Skip to main content

Showing 1–14 of 14 results for author: Moradi, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.17607  [pdf, other

    cs.IR cs.AI cs.LG

    Advancing Cultural Inclusivity: Optimizing Embedding Spaces for Balanced Music Recommendations

    Authors: Armin Moradi, Nicola Neophytou, Golnoosh Farnadi

    Abstract: Popularity bias in music recommendation systems -- where artists and tracks with the highest listen counts are recommended more often -- can also propagate biases along demographic and cultural axes. In this work, we identify these biases in recommendations for artists from underrepresented cultural groups in prototype-based matrix factorization methods. Unlike traditional matrix factorization met… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  2. arXiv:2403.16577  [pdf

    cs.AR cs.ET

    Partially-Precise Computing Paradigm for Efficient Hardware Implementation of Application-Specific Embedded Systems

    Authors: Mohsen Faryabi, Amir Hossein Moradi

    Abstract: Nowadays, the number of emerging embedded systems rapidly grows in many application domains, due to recent advances in artificial intelligence and internet of things. The main inherent specification of these application-specific systems is that they have not a general nature and are basically developed to only perform a particular task and therefore, deal only with a limited and predefined range o… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: main article is 12 pages and supplementary notes is 6 pages

  3. arXiv:2402.09845  [pdf, other

    cs.CR

    JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing

    Authors: Maik Ender, Felix Hahn, Marc Fyrbiak, Amir Moradi, Christof Paar

    Abstract: Fuzzing is a well-established technique in the software domain to uncover bugs and vulnerabilities. Yet, applications of fuzzing for security vulnerabilities in hardware systems are scarce, as principal reasons are requirements for design information access (HDL source code). Moreover, observation of internal hardware state during runtime is typically an ineffective information source, as its docu… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

  4. arXiv:2309.02550  [pdf, other

    cs.IR

    Tidying Up the Conversational Recommender Systems' Biases

    Authors: Armin Moradi, Golnoosh Farnadi

    Abstract: The growing popularity of language models has sparked interest in conversational recommender systems (CRS) within both industry and research circles. However, concerns regarding biases in these systems have emerged. While individual components of CRS have been subject to bias studies, a literature gap remains in understanding specific biases unique to CRS and how these biases may be amplified or r… ▽ More

    Submitted 5 September, 2023; originally announced September 2023.

  5. Machine learning-based characterization of hydrochar from biomass: Implications for sustainable energy and material production

    Authors: Alireza Shafizadeh, Hossein Shahbeik, Shahin Rafiee, Aysooda Moradi, Mohammadreza Shahbaz, Meysam Madadi, Cheng Li, Wanxi Peng, Meisam Tabatabaei, Mortaza Aghbashlo

    Abstract: Hydrothermal carbonization (HTC) is a process that converts biomass into versatile hydrochar without the need for prior drying. The physicochemical properties of hydrochar are influenced by biomass properties and processing parameters, making it challenging to optimize for specific applications through trial-and-error experiments. To save time and money, machine learning can be used to develop a m… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

    Journal ref: Fuel 347, 1 September 2023, 128467

  6. arXiv:2302.12170  [pdf, other

    cs.NE

    Language Model Crossover: Variation through Few-Shot Prompting

    Authors: Elliot Meyerson, Mark J. Nelson, Herbie Bradley, Adam Gaier, Arash Moradi, Amy K. Hoover, Joel Lehman

    Abstract: This paper pursues the insight that language models naturally enable an intelligent variation operator similar in spirit to evolutionary crossover. In particular, language models of sufficient scale demonstrate in-context learning, i.e. they can learn from associations between a small number of input patterns to generate outputs incorporating such associations (also called few-shot prompting). Thi… ▽ More

    Submitted 13 May, 2024; v1 submitted 23 February, 2023; originally announced February 2023.

  7. arXiv:2207.03204  [pdf, other

    cs.CV cs.AI cs.GT

    MCTS with Refinement for Proposals Selection Games in Scene Understanding

    Authors: Sinisa Stekovic, Mahdi Rad, Alireza Moradi, Friedrich Fraundorfer, Vincent Lepetit

    Abstract: We propose a novel method applicable in many scene understanding problems that adapts the Monte Carlo Tree Search (MCTS) algorithm, originally designed to learn to play games of high-state complexity. From a generated pool of proposals, our method jointly selects and optimizes proposals that minimize the objective term. In our first application for floor plan reconstruction from point clouds, our… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

    Comments: Submitted to: TPAMI Special Section on the Best Papers of ICCV2021 GitHub Repository: https://github.com/vevenom/MonteScene. arXiv admin note: substantial text overlap with arXiv:2103.11161

