Skip to main content

Showing 1–24 of 24 results for author: Zamani, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.00272  [pdf, other

    cs.CV

    Temporally Consistent Object Editing in Videos using Extended Attention

    Authors: AmirHossein Zamani, Amir G. Aghdam, Tiberiu Popa, Eugene Belilovsky

    Abstract: Image generation and editing have seen a great deal of advancements with the rise of large-scale diffusion models that allow user control of different modalities such as text, mask, depth maps, etc. However, controlled editing of videos still lags behind. Prior work in this area has focused on using 2D diffusion models to globally change the style of an existing video. On the other hand, in many p… ▽ More

    Submitted 31 May, 2024; originally announced June 2024.

  2. arXiv:2405.08709  [pdf, other

    cs.IT

    Multi-Task Private Semantic Communication

    Authors: Amirreza Zamani, Sajad Daei, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We study a multi-task private semantic communication problem, in which an encoder has access to an information source arbitrarily correlated with some latent private data. A user has $L$ tasks with priorities. The encoder designs a message to be revealed which is called the semantic of the information source. Due to the privacy constraints the semantic can not be disclosed directly and the encoder… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

  3. arXiv:2405.06831  [pdf, other

    cs.DS

    Better Algorithms for Constructing Minimum Cost Markov Chains and AIFV Codes

    Authors: Reza Hosseini Dolatabadi, Mordedcai J. Golin, Arian Zamani

    Abstract: The problem of constructing optimal AIFV codes is a special case of that of constructing minimum cost Markov Chains. This paper provides the first complete proof of correctness for the previously known iterative algorithm for constructing such Markov chains. A recent work describes how to efficiently solve the Markov Chain problem by first constructing a Markov Chain Polytope and then running th… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: Expanded version of paper appearing in ISIT 2024

    ACM Class: F.2.2; E.4

  4. arXiv:2405.06805  [pdf, ps, other

    cs.DS

    A (Weakly) Polynomial Algorithm for AIVF Coding

    Authors: Reza Hosseini Dolatabadi, Mordecai J. Golin, Arian Zamani

    Abstract: It is possible to improve upon Tunstall coding using a collection of multiple parse trees. The best such results so far are Iwata and Yamamoto's maximum cost AIVF codes. The most efficient algorithm for designing such codes is an iterative one that could run in exponential time. In this paper, we show that this problem fits into the framework of a newly developed technique that uses linear program… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: Expanded version of paper appearing on ISIT 2024

    ACM Class: F.2; E.4

  5. Private Variable-Length Coding with Zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Deniz Gündüz, Mikael Skoglund

    Abstract: A private compression design problem is studied, where an encoder observes useful data $Y$, wishes to compress it using variable length code and communicates it through an unsecured channel. Since $Y$ is correlated with private attribute $X$, the encoder uses a private compression mechanism to design encoded message $\cal C$ and sends it over the channel. An adversary is assumed to have access to… ▽ More

    Submitted 29 October, 2023; originally announced October 2023.

    Comments: arXiv admin note: text overlap with arXiv:2306.13184, arXiv:2309.09034, arXiv:2211.15525, arXiv:2310.19122

    Journal ref: 2023 IEEE International Workshop on Information Forensics and Security (WIFS)

  6. arXiv:2310.19122  [pdf, ps, other

    cs.IT

    Private Variable-Length Coding with Non-zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: A private compression design problem is studied, where an encoder observes useful data $Y$, wishes to compress it using variable length code and communicates it through an unsecured channel. Since $Y$ is correlated with private data $X$, the encoder uses a private compression mechanism to design encoded message $\cal C$ and sends it over the channel. An adversary is assumed to have access to the o… ▽ More

    Submitted 20 November, 2023; v1 submitted 29 October, 2023; originally announced October 2023.

