Skip to main content

Showing 1–50 of 64 results for author: Rezaei, A

  1. arXiv:2404.07091  [pdf, other

    cs.LG cs.AI

    LaTiM: Longitudinal representation learning in continuous-time models to predict disease progression

    Authors: Rachid Zeghlache, Pierre-Henri Conze, Mostafa El Habib Daho, Yihao Li, Hugo Le Boité, Ramin Tadayoni, Pascal Massin, Béatrice Cochener, Alireza Rezaei, Ikram Brahim, Gwenolé Quellec, Mathieu Lamard

    Abstract: This work proposes a novel framework for analyzing disease progression using time-aware neural ordinary differential equations (NODE). We introduce a "time-aware head" in a framework trained through self-supervised learning (SSL) to leverage temporal information in latent space for data augmentation. This approach effectively integrates NODEs with SSL, offering significant performance improvements… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: Submitted to MICCAI 2024

  2. arXiv:2403.16272  [pdf, other

    cs.CV cs.AI

    L-MAE: Longitudinal masked auto-encoder with time and severity-aware encoding for diabetic retinopathy progression prediction

    Authors: Rachid Zeghlache, Pierre-Henri Conze, Mostafa El Habib Daho, Yihao Li, Alireza Rezaei, Hugo Le Boité, Ramin Tadayoni, Pascal Massin, Béatrice Cochener, Ikram Brahim, Gwenolé Quellec, Mathieu Lamard

    Abstract: Pre-training strategies based on self-supervised learning (SSL) have proven to be effective pretext tasks for many downstream tasks in computer vision. Due to the significant disparity between medical and natural images, the application of typical SSL is not straightforward in medical imaging. Additionally, those pretext tasks often lack context, which is critical for computer-aided clinical decis… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

  3. arXiv:2402.14576  [pdf, other

    cs.NI cs.LG eess.SY

    Edge Caching Based on Deep Reinforcement Learning and Transfer Learning

    Authors: Farnaz Niknia, Ping Wang, Zixu Wang, Aakash Agarwal, Adib S. Rezaei

    Abstract: This paper addresses the escalating challenge of redundant data transmission in networks. The surge in traffic has strained backhaul links and backbone networks, prompting the exploration of caching solutions at the edge router. Existing work primarily relies on Markov Decision Processes (MDP) for caching issues, assuming fixed-time interval decisions; however, real-world scenarios involve random… ▽ More

    Submitted 29 February, 2024; v1 submitted 8 February, 2024; originally announced February 2024.

  4. arXiv:2402.08084  [pdf, other

    cs.CR

    CycPUF: Cyclic Physical Unclonable Function

    Authors: Michael Dominguez, Amin Rezaei

    Abstract: Physical Unclonable Functions (PUFs) leverage manufacturing process imperfections that cause propagation delay discrepancies for the signals traveling along these paths. While PUFs can be used for device authentication and chip-specific key generation, strong PUFs have been shown to be vulnerable to machine learning modeling attacks. Although there is an impression that combinational circuits must… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

    Comments: Proceedings of 27th Design, Automation & Test in Europe Conference & Exhibition (DATE 2024)

  5. arXiv:2402.04235  [pdf, other

    cs.CR

    LIPSTICK: Corruptibility-Aware and Explainable Graph Neural Network-based Oracle-Less Attack on Logic Locking

    Authors: Yeganeh Aghamohammadi, Amin Rezaei

    Abstract: In a zero-trust fabless paradigm, designers are increasingly concerned about hardware-based attacks on the semiconductor supply chain. Logic locking is a design-for-trust method that adds extra key-controlled gates in the circuits to prevent hardware intellectual property theft and overproduction. While attackers have traditionally relied on an oracle to attack logic-locked circuits, machine learn… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

    Comments: Proceedings of 29th Asia and South Pacific Design Automation Conference (ASP-DAC 2024)

  6. arXiv:2401.09479  [pdf, other

    cs.CR cs.AI cs.LG

    Uncertainty-Aware Hardware Trojan Detection Using Multimodal Deep Learning

    Authors: Rahul Vishwakarma, Amin Rezaei

    Abstract: The risk of hardware Trojans being inserted at various stages of chip production has increased in a zero-trust fabless era. To counter this, various machine learning solutions have been developed for the detection of hardware Trojans. While most of the focus has been on either a statistical or deep learning approach, the limited number of Trojan-infected benchmarks affects the detection accuracy a… ▽ More

    Submitted 23 January, 2024; v1 submitted 15 January, 2024; originally announced January 2024.

