Skip to main content

Showing 1–23 of 23 results for author: Eftekhari, M

.
  1. arXiv:2309.02471  [pdf, other

    physics.class-ph

    Investigating the classical problem of pursuit, in two modes

    Authors: Amir Hossein Arshadi Kalameh, Kourosh Bayati Komitaki, Reza Sharifian, Mohammad Mahdi Eftekhari

    Abstract: The pursuit problem is a historical issue of the application of mathematics in physics, which has been discussed for centuries since the time of Leonardo Da Vinci, and its applications are wide ranging from military and industrial to recreational, but its place of interest is nowhere but nature and inspiration from the way of migration of birds and hunting of archer fish. The pursuit problem invol… ▽ More

    Submitted 5 September, 2023; originally announced September 2023.

  2. Generating Modern Persian Carpet Map by Style-transfer

    Authors: Dorsa Rahmatian, Monireh Moshavash, Mahdi Eftekhari, Kamran Hoseinkhani

    Abstract: Today, the great performance of Deep Neural Networks(DNN) has been proven in various fields. One of its most attractive applications is to produce artistic designs. A carpet that is known as a piece of art is one of the most important items in a house, which has many enthusiasts all over the world. The first stage of producing a carpet is to prepare its map, which is a difficult, time-consuming, a… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

  3. arXiv:2308.00475  [pdf, other

    eess.IV cs.CV cs.LG

    DINO-CXR: A self supervised method based on vision transformer for chest X-ray classification

    Authors: Mohammadreza Shakouri, Fatemeh Iranmanesh, Mahdi Eftekhari

    Abstract: The limited availability of labeled chest X-ray datasets is a significant bottleneck in the development of medical imaging methods. Self-supervised learning (SSL) can mitigate this problem by training models on unlabeled data. Furthermore, self-supervised pretraining has yielded promising results in visual recognition of natural images but has not been given much consideration in medical image ana… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

  4. arXiv:2306.13055  [pdf, other

    cs.CV

    Deep Metric Learning with Soft Orthogonal Proxies

    Authors: Farshad Saberi-Movahed, Mohammad K. Ebrahimpour, Farid Saberi-Movahed, Monireh Moshavash, Dorsa Rahmatian, Mahvash Mohazzebi, Mahdi Shariatzadeh, Mahdi Eftekhari

    Abstract: Deep Metric Learning (DML) models rely on strong representations and similarity-based measures with specific loss functions. Proxy-based losses have shown great performance compared to pair-based losses in terms of convergence speed. However, proxies that are assigned to different classes may end up being closely located in the embedding space and hence having a hard time to distinguish between po… ▽ More

    Submitted 22 June, 2023; originally announced June 2023.

  5. arXiv:2303.15993  [pdf, other

    cs.CV

    SELF-VS: Self-supervised Encoding Learning For Video Summarization

    Authors: Hojjat Mokhtarabadi, Kave Bahraman, Mehrdad HosseinZadeh, Mahdi Eftekhari

    Abstract: Despite its wide range of applications, video summarization is still held back by the scarcity of extensive datasets, largely due to the labor-intensive and costly nature of frame-level annotations. As a result, existing video summarization methods are prone to overfitting. To mitigate this challenge, we propose a novel self-supervised video representation learning method using knowledge distillat… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: 9 pages, 5 figures

  6. An Adaptive Image Encryption Scheme Guided by Fuzzy Models

    Authors: Mahdi Shariatzadeh, Mohammad Javad Rostami, Mahdi Eftekhari

    Abstract: A new image encryption scheme using the advanced encryption standard (AES), a chaotic map, a genetic operator, and a fuzzy inference system is proposed in this paper. In this work, plain images were used as input, and the required security level was achieved. Security criteria were computed after running a proposed encryption process. Then an adaptive fuzzy system decided whether to repeat the enc… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

    Comments: Iranian Journal of Fuzzy Systems (2023)

