Loading...
Search for: false-positives
0.01 seconds

    Summarizing and Searching Data in Computer Networks

    , M.Sc. Thesis Sharif University of Technology Tavakoli, Mehdi (Author) ; Jafari, Amir (Supervisor) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Network forensic analysts employ Payload Attribution Systems (PAS) as an investigative tool. With such tool large amount of network traffic, including full packet payload, is summarized and stored. Hence an investigator could query the system for a specific string and see whether any packets transmitted previously in the network contained that specific string. Wildcards are an important type of query that allows the investigator to locate strings in the payload when only part of the string is known. In this thesis we present a new payload attribution technique, named character based bloom filter, which in addition to improving on previously proposed techniques is able to support wildcard... 

    A contourlet-based face detection method in color images

    , Article 3rd IEEE International Conference on Signal Image Technologies and Internet Based Systems, SITIS'07, Jiangong Jinjiang, Shanghai, 16 December 2007 through 18 December 2007 ; 2007 , Pages 727-732 ; 9780769531229 (ISBN) Sajedi, H ; Jamzad, M ; Sharif University of Technology
    2007
    Abstract
    The first step of any face processing system is detecting the location in images where faces are present. In this paper we present an upright frontal face detection system based on the multi-resolution analysis of the face. In this method firstly, skin-color information is used to detect skin pixels in color images; then, the skin-region blocks are decomposed into frequency sub-bands using contourlet transform. Features extracted from sub-bands are used to detect face in each block. A multi-layer perceptrone (MLP) neural network was trained to do this classification. To decrease false positive detection we use eyes and lips template matching. These templates achieved by averaging... 

    An optimized probabilistic edge based level set method for left ventricle segmentation in echocardiography images

    , Article Biomedical Research (India) ; Volume 28, Issue 8 , 2017 , Pages 3788-3793 ; 0970938X (ISSN) Sahba, N ; Fatemizadeh, E ; Behnam, H ; Sharif University of Technology
    Scientific Publishers of India  2017
    Abstract
    In this paper, an efficient approach for ultrasonic object segmentation with special application for left ventricle segmentation in echocardiography images is proposed. At first, an efficient hybrid trend for ultrasonic image edge detection is suggested. Then, a modified level set approach is introduced based on the extracted edges and the computed probabilistic map as the stopping criteria for the contour evolution. Both synthetic and clinical images are utilized as validation measures with respect to the prior techniques which indicate outperform results quantitatively and qualitatively. Left ventricle segmentation using proposed method illustrates expert-approved performance, providing a... 

    Proposing a new feature for structure-aware analysis of android malwares

    , Article 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 111-118 ; 9781538665602 (ISBN) Pooryousef, S ; Fouladi, K ; Sharif University of Technology
    Abstract
    Android is a major target of attackers for malicious purposes due to its popularity. Despite obvious malicious functionality of Android malware, its analysis is a challenging task. Extracting and using features that discriminate malicious and benign behaviors in applications is essential for malware classification in using machine learning methods. In this paper, we propose a new feature in Android malware classification process which in combination with other proposed features, can discriminate malicious and benign behaviors with a good accuracy. Using components such as activities and services in Android applications' source code will lead to different flows on invoking between... 

    Detecting lung cancer lesions in CT images using 3D convolutional neural networks

    , Article 4th International Conference on Pattern Recognition and Image Analysis, IPRIA 2019, 6 March 2019 through 7 March 2019 ; 2019 , Pages 114-118 ; 9781728116211 (ISBN) Moradi, P ; Jamzad, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Early diagnosis of lung cancer is very important in improving patients life expectancies. Due to the high number of Computed Tomography (CT) images, fast and accurate diagnosis is difficult for radiologists. Therefore, there is an increasing demand for Computer-Aid Diagnosis (CAD) lung cancer. The core of all lung cancer detection systems is the distinction between cancer and non-cancerous tissues. This operation is performed in the false positive reduction phase, which is one of the most critical part of the lung cancer detection systems. The primary objective of this paper is to present a new method based on 3D Convolutional Neural Networks (CNN) that can reduce the false positives rate... 