    Comments: 2024 Design, Automation and Test in Europe Conference | The European Event for Electronic System Design & Test (accepted)

    Journal ref: 2024 Design, Automation and Test in Europe Conference | The European Event for Electronic System Design & Test

  7. arXiv:2401.02758  [pdf, ps, other

    cs.CV

    Systematic review of image segmentation using complex networks

    Authors: Amin Rezaei, Fatemeh Asadi

    Abstract: This review presents various image segmentation methods using complex networks. Image segmentation is one of the important steps in image analysis as it helps analyze and understand complex images. At first, it has been tried to classify complex networks based on how it being used in image segmentation. In computer vision and image processing applications, image segmentation is essential for a… ▽ More

    Submitted 5 January, 2024; originally announced January 2024.

  8. arXiv:2312.10208  [pdf, other

    cs.CV

    Video-based Surgical Skill Assessment using Tree-based Gaussian Process Classifier

    Authors: Arefeh Rezaei, Mohammad Javad Ahmadi, Amir Molaei, Hamid. D. Taghirad

    Abstract: This paper aims to present a novel pipeline for automated surgical skill assessment using video data and to showcase the effectiveness of the proposed approach in evaluating surgeon proficiency, its potential for targeted training interventions, and quality assurance in surgical departments. The pipeline incorporates a representation flow convolutional neural network and a novel tree-based Gaussia… ▽ More

    Submitted 21 December, 2023; v1 submitted 15 December, 2023; originally announced December 2023.

    Comments: 11 pages, 2 figures, journal

  9. arXiv:2312.00009  [pdf, other

    cs.CR

    Risk-Aware and Explainable Framework for Ensuring Guaranteed Coverage in Evolving Hardware Trojan Detection

    Authors: Rahul Vishwakarma, Amin Rezaei

    Abstract: As the semiconductor industry has shifted to a fabless paradigm, the risk of hardware Trojans being inserted at various stages of production has also increased. Recently, there has been a growing trend toward the use of machine learning solutions to detect hardware Trojans more effectively, with a focus on the accuracy of the model as an evaluation metric. However, in a high-risk and sensitive dom… ▽ More

    Submitted 13 October, 2023; originally announced December 2023.

    Comments: The International Conference on Computer-Aided Design (IEEE/ACM ICCAD 2023)

  10. arXiv:2309.09374  [pdf

    cs.CE cs.LG

    Fully Convolutional Generative Machine Learning Method for Accelerating Non-Equilibrium Greens Function Simulations

    Authors: Preslav Aleksandrov, Ali Rezaei, Nikolas Xeni, Tapas Dutta, Asen Asenov, Vihar Georgiev

    Abstract: This work describes a novel simulation approach that combines machine learning and device modelling simulations. The device simulations are based on the quantum mechanical non-equilibrium Greens function (NEGF) approach and the machine learning method is an extension to a convolutional generative network. We have named our new simulation approach ML-NEGF and we have implemented it in our in-house… ▽ More

    Submitted 17 September, 2023; originally announced September 2023.

  11. Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices

    Authors: Rahul Vishwakarma, Ravi Monani, Amin Rezaei, Hossein Sayadi, Mehrdad Aliasgari, Ava Hedayatipour

    Abstract: The Global Wearable market is anticipated to rise at a considerable rate in the next coming years and communication is a fundamental block in any wearable device. In communication, encryption methods are being used with the aid of microcontrollers or software implementations, which are power-consuming and incorporate complex hardware implementation. Internet of Things (IoT) devices are considered… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

    Comments: 2023 24th International Symposium on Quality Electronic Design (ISQED)

  12. arXiv:2303.08915  [pdf, other

    q-bio.GN cs.LG

    LRDB: LSTM Raw data DNA Base-caller based on long-short term models in an active learning environment

    Authors: Ahmad Rezaei, Mahdi Taheri, Ali Mahani, Sebastian Magierowski

    Abstract: The first important step in extracting DNA characters is using the output data of MinION devices in the form of electrical current signals. Various cutting-edge base callers use this data to detect the DNA characters based on the input. In this paper, we discuss several shortcomings of prior base callers in the case of time-critical applications, privacy-aware design, and the problem of catastroph… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

    Comments: 12 figures, 6 table

  13. arXiv:2206.13740  [pdf, other

    eess.IV cs.CV

    GAN-based Super-Resolution and Segmentation of Retinal Layers in Optical coherence tomography Scans

    Authors: Paria Jeihouni, Omid Dehzangi, Annahita Amireskandari, Ali Rezai, Nasser M. Nasrabadi

    Abstract: In this paper, we design a Generative Adversarial Network (GAN)-based solution for super-resolution and segmentation of optical coherence tomography (OCT) scans of the retinal layers. OCT has been identified as a non-invasive and inexpensive modality of imaging to discover potential biomarkers for the diagnosis and progress determination of neurodegenerative diseases, such as Alzheimer's Disease (… ▽ More

    Submitted 27 June, 2022; originally announced June 2022.