  7. arXiv:2208.07635  [pdf

    cs.MM eess.IV

    A New Scheme for Image Compression and Encryption Using ECIES, Henon Map, and AEGAN

    Authors: Mahdi Shariatzadeh, Mahdi Eftekhari, Mohammad Javad Rostami

    Abstract: Providing security in the transmission of images and other multimedia data has become one of the most important scientific and practical issues. In this paper, a method for compressing and encryption images is proposed, which can safely transmit images in low-bandwidth data transmission channels. At first, using the autoencoding generative adversarial network (AEGAN) model, the images are mapped t… ▽ More

    Submitted 24 August, 2022; v1 submitted 16 August, 2022; originally announced August 2022.

  8. arXiv:2202.12864  [pdf, other

    cs.DC cs.DS

    Dynamic size counting in population protocols

    Authors: David Doty, Mahsa Eftekhari

    Abstract: The population protocol model describes a network of anonymous agents that interact asynchronously in pairs chosen at random. Each agent starts in the same initial state $s$. We introduce the *dynamic size counting* problem: approximately counting the number of agents in the presence of an adversary who at any time can remove any number of agents or add any number of new agents in state $s$. A val… ▽ More

    Submitted 25 February, 2022; originally announced February 2022.

    MSC Class: 68M18; 68W15 ACM Class: F.1; F.2.2

  9. arXiv:2106.10201  [pdf, other

    cs.DC cs.DS

    A time and space optimal stable population protocol solving exact majority

    Authors: David Doty, Mahsa Eftekhari, Leszek Gąsieniec, Eric Severson, Grzegorz Stachowiak, Przemysław Uznański

    Abstract: We study population protocols, a model of distributed computing appropriate for modeling well-mixed chemical reaction networks and other physical systems where agents exchange information in pairwise interactions, but have no control over their schedule of interaction partners. The well-studied *majority* problem is that of determining in an initial population of $n$ agents, each with one of two o… ▽ More

    Submitted 20 January, 2022; v1 submitted 4 June, 2021; originally announced June 2021.

    Comments: Applied FOCS reviewers' comments

    ACM Class: F.1; F.2.2

    Journal ref: FOCS 2021: Proceedings of the 62nd Annual IEEE Symposium on Foundations of Computer Science, Feb 2022

  10. A survey of size counting in population protocols

    Authors: David Doty, Mahsa Eftekhari

    Abstract: The population protocol model describes a network of $n$ anonymous agents who cannot control with whom they interact. The agents collectively solve some computational problem through random pairwise interactions, each agent updating its own state in response to seeing the state of the other agent. They are equivalent to the model of chemical reaction networks, describing abstract chemical reaction… ▽ More

    Submitted 22 October, 2021; v1 submitted 11 May, 2021; originally announced May 2021.

    MSC Class: 68M18; 68W15

  11. arXiv:2012.15800   

    cs.DC

    A stable majority population protocol using logarithmic time and states

    Authors: David Doty, Mahsa Eftekhari, Eric Severson

    Abstract: We study population protocols, a model of distributed computing appropriate for modeling well-mixed chemical reaction networks and other physical systems where agents exchange information in pairwise interactions, but have no control over their schedule of interaction partners. The well-studied *majority* problem is that of determining in an initial population of $n$ agents, each with one of two o… ▽ More

    Submitted 20 June, 2021; v1 submitted 31 December, 2020; originally announced December 2020.

    Comments: We combined this paper with arXiv:2011.07392 and have a new updated version at arXiv:2106.10201

  12. Message complexity of population protocols

    Authors: Talley Amir, James Aspnes, David Doty, Mahsa Eftekhari, Eric Severson

    Abstract: The standard population protocol model assumes that when two agents interact, each observes the entire state of the other agent. We initiate the study of $\textit{message complexity}$ for population protocols, where the state of an agent is divided into an externally-visible $\textit{message}$ and an internal component, where only the message can be observed by the other agent in an interaction.… ▽ More

    Submitted 23 September, 2020; v1 submitted 20 March, 2020; originally announced March 2020.

