Skip to main content

Showing 1–39 of 39 results for author: Zahedi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19765  [pdf, other

    cs.SE cs.LG

    Systematic Literature Review on Application of Learning-based Approaches in Continuous Integration

    Authors: Ali Kazemi Arani, Triet Huynh Minh Le, Mansooreh Zahedi, M. Ali Babar

    Abstract: Context: Machine learning (ML) and deep learning (DL) analyze raw data to extract valuable insights in specific phases. The rise of continuous practices in software projects emphasizes automating Continuous Integration (CI) with these learning-based methods, while the growing adoption of such approaches underscores the need for systematizing knowledge. Objective: Our objective is to comprehensivel… ▽ More

    Submitted 2 July, 2024; v1 submitted 28 June, 2024; originally announced June 2024.

    Comments: This paper has been accepted to be published in IEEE Access

  2. arXiv:2406.18071  [pdf, other

    cs.SE

    Documenting Ethical Considerations in Open Source AI Models

    Authors: Haoyu Gao, Mansooreh Zahedi, Christoph Treude, Sarita Rosenstock, Marc Cheong

    Abstract: Background: The development of AI-enabled software heavily depends on AI model documentation, such as model cards, due to different domain expertise between software engineers and model developers. From an ethical standpoint, AI model documentation conveys critical information on ethical considerations along with mitigation strategies for downstream developers to ensure the delivery of ethically c… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    Comments: This paper is accepted by 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM'24)

  3. arXiv:2405.08206  [pdf, ps, other

    cs.GT cs.MA

    Beyond Theorems: A Counterexample to Potential Markov Game Criteria

    Authors: Fatemeh Fardno, Seyed Majid Zahedi

    Abstract: There are only limited classes of multi-player stochastic games in which independent learning is guaranteed to converge to a Nash equilibrium. Markov potential games are a key example of such classes. Prior work has outlined sets of sufficient conditions for a stochastic game to qualify as a Markov potential game. However, these conditions often impose strict limitations on the game's structure an… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

  4. arXiv:2404.15996  [pdf, other

    cs.GT

    Asymptotically Fair and Truthful Allocation of Public Goods

    Authors: Pouya Kananian, Seyed Majid Zahedi

    Abstract: We study the fair and truthful allocation of m divisible public items among n agents, each with distinct preferences for the items. To aggregate agents' preferences fairly, we follow the literature on the fair allocation of public goods and aim to find a core solution. For divisible items, a core solution always exists and can be calculated efficiently by maximizing the Nash welfare objective. How… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

  5. arXiv:2402.01925  [pdf, ps, other

    cs.SE

    Are You a Real Software Engineer? Best Practices in Online Recruitment for Software Engineering Studies

    Authors: Adam Alami, Mansooreh Zahedi, Neil Ernst

    Abstract: Online research platforms, such as Prolific, offer rapid access to diverse participant pools but also pose unique challenges in participant qualification and skill verification. Previous studies reported mixed outcomes and challenges in leveraging online platforms for the recruitment of qualified software engineers. Drawing from our experience in conducting three different studies using Prolific,… ▽ More

    Submitted 2 February, 2024; originally announced February 2024.

    Comments: 6 pages. Accepted at WSESE 2024

  6. What Can Self-Admitted Technical Debt Tell Us About Security? A Mixed-Methods Study

    Authors: Nicolás E. Díaz Ferreyra, Mojtaba Shahin, Mansooreh Zahedi, Sodiq Quadri, Ricardo Scandariato

    Abstract: Self-Admitted Technical Debt (SATD) encompasses a wide array of sub-optimal design and implementation choices reported in software artefacts (e.g., code comments and commit messages) by developers themselves. Such reports have been central to the study of software maintenance and evolution over the last decades. However, they can also be deemed as dreadful sources of information on potentially exp… ▽ More

    Submitted 2 March, 2024; v1 submitted 23 January, 2024; originally announced January 2024.