    Comments: 5 pages,7 figures

  14. arXiv:2206.05277  [pdf, other

    eess.IV cs.CV

    Superresolution and Segmentation of OCT scans using Multi-Stage adversarial Guided Attention Training

    Authors: Paria Jeihouni, Omid Dehzangi, Annahita Amireskandari, Ali Dabouei, Ali Rezai, Nasser M. Nasrabadi

    Abstract: Optical coherence tomography (OCT) is one of the non-invasive and easy-to-acquire biomarkers (the thickness of the retinal layers, which is detectable within OCT scans) being investigated to diagnose Alzheimer's disease (AD). This work aims to segment the OCT images automatically; however, it is a challenging task due to various issues such as the speckle noise, small target region, and unfavorabl… ▽ More

    Submitted 9 June, 2022; originally announced June 2022.

    Comments: 5 pages,conference

  15. arXiv:2202.09093  [pdf, other

    eess.SP cs.NI

    Toward a Smart Resource Allocation Policy via Artificial Intelligence in 6G Networks: Centralized or Decentralized?

    Authors: Ali Nouruzi, Atefeh Rezaei, Ata Khalili, Nader Mokari, Mohammad Reza Javan, Eduard A. Jorswieck, Halim Yanikomeroglu

    Abstract: In this paper, we design a new smart softwaredefined radio access network (RAN) architecture with important properties like flexibility and traffic awareness for sixth generation (6G) wireless networks. In particular, we consider a hierarchical resource allocation framework for the proposed smart soft-RAN model, where the software-defined network (SDN) controller is the first and foremost layer of… ▽ More

    Submitted 18 February, 2022; originally announced February 2022.

    Comments: Submitted to IEEE for possible publications

  16. arXiv:2202.06307  [pdf

    cs.LG cs.SI

    Learning Asymmetric Embedding for Attributed Networks via Convolutional Neural Network

    Authors: Mohammadreza Radmanesh, Hossein Ghorbanzadeh, Ahmad Asgharian Rezaei, Mahdi Jalili, Xinghuo Yu

    Abstract: Recently network embedding has gained increasing attention due to its advantages in facilitating network computation tasks such as link prediction, node classification and node clustering. The objective of network embedding is to represent network nodes in a low-dimensional vector space while retaining as much information as possible from the original network including structural, relational, and… ▽ More

    Submitted 13 February, 2022; originally announced February 2022.

    Comments: 16 Pages, 7 figures, 4 tables. Submitted to AEEE TNNLS

  17. arXiv:2202.06229  [pdf

    cs.SI cs.LG

    Vital Node Identification in Complex Networks Using a Machine Learning-Based Approach

    Authors: Ahmad Asgharian Rezaei, Justin Munoz, Mahdi Jalili, Hamid Khayyam

    Abstract: Vital node identification is the problem of finding nodes of highest importance in complex networks. This problem has crucial applications in various contexts such as viral marketing or controlling the propagation of virus or rumours in real-world networks. Existing approaches for vital node identification mainly focus on capturing the importance of a node through a mathematical expression which d… ▽ More

    Submitted 13 February, 2022; originally announced February 2022.

    Comments: 20 Pages, 5 figures, 6 tables. Submitted to Expert Systems with Applications

  18. arXiv:2112.06288  [pdf, ps, other

    cs.LG cs.CY stat.ML

    Fairness for Robust Learning to Rank

    Authors: Omid Memarrast, Ashkan Rezaei, Rizal Fathony, Brian Ziebart

    Abstract: While conventional ranking systems focus solely on maximizing the utility of the ranked items to users, fairness-aware ranking systems additionally try to balance the exposure for different protected attributes such as gender or race. To achieve this type of group fairness for ranking, we derive a new ranking system based on the first principles of distributional robustness. We formulate a minimax… ▽ More

    Submitted 12 December, 2021; originally announced December 2021.

  19. arXiv:2112.02927  [pdf

    cs.SI cs.DS

    Influential Node Ranking in Complex Information Networks Using A Randomized Dynamics-Sensitive Approach

    Authors: Ahmad Asgharian Rezaei, Justin Munoz, Mahdi Jalili, Hamid Khayyam

    Abstract: Identifying the most influential nodes in information networks has been the focus of many research studies. This problem has crucial applications in various contexts, such as controlling the propagation of viruses or rumours in real-world networks. While existing approaches mostly rely on the structural properties of networks and generate static rankings, in this work we propose a novel method tha… ▽ More

    Submitted 27 August, 2022; v1 submitted 6 December, 2021; originally announced December 2021.

