Loading...
Search for:
jafari-siavoshani--mahdi
0.144 seconds
Total 865 records
Improvement in Distributed Storage by Using Network Coding
, M.Sc. Thesis Sharif University of Technology ; Jafari Siavoshani, Mahdi (Supervisor)
Abstract
Cloud and distributed storage systems can provide large-scale data storage and high data reliability by adding redundancy to data. Redundant data may get lost due to the instability of distributed systems such as hardware failures. In order to maintain data availability, it is necessary to regenerate new redundant data in another node, referred to as a newcomer and this process reffered to repair process. Repair process is expected to be finished as soon as possible, because the regeneration time can influence the data reliability and availability of distributed storage systems. In this context, the general objective is to minimize the volume of actual network traffic caused by such...
Improving Distributed Matrix-Factorization-Based Recommender Systems in MapReduce Framework Using Network Coding
, M.Sc. Thesis Sharif University of Technology ; Jafari Siavoshani, Mahdi (Supervisor)
Abstract
In recent years, highly recommended systems have been used in various areas. One of the approaches of these systems is a collaborative refinement that consists of three user-based, item-based, and matrix-based parsing. Matrix degradation methods are more effective because they allow us to discover the hidden features that exist between user and item interactions and help us better predict recommendations. The low-level mapping method is designed to store and process very high volume of data. In this method, after completing computations in the author’s nodes, the data is sent to the downsizing nodes, which is referred to as ”data spoofing”. It has been observed that in many applications, the...
A Deep Learning-Based Network Traffic Classifier with the Ability to Detect Novelty
, M.Sc. Thesis Sharif University of Technology ; Jafari Siavoshani, Mahdi (Supervisor)
Abstract
Network traffic classification has been an essential element for security monitoring in the network security scope and also for quality of service purposes. Every now and then, new traffic classes are added to the available groups which are unknown to the system. In an security scope, the novelties are actually the zero-day attacks which can have huge effects on the system environment. There have been many methods developed for traffic classification which are able to distinguish known traffic using signatures or learning-based methods. In a real world scenario, The primary challenge that new traffic classifiers face, is to detect novelty and separate them from the previously known labels....
Traffic Embedding via Deep Learning
, M.Sc. Thesis Sharif University of Technology ; Jafari Siavoshani, Mahdi (Supervisor)
Abstract
One of the most widely used protocols used on the Internet is the SSL protocol, which is also used in many applications to exchange information between the server and the user. Therefore, the analysis of this traffic can help decision makers in many analyses. In this thesis, we are going to present a mapping for feature vectors extracted from SSL traffic that will lead to improving the performance of machine learning algorithms.In this treatise, three methods for learning mapping are proposed, all of which are based on deep learning. The first method is to use a simple self-encoder for map learning that tries to learn a compact map from the input feature vector.The second method is the...
Proposal of a Numerical Metric for Comparing and Evaluating Interpreting Methods for Machine Learning Models
, M.Sc. Thesis Sharif University of Technology ; Jafari Siavoshani, Mahdi (Supervisor)
Abstract
The complexity and non-linearity of today’s machine learning-based systems make it difficult for both end users and experts in the field to understand the logic and reasoning behind their decisions and outputs. Explainable AI (XAI) methods have gained significant attention in real-world problems as they enhance our understanding of these models, increasing trust and improving their efficiency. By applying different explanation methods on a machine learning model, the same output is not necessarily observed, hence evaluation metrics are needed to assess and compare the quality of explanation methods based on one or more definitions of the goodness of the explanation produced by them. Several...
Effect of Generated Data on the Robustness of Adversarial Distillation Methods
, M.Sc. Thesis Sharif University of Technology ; Jafari Siavoshani, Mahdi (Supervisor)
Abstract
Nowadays, neural networks are used as the main method in most machine learning applications. But research has shown that these models are vulnerable to adversarial attacks imperceptible changes to the input of neural networks that cause the net- work to be deceived and predict incorrectly. The importance of this issue in sensitive and security applications of neural networks, such as self-driving cars and medical diagnosis systems, becomes much higher. In recent years, many researches have been done in the field of making neural net- works robust against this threat, but in most of them, higher robustness has been provided on the basis of larger and more complex models. Few researches have...
The Application of Deep Learning on Network Traffic Classification
, M.Sc. Thesis Sharif University of Technology ; Jafari Siavoshani, Mahdi (Supervisor)
Abstract
Almost all of the network traffic classification systems use pre-defined extracted features by the experts in computer network. These features include regular expressions, port number, information in the header of different layers and statistical feature of the flow. The main problem of the traffic analysis and anomaly detection system lies in finding appropriate features. The feature extraction is a time consuming process which needs an expert to be done. It is notable that the classification of special kinds of traffic like encrypted traffic is impossible using some subset of mentioned features.The lack of integration in feature detection and classification is also another important issue...
