Gei**, Tom Goldstein

    Abstract: As industrial applications are increasingly automated by machine learning models, enforcing personal data ownership and intellectual property rights requires tracing training data back to their rightful owners. Membership inference algorithms approach this problem by using statistical techniques to discern whether a target sample was included in a model's training set. However, existing methods on… ▽ More

    Submitted 1 June, 2023; v1 submitted 19 October, 2022; originally announced October 2022.

    Comments: Code is available at https://github.com/YuxinWenRick/canary-in-a-coalmine, published as a conference paper at ICLR 2023

  10. arXiv:2209.04013  [pdf, other

    cs.CG

    Trajectory Range Visibility

    Authors: Seyed Mohammad Hussein Kazemi, Arash Vaezi, Mohammad Ali Abam, Mohammad Ghodsi

    Abstract: Consider two entities with constant but not necessarily equal velocities, moving on two given piece-wise linear trajectories inside a simple polygon $P$. The Trajectory Range Visibility problem deals with determining the sub-trajectories on which two entities become visible to each other. A more straightforward decision version of this problem is called Trajectory Visibility, where the trajectorie… ▽ More

    Submitted 27 February, 2023; v1 submitted 29 August, 2022; originally announced September 2022.

  11. arXiv:2208.09392  [pdf, other

    cs.CV cs.LG

    Cold Diffusion: Inverting Arbitrary Image Transforms Without Noise

    Authors: Arpit Bansal, Eitan Borgnia, Hong-Min Chu, Jie S. Li, Hamid Kazemi, Furong Huang, Micah Goldblum, Jonas Gei**, Tom Goldstein

    Abstract: Standard diffusion models involve an image transform -- adding Gaussian noise -- and an image restoration operator that inverts this degradation. We observe that the generative behavior of diffusion models is not strongly dependent on the choice of image degradation, and in fact an entire family of generative models can be constructed by varying this choice. Even when using completely deterministi… ▽ More

    Submitted 19 August, 2022; originally announced August 2022.

  12. arXiv:2206.10532  [pdf

    cs.IT

    Terabit Indoor Laser-Based Wireless Communications: LiFi 2.0 for 6G

    Authors: Mohammad Dehghani Soltani, Hossein Kazemi, Elham Sarbazi, Ahmad Adnan Qidan, Barzan Yosuf, Sanaa Mohamed, Ravinder Singh, Bela Berde, Dominique Chiaroni, Bastien Béchadergue, Fathi Abdeldayem, Hardik Soni, Jose Tabu, Micheline Perrufel, Nikola Serafimovski, Taisir E. H. El-Gorashi, Jaafar Elmirghani, Richard Penty, Ian H. White, Harald Haas, Majid Safari

    Abstract: This paper provides a summary of available technologies required for implementing indoor laser-based wireless networks capable of achieving aggregate data-rates of terabits per second as widely accepted as a sixth generation (6G) key performance indicator. The main focus of this paper is on the technologies supporting the near infrared region of the optical spectrum. The main challenges in the des… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

    Comments: 7 pages, 7 figures

  13. arXiv:2205.05626  [pdf, other

    cs.IT eess.SP

    High-Speed Imaging Receiver Design for 6G Optical Wireless Communications: A Rate-FOV Trade-Off

    Authors: Mohammad Dehghani Soltani, Hossein Kazemi, Elham Sarbazi, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani, Richard V. Penty, Ian H. White, Harald Haas, Majid Safari

    Abstract: The design of a compact high-speed and wide field of view (FOV) receiver is challenging due to the presence of two well-known trade-offs. The first one is the area-bandwidth trade-off of photodetectors (PDs) and the second one is the gain-FOV trade-off due to the use of optics. The combined effects of these two trade-offs imply that the achievable data rate of an imaging optical receiver is limite… ▽ More

    Submitted 11 May, 2022; originally announced May 2022.

