Skip to main content

Showing 1–5 of 5 results for author: Alaghband, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2006.12624  [pdf, other

    cs.CY

    Effects of Non-Cognitive Factors on Post-Secondary Persistence of Deaf Students: An Agent-Based Modeling Approach

    Authors: Marie Alaghband, Ivan Garibay

    Abstract: Post-secondary education persistence is the likelihood of a student remaining in post-secondary education. Although statistics show that post-secondary persistence for deaf students has increased recently, there are still many obstacles obstructing students from completing their post-secondary degree goals. Therefore, increasing the persistence rate is crucial to increase education and work goals… ▽ More

    Submitted 22 June, 2020; originally announced June 2020.

  2. arXiv:2003.08759  [pdf, other

    cs.CV

    Facial Expression Phoenix (FePh): An Annotated Sequenced Dataset for Facial and Emotion-Specified Expressions in Sign Language

    Authors: Marie Alaghband, Niloofar Yousefi, Ivan Garibay

    Abstract: Facial expressions are important parts of both gesture and sign language recognition systems. Despite the recent advances in both fields, annotated facial expression datasets in the context of sign language are still scarce resources. In this manuscript, we introduce an annotated sequenced facial expression dataset in the context of sign language, comprising over $3000$ facial images extracted fro… ▽ More

    Submitted 8 September, 2020; v1 submitted 2 March, 2020; originally announced March 2020.

  3. arXiv:1912.02629  [pdf, ps, other

    cs.LG cs.CR cs.CY

    A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection

    Authors: Niloofar Yousefi, Marie Alaghband, Ivan Garibay

    Abstract: With the increase of credit card usage, the volume of credit card misuse also has significantly increased. As a result, financial organizations are working hard on developing and deploying credit card fraud detection methods, in order to adapt to ever-evolving, increasingly sophisticated defrauding strategies and identifying illicit transactions as quickly as possible to protect themselves and the… ▽ More

    Submitted 2 December, 2019; originally announced December 2019.

  4. Cryptanalysis of two mutual authentication protocols for low-cost RFID

    Authors: Mohammad Hassan Habibi, Mahmoud Gardeshi, Mahdi R. Alaghband

    Abstract: Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID authentication protocols and their secu… ▽ More

    Submitted 4 February, 2011; originally announced February 2011.

    Comments: 17 pages, 2 figures, 1 table, International Journal of Distributed and Parallel systems

    MSC Class: 68-02

    Journal ref: International Journal of Distributed and Parallel systems, Volume 2, Number 1, pp. 103-114. 2011

  5. Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard

    Authors: Mohammad Hassan Habibi, Mahmud Gardeshi, Mahdi R. Alaghband

    Abstract: Yeh et al. recently have proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard [1]. They have claimed that their protocol is secure against adversarial attacks and also provides forward secrecy. In this paper we will show that the proposed protocol does not have proper security features. A powerful and practical attack is presented on this protocol whereby the whole securi… ▽ More

    Submitted 4 February, 2011; v1 submitted 3 February, 2011; originally announced February 2011.

    Comments: 13 page, International Journal of Ubicomp

    MSC Class: 68-02

    Journal ref: International Journal of Ubicomp, Volume 2, Number 1,pp. 1-13, 2011