Loading...
Search for: siavoshani--m--j
0.156 seconds

    On linear index coding from graph homomorphism perspective

    , Article 2015 Information Theory and Applications Workshop, ITA 2015 - Conference Proceedings, 1 February 2015 through 6 February 2015 ; 2015 , Pages 220-229 ; 9781479971954 (ISBN) Ebrahimi, J. B ; Jafari Siavoshani, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this work, we study the problem of linear index coding from graph homomorphism point of view. We show that the decision version of linear (scalar or vector) index coding problem is equivalent to certain graph homomorphism problem. Using this equivalence expression, we conclude the following results. First we introduce new lower bounds on linear index of graphs. Next, we show that if the linear index of a graph over a finite filed is bounded by a constant, then by changing the ground field, the linear index of the graph may change by at most a constant factor that is independent from the size of the graph. Finally, we show that the decision version of linear index coding problem is... 

    Low-complexity stochastic Generalized Belief Propagation

    , Article 2016 IEEE International Symposium on Information Theory, ISIT 2016, 10 July 2016 through 15 July 2016 ; Volume 2016-August , 2016 , Pages 785-789 ; 21578095 (ISSN) ; 9781509018062 (ISBN) Haddadpour, F ; Jafari Siavoshani, M ; Noshad, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    The generalized belief propagation (GBP), introduced by Yedidia et al., is an extension of the belief propagation (BP) algorithm, which is widely used in different problems involved in calculating exact or approximate marginals of probability distributions. In many problems, it has been observed that the accuracy of GBP outperforms that of BP considerably. However, due to its generally higher complexity compared to BP, its application is limited in practice. In this paper, we introduce a stochastic version of GBP called stochastic generalized belief propagation (SGBP) that can be considered as an extension to the stochastic BP (SBP) algorithm introduced by Noorshams et al. They have shown... 

    Multi-message private information retrieval with private side information

    , Article 2018 IEEE Information Theory Workshop, ITW 2018, 25 November 2018 through 29 November 2018 ; 2019 ; 9781538635995 (ISBN) Shariatpanahi, S. P ; Jafari Siavoshani, M ; Maddah Ali, M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    We consider the problem of private information retrieval (PIR) where a single user with private side information aims to retrieve multiple files from a library stored (uncoded) at a number of servers. We assume the side information at the user includes a subset of files stored privately (i.e., the server does not know the indices of these files). In addition, we require that the identity of requests and side information at the user are not revealed to any of the servers. The problem involves finding the minimum load to be transmitted from the servers to the user such that the requested files can be decoded with the help of received and side information. By providing matching lower and upper... 

    Private Information Retrieval for a Multi-Message Scenario with Private Side Information

    , Article IEEE Transactions on Communications ; Volume 69, Issue 5 , 2021 , Pages 3235-3244 ; 00906778 (ISSN) Siavoshani, M. J ; Shariatpanahi, S. P ; Maddah Ali, M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    We consider the problem of private information retrieval (PIR), where a single user with private side information (PSI) aims to retrieve multiple files from a library stored at some servers. We assume that the side information (SI) at the user includes a subset of files stored privately. Moreover, the identity of requests and side information at the user are not revealed to any of the servers. The problem involves finding the minimum load transmitted from the servers to the user such that the requested files can be decoded with the help of received data and side information. By providing matching lower and upper bounds for certain regimes, we characterize the minimum load imposed on all the... 

    Intelligent reflecting surfaces for compute-and-forward

    , Article 9th Iran Workshop on Communication and Information Theory, IWCIT 2021, 19 May 2021 through 20 May 2021 ; 2021 ; 9781665400565 (ISBN) Siavoshani, M. J ; Shariatpanahi, S. P ; Omidvar, N ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Compute-and-forward is a promising strategy to tackle interference and obtain high rates between the transmitting users in a wireless network. However, the quality of the wireless channels between the users substantially limits the achievable computation rate in such systems. In this paper, we introduce the idea of using intelligent reflecting surfaces (IRSs) to enhance the computing capability of the compute-and-forward systems. For this purpose, we consider a multiple access channel (MAC) where a number of users aim to send data to a base station (BS) in a wireless network, where the BS is interested in decoding a linear combination of the data from different users in the corresponding... 

    Deep packet: a novel approach for encrypted traffic classification using deep learning

    , Article Soft Computing ; Volume 24, Issue 3 , May , 2020 , Pages 1999-2012 Lotfollahi, M ; Jafari Siavoshani, M ; Shirali Hossein Zade, R ; Saberian, M ; Sharif University of Technology
    Springer  2020
    Abstract
    Network traffic classification has become more important with the rapid growth of Internet and online applications. Numerous studies have been done on this topic which have led to many different approaches. Most of these approaches use predefined features extracted by an expert in order to classify network traffic. In contrast, in this study, we propose a deep learning-based approach which integrates both feature extraction and classification phases into one system. Our proposed scheme, called “Deep Packet,” can handle both traffic characterization in which the network traffic is categorized into major classes (e.g., FTP and P2P) and application identification in which identifying end-user... 