    Comments: 18 Pages, 4 Figures, 5 Tables

  20. arXiv:2105.06599  [pdf, other

    cs.CV

    TriPose: A Weakly-Supervised 3D Human Pose Estimation via Triangulation from Video

    Authors: Mohsen Gholami, Ahmad Rezaei, Helge Rhodin, Rabab Ward, Z. Jane Wang

    Abstract: Estimating 3D human poses from video is a challenging problem. The lack of 3D human pose annotations is a major obstacle for supervised training and for generalization to unseen datasets. In this work, we address this problem by proposing a weakly-supervised training scheme that does not require 3D annotations or calibrated cameras. The proposed method relies on temporal information and triangulat… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

  21. arXiv:2012.11877  [pdf, other

    cs.SI

    Influencers and the Giant Component: the Fundamental Hardness in Privacy Protection for Socially Contagious Attributes

    Authors: Aria Rezaei, Jie Gao, Anand D. Sarwate

    Abstract: The presence of correlation is known to make privacy protection more difficult. We investigate the privacy of socially contagious attributes on a network of individuals, where each individual possessing that attribute may influence a number of others into adopting it. We show that for contagions following the Independent Cascade model there exists a giant connected component of infected nodes, con… ▽ More

    Submitted 22 December, 2020; originally announced December 2020.

    Comments: SIAM SDM 2021, privacy, social contagions, social networks

  22. arXiv:2012.04224  [pdf, other

    cs.CV

    KNN-enhanced Deep Learning Against Noisy Labels

    Authors: Shuyu Kong, You Li, Jia Wang, Amin Rezaei, Hai Zhou

    Abstract: Supervised learning on Deep Neural Networks (DNNs) is data hungry. Optimizing performance of DNN in the presence of noisy labels has become of paramount importance since collecting a large dataset will usually bring in noisy labels. Inspired by the robustness of K-Nearest Neighbors (KNN) against data noise, in this work, we propose to apply deep KNN for label cleanup. Our approach leverages DNNs f… ▽ More

    Submitted 8 December, 2020; originally announced December 2020.

  23. arXiv:2010.05166  [pdf, other

    cs.LG stat.ML

    Robust Fairness under Covariate Shift

    Authors: Ashkan Rezaei, Anqi Liu, Omid Memarrast, Brian Ziebart

    Abstract: Making predictions that are fair with regard to protected group membership (race, gender, age, etc.) has become an important requirement for classification algorithms. Existing techniques derive a fair model from sampled labeled data relying on the assumption that training and testing data are identically and independently drawn (iid) from the same distribution. In practice, distribution shift can… ▽ More

    Submitted 6 February, 2021; v1 submitted 11 October, 2020; originally announced October 2020.

  24. arXiv:2009.12097  [pdf, other

    cs.IR

    Parsisanj: a semi-automatic component-based approach towards search engine evaluation

    Authors: Amin Heydari Alashti, Ahmad Asgharian Rezaei, Alireza Elahi, Sobhan Sayyaran, Mohammad Ghodsi

    Abstract: Accessing to required data on the internet is wide via search engines in the last two decades owing to the huge amount of available data and the high rate of new data is generating daily. Accordingly, search engines are encouraged to make the most valuable existing data on the web searchable. Knowing how to handle a large amount of data in each step of a search engines' procedure from crawling to… ▽ More

    Submitted 25 September, 2020; originally announced September 2020.

  25. arXiv:2007.14790  [pdf

    eess.IV cs.CV

    Efficient OCT Image Segmentation Using Neural Architecture Search

    Authors: Saba Heidari Gheshlaghi, Omid Dehzangi, Ali Dabouei, Annahita Amireskandari, Ali Rezai, Nasser M Nasrabadi

    Abstract: In this work, we propose a Neural Architecture Search (NAS) for retinal layer segmentation in Optical Coherence Tomography (OCT) scans. We incorporate the Unet architecture in the NAS framework as its backbone for the segmentation of the retinal layers in our collected and pre-processed OCT image dataset. At the pre-processing stage, we conduct super resolution and image processing techniques on t… ▽ More

    Submitted 27 July, 2020; originally announced July 2020.

  26. arXiv:2006.06806  [pdf, other

    cs.CR

    Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking

    Authors: Benjamin Tan, Ramesh Karri, Nimisha Limaye, Abhrajit Sengupta, Ozgur Sinanoglu, Md Moshiur Rahman, Swarup Bhunia, Danielle Duvalsaint, R. D., Blanton, Amin Rezaei, Yuanqi Shen, Hai Zhou, Leon Li, Alex Orailoglu, Zhaokun Han, Austin Benedetti, Luciano Brignone, Muhammad Yasin, Jeyavijayan Rajendran, Michael Zuzak, Ankur Srivastava, Ujjwal Guin, Chandan Karfa, Kanad Basu , et al. (11 additional authors not shown)