    Digesting network traffic for forensic investigation using digital signal processing techniques

    , Article IEEE Transactions on Information Forensics and Security ; Volume 14, Issue 12 , 2019 , Pages 3312-3321 ; 15566013 (ISSN) Mohammad Hosseini, S ; Jahangir, A.H ; Kazemi, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    One of the most important practices of cybercrime investigations is to search a network traffic history for an excerpt of traffic, such as the disclosed information of an organization or a worm's signature. In post-mortem investigations, criminals and targets are detected by attributing the excerpt to payloads of traffic flows. Since it is impossible to store the high volume of data related to long-term traffic history, payload attribution systems (PASs) based on storing a compact digest of traffic using Bloom filters have been presented in the literature. In these systems, querying the stored digest for an excerpt results in a low number of suspects instead of certain criminals. In this... 

    An effective payload attribution scheme for cybercriminal detection using compressed bitmap index tables and traffic downsampling

    , Article IEEE Transactions on Information Forensics and Security ; Volume 13, Issue 4 , 2018 , Pages 850-860 ; 15566013 (ISSN) Hosseini, M ; Jahangir, A. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Payload attribution systems (PAS) are one of the most important tools of network forensics for detecting an offender after the occurrence of a cybercrime. A PAS stores the network traffic history in order to detect the source and destination pair of a certain data stream in case a malicious activity occurs on the network. The huge volume of information that is daily transferred in the network means that the data stored by a PAS must be as compact and concise as possible. Moreover, the investigation of this large volume of data for a malicious data stream must be handled within a reasonable time. For this purpose, several techniques based on storing a digest of traffic using Bloom filters... 

    RA-GCN: Graph convolutional network for disease prediction problems with imbalanced data

    , Article Medical Image Analysis ; Volume 75 , 2022 ; 13618415 (ISSN) Ghorbani, M ; Kazi, A ; Soleymani Baghshah, M ; Rabiee, H. R ; Navab, N ; Sharif University of Technology
    Elsevier B.V  2022
    Abstract
    Disease prediction is a well-known classification problem in medical applications. Graph Convolutional Networks (GCNs) provide a powerful tool for analyzing the patients’ features relative to each other. This can be achieved by modeling the problem as a graph node classification task, where each node is a patient. Due to the nature of such medical datasets, class imbalance is a prevalent issue in the field of disease prediction, where the distribution of classes is skewed. When the class imbalance is present in the data, the existing graph-based classifiers tend to be biased towards the major class(es) and neglect the samples in the minor class(es). On the other hand, the correct diagnosis... 

    Skin detection using contourlet texture analysis

    , Article 2009 14th International CSI Computer Conference, CSICC 2009, 20 October 2009 through 21 October 2009, Tehran ; 2009 , Pages 367-372 ; 9781424442621 (ISBN) Fotouhi, M ; Rohban, M. H ; Kasaei, S ; Sharif University of Technology
    Abstract
    A combined texture- and color-based skin detection is proposed in this paper. Nonsubsampled contourlet transform is used to represent texture of the whole image. Local neighbor contourlet coefficients of a pixel are used as feature vectors to classify each pixel. Dimensionality reduction is addressed through principal component analysis (PCA) to remedy the curse of dimensionality in the training phase. Before texture classification, the pixel is tested to determine whether it is skin-colored. Therefore, the classifier is learned to discriminate skin and non-skin texture for skin colored regions. A multi-layer perceptron is then trained using the feature vectors in the PCA reduced space. The... 

    Skin detection using contourlet-based texture analysis

    , Article 2009 4th International Conference on Digital Telecommunications, ICDT 2009, Colmar, 20 July 2009 through 25 July 2009 ; 2009 , Pages 59-64 ; 9780769536958 (ISBN) Fotouhi, M ; Rohban, M. H ; Kasaei, S ; IARIA ; Sharif University of Technology
    2009
    Abstract
    Detection of skin pixels in arbitrary images is addressed in this paper. We have combined texture and color information to segment skin regions. First, a pixel-based boosted skin detection method is used to locate skin pixels. To further improve the detect performance, skin region texture features are employed using the nonsubsampled contourlet coefficients. For the candidate skin pixels, the set of 8×8 patches around that pixel in all subimages are selected and the feature vector of each patch is extracted. Multilayer perceptron is then utilized to learn features and classify any given input sample. The proposed algorithm has achieved true positive rate of about 82.8% and false positive... 