    Comments: 30 pages, 15 Figures and 6 Tables

  14. arXiv:2201.12961  [pdf, other

    cs.CV cs.LG

    Plug-In Inversion: Model-Agnostic Inversion for Vision with Data Augmentations

    Authors: Amin Ghiasi, Hamid Kazemi, Steven Reich, Chen Zhu, Micah Goldblum, Tom Goldstein

    Abstract: Existing techniques for model inversion typically rely on hard-to-tune regularizers, such as total variation or feature regularization, which must be individually calibrated for each network in order to produce adequate images. In this work, we introduce Plug-In Inversion, which relies on a simple set of augmentations and does not require excessive hyper-parameter tuning. Under our proposed augmen… ▽ More

    Submitted 30 January, 2022; originally announced January 2022.

  15. arXiv:2102.10024  [pdf, ps, other

    cs.IT

    A Tb/s Indoor MIMO Optical Wireless Backhaul System Using VCSEL Arrays

    Authors: Hossein Kazemi, Elham Sarbazi, Mohammad Dehghani Soltani, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani, Richard V. Penty, Ian H. White, Majid Safari, Harald Haas

    Abstract: In this paper, the design of a multiple-input multiple-output (MIMO) optical wireless communication (OWC) link based on vertical cavity surface emitting laser (VCSEL) arrays is systematically carried out with the aim to support data rates in excess of 1 Tb/s for the backhaul of sixth generation (6G) indoor wireless networks. The proposed design combines direct current optical orthogonal frequency… ▽ More

    Submitted 4 April, 2022; v1 submitted 19 February, 2021; originally announced February 2021.

    Comments: Accepted for publication in the IEEE Transactions on Communications

  16. arXiv:2102.08707  [pdf, other

    cs.IT

    Safety Analysis for Laser-based Optical Wireless Communications: A Tutorial

    Authors: Mohammad Dehghani Soltani, Elham Sarbazi, Nikolaos Bamiedakis, Priyanka de Souza, Hossein Kazemi, Jaafar M. H. Elmirghani, Ian H. White, Richard V. Penty, Harald Haas, Majid Safari

    Abstract: Light amplification by stimulated emission of radiation (laser) sources have many advantages for use in high data rate optical wireless communications. In particular, the low cost and high-bandwidth properties of laser sources such as vertical-cavity surface-emitting lasers (VCSELs) make them attractive for future indoor optical wireless communications. In order to be integrated into future indoor… ▽ More

    Submitted 5 May, 2021; v1 submitted 17 February, 2021; originally announced February 2021.

    Comments: 54 pages, 24 figures Submitted to IEEE journal

  17. arXiv:2012.03790  [pdf, other

    cs.CV cs.LG

    Matching Distributions via Optimal Transport for Semi-Supervised Learning

    Authors: Fariborz Taherkhani, Hadi Kazemi, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi

    Abstract: Semi-Supervised Learning (SSL) approaches have been an influential framework for the usage of unlabeled data when there is not a sufficient amount of labeled data available over the course of training. SSL methods based on Convolutional Neural Networks (CNNs) have recently provided successful results on standard benchmark tasks such as image classification. In this work, we consider the general se… ▽ More

    Submitted 21 October, 2021; v1 submitted 4 December, 2020; originally announced December 2020.

  18. arXiv:2005.02133  [pdf, other

    cs.CV eess.IV stat.ML

    Quality Guided Sketch-to-Photo Image Synthesis

    Authors: Uche Osahor, Hadi Kazemi, Ali Dabouei, Nasser Nasrabadi

    Abstract: Facial sketches drawn by artists are widely used for visual identification applications and mostly by law enforcement agencies, but the quality of these sketches depend on the ability of the artist to clearly replicate all the key facial features that could aid in capturing the true identity of a subject. Recent works have attempted to synthesize these sketches into plausible visual images to impr… ▽ More

    Submitted 20 April, 2020; originally announced May 2020.

    Comments: 10 pages, 9 figures

  19. arXiv:2001.03113  [pdf, other

    cs.CV

    Robust Facial Landmark Detection via Aggregation on Geometrically Manipulated Faces

    Authors: Seyed Mehdi Iranmanesh, Ali Dabouei, Sobhan Soleymani, Hadi Kazemi, Nasser M. Nasrabadi

    Abstract: In this work, we present a practical approach to the problem of facial landmark detection. The proposed method can deal with large shape and appearance variations under the rich shape deformation. To handle the shape variations we equip our method with the aggregation of manipulated face images. The proposed framework generates different manipulated faces using only one given face image. The appro… ▽ More

    Submitted 7 January, 2020; originally announced January 2020.

