Skip to main content

Showing 1–17 of 17 results for author: Mohammadi, E

Searching in archive cs. Search in all archives.
.
  1. Cutting through the noise to motivate people: A comprehensive analysis of COVID-19 social media posts de/motivating vaccination

    Authors: Ashiqur Rahman, Ehsan Mohammadi, Hamed Alhoori

    Abstract: The COVID-19 pandemic exposed significant weaknesses in the healthcare information system. The overwhelming volume of misinformation on social media and other socioeconomic factors created extraordinary challenges to motivate people to take proper precautions and get vaccinated. In this context, our work explored a novel direction by analyzing an extensive dataset collected over two years, identif… ▽ More

    Submitted 14 June, 2024; originally announced July 2024.

    Comments: 51 pages, 13 figures, 12 tables. Accepted at Natural Language Processing Journal

    Journal ref: Natural Language Processing Journal (June 2024), 100085

  2. arXiv:2403.15091  [pdf, other

    cs.LG cs.AI eess.SY

    Improved Long Short-Term Memory-based Wastewater Treatment Simulators for Deep Reinforcement Learning

    Authors: Esmaeel Mohammadi, Daniel Ortiz-Arroyo, Mikkel Stokholm-Bjerregaard, Aviaja Anna Hansen, Petar Durdevic

    Abstract: Even though Deep Reinforcement Learning (DRL) showed outstanding results in the fields of Robotics and Games, it is still challenging to implement it in the optimization of industrial processes like wastewater treatment. One of the challenges is the lack of a simulation environment that will represent the actual plant as accurately as possible to train DRL policies. Stochasticity and non-linearity… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

  3. Deep Learning Based Simulators for the Phosphorus Removal Process Control in Wastewater Treatment via Deep Reinforcement Learning Algorithms

    Authors: Esmaeel Mohammadi, Mikkel Stokholm-Bjerregaard, Aviaja Anna Hansen, Per Halkjær Nielsen, Daniel Ortiz-Arroyo, Petar Durdevic

    Abstract: Phosphorus removal is vital in wastewater treatment to reduce reliance on limited resources. Deep reinforcement learning (DRL) is a machine learning technique that can optimize complex and nonlinear systems, including the processes in wastewater treatment plants, by learning control policies through trial and error. However, applying DRL to chemical and biological processes is challenging due to t… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

    Comments: Journal Paper

    Journal ref: Engineering Applications of Artificial Intelligence 133 (2024) 107992

  4. PrivAgE: A Toolchain for Privacy-Preserving Distributed Aggregation on Edge-Devices

    Authors: Johannes Liebenow, Timothy Imort, Yannick Fuchs, Marcel Heisel, Nadja Käding, Jan Rupp, Esfandiar Mohammadi

    Abstract: Valuable insights, such as frequently visited environments in the wake of the COVID-19 pandemic, can oftentimes only be gained by analyzing sensitive data spread across edge-devices like smartphones. To facilitate such an analysis, we present a toolchain called PrivAgE for a distributed, privacy-preserving aggregation of local data by taking the limited resources of edge-devices into account. The… ▽ More

    Submitted 12 April, 2024; v1 submitted 21 September, 2023; originally announced September 2023.

  5. arXiv:2309.12041  [pdf, other

    cs.CR cs.LG

    S-GBDT: Frugal Differentially Private Gradient Boosting Decision Trees

    Authors: Moritz Kirschte, Thorsten Peinemann, Joshua Stock, Carlos Cotrini, Esfandiar Mohammadi

    Abstract: Privacy-preserving learning of gradient boosting decision trees (GBDT) has the potential for strong utility-privacy tradeoffs for tabular data, such as census data or medical meta data: classical GBDT learners can extract non-linear patterns from small sized datasets. The state-of-the-art notion for provable privacy-properties is differential privacy, which requires that the impact of single data… ▽ More

    Submitted 28 September, 2023; v1 submitted 21 September, 2023; originally announced September 2023.