    Comments: Accepted in the 21th International Conference on Mining Software Repositories (MSR '24)

  7. arXiv:2401.08097  [pdf, other

    cs.SE cs.AI cs.CY

    Fairness Concerns in App Reviews: A Study on AI-based Mobile Apps

    Authors: Ali Rezaei Nasab, Maedeh Dashti, Mojtaba Shahin, Mansooreh Zahedi, Hourieh Khalajzadeh, Chetan Arora, Peng Liang

    Abstract: Fairness is one of the socio-technical concerns that must be addressed in AI-based systems. Unfair AI-based systems, particularly unfair AI-based mobile apps, can pose difficulties for a significant proportion of the global population. This paper aims to analyze fairness concerns in AI-based app reviews. We first manually constructed a ground-truth dataset, including 1,132 fairness and 1,473 non-f… ▽ More

    Submitted 20 June, 2024; v1 submitted 15 January, 2024; originally announced January 2024.

    Comments: 30 pages, 5 images, 6 tables, Manuscript submitted to a Journal (2024)

  8. arXiv:2312.03250  [pdf, other

    cs.SE

    "Add more config detail": A Taxonomy of Installation Instruction Changes

    Authors: Haoyu Gao, Christoph Treude, Mansooreh Zahedi

    Abstract: README files play an important role in providing installation-related instructions to software users and are widely used in open source software systems on platforms such as GitHub. However, these files often suffer from various documentation issues, leading to challenges in comprehension and potential errors in content. Despite their significance, there is a lack of systematic understanding regar… ▽ More

    Submitted 5 December, 2023; originally announced December 2023.

    Comments: under submission to Transaction on Software Engineering

  9. arXiv:2310.04366  [pdf, other

    cs.AR cs.ET q-bio.GN

    Swordfish: A Framework for Evaluating Deep Neural Network-based Basecalling using Computation-In-Memory with Non-Ideal Memristors

    Authors: Taha Shahroodi, Gagandeep Singh, Mahdi Zahedi, Haiyu Mao, Joel Lindegger, Can Firtina, Stephan Wong, Onur Mutlu, Said Hamdioui

    Abstract: Basecalling, an essential step in many genome analysis studies, relies on large Deep Neural Networks (DNNs) to achieve high accuracy. Unfortunately, these DNNs are computationally slow and inefficient, leading to considerable delays and resource constraints in the sequence analysis process. A Computation-In-Memory (CIM) architecture using memristors can significantly accelerate the performance of… ▽ More

    Submitted 26 November, 2023; v1 submitted 6 October, 2023; originally announced October 2023.

    Comments: To appear in 56th IEEE/ACM International Symposium on Microarchitecture (MICRO), 2023

  10. Evaluating Transfer Learning for Simplifying GitHub READMEs

    Authors: Haoyu Gao, Christoph Treude, Mansooreh Zahedi

    Abstract: Software documentation captures detailed knowledge about a software product, e.g., code, technologies, and design. It plays an important role in the coordination of development teams and in conveying ideas to various stakeholders. However, software documentation can be hard to comprehend if it is written with jargon and complicated sentence structure. In this study, we explored the potential of te… ▽ More

    Submitted 19 August, 2023; originally announced August 2023.

    Comments: Accepted by ESEC/FSE 2023

  11. arXiv:2305.12736   

    cs.SE

    Mitigating ML Model Decay in Continuous Integration with Data Drift Detection: An Empirical Study

    Authors: Ali Kazemi Arani, Triet Huynh Minh Le, Mansooreh Zahedi, Muhammad Ali Babar

    Abstract: Background: Machine Learning (ML) methods are being increasingly used for automating different activities, e.g., Test Case Prioritization (TCP), of Continuous Integration (CI). However, ML models need frequent retraining as a result of changes in the CI environment, more commonly known as data drift. Also, continuously retraining ML models consume a lot of time and effort. Hence, there is an urgen… ▽ More

    Submitted 17 July, 2023; v1 submitted 22 May, 2023; originally announced May 2023.