    Abstract: Integrated circuits (ICs) are the foundation of all computing systems. They comprise high-value hardware intellectual property (IP) that are at risk of piracy, reverse-engineering, and modifications while making their way through the geographically-distributed IC supply chain. On the frontier of hardware security are various design-for-trust techniques that claim to protect designs from untrusted… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

  27. arXiv:2005.04074  [pdf, other

    cs.LG cs.SI stat.ML

    Adversarial Graph Embeddings for Fair Influence Maximization over Social Networks

    Authors: Moein Khajehnejad, Ahmad Asgharian Rezaei, Mahmoudreza Babaei, Jessica Hoffmann, Mahdi Jalili, Adrian Weller

    Abstract: Influence maximization is a widely studied topic in network science, where the aim is to reach the maximum possible number of nodes, while only targeting a small initial set of individuals. It has critical applications in many fields, including viral marketing, information propagation, news dissemination, and vaccinations. However, the objective does not usually take into account whether the final… ▽ More

    Submitted 10 May, 2020; v1 submitted 8 May, 2020; originally announced May 2020.

    Comments: In Proc. of the 29th International Joint Conference on Artificial Intelligence (IJCAI'20), 2020

  28. arXiv:1912.00318  [pdf, other

    q-bio.BM cs.AI cs.LG

    DeepAtom: A Framework for Protein-Ligand Binding Affinity Prediction

    Authors: Yanjun Li, Mohammad A. Rezaei, Chenglong Li, Xiaolin Li, Dapeng Wu

    Abstract: The cornerstone of computational drug design is the calculation of binding affinity between two biological counterparts, especially a chemical compound, i.e., a ligand, and a protein. Predicting the strength of protein-ligand binding with reasonable accuracy is critical for drug discovery. In this paper, we propose a data-driven framework named DeepAtom to accurately predict the protein-ligand bin… ▽ More

    Submitted 30 November, 2019; originally announced December 2019.

    Comments: Accepted IEEE BIBM 2019 paper with minor revisions

    Journal ref: IEEE International Conference on Bioinformatics and Biomedicine (BIBM 2019)

  29. arXiv:1909.00543  [pdf, other

    cs.SI physics.soc-ph

    On Privacy of Socially Contagious Attributes

    Authors: Aria Rezaei, Jie Gao

    Abstract: A commonly used method to protect user privacy in data collection is to perform randomized perturbation on user's real data before collection so that aggregated statistics can still be inferred without endangering secrets held by individuals. In this paper, we take a closer look at the validity of Differential Privacy guarantees, when the sensitive attributes are subject to social influence and co… ▽ More

    Submitted 2 September, 2019; originally announced September 2019.

    Comments: 10 pages, ICDM 2019

  30. arXiv:1907.03197  [pdf, other

    cs.DS cs.LG

    Composable Core-sets for Determinant Maximization: A Simple Near-Optimal Algorithm

    Authors: Piotr Indyk, Sepideh Mahabadi, Shayan Oveis Gharan, Alireza Rezaei

    Abstract: ``Composable core-sets'' are an efficient framework for solving optimization problems in massive data models. In this work, we consider efficient construction of composable core-sets for the determinant maximization problem. This can also be cast as the MAP inference task for determinantal point processes, that have recently gained a lot of interest for modeling diversity and fairness. The problem… ▽ More

    Submitted 6 July, 2019; originally announced July 2019.

    Comments: This paper has appeared in the 36th International Conference on Machine Learning (ICML), 2019. This is an equal contribution paper

    ACM Class: F.2.0; G.1.2; G.1.6; G.2.2

  31. arXiv:1905.02549  [pdf

    cs.AI

    Descriptive evaluation of students using fuzzy approximate reasoning

    Authors: Mohsen Annabestani, Alireza Rowhanimanesh, Aylar Mizani, Akram Rezaei

    Abstract: In recent years, descriptive evaluation has been introduced as a new model for educational evaluation of Iranian students. The current descriptive evaluation method is based on four-valued logic. Assessing all students with only four values is led to a lack of relative justice and the creation of unrealistic equality. Also, the complexity of the evaluation process in the current method increases t… ▽ More

    Submitted 11 May, 2019; v1 submitted 7 May, 2019; originally announced May 2019.

  32. arXiv:1905.00607  [pdf

    cs.AI

    A knowledge-based intelligent system for control of dirt recognition process in the smart washing machines

    Authors: Mohsen Annabestani, Alireza Rowhanimanesh, Akram Rezaei, Ladan Avazpour, Fatemeh Sheikhhasani

    Abstract: In this paper, we propose an intelligence approach based on fuzzy logic to modeling human intelligence in washing clothes. At first, an intelligent feedback loop is designed for perception-based sensing of dirt inspired by human color understanding. Then, when color stains leak out of some colored clothes the human probabilistic decision making is computationally modeled to detect this stain leaka… ▽ More

    Submitted 7 May, 2019; v1 submitted 2 May, 2019; originally announced May 2019.