    Performance analysis of network coding-based content delivery in dual interface cellular networks

    , Article 2018 Iran Workshop on Communication and Information Theory, IWCIT 2018, 25 April 2018 through 26 April 2018 ; 2018 , Pages 1-6 ; 9781538641491 (ISBN) Amerimehr, M. H ; Shariatpanahi, S. P ; Jafari Siavoshani, M ; Ashtiani, F ; Mazoochi, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    We consider a group of mobile users, in closed proximity, who are interested in downloading a common content (e.g., a video file). We address a cooperative solution where each mobile device is equipped with both cellular and Wi-Fi interfaces. The users exploit the cellular link to download different shares of the content from the based-station and leverage on Wi-Fi link to exchange the received data. In order to expedite content delivery, the base-station transmits random linear network-coded data to users. This paper presents an analytical study of the average completion time, i.e., the time necessary for all devices to successfully retrieve the data. We propose an analytical model to... 

    Multi-Sender index coding over linear networks

    , Article IEEE Communications Letters ; 2021 ; 10897798 (ISSN) Ghaffari, F ; Shariatpanahi, S. P ; Jafari Siavoshani, M ; Bahrak, B ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    We consider an index coding problem in which several transmitters deliver distinct files to a number of users with minimum delay. Each user has access to a subset of other files from the library, which can be used as side information. The information sent by the transmitters experience a linear transformation before being received at the users. By benefiting from the concept of Zero-Forcing in MIMO systems, we generalize the notion of MinRank characterization and the clique cover algorithm to accommodate this generalized setting. We show that increasing the number of transmitters can substantially reduce the delivery delay. IEEE  

    Multi-Sender index coding over linear networks

    , Article IEEE Communications Letters ; Volume 26, Issue 2 , 2022 , Pages 273-276 ; 10897798 (ISSN) Ghaffari, F ; Shariatpanahi, S. P ; Jafari Siavoshani, M ; Bahrak, B ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    We consider an index coding problem in which several transmitters deliver distinct files to a number of users with minimum delay. Each user has access to a subset of other files from the library, which can be used as side information. The information sent by the transmitters experience a linear transformation before being received at the users. By benefiting from the concept of Zero-Forcing in MIMO systems, we generalize the notion of MinRank characterization and the clique cover algorithm to accommodate this generalized setting. We show that increasing the number of transmitters can substantially reduce the delivery delay. © 1997-2012 IEEE  

    An adaptable deep learning-based intrusion detection system to zero-day attacks

    , Article Journal of Information Security and Applications ; Volume 76 , 2023 ; 22142134 (ISSN) Soltani, M ; Ousat, B ; Jafari Siavoshani, M ; Jahangir, A. H ; Sharif University of Technology
    Elsevier Ltd  2023
    Abstract
    The main challenge of an intrusion detection system (IDS) is detecting novelties (i.e., zero-day attacks) in addition to generating a report about the known attacks (i.e., classifying known attacks). Another challenge of an IDS is the adaptation to the detected novelties. For this purpose, it needs sufficient labeled samples of the new attacks. On the other hand, the labeling procedure is a time-consuming task for the security expert teams. This paper proposes a DL-based IDS framework adaptable to new attacks, consisting of different phases. The first phase uses deep learning-based open set recognition methods to identify unknown samples (i.e., new attacks), and make a report from different... 

    Dichlorosilane adsorption on the Al, Ga, and Zn-doped fullerenes

    , Article Monatshefte fur Chemie ; Volume 153, Issue 5-6 , 2022 , Pages 427-434 ; 00269247 (ISSN) Sadeghi, M ; Yousefi Siavoshani, A ; Bazargani, M ; Turki Jalil, A ; Ramezani, M ; Poor Heravi, M. R ; Sharif University of Technology
    Springer  2022
    Abstract
    Density functional theory calculations are utilized for probing the effect of doping Al, Ga, and Zn atoms on the sensing performance of a C60 fullerene in detecting the dichlorosilane (DS) gas. We predicted that the interaction of pure C60 with DS is physisorption, and the sensing response (SR) of C60 is 8.6. The adsorption energy of DS changes from − 21.4 to − 84.4, − 86.7, and − 90.7 kJ/mol, by doping the Al, Ga, and Zn metals, respectively. Also, the corresponding SR meaningfully rises to 33.7, 52.3, and 92.9, indicating that the Zn transition metal much more increases the sensitivity of fullerene compared to the Al and Ga metals. Our theoretical results further support the fact that the... 

    Improvement in Distributed Storage by Using Network Coding

    , M.Sc. Thesis Sharif University of Technology Garshasbi, Javad (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    Cloud and distributed storage systems can provide large-scale data storage and high data reliability by adding redundancy to data. Redundant data may get lost due to the instability of distributed systems such as hardware failures. In order to maintain data availability, it is necessary to regenerate new redundant data in another node, referred to as a newcomer and this process reffered to repair process. Repair process is expected to be finished as soon as possible, because the regeneration time can influence the data reliability and availability of distributed storage systems. In this context, the general objective is to minimize the volume of actual network traffic caused by such... 