    Comments: This paper got a rejection and we need to address the comments and upload the new version with new results

  12. arXiv:2305.12695   

    cs.SE cs.LG

    Systematic Literature Review on Application of Machine Learning in Continuous Integration

    Authors: Ali Kazemi Arani, Triet Huynh Minh Le, Mansooreh Zahedi, Muhammad Ali Babar

    Abstract: This research conducted a systematic review of the literature on machine learning (ML)-based methods in the context of Continuous Integration (CI) over the past 22 years. The study aimed to identify and describe the techniques used in ML-based solutions for CI and analyzed various aspects such as data engineering, feature engineering, hyper-parameter tuning, ML models, evaluation methods, and metr… ▽ More

    Submitted 17 July, 2023; v1 submitted 22 May, 2023; originally announced May 2023.

    Comments: This paper got a rejection and we need to address the comments and upload the new version with new results

  13. arXiv:2304.02829  [pdf, other

    cs.SE cs.LG

    SoK: Machine Learning for Continuous Integration

    Authors: Ali Kazemi Arani, Mansooreh Zahedi, Triet Huynh Minh Le, Muhammad Ali Babar

    Abstract: Continuous Integration (CI) has become a well-established software development practice for automatically and continuously integrating code changes during software development. An increasing number of Machine Learning (ML) based approaches for automation of CI phases are being reported in the literature. It is timely and relevant to provide a Systemization of Knowledge (SoK) of ML-based approaches… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

    Comments: 6 pages, 2 figures, accepted in the ICSE'23 Workshop on Cloud Intelligence / AIOps

  14. arXiv:2303.09808  [pdf, other

    cs.SE

    A Study of Gender Discussions in Mobile Apps

    Authors: Mojtaba Shahin, Mansooreh Zahedi, Hourieh Khalajzadeh, Ali Rezaei Nasab

    Abstract: Mobile software apps ("apps") are one of the prevailing digital technologies that our modern life heavily depends on. A key issue in the development of apps is how to design gender-inclusive apps. Apps that do not consider gender inclusion, diversity, and equality in their design can create barriers (e.g., excluding some of the users because of their gender) for their diverse users. While there ha… ▽ More

    Submitted 17 March, 2023; originally announced March 2023.

    Comments: Preprint- Accepted for publication in 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR)

  15. arXiv:2302.11178  [pdf, ps, other

    cs.GT

    IRS: An Incentive-compatible Reward Scheme for Algorand

    Authors: Maizi Liao, Wojciech Golab, Seyed Majid Zahedi

    Abstract: Founded in 2017, Algorand is one of the world's first carbon-negative, public blockchains inspired by proof of stake. Algorand uses a Byzantine agreement protocol to add new blocks to the blockchain. The protocol can tolerate malicious users as long as a supermajority of the stake is controlled by non-malicious users. The protocol achieves about 100x more throughput compared to Bitcoin and can be… ▽ More

    Submitted 22 February, 2023; originally announced February 2023.

    Comments: This work has been accepted for publication in AAMAS'23

  16. arXiv:2302.00594  [pdf, ps, other

    cs.CV cs.AI

    Inching Towards Automated Understanding of the Meaning of Art: An Application to Computational Analysis of Mondrian's Artwork

    Authors: Alex Doboli, Mahan Agha Zahedi, Niloofar Gholamrezaei

    Abstract: Deep Neural Networks (DNNs) have been successfully used in classifying digital images but have been less successful in classifying images with meanings that are not linear combinations of their visualized features, like images of artwork. Moreover, it is unknown what additional features must be included into DNNs, so that they can possibly classify using features beyond visually displayed features… ▽ More

    Submitted 29 December, 2022; originally announced February 2023.