  20. Multi-material Topology Optimization of Lattice Structures using Geometry Projection

    Authors: Hesaneh Kazemi, Ashkan Vaziri, Julian A. Norato

    Abstract: This work presents a computational method for the design of architected truss lattice materials where each strut can be made of one of a set of available materials. We design the lattices to extremize effective properties. As customary in topology optimization, we design a periodic unit cell of the lattice and obtain the effective properties via numerical homogenization. Each bar is represented as… ▽ More

    Submitted 23 October, 2019; originally announced October 2019.

    MSC Class: 74P05; 49Q10; 74S05 ACM Class: J.2; J.6

  21. arXiv:1909.08130  [pdf, other

    cs.CV cs.LG

    Identity-Aware Deep Face Hallucination via Adversarial Face Verification

    Authors: Hadi Kazemi, Fariborz Taherkhani, Nasser M. Nasrabadi

    Abstract: In this paper, we address the problem of face hallucination by proposing a novel multi-scale generative adversarial network (GAN) architecture optimized for face verification. First, we propose a multi-scale generator architecture for face hallucination with a high up-scaling ratio factor, which has multiple intermediate outputs at different resolutions. The intermediate outputs have the growing g… ▽ More

    Submitted 17 September, 2019; originally announced September 2019.

    Comments: BTAS 2019

  22. arXiv:1907.05967  [pdf, ps, other

    cs.IT

    Multi-Hop Wireless Optical Backhauling for LiFi Attocell Networks: Bandwidth Scheduling and Power Control

    Authors: Hossein Kazemi, Majid Safari, Harald Haas

    Abstract: The backhaul of hundreds of light fidelity (LiFi) base stations (BSs) constitutes a major challenge. Indoor wireless optical backhauling is a novel approach whereby the interconnections between adjacent LiFi BSs are provided by way of directed line-of-sight (LOS) wireless infrared (IR) links. Building on the aforesaid approach, this paper presents the top-down design of a multi-hop wireless backha… ▽ More

    Submitted 12 July, 2019; originally announced July 2019.

    Comments: 36 pages, 21 figures, 1 table

  23. arXiv:1905.06327  [pdf, other

    eess.IV cs.CE cs.LG stat.ML

    A data-driven proxy to Stoke's flow in porous media

    Authors: Ali Takbiri-Borujeni, Hadi Kazemi, Nasser Nasrabadi

    Abstract: The objective for this work is to develop a data-driven proxy to high-fidelity numerical flow simulations using digital images. The proposed model can capture the flow field and permeability in a large verity of digital porous media based on solid grain geometry and pore size distribution by detailed analyses of the local pore geometry and the local flow fields. To develop the model, the detailed… ▽ More

    Submitted 25 April, 2019; originally announced May 2019.

  24. arXiv:1811.11979  [pdf, other

    cs.CV

    Unsupervised Image-to-Image Translation Using Domain-Specific Variational Information Bound

    Authors: Hadi Kazemi, Sobhan Soleymani, Fariborz Taherkhani, Seyed Mehdi Iranmanesh, Nasser M. Nasrabadi

    Abstract: Unsupervised image-to-image translation is a class of computer vision problems which aims at modeling conditional distribution of images in the target domain, given a set of unpaired images in the source and target domains. An image in the source domain might have multiple representations in the target domain. Therefore, ambiguity in modeling of the conditional distribution arises, specially when… ▽ More

    Submitted 29 November, 2018; originally announced November 2018.

    Comments: NIPS 2018

  25. arXiv:1811.05621  [pdf, other

    cs.CV

    Style and Content Disentanglement in Generative Adversarial Networks

    Authors: Hadi Kazemi, Seyed Mehdi Iranmanesh, Nasser M. Nasrabadi

    Abstract: Disentangling factors of variation within data has become a very challenging problem for image generation tasks. Current frameworks for training a Generative Adversarial Network (GAN), learn to disentangle the representations of the data in an unsupervised fashion and capture the most significant factors of the data variations. However, these approaches ignore the principle of content and style di… ▽ More

    Submitted 13 November, 2018; originally announced November 2018.