Domain Dependent Regularization in Online Optimization
, M.Sc. Thesis Sharif University of Technology ; Jafari Siavoshani, Mahdi (Supervisor)
Abstract
As application demands for online convex optimization accelerate, the need for design-ing new methods that simultaneously cover a large class of convex functions and im-pose the lowest possible regret is highly rising. Known online optimization methods usually perform well only in specific settings, e.g., specific parameters such as the diam-eter of decision space, Lipschitz constant, and strong convexity coefficient, where their performance depends highly on the geometry of the decision space and cost functions. However, in practice, the lack of such geometric information leads to confusion in using the appropriate algorithm. To address these issues, some adaptive methods have been proposed...
Improvement of Communication Cost and Waiting Time Trade off in Content Delivery Networks
, M.Sc. Thesis Sharif University of Technology ; Jafari Siavoshani, Mahdi (Supervisor)
Abstract
By increasing the use of Internet and sharing information in this platform, servers are equipped with more robust hardware and a wider bandwidth network. But the growth of data and services is such that a server, no matter how powerful, does not have the ability to respond all users! Several servers are used to solve this problem. Data centers, content delivery networks, and so on are emerged depending on types of service. One of the important issues in these systems is how to distribute loads between servers in a proportional manner. In this thesis, we first examine the relationship between cost and response time on user requests. Cost can be considered as a communication cost or financial...
Link Prediction using Dynamic Graph Neural Network with Application to Call Data
, M.Sc. Thesis Sharif University of Technology ; Jafari Siavoshani, Mahdi (Supervisor)
Abstract
In network science, link prediction is one of the essential tasks that has been neglected. One important application of link prediction in telecommunication networks is analyzing the user's consumption pattern to provide better service. This project aims to predict future links with applications to call data using the users' call history. In previous research, there are two main approaches: 1) heuristic-based approach, and 2) deep-learning-based approach, such as graph neural networks. These methods are mainly used for processing static graphs, and therefore, we cannot generalize them to dynamic graphs. But there are many graphs which are dynamic in nature. For instance, call data records...
Analyzing TOR Network Data Through Deep Learning
, M.Sc. Thesis Sharif University of Technology ; Jafari Siavoshani, Mahdi (Supervisor)
Abstract
Today, we live in an information age where all people can access the vast amount of data in the world by connecting to the Internet.Since the Internet has expanded significantly to share information, some individuals and organizations seek to be able to prevent the possible sabotage of some people by monitoring network users. Analysis of computer network traffic is one of the importance issues that many activities have been done in this area. One of the most important questions in traffic analysis is to identify the main content of traffic on the encrypted network. Numerous studies have shown that the traffic of websites visited through the Tor network, including Specific information that...
Performance Improvement of Machine Learning based Intrusion Detection Systems
, M.Sc. Thesis Sharif University of Technology ; Jafari Siavoshani, Mahdi (Supervisor)
Abstract
The rapid growth of computer networks has increased the importance of analytics and traffic analysis tools for these networks, and the increasing importance of these networks has increased the importance of security of these networks and the intrusion detection in these networks. Many studies aimed at providing a powerful way to quickly and accurately detect computer network intrusions, each of which has addressed this issue.The common point of all these methods is their reliance on the features extracted from network traffic by an expert. This strong dependence has prevented these methods from being flexible against new attacks and methods of intrusion or changes in the current normal...
Image Categorization Using Deep Learning
, M.Sc. Thesis Sharif University of Technology ; Jafari Siavoshani, Mahdi (Supervisor) ; Rabiee, Hamid Reza (Co-Advisor)
Abstract
The representation of data influences the explanation factors of data variations. Thus,the success of learner algorithms depends on the data representation. Our main contribution in this thesis is learning of high level and abstract representation using deep structure. One of the fundamental examples of representation learning is the AutoEncoders. The auto-encoder is a rigid framework that doesn’t consider explanation factors in terms of statistical concepts. So, the auto-encoders can be re-interpreted by seeing the decoder as the statistical model of interest. The role of encoder is a mechanism for inference in the model described by the decoder. Our purpose is to design such model with...
Deep Learning Based Enhancement of Intrusion Detection Methods
, Ph.D. Dissertation Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor) ; Jafari Siavoshani, Mahdi (Supervisor)
Abstract
We live in the cyber era in which network-based technologies have become omnipresent. Meanwhile, threats and attacks are rapidly growing in cyberspace. Nowadays, some signature-based intrusion detection systems try to detect these malicious traffics. However, as new vulnerabilities and new zero-day attacks appear, there is a growing risk of bypassing the current intrusion detection systems. Many research studies have worked on machine learning algorithms for intrusion detection applications. Their major weakness is to consider the different aspects of network security concurrently. For example, continuous concept drift in normal and abnormal traffic, the permanent appearance of zero-day...