    Comments: 40 pages, 5 figures

  17. arXiv:2211.07585  [pdf

    cs.CY cs.SE

    An Empirical Study on Secure Usage of Mobile Health Apps: The Attack Simulation Approach

    Authors: Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, M. Ali Babar

    Abstract: Mobile applications, mobile apps for short, have proven their usefulness in enhancing service provisioning across a multitude of domains that range from smart healthcare, to mobile commerce, and areas of context sensitive computing. In recent years, a number of empirically grounded, survey-based studies have been conducted to investigate secure development and usage of mHealth apps. However, such… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

  18. arXiv:2211.06953  [pdf, other

    cs.SE

    Collaborative Application Security Testing for DevSecOps: An Empirical Analysis of Challenges, Best Practices and Tool Support

    Authors: Roshan Namal Rajapakse, Mansooreh Zahedi, Muhammad Ali Babar

    Abstract: DevSecOps is a software development paradigm that places a high emphasis on the culture of collaboration between developers (Dev), security (Sec) and operations (Ops) teams to deliver secure software continuously and rapidly. Adopting this paradigm effectively, therefore, requires an understanding of the challenges, best practices and available solutions for collaboration among these functional te… ▽ More

    Submitted 25 November, 2022; v1 submitted 13 November, 2022; originally announced November 2022.

    Comments: Submitted to the Empirical Software Engineering journal_v2

  19. arXiv:2211.06261  [pdf, other

    cs.ET

    BCIM: Efficient Implementation of Binary Neural Network Based on Computation in Memory

    Authors: Mahdi Zahedi, Taha Shahroodi, Stephan Wong, Said Hamdioui

    Abstract: Applications of Binary Neural Networks (BNNs) are promising for embedded systems with hard constraints on computing power. Contrary to conventional neural networks with the floating-point datatype, BNNs use binarized weights and activations which additionally reduces memory requirements. Memristors, emerging non-volatile memory devices, show great potential as the target implementation platform fo… ▽ More

    Submitted 11 November, 2022; originally announced November 2022.

  20. An Empirical Study of Automation in Software Security Patch Management

    Authors: Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar

    Abstract: Several studies have shown that automated support for different activities of the security patch management process has great potential for reducing delays in installing security patches. However, it is also important to understand how automation is used in practice, its limitations in meeting real-world needs and what practitioners really need, an area that has not been empirically investigated i… ▽ More

    Submitted 3 September, 2022; originally announced September 2022.

    Comments: 13 pages, 2 figures

  21. arXiv:2206.01932  [pdf, other

    cs.AR q-bio.GN

    Demeter: A Fast and Energy-Efficient Food Profiler using Hyperdimensional Computing in Memory

    Authors: Taha Shahroodi, Mahdi Zahedi, Can Firtina, Mohammed Alser, Stephan Wong, Onur Mutlu, Said Hamdioui

    Abstract: Food profiling is an essential step in any food monitoring system needed to prevent health risks and potential frauds in the food industry. Significant improvements in sequencing technologies are pushing food profiling to become the main computational bottleneck. State-of-the-art profilers are unfortunately too costly for food profiling. Our goal is to design a food profiler that solves the main… ▽ More

    Submitted 24 August, 2022; v1 submitted 4 June, 2022; originally announced June 2022.

  22. arXiv:2203.16031  [pdf, other

    cs.CV cs.LG

    How Deep is Your Art: An Experimental Study on the Limits of Artistic Understanding in a Single-Task, Single-Modality Neural Network

    Authors: Mahan Agha Zahedi, Niloofar Gholamrezaei, Alex Doboli

    Abstract: Computational modeling of artwork meaning is complex and difficult. This is because art interpretation is multidimensional and highly subjective. This paper experimentally investigated the degree to which a state-of-the-art Deep Convolutional Neural Network (DCNN), a popular Machine Learning approach, can correctly distinguish modern conceptual art work into the galleries devised by art curators.… ▽ More

    Submitted 18 January, 2024; v1 submitted 29 March, 2022; originally announced March 2022.

