Skip to main content

Showing 1–4 of 4 results for author: Momeni, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.11640  [pdf, other

    cs.CR cs.LG

    Free-text Keystroke Authentication using Transformers: A Comparative Study of Architectures and Loss Functions

    Authors: Saleh Momeni, Bagher BabaAli

    Abstract: Keystroke biometrics is a promising approach for user identification and verification, leveraging the unique patterns in individuals' ty** behavior. In this paper, we propose a Transformer-based network that employs self-attention to extract informative features from keystroke sequences, surpassing the performance of traditional Recurrent Neural Networks. We explore two distinct architectures, n… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

  2. arXiv:2307.15045  [pdf, other

    cs.CV cs.LG

    A Transformer-based Approach for Arabic Offline Handwritten Text Recognition

    Authors: Saleh Momeni, Bagher BabaAli

    Abstract: Handwriting recognition is a challenging and critical problem in the fields of pattern recognition and machine learning, with applications spanning a wide range of domains. In this paper, we focus on the specific issue of recognizing offline Arabic handwritten text. Existing approaches typically utilize a combination of convolutional neural networks for image feature extraction and recurrent neura… ▽ More

    Submitted 27 July, 2023; originally announced July 2023.

  3. arXiv:1610.06936  [pdf, other

    cs.CR

    Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program

    Authors: Birhanu Eshete, Rigel Gjomemo, Md Nahid Hossain, Sadegh Momeni, R. Sekar, Scott Stoller, V. N. Venkatakrishnan, Junao Wang

    Abstract: This report presents attack analysis results of the first adversarial engagement event stream for the first engagement of the DARPA TC program conducted in October 2016. The analysis was performed by Stony Brook University and University of Illinois at Chicago. The findings in this report are obtained without prior knowledge of the attacks conducted.

    Submitted 21 October, 2016; originally announced October 2016.

    Comments: 29 pages, 19 figures, technical report

  4. arXiv:1602.04844  [pdf, other

    cs.SI

    Fast Memory-efficient Anomaly Detection in Streaming Heterogeneous Graphs

    Authors: Emaad A. Manzoor, Sadegh Momeni, Venkat N. Venkatakrishnan, Leman Akoglu

    Abstract: Given a stream of heterogeneous graphs containing different types of nodes and edges, how can we spot anomalous ones in real-time while consuming bounded memory? This problem is motivated by and generalizes from its application in security to host-level advanced persistent threat (APT) detection. We propose StreamSpot, a clustering based anomaly detection approach that addresses challenges in two… ▽ More

    Submitted 22 February, 2016; v1 submitted 15 February, 2016; originally announced February 2016.

    Comments: 10 pages, 2 tables, 14 figures