    Comments: WACV 2019

  26. arXiv:1810.05361  [pdf, other

    cs.CV

    Unsupervised Facial Geometry Learning for Sketch to Photo Synthesis

    Authors: Hadi Kazemi, Fariborz Taherkhani, Nasser M. Nasrabadi

    Abstract: Face sketch-photo synthesis is a critical application in law enforcement and digital entertainment industry where the goal is to learn the map** between a face sketch image and its corresponding photo-realistic image. However, the limited number of paired sketch-photo training data usually prevents the current frameworks to learn a robust map** between the geometry of sketches and their matchi… ▽ More

    Submitted 12 October, 2018; originally announced October 2018.

    Comments: Published as a conference paper in BIOSIG 2018

  27. arXiv:1808.01026  [pdf, other

    eess.AS cs.CV cs.LG cs.SD

    Prosodic-Enhanced Siamese Convolutional Neural Networks for Cross-Device Text-Independent Speaker Verification

    Authors: Sobhan Soleymani, Ali Dabouei, Seyed Mehdi Iranmanesh, Hadi Kazemi, Jeremy Dawson, Nasser M. Nasrabadi

    Abstract: In this paper a novel cross-device text-independent speaker verification architecture is proposed. Majority of the state-of-the-art deep architectures that are used for speaker verification tasks consider Mel-frequency cepstral coefficients. In contrast, our proposed Siamese convolutional neural network architecture uses Mel-frequency spectrogram coefficients to benefit from the dependency of the… ▽ More

    Submitted 31 July, 2018; originally announced August 2018.

    Comments: Accepted in 9th IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2018)

  28. A Learning-Based Framework for Two-Dimensional Vehicle Maneuver Prediction over V2V Networks

    Authors: Hossein Nourkhiz Mahjoub, Amin Tahmasbi-Sarvestani, Hadi Kazemi, Yaser P. Fallah

    Abstract: Situational awareness in vehicular networks could be substantially improved utilizing reliable trajectory prediction methods. More precise situational awareness, in turn, results in notably better performance of critical safety applications, such as Forward Collision Warning (FCW), as well as comfort applications like Cooperative Adaptive Cruise Control (CACC). Therefore, vehicle trajectory predic… ▽ More

    Submitted 1 August, 2018; originally announced August 2018.

    Journal ref: 2017 IEEE Cyber Science and Technology Congress(CyberSciTech), Orlando, FL, 2017, pp. 156-163

  29. arXiv:1808.00059  [pdf, other

    cs.CV

    Deep Sketch-Photo Face Recognition Assisted by Facial Attributes

    Authors: Seyed Mehdi Iranmanesh, Hadi Kazemi, Sobhan Soleymani, Ali Dabouei, Nasser M. Nasrabadi

    Abstract: In this paper, we present a deep coupled framework to address the problem of matching sketch image against a gallery of mugshots. Face sketches have the essential in- formation about the spatial topology and geometric details of faces while missing some important facial attributes such as ethnicity, hair, eye, and skin color. We propose a cou- pled deep neural network architecture which utilizes f… ▽ More

    Submitted 31 July, 2018; originally announced August 2018.

  30. arXiv:1808.00035  [pdf, other

    cs.CV

    ID Preserving Generative Adversarial Network for Partial Latent Fingerprint Reconstruction

    Authors: Ali Dabouei, Sobhan Soleymani, Hadi Kazemi, Seyed Mehdi Iranmanesh, Jeremy Dawson, Nasser M. Nasrabadi

    Abstract: Performing recognition tasks using latent fingerprint samples is often challenging for automated identification systems due to poor quality, distortion, and partially missing information from the input samples. We propose a direct latent fingerprint reconstruction model based on conditional generative adversarial networks (cGANs). Two modifications are applied to the cGAN to adapt it for the task… ▽ More

    Submitted 31 July, 2018; originally announced August 2018.