  23. arXiv:2202.09016  [pdf, other

    cs.SE cs.HC

    Why, How and Where of Delays in Software Security Patch Management: An Empirical Investigation in the Healthcare Sector

    Authors: Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, M. Ali Babar

    Abstract: Numerous security attacks that resulted in devastating consequences can be traced back to a delay in applying a security patch. Despite the criticality of timely patch application, not much is known about why and how delays occur when applying security patches in practice, and how the delays can be mitigated. Based on longitudinal data collected from 132 delayed patching tasks over a period of fou… ▽ More

    Submitted 3 September, 2022; v1 submitted 17 February, 2022; originally announced February 2022.

    Comments: 28 pages, 10 figures

  24. arXiv:2112.10354  [pdf, other

    cs.CR

    Systematic Literature Review on Cyber Situational Awareness Visualizations

    Authors: Liuyue Jiang, Asangi Jayatilaka, Mehwish Nasim, Marthie Grobler, Mansooreh Zahedi, M. Ali Babar

    Abstract: The dynamics of cyber threats are increasingly complex, making it more challenging than ever for organizations to obtain in-depth insights into their cyber security status. Therefore, organizations rely on Cyber Situational Awareness (CSA) to support them in better understanding the threats and associated impacts of cyber events. Due to the heterogeneity and complexity of cyber security data, ofte… ▽ More

    Submitted 24 May, 2022; v1 submitted 20 December, 2021; originally announced December 2021.

  25. arXiv:2112.06356  [pdf, other

    cs.CR

    Evaluation of Security Training and Awareness Programs: Review of Current Practices and Guideline

    Authors: Asangi Jayatilaka, Nathan Beu, Irina Baetu, Mansooreh Zahedi, M. Ali Babar, Laura Hartley, Winston Lewinsmith

    Abstract: Evaluating the effectiveness of security awareness and training programs is critical for minimizing organizations' human security risk. Based on a literature review and industry interviews, we discuss current practices and devise guidelines for measuring the effectiveness of security training and awareness initiatives used by organizations

    Submitted 12 December, 2021; originally announced December 2021.

    Comments: 12 pages

  26. arXiv:2107.13723  [pdf, other

    cs.SE cs.CR

    An Empirical Study of Developers' Discussions about Security Challenges of Different Programming Languages

    Authors: Roland Croft, Yongzheng Xie, Mansooreh Zahedi, M. Ali Babar, Christoph Treude

    Abstract: Given programming languages can provide different types and levels of security support, it is critically important to consider security aspects while selecting programming languages for develo** software systems. Inadequate consideration of security in the choice of a programming language may lead to potential ramifications for secure development. Whilst theoretical analysis of the supposed secu… ▽ More

    Submitted 26 November, 2021; v1 submitted 28 July, 2021; originally announced July 2021.

    Comments: To be published in EMSE

  27. arXiv:2107.02096  [pdf, other

    cs.CR cs.SE

    An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration into DevOps

    Authors: Roshan Namal Rajapakse, Mansooreh Zahedi, Muhammad Ali Babar

    Abstract: Background: Security tools play a vital role in enabling developers to build secure software. However, it can be quite challenging to introduce and fully leverage security tools without affecting the speed or frequency of deployments in the DevOps paradigm. Aims: We aim to empirically investigate the key challenges practitioners face when integrating security tools into a DevOps workflow in order… ▽ More

    Submitted 19 July, 2021; v1 submitted 5 July, 2021; originally announced July 2021.

    Comments: [v3] Camera-ready version (with a few improvements)

  28. A Grounded Theory of the Role of Coordination in Software Security Patch Management

    Authors: Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar

    Abstract: Several disastrous security attacks can be attributed to delays in patching software vulnerabilities. While researchers and practitioners have paid significant attention to automate vulnerabilities identification and patch development activities of software security patch management, there has been relatively little effort dedicated to gain an in-depth understanding of the socio-technical aspects,… ▽ More

    Submitted 18 June, 2021; v1 submitted 7 June, 2021; originally announced June 2021.