    Comments: arXiv admin note: text overlap with arXiv:2306.13184

  7. arXiv:2309.09034  [pdf, other

    cs.IT

    Private Variable-Length Coding with Sequential Encoder

    Authors: Amirreza Zamani, Tobias J. Oechtering, Deniz Gündüz, Mikael Skoglund

    Abstract: A multi-user private data compression problem is studied. A server has access to a database of $N$ files, $(Y_1,...,Y_N)$, each of size $F$ bits and is connected to an encoder. The encoder is connected through an unsecured link to a user. We assume that each file $Y_i$ is arbitrarily correlated with a private attribute $X$, which is assumed to be accessible by the encoder. Moreover, an adversary i… ▽ More

    Submitted 16 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2306.13184

  8. arXiv:2309.09033  [pdf, other

    cs.IT

    New Privacy Mechanism Design With Direct Access to the Private Data

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: The design of a statistical signal processing privacy problem is studied where the private data is assumed to be observable. In this work, an agent observes useful data $Y$, which is correlated with private data $X$, and wants to disclose the useful information to a user. A statistical privacy mechanism is employed to generate data $U$ based on $(X,Y)$ that maximizes the revealed information about… ▽ More

    Submitted 16 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2201.08738, arXiv:2212.12475

  9. arXiv:2306.13184  [pdf, other

    cs.IT

    Cache-Aided Private Variable-Length Coding with Zero and Non-Zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Deniz Gündüz, Mikael Skoglund

    Abstract: A private cache-aided compression problem is studied, where a server has access to a database of $N$ files, $(Y_1,...,Y_N)$, each of size $F$ bits and is connected through a shared link to $K$ users, each equipped with a local cache of size $MF$ bits. In the placement phase, the server fills the users$'$ caches without knowing their demands, while the delivery phase takes place after the users sen… ▽ More

    Submitted 22 June, 2023; originally announced June 2023.

  10. arXiv:2212.12475  [pdf, other

    cs.IT

    On the Privacy-Utility Trade-off With and Without Direct Access to the Private Data

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We study an information theoretic privacy mechanism design problem for two scenarios where the private data is either observable or hidden. In each scenario, we first consider bounded mutual information as privacy leakage criterion, then we use two different per-letter privacy constraints. In the first scenario, an agent observes useful data $Y$ that is correlated with private data $X$, and wishes… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2205.04881, arXiv:2201.08738

  11. arXiv:2211.15525  [pdf, other

    cs.IT

    Multi-User Privacy Mechanism Design with Non-zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: A privacy mechanism design problem is studied through the lens of information theory. In this work, an agent observes useful data $Y=(Y_1,...,Y_N)$ that is correlated with private data $X=(X_1,...,X_N)$ which is assumed to be also accessible by the agent. Here, we consider $K$ users where user $i$ demands a sub-vector of $Y$, denoted by $C_{i}$. The agent wishes to disclose $C_{i}$ to user $i$. Si… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: text overlap with arXiv:2205.04881, arXiv:2201.08738

  12. arXiv:2209.10029  [pdf, other

    cs.CV

    Fast-Image2Point: Towards Real-Time Point Cloud Reconstruction of a Single Image using 3D Supervision

    Authors: AmirHossein Zamani, Amir G. Aghdam, Kamran Ghaffari T

    Abstract: A key question in the problem of 3D reconstruction is how to train a machine or a robot to model 3D objects. Many tasks like navigation in real-time systems such as autonomous vehicles directly depend on this problem. These systems usually have limited computational power. Despite considerable progress in 3D reconstruction systems in recent years, applying them to real-time systems such as navigat… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

    Comments: 1- The paper has 8 pages 2- The paper has already been accepted in IEEE International Conference on Machine Learning and Applications (ICMLA) 2022 and it will appear in IEEE ICMLA 2022 proceedings

  13. arXiv:2207.04503  [pdf

    cs.CR

    BotNet Intrusion Detection System in Internet of Things with Developed Deep Learning

    Authors: Amirabas Kabiri Zamani, Amirahmad Chapnevis

    Abstract: The rapid growth of technology has led to the creation of computing networks. The applications of the Internet of Things are becoming more and more visible with the expansion and development of sensors and the use of a series of equipment to connect to the Internet. Of course, the growth of any network will also provide some challenges. The main challenge of IoT like any other network is its secur… ▽ More

    Submitted 10 July, 2022; originally announced July 2022.