    Comments: Accepted in BTAS 2018

  31. arXiv:1807.01332  [pdf, other

    cs.LG stat.ML

    Multi-Level Feature Abstraction from Convolutional Neural Networks for Multimodal Biometric Identification

    Authors: Sobhan Soleymani, Ali Dabouei, Hadi Kazemi, Jeremy Dawson, Nasser M. Nasrabadi

    Abstract: In this paper, we propose a deep multimodal fusion network to fuse multiple modalities (face, iris, and fingerprint) for person identification. The proposed deep multimodal fusion algorithm consists of multiple streams of modality-specific Convolutional Neural Networks (CNNs), which are jointly optimized at multiple feature abstraction levels. Multiple features are extracted at several different c… ▽ More

    Submitted 3 July, 2018; originally announced July 2018.

    Comments: Accepted in "2018 International Conference on Pattern Recognition"

  32. arXiv:1804.03082  [pdf, other

    cs.CV

    Attribute-Centered Loss for Soft-Biometrics Guided Face Sketch-Photo Recognition

    Authors: Hadi Kazemi, Sobhan Soleymani, Ali Dabouei, Mehdi Iranmanesh, Nasser M. Nasrabadi

    Abstract: Face sketches are able to capture the spatial topology of a face while lacking some facial attributes such as race, skin, or hair color. Existing sketch-photo recognition approaches have mostly ignored the importance of facial attributes. In this paper, we propose a new loss function, called attribute-centered loss, to train a Deep Coupled Convolutional Neural Network (DCCNN) for the facial attrib… ▽ More

    Submitted 9 April, 2018; originally announced April 2018.

    Comments: Accepted as a conference paper on CVPRW 2018

  33. arXiv:1801.01486  [pdf, other

    cs.CV

    Deep Cross Polarimetric Thermal-to-visible Face Recognition

    Authors: Seyed Mehdi Iranmanesh, Ali Dabouei, Hadi Kazemi, Nasser M. Nasrabadi

    Abstract: In this paper, we present a deep coupled learning frame- work to address the problem of matching polarimetric ther- mal face photos against a gallery of visible faces. Polariza- tion state information of thermal faces provides the miss- ing textural and geometrics details in the thermal face im- agery which exist in visible spectrum. we propose a coupled deep neural network architecture which leve… ▽ More

    Submitted 4 January, 2018; originally announced January 2018.

  34. arXiv:1801.01198  [pdf, other

    cs.CV

    Fingerprint Distortion Rectification using Deep Convolutional Neural Networks

    Authors: Ali Dabouei, Hadi Kazemi, Seyed Mehdi Iranmanesh, Jeremi Dawson, Nasser M. Nasrabadi

    Abstract: Elastic distortion of fingerprints has a negative effect on the performance of fingerprint recognition systems. This negative effect brings inconvenience to users in authentication applications. However, in the negative recognition scenario where users may intentionally distort their fingerprints, this can be a serious problem since distortion will prevent recognition system from identifying malic… ▽ More

    Submitted 3 January, 2018; originally announced January 2018.

    Comments: Accepted at ICB 2018

  35. Polar Coding for Achieving the Capacity of Marginal Channels in Nonbinary-Input Setting

    Authors: Amirsina Torfi, Sobhan Soleymani, Seyed Mehdi Iranmanesh, Hadi Kazemi, Rouzbeh Asghari Shirvani, Vahid Tabataba Vakili

    Abstract: Achieving information-theoretic security using explicit coding scheme in which unlimited computational power for eavesdropper is assumed, is one of the main topics is security consideration. It is shown that polar codes are capacity achieving codes and have a low complexity in encoding and decoding. It has been proven that polar codes reach to secrecy capacity in the binary-input wiretap channels… ▽ More

    Submitted 6 February, 2017; v1 submitted 20 January, 2017; originally announced January 2017.

    Comments: Accepted to be published in "51th Conference on Information Sciences and Systems", Baltimore, Maryland

    Journal ref: 51th Annual Conference on Information Sciences and Systems (CISS), 1-6 (2017)