    Comments: Accepted for publication at the 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '21)

  29. Challenges and solutions when adopting DevSecOps: A systematic review

    Authors: Roshan N. Rajapakse, Mansooreh Zahedi, M. Ali Babar, Haifeng Shen

    Abstract: Context: DevOps has become one of the fastest-growing software development paradigms in the industry. However, this trend has presented the challenge of ensuring secure software delivery while maintaining the agility of DevOps. The efforts to integrate security in DevOps have resulted in the DevSecOps paradigm, which is gaining significant interest from both industry and academia. However, the ado… ▽ More

    Submitted 29 July, 2021; v1 submitted 15 March, 2021; originally announced March 2021.

    Comments: Addressed reviewer comments from the Information and Software Technology (IST) journal

    Journal ref: Information and software technology 141 (2022) 106700

  30. arXiv:2101.10412  [pdf

    cs.CR cs.SE

    End-Users' Knowledge and Perception about Security of Mobile Health Apps: A Case Study with Two Saudi Arabian mHealth Providers

    Authors: Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, M. Ali Babar

    Abstract: Mobile health applications (mHealth apps for short) are being increasingly adopted in the healthcare sector, enabling stakeholders such as governments, health units, medics, and patients, to utilize health services in a pervasive manner. Despite having several known benefits, mHealth apps entail significant security and privacy challenges that can lead to data breaches with serious social, legal,… ▽ More

    Submitted 23 September, 2021; v1 submitted 25 January, 2021; originally announced January 2021.

    Comments: This research is 29 pages. It has 9 figures, and 7 tables

  31. arXiv:2012.00544  [pdf, other

    cs.SE

    Software Security Patch Management -- A Systematic Literature Review of Challenges, Approaches, Tools and Practices

    Authors: Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, M. Ali Babar

    Abstract: Context: Software security patch management purports to support the process of patching known software security vulnerabilities. Given the increasing recognition of the importance of software security patch management, it is important and timely to systematically review and synthesise the relevant literature on this topic. Objective: This paper aims at systematically reviewing the state of the a… ▽ More

    Submitted 19 August, 2021; v1 submitted 1 December, 2020; originally announced December 2020.

    Comments: 45 pages, 7 figures

  32. arXiv:2008.13009  [pdf

    cs.SE

    Security Awareness of End-Users of Mobile Health Applications: An Empirical Study

    Authors: Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, M. Ali Babar

    Abstract: Mobile systems offer portable and interactive computing, empowering users, to exploit a multitude of context-sensitive services, including mobile healthcare. Mobile health applications (i.e., mHealth apps) are revolutionizing the healthcare sector by enabling stakeholders to produce and consume healthcare services. A widespread adoption of mHealth technologies and rapid increase in mHealth apps en… ▽ More

    Submitted 29 August, 2020; originally announced August 2020.

    Comments: 10 pages, 4 figures, 5 tables

  33. arXiv:2008.03034  [pdf

    cs.SE cs.CY

    An Empirical Study on Develo** Secure Mobile Health Apps: The Developers Perspective

    Authors: Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, M. Ali Babar

    Abstract: Mobile apps exploit embedded sensors and wireless connectivity of a device to empower users with portable computations, context-aware communication, and enhanced interaction. Specifically, mobile health apps (mHealth apps for short) are becoming integral part of mobile and pervasive computing to improve the availability and quality of healthcare services. Despite the offered benefits, mHealth apps… ▽ More

    Submitted 7 August, 2020; originally announced August 2020.