    Comments: 19 pages, 5 figures

  14. arXiv:2205.04881  [pdf, other

    cs.IT

    Bounds for Privacy-Utility Trade-off with Per-letter Privacy Constraints and Non-zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: An information theoretic privacy mechanism design problem for two scenarios is studied where the private data is either hidden or observable. In each scenario, privacy leakage constraints are considered using two different measures. In these scenarios the private data is hidden or observable. In the first scenario, an agent observes useful data $Y$ that is correlated with private data $X$, and wis… ▽ More

    Submitted 10 May, 2022; originally announced May 2022.

    Comments: arXiv admin note: text overlap with arXiv:2201.08738

  15. arXiv:2201.08738  [pdf, other

    cs.IT

    Bounds for Privacy-Utility Trade-off with Non-zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: The design of privacy mechanisms for two scenarios is studied where the private data is hidden or observable. In the first scenario, an agent observes useful data $Y$, which is correlated with private data $X$, and wants to disclose the useful information to a user. A privacy mechanism is employed to generate data $U$ that maximizes the revealed information about $Y$ while satisfying a privacy cri… ▽ More

    Submitted 13 January, 2023; v1 submitted 21 January, 2022; originally announced January 2022.

  16. Operational Learning-based Boundary Estimation in Electromagnetic Medical Imaging

    Authors: A. Al-Saffar, A. Stancombe, A. Zamani, A. Abbosh

    Abstract: Incorporating boundaries of the imaging object as a priori information to imaging algorithms can significantly improve the performance of electromagnetic medical imaging systems. To avoid overly complicating the system by using different sensors and the adverse effect of the subject's movement, a learning-based method is proposed to estimate the boundary (external contour) of the imaged object usi… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

    Comments: Under Review

    Journal ref: IEEE TAP 2021

  17. arXiv:2107.07484  [pdf, other

    cs.IT

    Data Disclosure with Non-zero Leakage and Non-invertible Leakage Matrix

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We study a statistical signal processing privacy problem, where an agent observes useful data $Y$ and wants to reveal the information to a user. Since the useful data is correlated with the private data $X$, the agent employs a privacy mechanism to generate data $U$ that can be released. We study the privacy mechanism design that maximizes the revealed information about $Y$ while satisfying a stro… ▽ More

    Submitted 15 July, 2021; originally announced July 2021.

  18. A Design Framework for Strongly $χ^2$-Private Data Disclosure

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: In this paper, we study a stochastic disclosure control problem using information-theoretic methods. The useful data to be disclosed depend on private data that should be protected. Thus, we design a privacy mechanism to produce new data which maximizes the disclosed information about the useful data under a strong $χ^2$-privacy criterion. For sufficiently small leakage, the privacy mechanism desi… ▽ More

    Submitted 22 March, 2021; v1 submitted 3 September, 2020; originally announced September 2020.

    Comments: 16 pages, 2 figures

    Journal ref: vol. 16, pp. 2312-2325, 2021

  19. CerebroVis: Designing an Abstract yet Spatially Contextualized Cerebral Arteries Network Visualization

    Authors: Aditeya Pandey, Harsh Shukla, Geoffrey S. Young, Lei Qin, Amir A. Zamani, Liangge Hsu, Raymond Huang, Cody Dunne, Michelle A. Borkin

    Abstract: Blood circulation in the human brain is supplied through a network of cerebral arteries. If a clinician suspects a patient has a stroke or other cerebrovascular condition they order imaging tests. Neuroradiologists visually search the resulting scans for abnormalities. Their visual search tasks correspond to the abstract network analysis tasks of browsing and path following. To assist neuroradiolo… ▽ More

    Submitted 15 October, 2019; v1 submitted 29 July, 2019; originally announced July 2019.

