Skip to main content

Showing 1–7 of 7 results for author: Mousavi, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.16198  [pdf

    cs.CL

    Towards Efficient Patient Recruitment for Clinical Trials: Application of a Prompt-Based Learning Model

    Authors: Mojdeh Rahmanian, Seyed Mostafa Fakhrahmad, Seyedeh Zahra Mousavi

    Abstract: Objective: Clinical trials are essential for advancing pharmaceutical interventions, but they face a bottleneck in selecting eligible participants. Although leveraging electronic health records (EHR) for recruitment has gained popularity, the complex nature of unstructured medical texts presents challenges in efficiently identifying participants. Natural Language Processing (NLP) techniques have e… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    ACM Class: I.7

  2. arXiv:2404.03823  [pdf, other

    cs.CR cs.CL cs.CY

    An Investigation into Misuse of Java Security APIs by Large Language Models

    Authors: Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar

    Abstract: The increasing trend of using Large Language Models (LLMs) for code generation raises the question of their capability to generate trustworthy code. While many researchers are exploring the utility of code generation for uncovering software vulnerabilities, one crucial but often overlooked aspect is the security Application Programming Interfaces (APIs). APIs play an integral role in upholding sof… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: This paper has been accepted by ACM ASIACCS 2024

  3. arXiv:2306.08869  [pdf, other

    cs.CR cs.SE

    Detecting Misuse of Security APIs: A Systematic Review

    Authors: Zahra Mousavi, Chadni Islam, M. Ali Babar, Alsharif Abuadbba, Kristen Moore

    Abstract: Security Application Programming Interfaces (APIs) are crucial for ensuring software security. However, their misuse introduces vulnerabilities, potentially leading to severe data breaches and substantial financial loss. Complex API design, inadequate documentation, and insufficient security training often lead to unintentional misuse by developers. The software security community has devised and… ▽ More

    Submitted 25 June, 2024; v1 submitted 15 June, 2023; originally announced June 2023.

  4. Application of Deep Learning in Generating Structured Radiology Reports: A Transformer-Based Technique

    Authors: Seyed Ali Reza Moezzi, Abdolrahman Ghaedi, Mojdeh Rahmanian, Seyedeh Zahra Mousavi, Ashkan Sami

    Abstract: Since radiology reports needed for clinical practice and research are written and stored in free-text narrations, extraction of relative information for further analysis is difficult. In these circumstances, natural language processing (NLP) techniques can facilitate automatic information extraction and transformation of free-text formats to structured data. In recent years, deep learning (DL)-bas… ▽ More

    Submitted 25 September, 2022; originally announced September 2022.

    Journal ref: Journal of Digital Imaging (2022) 1--11 Springer

  5. arXiv:2201.11230  [pdf, other

    cs.HC cs.LG

    Objective Prediction of Tomorrow's Affect Using Multi-Modal Physiological Data and Personal Chronicles: A Study of Monitoring College Student Well-being in 2020

    Authors: Salar Jafarlou, Jocelyn Lai, Zahra Mousavi, Sina Labbaf, Ramesh Jain, Nikil Dutt, Jessica Borelli, Amir Rahmani

    Abstract: Monitoring and understanding affective states are important aspects of healthy functioning and treatment of mood-based disorders. Recent advancements of ubiquitous wearable technologies have increased the reliability of such tools in detecting and accurately estimating mental states (e.g., mood, stress, etc.), offering comprehensive and continuous monitoring of individuals over time. Previous atte… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

  6. arXiv:2201.08066  [pdf, other

    cs.SE

    NLP Methods in Host-based Intrusion Detection Systems: A Systematic Review and Future Directions

    Authors: Zarrin Tasnim Sworna, Zahra Mousavi, Muhammad Ali Babar

    Abstract: Host based Intrusion Detection System (HIDS) is an effective last line of defense for defending against cyber security attacks after perimeter defenses (e.g., Network based Intrusion Detection System and Firewall) have failed or been bypassed. HIDS is widely adopted in the industry as HIDS is ranked among the top two most used security tools by Security Operation Centers (SOC) of organizations. Al… ▽ More

    Submitted 19 November, 2022; v1 submitted 20 January, 2022; originally announced January 2022.

  7. arXiv:1704.03223  [pdf

    cs.CL cs.LG stat.ML

    Persian Wordnet Construction using Supervised Learning

    Authors: Zahra Mousavi, Heshaam Faili

    Abstract: This paper presents an automated supervised method for Persian wordnet construction. Using a Persian corpus and a bi-lingual dictionary, the initial links between Persian words and Princeton WordNet synsets have been generated. These links will be discriminated later as correct or incorrect by employing seven features in a trained classification system. The whole method is just a classification sy… ▽ More

    Submitted 11 April, 2017; originally announced April 2017.