    Traffic Embedding via Deep Learning

    , M.Sc. Thesis Sharif University of Technology Aqamiri, Saeed (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    One of the most widely used protocols used on the Internet is the SSL protocol, which is also used in many applications to exchange information between the server and the user. Therefore, the analysis of this traffic can help decision makers in many analyses. In this thesis, we are going to present a mapping for feature vectors extracted from SSL traffic that will lead to improving the performance of machine learning algorithms.In this treatise, three methods for learning mapping are proposed, all of which are based on deep learning. The first method is to use a simple self-encoder for map learning that tries to learn a compact map from the input feature vector.The second method is the... 

    A Deep Learning-Based Network Traffic Classifier with the Ability to Detect Novelty

    , M.Sc. Thesis Sharif University of Technology Ousat, Behzad (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    Network traffic classification has been an essential element for security monitoring in the network security scope and also for quality of service purposes. Every now and then, new traffic classes are added to the available groups which are unknown to the system. In an security scope, the novelties are actually the zero-day attacks which can have huge effects on the system environment. There have been many methods developed for traffic classification which are able to distinguish known traffic using signatures or learning-based methods. In a real world scenario, The primary challenge that new traffic classifiers face, is to detect novelty and separate them from the previously known labels.... 

    Improving Distributed Matrix-Factorization-Based Recommender Systems in MapReduce Framework Using Network Coding

    , M.Sc. Thesis Sharif University of Technology Saeidi, Mohsen (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    In recent years, highly recommended systems have been used in various areas. One of the approaches of these systems is a collaborative refinement that consists of three user-based, item-based, and matrix-based parsing. Matrix degradation methods are more effective because they allow us to discover the hidden features that exist between user and item interactions and help us better predict recommendations. The low-level mapping method is designed to store and process very high volume of data. In this method, after completing computations in the author’s nodes, the data is sent to the downsizing nodes, which is referred to as ”data spoofing”. It has been observed that in many applications, the... 

    Designing Machine-Learning based Efficient Combinatorial Auctions

    , M.Sc. Thesis Sharif University of Technology Jamshidi, Arash (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    The aim of this research is to use machine learning methods in the design of Combinatorial Auctions. In particular, in this study, we first examine the relationship between Differential Privacy and combinatorial auctions. We propose a method based on Differential Privacy that, under certain assumptions, can transform any combinatorial auction based on machine learning methods into a Truthful auction using the Exponential Mechanism, such that all participants in the auction have no reason to misreport their Valuation Function. We also prove that in this case, using this method when the number of items is much less than the number of participants does not significantly impact the social... 

    Investigating the Information Leakage of Transport Layer Security Protocol using Deep Learning and Machine Learning Interpretation Methods

    , M.Sc. Thesis Sharif University of Technology Sadeghian, Zeinab (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    Machine learning models and deep learning, in attempting to solve complex and nonlinear problems, are not easily understandable, even for experts in these fields, due to the complexity of functions and issues involved. This lack of interpretability includes how models make decisions and their logical reasoning. Therefore, interpretability methods have gained attention in recent years. On the other hand, machine learning has entered many domains and penetrated a wide range of problems in various fields, especially in computer networks. This is crucial for internet service providers and computer network managers. Solving these problems enables the analysis of data flow structures in the... 

    Proposing an Interpretation Method for Clustering Algorithms

    , M.Sc. Thesis Sharif University of Technology Khodaverdian, Masoud (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    The complexity of machine learning models has made it difficult for end-users and even experts in the field to understand the reasoning behind the decisions made by these models. As a result, the need for explanation and interpretation of machine learning models has been increasing. One subset of machine learning models is clustering models. Despite the extensive research conducted on interpreting supervised models, very few studies have been focused on interpreting clustering models. In this research, we aim to propose algorithms for interpreting a clustering model in a model-agnostic and post-hoc manner. In this study, various methods are presented for interpreting a clustering model. The... 

    Proposal of a Numerical Metric for Comparing and Evaluating Interpreting Methods for Machine Learning Models

    , M.Sc. Thesis Sharif University of Technology Khani, Pouya (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    The complexity and non-linearity of today’s machine learning-based systems make it difficult for both end users and experts in the field to understand the logic and reasoning behind their decisions and outputs. Explainable AI (XAI) methods have gained significant attention in real-world problems as they enhance our understanding of these models, increasing trust and improving their efficiency. By applying different explanation methods on a machine learning model, the same output is not necessarily observed, hence evaluation metrics are needed to assess and compare the quality of explanation methods based on one or more definitions of the goodness of the explanation produced by them. Several... 

    Effect of Generated Data on the Robustness of Adversarial Distillation Methods

    , M.Sc. Thesis Sharif University of Technology Kashani, Paria (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    Nowadays, neural networks are used as the main method in most machine learning applications. But research has shown that these models are vulnerable to adversarial attacks imperceptible changes to the input of neural networks that cause the net- work to be deceived and predict incorrectly. The importance of this issue in sensitive and security applications of neural networks, such as self-driving cars and medical diagnosis systems, becomes much higher. In recent years, many researches have been done in the field of making neural net- works robust against this threat, but in most of them, higher robustness has been provided on the basis of larger and more complex models. Few researches have...