  33. Fairness for Robust Log Loss Classification

    Authors: Ashkan Rezaei, Rizal Fathony, Omid Memarrast, Brian Ziebart

    Abstract: Developing classification methods with high accuracy that also avoid unfair treatment of different groups has become increasingly important for data-driven decision making in social applications. Many existing methods enforce fairness constraints on a selected classifier (e.g., logistic regression) by directly forming constrained optimizations. We instead re-derive a new classifier from the first… ▽ More

    Submitted 14 October, 2020; v1 submitted 9 March, 2019; originally announced March 2019.

    Journal ref: Proceedings of the AAAI Conference on Artificial Intelligence (2020), Vol 34 No 04: AAAI-20 Technical Tracks 4

  34. arXiv:1903.02928  [pdf, other

    cs.IT

    Joint Dynamic Pricing and Radio Resource Allocation Framework for IoT Services

    Authors: Mohammad Moltafet, Atefeh Rezaei, Nader Mokari, Mohammad Reza Javan, Hamid Saeedi, Hossein Pishro Nik

    Abstract: In this paper, we study the problem of resource allocation as well as pricing in the context of Internet of things (IoT) networks. We provide a novel pricing model for IoT services where all the parties involved in the communication scenario as well as their revenue and cost are determined. We formulate the resource allocation in the considered model as a multi-objective optimization problem where… ▽ More

    Submitted 7 March, 2019; originally announced March 2019.

  35. arXiv:1902.09879  [pdf, other

    cs.IT eess.SP

    Robust Resource Allocation for PD-NOMA-Based MISO Heterogeneous Networks with CoMP Technology

    Authors: Atefeh Rezaei, Paeiz Azmi, Nader Mokari, Mohammad Reza Javan

    Abstract: In this paper, we consider a hybrid scheme of coordinated multi-point (CoMP) technology in MISO heterogeneous communication networks based on power domain non-orthogonal multiple access (PD-NOMA). We propose a novel method based on matching game with externalities to realize the hybrid scheme where the number of the cooperative nodes are variable. Moreover, we propose a new matching utility functi… ▽ More

    Submitted 19 September, 2019; v1 submitted 26 February, 2019; originally announced February 2019.

  36. arXiv:1812.10193  [pdf, other

    cs.LG cs.CR stat.ML

    Application-driven Privacy-preserving Data Publishing with Correlated Attributes

    Authors: Aria Rezaei, Chaowei Xiao, Jie Gao, Bo Li, Sirajum Munir

    Abstract: Recent advances in computing have allowed for the possibility to collect large amounts of data on personal activities and private living spaces. To address the privacy concerns of users in this environment, we propose a novel framework called PR-GAN that offers privacy-preserving mechanism using generative adversarial networks. Given a target application, PR-GAN automatically modifies the data to… ▽ More

    Submitted 4 January, 2021; v1 submitted 25 December, 2018; originally announced December 2018.

    Comments: 12 pages

  37. Application of the Fast Multipole Fully Coupled Poroelastic Displacement Discontinuity Method to Hydraulic Fracturing Problems

    Authors: Ali Rezaei, Fahd Siddiqui, Giorgio Bornia, Mohamed Y. Soliman

    Abstract: In this study, a fast multipole method (FMM) is used to decrease the computational time of a fully-coupled poroelastic hydraulic fracture model with a controllable effect on its accuracy. The hydraulic fracture model is based on the poroelastic formulation of the displacement discontinuity method (DDM) which is a special formulation of the boundary element method (BEM). DDM is a powerful and effic… ▽ More

    Submitted 19 March, 2019; v1 submitted 12 December, 2018; originally announced December 2018.

  38. arXiv:1812.03424  [pdf, other

    math.NA cs.CE

    A global sensitivity analysis and reduced order models for hydraulically-fractured horizontal wells

    Authors: A. Rezaei, K. B. Nakshatrala, F. Siddiqui, B. Dindoruk, M. Soliman

    Abstract: We present a systematic global sensitivity analysis using the Sobol method which can be utilized to rank the variables that affect two quantity of interests -- pore pressure depletion and stress change -- around a hydraulically-fractured horizontal well based on their degree of importance. These variables include rock properties and stimulation design variables. A fully-coupled poroelastic hydraul… ▽ More

    Submitted 8 December, 2018; originally announced December 2018.