    Comments: 10 pages, 5 figures

  34. arXiv:1808.08796  [pdf

    cs.SE

    An Empirical Study of Architecting for Continuous Delivery and Deployment

    Authors: Mojtaba Shahin, Mansooreh Zahedi, Muhammad Ali Babar, Liming Zhu

    Abstract: Recently, many software organizations have been adopting Continuous Delivery and Continuous Deployment (CD) practices to develop and deliver quality software more frequently and reliably. Whilst an increasing amount of the literature covers different aspects of CD, little is known about the role of software architecture in CD and how an application should be (re-) architected to enable and support… ▽ More

    Submitted 27 August, 2018; originally announced August 2018.

    Comments: To appear in Empirical Software Engineering

  35. arXiv:1703.04277  [pdf

    cs.SE cs.CR

    Security Support in Continuous Deployment Pipeline

    Authors: Faheem Ullah, Adam Johannes Raft, Mojtaba Shahin, Mansooreh Zahedi, Muhammad Ali Babar

    Abstract: Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production. Continuous Deployment Pipeline (CDP) supports CD practice by transferring the changes from the repository to production. Since most of the CDP components run in an environment that has several interfaces to the Internet, these components are v… ▽ More

    Submitted 13 March, 2017; originally announced March 2017.

  36. arXiv:1309.7266  [pdf

    cs.CY cs.LG

    Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites

    Authors: Ahmed Abbasi, Siddharth Kaza, F. Mariam Zahedi

    Abstract: Fake online pharmacies have become increasingly pervasive, constituting over 90% of online pharmacy websites. There is a need for fake website detection techniques capable of identifying fake online pharmacy websites with a high degree of accuracy. In this study, we compared several well-known link-based detection techniques on a large-scale test bed with the hyperlink graph encompassing over 80 m… ▽ More

    Submitted 27 September, 2013; originally announced September 2013.

    Comments: Abbasi, A., Kaza, S., and Zahedi, F. M. "Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites," In Proceedings of the 19th Annual Workshop on Information Technologies and Systems, Phoenix, Arizona, December 14-15, 2009

  37. arXiv:1309.7262  [pdf

    cs.CY

    Design Elements that Promote the use of Fake Website Detection Tools

    Authors: F. Mariam Zahedi, Ahmed Abbasi, Yan Chen

    Abstract: Fake websites have emerged as a major source of online fraud, accounting for billions of dollars of loss by Internet users. We explore the process by which salient design elements could increase the use of protective tools, thus reducing the success rate of fake websites. Using the protection motivation theory, we conceptualize a model to investigate how salient design elements of detection tools… ▽ More

    Submitted 27 September, 2013; originally announced September 2013.

    Comments: Zahedi, F. M., Abbasi, A., and Chen, Y. "Design Elements that Promote the use of Fake Website Detection Tools," In Proceedings of the 10th Annual AIS SIG-HCI Workshop, Shanghai, China, December 4, 2011

  38. arXiv:1108.1500  [pdf

    cs.AI cs.CV

    Gender Recognition Based on Sift Features

    Authors: Sahar Yousefi, Morteza Zahedi

    Abstract: This paper proposes a robust approach for face detection and gender classification in color images. Previous researches about gender recognition suppose an expensive computational and time-consuming pre-processing step in order to alignment in which face images are aligned so that facial landmarks like eyes, nose, lips, chin are placed in uniform locations in image. In this paper, a novel techniqu… ▽ More

    Submitted 6 August, 2011; originally announced August 2011.

  39. arXiv:1105.0699  [pdf

    cs.MM

    Robust Sign Language Recognition System Using ToF Depth Cameras

    Authors: Morteza Zahedi, Ali Reza Manashty

    Abstract: Sign language recognition is a difficult task, yet required for many applications in real-time speed. Using RGB cameras for recognition of sign languages is not very successful in practical situations and accurate 3D imaging requires expensive and complex instruments. With introduction of Time-of-Flight (ToF) depth cameras in recent years, it has become easier to scan the environment for accurate,… ▽ More

    Submitted 3 May, 2011; originally announced May 2011.

    Comments: 6 Pages

    Journal ref: World of Computer Science and Information Technology Journal (WCSIT), Vol. 1, No. 3, 50-55, 2011