    Comments: The first two authors equally contributed to this work

  6. arXiv:2307.02969  [pdf, other

    cs.CR cs.LG

    DPM: Clustering Sensitive Data through Separation

    Authors: Yara Schütt, Johannes Liebenow, Tanya Braun, Marcel Gehrke, Florian Thaeter, Esfandiar Mohammadi

    Abstract: Privacy-preserving clustering groups data points in an unsupervised manner whilst ensuring that sensitive information remains protected. Previous privacy-preserving clustering focused on identifying concentration of point clouds. In this paper, we take another path and focus on identifying appropriate separators that split a data set. We introduce the novel differentially private clustering algori… ▽ More

    Submitted 6 July, 2023; originally announced July 2023.

    Comments: The first two authors equally contributed to this work. 21 pages, 9 figures

  7. arXiv:2211.02003  [pdf, other

    cs.CR cs.LG stat.ML

    Distributed DP-Helmet: Scalable Differentially Private Non-interactive Averaging of Single Layers

    Authors: Moritz Kirschte, Sebastian Meiser, Saman Ardalan, Esfandiar Mohammadi

    Abstract: In this work, we propose two differentially private, non-interactive, distributed learning algorithms in a framework called Distributed DP-Helmet. Our framework is based on what we coin blind averaging: each user locally learns and noises a model and all users then jointly compute the mean of their models via a secure summation protocol. We provide experimental evidence that blind averaging for SV… ▽ More

    Submitted 14 May, 2024; v1 submitted 3 November, 2022; originally announced November 2022.

  8. arXiv:2109.04086  [pdf, other

    cs.DL cs.LG cs.SE

    Map** the Structure and Evolution of Software Testing Research Over the Past Three Decades

    Authors: Alireza Salahirad, Gregory Gay, Ehsan Mohammadi

    Abstract: Background: The field of software testing is growing and rapidly-evolving. Aims: Based on keywords assigned to publications, we seek to identify predominant research topics and understand how they are connected and have evolved. Method: We apply co-word analysis to map the topology of testing research as a network where author-assigned keywords are connected by edges indicating co-occurrence i… ▽ More

    Submitted 19 September, 2022; v1 submitted 9 September, 2021; originally announced September 2021.

    Comments: To appear, Journal of Systems and Software

  9. arXiv:2107.12957  [pdf, other

    cs.CR cs.LG

    Learning Numeric Optimal Differentially Private Truncated Additive Mechanisms

    Authors: David M. Sommer, Lukas Abfalterer, Sheila Zingg, Esfandiar Mohammadi

    Abstract: Differentially private (DP) mechanisms face the challenge of providing accurate results while protecting their inputs: the privacy-utility trade-off. A simple but powerful technique for DP adds noise to sensitivity-bounded query outputs to blur the exact query output: additive mechanisms. While a vast body of work considers infinitely wide noise distributions, some applications (e.g., real-time op… ▽ More

    Submitted 27 July, 2021; originally announced July 2021.

    Comments: Code is available at https://github.com/teuron/optimal_truncated_noise

  10. Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Challenges and Solutions

    Authors: Eike Petersen, Yannik Potdevin, Esfandiar Mohammadi, Stephan Zidowitz, Sabrina Breyer, Dirk Nowotka, Sandra Henn, Ludwig Pechmann, Martin Leucker, Philipp Rostalski, Christian Herzog

    Abstract: Machine learning is expected to fuel significant improvements in medical care. To ensure that fundamental principles such as beneficence, respect for human autonomy, prevention of harm, justice, privacy, and transparency are respected, medical machine learning systems must be developed responsibly. Many high-level declarations of ethical principles have been put forth for this purpose, but there i… ▽ More

    Submitted 9 June, 2022; v1 submitted 20 July, 2021; originally announced July 2021.

    ACM Class: J.3; I.5; I.2.6

    Journal ref: IEEE Access, Vol. 10, pp. 58375-58418, 2022

  11. arXiv:1905.00650  [pdf, other

    cs.CR

    Differential privacy with partial knowledge

    Authors: Damien Desfontaines, Esfandiar Mohammadi, Elisabeth Krahmer, David Basin

    Abstract: Differential privacy offers formal quantitative guarantees for algorithms over datasets, but it assumes attackers that know and can influence all but one record in the database. This assumption often vastly overapproximates the attackers' actual strength, resulting in unnecessarily poor utility. Recent work has made significant steps towards privacy in the presence of partial background knowledg… ▽ More

    Submitted 27 November, 2020; v1 submitted 2 May, 2019; originally announced May 2019.

