Skip to main content

Showing 1–15 of 15 results for author: Saidi, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.01286  [pdf, other

    cs.RO cs.AI cs.DC cs.MA eess.SY

    Summary Paper: Use Case on Building Collaborative Safe Autonomous Systems-A Robotdog for Guiding Visually Impaired People

    Authors: Aman Malhotra, Selma Saidi

    Abstract: This is a summary paper of a use case of a Robotdog dedicated to guide visually impaired people in complex environment like a smart intersection. In such scenarios, the Robotdog has to autonomously decide whether it is safe to cross the intersection or not in order to further guide the human. We leverage data sharing and collaboration between the Robotdog and other autonomous systems operating in… ▽ More

    Submitted 2 March, 2024; originally announced March 2024.

  2. arXiv:2311.13333  [pdf, other

    cs.OS

    Trace-enabled Timing Model Synthesis for ROS2-based Autonomous Applications

    Authors: Hazem Abaza, Debayan Roy, Shiqing Fan, Selma Saidi, Antonios Motakis

    Abstract: Autonomous applications are typically developed over Robot Operating System 2.0 (ROS2) even in time-critical systems like automotive. Recent years have seen increased interest in develo** model-based timing analysis and schedule optimization approaches for ROS2-based applications. To complement these approaches, we propose a tracing and measurement framework to obtain timing models of ROS2-based… ▽ More

    Submitted 23 November, 2023; v1 submitted 22 November, 2023; originally announced November 2023.

  3. arXiv:2307.09918  [pdf, other

    cs.NI

    Analyzing IoT Hosts in the IPv6 Internet

    Authors: Peter Jose, Said Jawad Saidi, Oliver Gasser

    Abstract: Users and businesses are increasingly deploying Internet of Things (IoT) devices at home, at work, and in factories. At the same time, we see an increase in the use of IPv6 for Internet connectivity. Even though the IoT ecosystem has been the focus of recent studies, there is no comprehensive analysis of IoT end-hosts in the IPv6 Internet to date. In this paper we perform an in-depth analysis of I… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

  4. arXiv:2305.11295  [pdf, other

    cs.MA cs.CY cs.DC eess.SY

    Collective Reasoning for Safe Autonomous Systems

    Authors: Selma Saidi

    Abstract: Collaboration in multi-agent autonomous systems is critical to increase performance while ensuring safety. However, due to heterogeneity of their features in, e.g., perception qualities, some autonomous systems have to be considered more trustworthy than others when contributing to collaboratively build a common environmental model, especially under uncertainty. In this paper, we introduce the ide… ▽ More

    Submitted 18 May, 2023; originally announced May 2023.

  5. arXiv:2302.01567   

    cs.LG cs.AI eess.SY

    Deep Reinforcement Learning for Online Error Detection in Cyber-Physical Systems

    Authors: Seyyedamirhossein Saeidi, Forouzan Fallah, Saeed Samieezafarghandi, Hamed Farbeh

    Abstract: Reliability is one of the major design criteria in Cyber-Physical Systems (CPSs). This is because of the existence of some critical applications in CPSs and their failure is catastrophic. Therefore, employing strong error detection and correction mechanisms in CPSs is inevitable. CPSs are composed of a variety of units, including sensors, networks, and microcontrollers. Each of these units is prob… ▽ More

    Submitted 5 June, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: There are some problems in the paper, so the authors decide to withdraw the paper

  6. Deep Dive into the IoT Backend Ecosystem

    Authors: Said Jawad Saidi, Srdjan Matic, Oliver Gasser, Georgios Smaragdakis, Anja Feldmann

    Abstract: Internet of Things (IoT) devices are becoming increasingly ubiquitous, e.g., at home, in enterprise environments, and in production lines. To support the advanced functionalities of IoT devices, IoT vendors as well as service and cloud companies operate IoT backends -- the focus of this paper. We propose a methodology to identify and locate them by (a) compiling a list of domains used exclusively… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

    Journal ref: Proceedings of the 2022 ACM Internet Measurement Conference (IMC '22)

  7. arXiv:2203.14159  [pdf

    cs.LG cs.AR

    A Novel Neuromorphic Processors Realization of Spiking Deep Reinforcement Learning for Portfolio Management

    Authors: Seyyed Amirhossein Saeidi, Forouzan Fallah, Soroush Barmaki, Hamed Farbeh

    Abstract: The process of continuously reallocating funds into financial assets, aiming to increase the expected return of investment and minimizing the risk, is known as portfolio management. Processing speed and energy consumption of portfolio management have become crucial as the complexity of their real-world applications increasingly involves high-dimensional observation and action spaces and environmen… ▽ More

    Submitted 26 March, 2022; originally announced March 2022.