  8. arXiv:2111.02168  [pdf, other

    cs.LG cs.CL cs.CV cs.HC cs.IR

    The Klarna Product Page Dataset: Web Element Nomination with Graph Neural Networks and Large Language Models

    Authors: Alexandra Hotti, Riccardo Sven Risuleo, Stefan Magureanu, Aref Moradi, Jens Lagergren

    Abstract: Web automation holds the potential to revolutionize how users interact with the digital world, offering unparalleled assistance and simplifying tasks via sophisticated computational methods. Central to this evolution is the web element nomination task, which entails identifying unique elements on webpages. Unfortunately, the development of algorithmic designs for web automation is hampered by the… ▽ More

    Submitted 23 February, 2024; v1 submitted 3 November, 2021; originally announced November 2021.

    Comments: 12 pages, 8 figures, 3 tables, under review

    MSC Class: 68T07

  9. arXiv:2105.13756  [pdf, other

    cs.CR

    The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs

    Authors: Maik Ender, Amir Moradi, Christof Paar

    Abstract: The security of FPGAs is a crucial topic, as any vulnerability within the hardware can have severe consequences, if they are used in a secure design. Since FPGA designs are encoded in a bitstream, securing the bitstream is of the utmost importance. Adversaries have many motivations to recover and manipulate the bitstream, including design cloning, IP theft, manipulation of the design, or design su… ▽ More

    Submitted 28 May, 2021; originally announced May 2021.

  10. Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model

    Authors: Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert

    Abstract: Due to its sound theoretical basis and practical efficiency, masking has become the most prominent countermeasure to protect cryptographic implementations against physical side-channel attacks (SCAs). The core idea of masking is to randomly split every sensitive intermediate variable during computation into at least t+1 shares, where t denotes the maximum number of shares that are allowed to be ob… ▽ More

    Submitted 9 September, 2020; originally announced September 2020.

    Comments: This is the authors' version of the article accepted for publication at IEEE Symposium on Security and Privacy 2021

  11. Interdiction in Practice -- Hardware Trojan Against a High-Security USB Flash Drive

    Authors: Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar

    Abstract: As part of the revelations about the NSA activities, the notion of interdiction has become known to the public: the interception of deliveries to manipulate hardware in a way that backdoors are introduced. Manipulations can occur on the firmware or at hardware level. With respect to hardware, FPGAs are particular interesting targets as they can be altered by manipulating the corresponding bitstrea… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: J Cryptogr Eng (2017) 7: 199

  12. arXiv:1910.00737  [pdf, other

    cs.CR cs.AR

    Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations

    Authors: Samaneh Ghandali, Thorben Moos, Amir Moradi, Christof Paar

    Abstract: Hardware Trojans have drawn the attention of academia, industry and government agencies. Effective detection mechanisms and countermeasures against such malicious designs can only be developed when there is a deep understanding of how hardware Trojans can be built in practice, in particular Trojans specifically designed to avoid detection. In this work, we present a mechanism to introduce an extre… ▽ More

    Submitted 22 September, 2019; originally announced October 2019.

  13. arXiv:1903.02352  [pdf, ps, other

    cs.DC

    Easily implementable time series forecasting techniques for resource provisioning in cloud computing

    Authors: Michel Fliess, Cédric Join, Maria Bekcheva, Alireza Moradi, Hugues Mounier

    Abstract: Workload predictions in cloud computing is obviously an important topic. Most of the existing publications employ various time series techniques, that might be difficult to implement. We suggest here another route, which has already been successfully used in financial engineering and photovoltaic energy. No mathematical modeling and machine learning procedures are needed. Our computer simulations… ▽ More

    Submitted 11 March, 2019; v1 submitted 20 February, 2019; originally announced March 2019.

    Comments: 6th Conference on Control, Decision and Information Technologies (CoDIT 2019), April 2019, Paris

  14. arXiv:1810.03702  [pdf, other

    cs.DC eess.SY math.OC

    Improving resource elasticity in cloud computing thanks to model-free control

    Authors: Maria Bekcheva, Michel Fliess, Cédric Join, Alireza Moradi, Hugues Mounier

    Abstract: In cloud computing management, the dynamic adaptation of computing resource allocations under time-varying workload is an active domain of investigation. Several control strategies were already proposed. Here the model-free control setting and the corresponding "intelligent" controllers, which are most successful in many concrete engineering situations, are employed for the "horizontal elasticity.… ▽ More

    Submitted 8 October, 2018; originally announced October 2018.

    Comments: in French

    Journal ref: ISTE OpenScience Automatique/Control, vol. 2, 2018