  12. arXiv:1901.08593  [pdf

    cs.DL cs.IR

    Readership Data and Research Impact

    Authors: Ehsan Mohammadi, Mike Thelwall

    Abstract: Reading academic publications is a key scholarly activity. Scholars accessing and recording academic publications online are producing new types of readership data. These include publisher, repository, and academic social network download statistics as well as online reference manager records. This chapter discusses the use of download and reference manager data for research evaluation and library… ▽ More

    Submitted 23 January, 2019; originally announced January 2019.

    Journal ref: Handbook of Quantitative Science and Technology Research, 2019

  13. arXiv:1808.09325  [pdf

    cs.CY

    "Life never matters in the DEMOCRATS MIND": Examining Strategies of Retweeted Social Bots During a Mass Shooting Event

    Authors: Vanessa L. Kitzie, Ehsan Mohammadi, Amir Karami

    Abstract: This exploratory study examines the strategies of social bots on Twitter that were retweeted following a mass shooting event. Using a case study method to frame our work, we collected over seven million tweets during a one-month period following a mass shooting in Parkland, Florida. From this dataset, we selected retweets of content generated by over 400 social bot accounts to determine what strat… ▽ More

    Submitted 28 August, 2018; originally announced August 2018.

  14. Computational Soundness for Dalvik Bytecode

    Authors: Michael Backes, Robert Künnemann, Esfandiar Mohammadi

    Abstract: Automatically analyzing information flow within Android applications that rely on cryptographic operations with their computational security guarantees imposes formidable challenges that existing approaches for understanding an app's behavior struggle to meet. These approaches do not distinguish cryptographic and non-cryptographic operations, and hence do not account for cryptographic protections:… ▽ More

    Submitted 25 October, 2016; v1 submitted 15 August, 2016; originally announced August 2016.

    Comments: Technical report for the ACM CCS 2016 conference paper

  15. arXiv:1606.05514  [pdf, other

    cs.IT

    Sampling and Distortion Tradeoffs for Indirect Source Retrieval

    Authors: Elaheh Mohammadi, Alireza Fallah, Farokh Marvasti

    Abstract: Consider a continuous signal that cannot be observed directly. Instead, one has access to multiple corrupted versions of the signal. The available corrupted signals are correlated because they carry information about the common remote signal. The goal is to reconstruct the original signal from the data collected from its corrupted versions. The information theoretic formulation of the remote recon… ▽ More

    Submitted 5 December, 2016; v1 submitted 17 June, 2016; originally announced June 2016.

    Comments: Under review

  16. arXiv:1405.3980  [pdf, other

    cs.IT

    Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals

    Authors: Elaheh Mohammadi, Farokh Marvasti

    Abstract: In this paper, the optimal sampling strategies (uniform or nonuniform) and distortion tradeoffs for Gaussian bandlimited periodic signals with additive white Gaussian noise are studied. Our emphasis is on characterizing the optimal sampling locations as well as the optimal pre-sampling filter to minimize the reconstruction distortion. We first show that to achieve the optimal distortion, no pre-sa… ▽ More

    Submitted 30 October, 2016; v1 submitted 15 May, 2014; originally announced May 2014.

    Comments: Under review

  17. arXiv:1110.4069  [pdf, other

    cs.IT

    Transmission of non-linear binary input functions over a CDMA System

    Authors: Elaheh Mohammadi, Amin Gohari, Hassan Aghaeinia

    Abstract: We study the problem of transmission of binary input non-linear functions over a network of mobiles based on CDMA. Motivation for this study comes from the application of using cheap measurement devices installed on personal cell-phones to monitor environmental parameters such as air pollution, temperature and noise level. Our model resembles the MAC model of Nazer and Gastpar except that the enco… ▽ More

    Submitted 8 February, 2012; v1 submitted 18 October, 2011; originally announced October 2011.