    Comments: IEEE InfoVis 2019 ACM 2012 CCS-Human-centered computing,Visualization,Visualization application domains,Information visualization ACM 2012 CCS-Human-centered computing,Visualization,Visualization techniques,Graph drawings

    ACM Class: H.5.1; H.1.2; D.2.2

  20. arXiv:1902.11245  [pdf, other

    cs.CL cs.LG cs.SD eess.AS

    Incorporating End-to-End Speech Recognition Models for Sentiment Analysis

    Authors: Egor Lakomkin, Mohammad Ali Zamani, Cornelius Weber, Sven Magg, Stefan Wermter

    Abstract: Previous work on emotion recognition demonstrated a synergistic effect of combining several modalities such as auditory, visual, and transcribed text to estimate the affective state of a speaker. Among these, the linguistic modality is crucial for the evaluation of an expressed emotion. However, manually transcribed spoken text cannot be given as input to a system practically. We argue that using… ▽ More

    Submitted 28 February, 2019; originally announced February 2019.

    Comments: Accepted at the 2019 International Conference on Robotics and Automation (ICRA) will be held on May 20-24, 2019 in Montreal, Canada

  21. arXiv:1809.02891  [pdf

    cs.RO

    Stable Stair-Climbing of a Quadruped Robot

    Authors: Ali Zamani, Mahdi Khorram, S. Ali A. Moosavian

    Abstract: Synthesizing a stable gait that enables a quadruped robot to climb stairs is the focus of this paper. To this end, first a stable transition from initial to desired configuration is made based on the minimum number of steps and maximum use of the leg workspace to prepare the robot for the movement. Next, swing leg and body trajectories are planned for a successful stair- climbing gait. Afterwards,… ▽ More

    Submitted 8 September, 2018; originally announced September 2018.

    Comments: Proceeding of the 2013 RSI/ISM International Conference on Robotics and Mechatronics, February 13-15, 2013, Tehran, Iran

  22. arXiv:1807.02696  [pdf, other

    cs.RO

    Switching between Limit Cycles in a Model of Running Using Exponentially Stabilizing Discrete Control Lyapunov Function

    Authors: Pranav A. Bhounsule, Ali Zamani, Jason Pusey

    Abstract: This paper considers the problem of switching between two periodic motions, also known as limit cycles, to create agile running motions. For each limit cycle, we use a control Lyapunov function to estimate the region of attraction at the apex of the flight phase. We switch controllers at the apex, only if the current state of the robot is within the region of attraction of the subsequent limit cyc… ▽ More

    Submitted 7 July, 2018; originally announced July 2018.

    Comments: 6 pages, 4 figures, To be appeared in IEEE American Control Conference (ACC) 2018

  23. arXiv:1804.04053  [pdf, other

    cs.RO cs.CL cs.HC cs.LG

    EmoRL: Continuous Acoustic Emotion Classification using Deep Reinforcement Learning

    Authors: Egor Lakomkin, Mohammad Ali Zamani, Cornelius Weber, Sven Magg, Stefan Wermter

    Abstract: Acoustically expressed emotions can make communication with a robot more efficient. Detecting emotions like anger could provide a clue for the robot indicating unsafe/undesired situations. Recently, several deep neural network-based models have been proposed which establish new state-of-the-art results in affective state evaluation. These models typically start processing at the end of each uttera… ▽ More

    Submitted 3 April, 2018; originally announced April 2018.

    Comments: Accepted to the IEEE International Conference on Robotics and Automation (ICRA'18), Brisbane, Australia, May 21-25, 2018

  24. arXiv:1804.02173  [pdf, other

    cs.RO cs.CL cs.HC cs.SD eess.AS

    On the Robustness of Speech Emotion Recognition for Human-Robot Interaction with Deep Neural Networks

    Authors: Egor Lakomkin, Mohammad Ali Zamani, Cornelius Weber, Sven Magg, Stefan Wermter

    Abstract: Speech emotion recognition (SER) is an important aspect of effective human-robot collaboration and received a lot of attention from the research community. For example, many neural network-based architectures were proposed recently and pushed the performance to a new level. However, the applicability of such neural SER models trained only on in-domain data to noisy conditions is currently under-re… ▽ More

    Submitted 6 April, 2018; originally announced April 2018.

    Comments: Submitted to IROS'18, Madrid, Spain