    ACM Class: F.1.1

  13. DISCERN: Diversity-based Selection of Centroids for k-Estimation and Rapid Non-stochastic Clustering

    Authors: Ali Hassani, Amir Iranmanesh, Mahdi Eftekhari, Abbas Salemi

    Abstract: One of the applications of center-based clustering algorithms such as K-Means is partitioning data points into K clusters. In some examples, the feature space relates to the underlying problem we are trying to solve, and sometimes we can obtain a suitable feature space. Nevertheless, while K-Means is one of the most efficient offline clustering algorithms, it is not equipped to estimate the number… ▽ More

    Submitted 22 September, 2020; v1 submitted 14 October, 2019; originally announced October 2019.

    Comments: Int. J. Mach. Learn. & Cyber. (2020)

  14. arXiv:1909.08245  [pdf, other

    cs.CV

    Towards Shape Biased Unsupervised Representation Learning for Domain Generalization

    Authors: Nader Asadi, Amir M. Sarfi, Mehrdad Hosseinzadeh, Zahra Karimpour, Mahdi Eftekhari

    Abstract: It is known that, without awareness of the process, our brain appears to focus on the general shape of objects rather than superficial statistics of context. On the other hand, learning autonomously allows discovering invariant regularities which help generalization. In this work, we propose a learning framework to improve the shape bias property of self-supervised methods. Our method learns seman… ▽ More

    Submitted 29 March, 2020; v1 submitted 18 September, 2019; originally announced September 2019.

    Comments: Under review

  15. arXiv:1907.01023  [pdf, other

    cs.CV cs.LG

    Diminishing the Effect of Adversarial Perturbations via Refining Feature Representation

    Authors: Nader Asadi, AmirMohammad Sarfi, Mehrdad Hosseinzadeh, Sahba Tahsini, Mahdi Eftekhari

    Abstract: Deep neural networks are highly vulnerable to adversarial examples, which imposes severe security issues for these state-of-the-art models. Many defense methods have been proposed to mitigate this problem. However, a lot of them depend on modification or additional training of the target model. In this work, we analytically investigate each layer's representation of non-perturbed and perturbed ima… ▽ More

    Submitted 1 October, 2019; v1 submitted 1 July, 2019; originally announced July 2019.

    Comments: Accepted at NeuralIPS 2019 workshop on Safety and Robustness in Decision Making

  16. arXiv:1906.11878  [pdf

    cs.CV cs.LG cs.NE

    Deep Learning-Based Classification Of the Defective Pistachios Via Deep Autoencoder Neural Networks

    Authors: Mehdi Abbaszadeh, Aliakbar Rahimifard, Mohammadali Eftekhari, Hossein Ghayoumi Zadeh, Ali Fayazi, Ali Dini, Mostafa Danaeian

    Abstract: Pistachio nut is mainly consumed as raw, salted or roasted because of its high nutritional properties and favorable taste. Pistachio nuts with shell and kernel defects, besides not being acceptable for a consumer, are also prone to insects damage, mold decay, and aflatoxin contamination. In this research, a deep learning-based imaging algorithm was developed to improve the sorting of nuts with she… ▽ More

    Submitted 10 June, 2019; originally announced June 2019.

  17. arXiv:1808.08913  [pdf, other

    cs.DC cs.CC

    Efficient size estimation and impossibility of termination in uniform dense population protocols

    Authors: David Doty, Mahsa Eftekhari

    Abstract: We study uniform population protocols: networks of anonymous agents whose pairwise interactions are chosen at random, where each agent uses an identical transition algorithm that does not depend on the population size $n$. Many existing polylog$(n)$ time protocols for leader election and majority computation are nonuniform: to operate correctly, they require all agents to be initialized with an ap… ▽ More

    Submitted 28 July, 2019; v1 submitted 27 August, 2018; originally announced August 2018.