  39. arXiv:1811.07717  [pdf, other

    cs.MS cs.CE math.AP

    Zeffiro user interface for electromagnetic brain imaging: a GPU accelerated FEM tool for forward and inverse computations in Matlab

    Authors: Qin He, Atena Rezaei, Sampsa Pursiainen

    Abstract: This article introduces the Zeffiro interface (ZI) version 2.2 for brain imaging. ZI aims to provide a simple, accessible and multimodal open source platform for finite element method (FEM) based and graphics processing unit (GPU) accelerated forward and inverse computations in the Matlab environment. It allows one to (1) generate a given multi-compartment head model, (2) to evaluate a lead field… ▽ More

    Submitted 3 September, 2019; v1 submitted 19 November, 2018; originally announced November 2018.

    MSC Class: 65L60; 65N30; 34A55; 34M50; 92C50 ACM Class: G.1.8

  40. arXiv:1811.02933  [pdf, ps, other

    cs.DS cs.DM cs.IT math-ph math.CO

    A Tight Analysis of Bethe Approximation for Permanent

    Authors: Nima Anari, Alireza Rezaei

    Abstract: We prove that the permanent of nonnegative matrices can be deterministically approximated within a factor of $\sqrt{2}^n$ in polynomial time, improving upon the previous deterministic approximations. We show this by proving that the Bethe approximation of the permanent, a quantity computable in polynomial time, is at least as large as the permanent divided by $\sqrt{2}^{n}$. This resolves a conjec… ▽ More

    Submitted 9 December, 2019; v1 submitted 7 November, 2018; originally announced November 2018.

  41. arXiv:1811.02728  [pdf, other

    stat.ML cs.AI cs.LG

    Distributionally Robust Graphical Models

    Authors: Rizal Fathony, Ashkan Rezaei, Mohammad Ali Bashiri, Xinhua Zhang, Brian D. Ziebart

    Abstract: In many structured prediction problems, complex relationships between variables are compactly defined using graphical structures. The most prevalent graphical prediction methods---probabilistic graphical models and large margin methods---have their own distinct strengths but also possess significant drawbacks. Conditional random fields (CRFs) are Fisher consistent, but they do not permit integrati… ▽ More

    Submitted 6 November, 2018; originally announced November 2018.

    Comments: Appears in Neural Information Processing Systems, 2018

  42. arXiv:1810.08867  [pdf, ps, other

    cs.LG cs.DS stat.ML

    A Polynomial Time MCMC Method for Sampling from Continuous DPPs

    Authors: Shayan Oveis Gharan, Alireza Rezaei

    Abstract: We study the Gibbs sampling algorithm for continuous determinantal point processes. We show that, given a warm start, the Gibbs sampler generates a random sample from a continuous $k$-DPP defined on a $d$-dimensional domain by only taking $\text{poly}(k)$ number of steps. As an application, we design an algorithm to generate random samples from $k$-DPPs defined by a spherical Gaussian kernel on a… ▽ More

    Submitted 20 October, 2018; originally announced October 2018.

  43. Improved Bounds on Information Dissemination by Manhattan Random Waypoint Model

    Authors: Aria Rezaei, Jie Gao, Jeff M. Phillips, Csaba D. Tóth

    Abstract: With the popularity of portable wireless devices it is important to model and predict how information or contagions spread by natural human mobility -- for understanding the spreading of deadly infectious diseases and for improving delay tolerant communication schemes. Formally, we model this problem by considering $M$ moving agents, where each agent initially carries a \emph{distinct} bit of info… ▽ More

    Submitted 19 September, 2018; originally announced September 2018.

    Comments: 10 pages, ACM SIGSPATIAL 2018, Seattle, US

    Journal ref: 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (SIGSPATIAL 18), 2018, Seattle, WA, USA

  44. arXiv:1807.11648  [pdf, ps, other

    cs.DS cs.LG stat.ML

    Composable Core-sets for Determinant Maximization Problems via Spectral Spanners

    Authors: Piotr Indyk, Sepideh Mahabadi, Shayan Oveis Gharan, Alireza Rezaei

    Abstract: We study a spectral generalization of classical combinatorial graph spanners to the spectral setting. Given a set of vectors $V\subseteq \Re^d$, we say a set $U\subseteq V$ is an $α$-spectral spanner if for all $v\in V$ there is a probability distribution $μ_v$ supported on $U$ such that $$vv^\intercal \preceq α\cdot\mathbb{E}_{u\simμ_v} uu^\intercal.$$ We show that any set $V$ has an… ▽ More

    Submitted 16 November, 2019; v1 submitted 30 July, 2018; originally announced July 2018.