Probing the Relation Between Cell Function and Chromatin Interactions Using Community Detection Approaches
, M.Sc. Thesis Sharif University of Technology ; Rabiee, Hamid Reza (Supervisor) ; Jafari Siavoshani, Mahdi (Supervisor)
Abstract
Hi-C is a new technology invented to record the amount of interaction between all chromatin fragments. Chromatin interactions are manifestations of chromatin's 3D structure. It has been proved that different 3D structures of different cell types, despite having the same DNA, causes in different functionalities of cells. Therefore knowing chromatin structure, the factors affecting it and the way it affects cells' behaviors such as gene co-expression, sheds more light on the knowledge about cells and the methods that can change their fates. Finding the causes of diseases, designing more efficient drugs and progressing the conversion of different cell types into each other used for amending...
A Systematic Approach for Biomarker Identification in Autism Spectrum Disorder based on Machine learning
, M.Sc. Thesis Sharif University of Technology ; Jafari Siavoshani, Mahdi (Supervisor) ; Kavousi, Kaveh (Co-Supervisor) ; Ohadi, Mina (Co-Supervisor)
Abstract
Autism spectrum disorder (ASD) is a strong genetic perturbation that encompasses a wide range of clinical symptoms, including functional at different regions of the brain, repetitive behaviors, and interests, weaknesses in social relationships, some sensitivities to environmental factors and etc. Genetic complexity and the impact of environmental factors put the disease in the category of Level 1 complex developmental disorders.We proposed a pilot, combined, and highly effective structure to identify biomarkers in the autism spectrum disorder that could be extended to other diseases that have a similar genetic architecture with autism. We also develop a Gene-tissue interaction network to...
Storage, communication, and load balancing trade-off in distributed cache networks
, Article IEEE Transactions on Parallel and Distributed Systems ; 2017 ; 10459219 (ISSN) ; Pourmiri, A ; Shariatpanahi, S. P ; Sharif University of Technology
2017
Abstract
We consider load balancing in a network of caching servers delivering contents to end users. Randomized load balancing via the so-called power of two choices is a well-known approach in parallel and distributed systems. In this framework, we investigate the tension between storage resources, communication cost, and load balancing performance. To this end, we propose a randomized load balancing scheme which simultaneously considers cache size limitation and proximity in the server redirection process. IEEE
Storage, communication, and load balancing trade-off in distributed cache networks
, Article IEEE Transactions on Parallel and Distributed Systems ; Volume 29, Issue 4 , April , 2018 , Pages 943-957 ; 10459219 (ISSN) ; Pourmiri, A ; Shariatpanahi, S. P ; Sharif University of Technology
IEEE Computer Society
2018
Abstract
We consider load balancing in a network of caching servers delivering contents to end users. Randomized load balancing via the so-called power of two choices is a well-known approach in parallel and distributed systems. In this framework, we investigate the tension between storage resources, communication cost, and load balancing performance. To this end, we propose a randomized load balancing scheme which simultaneously considers cache size limitation and proximity in the server redirection process. In contrast to the classical power of two choices setup, since the memory limitation and the proximity constraint cause correlation in the server selection process, we may not benefit from the...
Improving Distributed SVM Learning Algorithm in MapReduce Framework Using Coding
, M.Sc. Thesis Sharif University of Technology ; Jafari, Mahdi (Supervisor)
Abstract
With the rise of the concept of “Big Data”, both data volumes and data processing time increased, imposing the need for new methods of processing and computation of said data.Analytical and computational methods in Machine Learning are some of the most important applications of Big Data processing. There exist many methods of data analysis in the Machine Learning field, each requiring extensive processing on Big Data. One of the methods for working with Big Data is Distributed Systems. MapReduce is one of the most popular methods distributed computation by increasing the ease and speed of distributed processing of big data. But a number of bottlenecks have been discovered in MapReduce which...
Multi-party secret key agreement over state-dependent wireless broadcast channels
, Article IEEE Transactions on Information Forensics and Security ; Volume PP, Issue 99 , 2016 ; 15566013 (ISSN) ; Mishra, S ; Fragouli, C ; Diggavi, S. N ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
We consider a group of m trusted and authenticated nodes that aim to create a shared secret key K over a wireless channel in the presence of an eavesdropper Eve. We assume that there exists a state dependent wireless broadcast channel from one of the honest nodes to the rest of them including Eve. All of the trusted nodes can also discuss over a cost-free, noiseless and unlimited rate public channel which is also overheard by Eve. For this setup, we develop an information-theoretically secure secret key agreement protocol. We show the optimality of this protocol for "linear deterministic" wireless broadcast channels. This model generalizes the packet erasure model studied in literature for...