    A simple and fast solution for fault simulation using approximate parallel critical path tracing

    , Article Canadian Journal of Electrical and Computer Engineering ; Volume 43, Issue 2 , 2020 , Pages 100-110 Ehteram, A ; Sabaghian Bidgoli, H ; Ghasvari, H ; Hessabi, S ; Sharif University of Technology
    IEEE Canada  2020
    Abstract
    Due to the growing complexity of today's digital circuits, the speed of fault simulation has become increasingly important. Although critical path tracing (CPT) is faster than conventional methods, it is not fast enough for fault simulation of complex circuits with a large number of faults and tests. Exact stem analysis is the most important obstacle in accelerating the CPT method. The simplification of stem analysis eliminates time-consuming computations and makes the CPT method more parallelizable. An approximate and bit-parallel CPT algorithm is proposed for ultrafast fault simulation for both stuck-at-fault (SAF) and transition delay fault (TDF) models. Time linearity, speedup, and... 

    Stacked hourglass network with a multi-level attention mechanism: where to Look for intervertebral disc labeling

    , Article 12th International Workshop on Machine Learning in Medical Imaging, MLMI 2021, held in conjunction with 24th International Conference on Medical Image Computing and Computer Assisted Intervention, MICCAI 2021, 27 September 2021 through 27 September 2021 ; Volume 12966 LNCS , 2021 , Pages 406-415 ; 03029743 (ISSN); 9783030875886 (ISBN) Azad, R ; Rouhier, L ; Cohen Adad, J ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2021
    Abstract
    Labeling vertebral discs from MRI scans is important for the proper diagnosis of spinal related diseases, including multiple sclerosis, amyotrophic lateral sclerosis, degenerative cervical myelopathy and cancer. Automatic labeling of the vertebral discs in MRI data is a difficult task because of the similarity between discs and bone area, the variability in the geometry of the spine and surrounding tissues across individuals, and the variability across scans (manufacturers, pulse sequence, image contrast, resolution and artefacts). In previous studies, vertebral disc labeling is often done after a disc detection step and mostly fails when the localization algorithm misses discs or has false... 

    An anomaly-based botnet detection approach for identifying stealthy botnets

    , Article ICCAIE 2011 - 2011 IEEE Conference on Computer Applications and Industrial Electronics ; 2011 , Pages 564-569 ; 9781457720581 (ISBN) Arshad, S ; Abbaspour, M ; Kharrazi, M ; Sanatkar, H ; IEEE Malaysia; IEEE Malaysia Power Electron. (PEL)/; Ind. Electron. (IE)/Ind. Appl. (IA) Jt. Chapter; IEEE Engineering in Medicine and; Biology Malaysia Chapter ; Sharif University of Technology
    Abstract
    Botnets (networks of compromised computers) are often used for malicious activities such as spam, click fraud, identity theft, phishing, and distributed denial of service (DDoS) attacks. Most of previous researches have introduced fully or partially signature-based botnet detection approaches. In this paper, we propose a fully anomaly-based approach that requires no a priori knowledge of bot signatures, botnet C&C protocols, and C&C server addresses. We start from inherent characteristics of botnets. Bots connect to the C&C channel and execute the received commands. Bots belonging to the same botnet receive the same commands that causes them having similar netflows characteristics and... 

    Skin segmentation based on cellular learning automata

    , Article 6th International Conference on Advances in Mobile Computing and Multimedia, MoMM2008, Linz, 24 November 2008 through 26 November 2008 ; November , 2008 , Pages 254-259 ; 9781605582696 (ISBN) Abin, Ahmad Ali ; Fotouhi, M ; Kasaei, S ; Sharif University of Technology
    2008
    Abstract
    In this paper, we propose a novel algorithm that combines color and texture information of skin with cellular learning automata to segment skin-like regions in color images. First, the presence of skin colors in an image is detected, using a committee structure, to make decision from several explicit boundary skin models. Detected skin-color regions are then fed to a color texture extractor that extracts the texture features of skin regions via their color statistical properties and maps them to a skin probability map. Cellular learning automatons use this map to make decision on skin-like regions. The proposed algorithm has demonstrated true positive rate of about 83.4% and false positive... 

    A new dynamic cellular learning automata-based skin detector

    , Article Multimedia Systems ; Volume 15, Issue 5 , 2009 , Pages 309-323 ; 09424962 (ISSN) Abin, A. A ; Fotouhi, M ; Kasaei, S ; Sharif University of Technology
    2009
    Abstract
    Skin detection is a difficult and primary task in many image processing applications. Because of the diversity of various image processing tasks, there exists no optimum method that can perform properly for all applications. In this paper, we have proposed a novel skin detection algorithm that combines color and texture information of skin with cellular learning automata to detect skin-like regions in color images. Skin color regions are first detected, by using a committee structure, from among several explicit boundary skin models. Detected skin-color regions are then fed to a texture analyzer which extracts texture features via their color statistical properties and maps them to a skin...