    Comments: To appear in SODA 2020

  45. arXiv:1712.07374  [pdf, other

    stat.ML cs.LG

    Adversarial Structured Prediction for Multivariate Measures

    Authors: Hong Wang, Ashkan Rezaei, Brian D. Ziebart

    Abstract: Many predicted structured objects (e.g., sequences, matchings, trees) are evaluated using the F-score, alignment error rate (AER), or other multivariate performance measures. Since inductively optimizing these measures using training data is typically computationally difficult, empirical risk minimization of surrogate losses is employed, using, e.g., the hinge loss for (structured) support vector… ▽ More

    Submitted 20 December, 2017; v1 submitted 20 December, 2017; originally announced December 2017.

  46. arXiv:1701.09039  [pdf, other

    cs.SI cs.IR physics.soc-ph

    Ties That Bind - Characterizing Classes by Attributes and Social Ties

    Authors: Aria Rezaei, Bryan Perozzi, Leman Akoglu

    Abstract: Given a set of attributed subgraphs known to be from different classes, how can we discover their differences? There are many cases where collections of subgraphs may be contrasted against each other. For example, they may be assigned ground truth labels (spam/not-spam), or it may be desired to directly compare the biological networks of different species or compound networks of different chemical… ▽ More

    Submitted 31 January, 2017; originally announced January 2017.

    Comments: WWW'17 Web Science, 9 pages

  47. arXiv:1609.07192  [pdf, other

    cs.NI cs.DC

    Hydra: Leveraging Functional Slicing for Efficient Distributed SDN Controllers

    Authors: Yiyang Chang, Ashkan Rezaei, Balajee Vamanan, Jahangir Hasan, Sanjay Rao, T. N. Vijaykumar

    Abstract: The conventional approach to scaling Software Defined Networking (SDN) controllers today is to partition switches based on network topology, with each partition being controlled by a single physical controller, running all SDN applications. However, topological partitioning is limited by the fact that (i) performance of latency-sensitive (e.g., monitoring) SDN applications associated with a given… ▽ More

    Submitted 22 September, 2016; originally announced September 2016.

    Comments: 8 pages

  48. arXiv:1607.02974  [pdf

    cs.DL cs.CY

    BioInfoBase : A Bioinformatics Resourceome

    Authors: Saeid Kadkhodaei, Fatemeh Barantalab, Sima Taheri, Majid Foroughi, Farahnaz Golestan Hashemi, Mahmood Reza Shabanimofrad, Hossein Hosseinimonfared, Morvarid Akhavan Rezaei, Ali Ranjbarfard, Mahbod Sahebi, Parisa Azizi, Maryam Dadar, Rambod Abiri, Mohammad Fazel Harighi, Nahid Kalhori, Mohammad Reza Etemadi, Ali Baradaran, Mahmoud Danaee, Iman Zare, Ahmad Ghafarpour, Zahra Azhdari, Hamid Rajabi Memari, Vajiheh Safavi, Naser Tajabadi, Faruku Bande

    Abstract: Over the past decade there has been a significant growth in bioinformatics databases, tools and resources. Although, bioinformatics is becoming more specific, increasing the number of bioinformatics-wares has made it difficult for researchers to find the most appropriate databases, tools or methods which match their needs. Our coordinated effort has been planned to establish a reference website in… ▽ More

    Submitted 20 November, 2016; v1 submitted 11 July, 2016; originally announced July 2016.

    Comments: 16 pages, 5 figures, International Association for Plant Biotechnology, IAPB Congress, Melbourne, Australia

    ACM Class: H.2.8

  49. arXiv:1602.05242  [pdf, ps, other

    cs.LG cs.DS math.PR

    Monte Carlo Markov Chain Algorithms for Sampling Strongly Rayleigh Distributions and Determinantal Point Processes

    Authors: Nima Anari, Shayan Oveis Gharan, Alireza Rezaei

    Abstract: Strongly Rayleigh distributions are natural generalizations of product and determinantal probability distributions and satisfy strongest form of negative dependence properties. We show that the "natural" Monte Carlo Markov Chain (MCMC) is rapidly mixing in the support of a {\em homogeneous} strongly Rayleigh distribution. As a byproduct, our proof implies Markov chains can be used to efficiently g… ▽ More

    Submitted 24 March, 2016; v1 submitted 16 February, 2016; originally announced February 2016.

  50. arXiv:1511.02786  [pdf, ps, other

    cs.DS

    Approximation Algorithms for Finding Maximum Induced Expanders

    Authors: Shayan Oveis Gharan, Alireza Rezaei

    Abstract: We initiate the study of approximating the largest induced expander in a given graph $G$. Given a $Δ$-regular graph $G$ with $n$ vertices, the goal is to find the set with the largest induced expansion of size at least $δ\cdot n$. We design a bi-criteria approximation algorithm for this problem; if the optimum has induced spectral expansion $λ$ our algorithm returns a $\fracλ{\log^2δ\exp(Δ/λ)}$-(s… ▽ More

    Submitted 9 November, 2015; originally announced November 2015.

    Comments: 20 pages