    Comments: Using leaderless phase clock

  18. arXiv:1808.00068  [pdf, ps, other

    cs.LG cs.AI stat.ML

    A Fuzzy-Rough based Binary Shuffled Frog Leaping Algorithm for Feature Selection

    Authors: Javad Rahimipour Anaraki, Saeed Samet, Mahdi Eftekhari, Chang Wook Ahn

    Abstract: Feature selection and attribute reduction are crucial problems, and widely used techniques in the field of machine learning, data mining and pattern recognition to overcome the well-known phenomenon of the Curse of Dimensionality, by either selecting a subset of features or removing unrelated ones. This paper presents a new feature selection method that efficiently carries out attribute reduction,… ▽ More

    Submitted 31 July, 2018; originally announced August 2018.

    Comments: 24 pages, 11 Tables, 1 figure

    ACM Class: I.5.2; I.2.3

  19. arXiv:1805.04832  [pdf, other

    cs.DC cs.CC

    Exact size counting in uniform population protocols in nearly logarithmic time

    Authors: David Doty, Mahsa Eftekhari, Othon Michail, Paul G. Spirakis, Michail Theofilatos

    Abstract: We study population protocols: networks of anonymous agents that interact under a scheduler that picks pairs of agents uniformly at random. The _size counting problem_ is that of calculating the exact number $n$ of agents in the population, assuming no leader (each agent starts in the same state). We give the first protocol that solves this problem in sublinear time. The protocol converges in… ▽ More

    Submitted 13 May, 2018; originally announced May 2018.

  20. arXiv:1503.04779  [pdf, ps, other

    cs.CR

    Cryptanalysis of some protocols using matrices over group rings

    Authors: Mohammad Eftekhari

    Abstract: We address a cryptanalysis of two protocols based on the supposed difficulty of discrete logarithm problem on (semi) groups of matrices over a group ring. We can find the secret key and break entirely the protocols.

    Submitted 16 March, 2015; originally announced March 2015.

  21. arXiv:1209.6337  [pdf, ps, other

    cs.CR

    Cryptanalysis and Improvements on Some Graph-based Authentication Schemes

    Authors: Mohammad Eftekhari, Herish Abdullah

    Abstract: In 2010, Grigoriev and Shpilrain, introduced some graph-based authentication schemes. We present a cryptanalysis of some of these protocols, and introduce some new schemes to fix the problems.

    Submitted 27 September, 2012; originally announced September 2012.

    Journal ref: cryptanalysis and improvements on some graph-based authentication schemes (2012) 7

  22. A Diffie-Hellman Key Exchange Using Matrices Over Non Commutative Rings

    Authors: Mohammad Eftekhari

    Abstract: We consider a key exchange procedure whose security is based on the difficulty of computing discrete logarithms in a group, and where exponentiation is hidden by a conjugation. We give a platform-dependent cryptanalysis of this protocol. Finally, to take full advantage of this procedure, we propose a group of matrices over a noncommutative ring as platform group

    Submitted 27 September, 2012; originally announced September 2012.

    Journal ref: groups, complexity and cryptology 4, issue 1 (2012) 167-176

  23. Comparison of different T-norm operators in classification problems

    Authors: Fahimeh Farahbod, Mahdi Eftekhari

    Abstract: Fuzzy rule based classification systems are one of the most popular fuzzy modeling systems used in pattern classification problems. This paper investigates the effect of applying nine different T-norms in fuzzy rule based classification systems. In the recent researches, fuzzy versions of confidence and support merits from the field of data mining have been widely used for both rules selecting and… ▽ More

    Submitted 9 August, 2012; originally announced August 2012.

    Comments: 6 pages, 1 figure, 4 tables; International Journal of Fuzzy Logic Systems (IJFLS) Vol.2, No.3, July 2012