  8. arXiv:2203.08946  [pdf, other

    cs.CR cs.NI

    One Bad Apple Can Spoil Your IPv6 Privacy

    Authors: Said Jawad Saidi, Oliver Gasser, Georgios Smaragdakis

    Abstract: IPv6 is being more and more adopted, in part to facilitate the millions of smart devices that have already been installed at home. Unfortunately, we find that the privacy of a substantial fraction of end-users is still at risk, despite the efforts by ISPs and electronic vendors to improve end-user security, e.g., by adopting prefix rotation and IPv6 privacy extensions. By analyzing passive data fr… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Comments: Accepted at ACM SIGCOMM Computer Communication Review, to appear in the April 2022 issue

  9. arXiv:2106.14180  [pdf, other

    cs.CR cs.GT

    A Fair Model of Identity Information Exchange Leveraging Zero-Knowledge

    Authors: Mohsen Rahnamaei, Saeid Tousi Saeidi, Siavash Khorsandi, Mehdi Shajari

    Abstract: Many companies use identity information for different goals. There are a lot of marketplaces for identity information. These markets have some practical issues such as privacy, mutual trust and fairing exchange. The management of identity information is one of the most important applications for blockchain, for which researchers have proposed a large number of models. In the present paper, an atte… ▽ More

    Submitted 27 June, 2021; originally announced June 2021.

  10. Exploring Network-Wide Flow Data with Flowyager

    Authors: Said Jawad Saidi, Aniss Maghsoudlou, Damien Foucard, Georgios Smaragdakis, Ingmar Poese, Anja Feldmann

    Abstract: Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. Although flow records are collected at each router, using available traffic capture utilities, querying the resulting datasets from hundreds of routers across sites and over time, remains a significant challenge due to the sheer traffic volume and… ▽ More

    Submitted 27 October, 2020; v1 submitted 25 October, 2020; originally announced October 2020.

    Comments: accepted at IEEE TNSM Journal DOI added

  11. arXiv:2009.01880  [pdf, other

    cs.NI

    A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild

    Authors: Said Jawad Saidi, Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi, Daniel J. Dubois, David Choffnes, Georgios Smaragdakis, Anja Feldmann

    Abstract: Consumer Internet of Things (IoT) devices are extremely popular, providing users with rich and diverse functionalities, from voice assistants to home appliances. These functionalities often come with significant privacy and security risks, with notable recent large scale coordinated global attacks disrupting large service providers. Thus, an important first step to address these risks is to know w… ▽ More

    Submitted 30 September, 2020; v1 submitted 3 September, 2020; originally announced September 2020.

    Comments: Accepted at the ACM Internet Measurement Conference 2020 (IMC'20)

  12. arXiv:2001.01918  [pdf, other

    cs.AI cs.LG cs.MA

    Context-Aware Design of Cyber-Physical Human Systems (CPHS)

    Authors: Supratik Mukhopadhyay, Qun Liu, Edward Collier, Yimin Zhu, Ravindra Gudishala, Chanachok Chokwitthaya, Robert DiBiano, Alimire Nabijiang, Sanaz Saeidi, Subhajit Sidhanta, Arnab Ganguly

    Abstract: Recently, it has been widely accepted by the research community that interactions between humans and cyber-physical infrastructures have played a significant role in determining the performance of the latter. The existing paradigm for designing cyber-physical systems for optimal performance focuses on develo** models based on historical data. The impacts of context factors driving human system i… ▽ More

    Submitted 7 January, 2020; originally announced January 2020.

    Comments: Paper was accepted at the 12th International Conference on Communication Systems and Networks (COMSNETS 2020)

  13. arXiv:1905.06463  [pdf, other

    cs.CY stat.AP stat.ME

    Why do you take that route?

    Authors: Alimire Nabijiang, Supratik Mukhopadhyay, Yimin Zhu, Ravindra Gudishala, Sanaz Saeidi, Qun Liu

    Abstract: The purpose of this paper is to determine whether a particular context factor among the variables that a researcher is interested in causally affects the route choice behavior of drivers. To our knowledge, there is limited literature that consider the effects of various factors on route choice based on causal inference.Yet, collecting data sets that are sensitive to the aforementioned factors are… ▽ More

    Submitted 12 May, 2019; originally announced May 2019.

    Comments: 7 pages, 3 figures

  14. Consistent SDNs through Network State Fuzzing

    Authors: Apoorv Shukla, Said Jawad Saidi, Stefan Schmid, Marco Canini, Thomas Zinner, Anja Feldmann

    Abstract: The conventional wisdom is that a software-defined network (SDN) operates under the premise that the logically centralized control plane has an accurate representation of the actual data plane state. Unfortunately, bugs, misconfigurations, faults or attacks can introduce inconsistencies that undermine correct operation. Previous work in this area, however, lacks a holistic methodology to tackle th… ▽ More

    Submitted 2 May, 2020; v1 submitted 18 April, 2019; originally announced April 2019.

    Comments: Added three extra relevant references, the arXiv later was accepted in IEEE Transactions of Network and Service Management (TNSM), 2019 with the title "Towards Consistent SDNs: A Case for Network State Fuzzing"

    Journal ref: IEEE Transactions on Network and Service Management 2019

  15. arXiv:1903.11253  [pdf, other

    cs.LG cs.AI stat.ML

    Improving Route Choice Models by Incorporating Contextual Factors via Knowledge Distillation

    Authors: Qun Liu, Supratik Mukhopadhyay, Yimin Zhu, Ravindra Gudishala, Sanaz Saeidi, Alimire Nabijiang

    Abstract: Route Choice Models predict the route choices of travelers traversing an urban area. Most of the route choice models link route characteristics of alternative routes to those chosen by the drivers. The models play an important role in prediction of traffic levels on different routes and thus assist in development of efficient traffic management strategies that result in minimizing traffic delay an… ▽ More

    Submitted 27 March, 2019; originally announced March 2019.

    Comments: Paper was accepted at the 2019 International Joint Conference on Neural Networks (IJCNN 2019)