Skip to main content

Showing 1–4 of 4 results for author: Abbaspour, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2011.10111  [pdf, ps, other

    cs.CV eess.IV

    Online Multi-Object Tracking with delta-GLMB Filter based on Occlusion and Identity Switch Handling

    Authors: Mohammadjavad Abbaspour, Mohammad Ali Masnadi-Shirazi

    Abstract: In this paper, we propose an online multi-object tracking (MOT) method in a delta Generalized Labeled Multi-Bernoulli (delta-GLMB) filter framework to address occlusion and miss-detection issues, reduce false alarms, and recover identity switch (ID switch). To handle occlusion and miss-detection issues, we propose a measurement-to-disappeared track association method based on one-step delta-GLMB f… ▽ More

    Submitted 26 April, 2021; v1 submitted 19 November, 2020; originally announced November 2020.

  2. arXiv:1903.06827  [pdf, other

    cs.SI physics.soc-ph

    Does Homophily Make Socialbots More Influential? Exploring Infiltration Strategies

    Authors: Samaneh Hosseini Moghaddam, Mandana Khademi, Maghsoud Abbaspour

    Abstract: Socialbots are intelligent software controlling all the behavior of fake accounts in an online social network. They use artificial intelligence techniques to pass themselves off as human social media users. Socialbots exploit user trust to achieve their malicious goals, such as astroturfing, performing Sybil attacks, spamming, and harvesting private data. The first phase to countermeasure the mali… ▽ More

    Submitted 15 March, 2019; originally announced March 2019.

  3. An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets

    Authors: Sajjad Arshad, Maghsoud Abbaspour, Mehdi Kharrazi, Hooman Sanatkar

    Abstract: Botnets (networks of compromised computers) are often used for malicious activities such as spam, click fraud, identity theft, phishing, and distributed denial of service (DDoS) attacks. Most of previous researches have introduced fully or partially signature-based botnet detection approaches. In this paper, we propose a fully anomaly-based approach that requires no a priori knowledge of bot signa… ▽ More

    Submitted 2 November, 2018; originally announced November 2018.

    Comments: IEEE Conference on Computer Applications and Industrial Electronics (ICCAIE), Penang, Malaysia, December 2011

  4. arXiv:0710.1924  [pdf

    cs.NI cs.AI

    A Heuristic Routing Mechanism Using a New Addressing Scheme

    Authors: Mohsen Ravanbakhsh, Yasin Abbasi-Yadkori, Maghsoud Abbaspour, Hamid Sarbazi-Azad

    Abstract: Current methods of routing are based on network information in the form of routing tables, in which routing protocols determine how to update the tables according to the network changes. Despite the variability of data in routing tables, node addresses are constant. In this paper, we first introduce the new concept of variable addresses, which results in a novel framework to cope with routing pr… ▽ More

    Submitted 10 October, 2007; originally announced October 2007.

    Comments: 8 pages, because of lack of space journal reference just contains the reference to the proceeding

    Journal ref: Proceedings of First International Conference on Bio Inspired models of Networks, Information and Computing Systems (BIONETICS), Cavalese, Italy, December 2006