Skip to main content

Showing 1–11 of 11 results for author: Atyabi, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.03954  [pdf, other

    cs.CV cs.AI cs.CL cs.LG

    Recognition of Handwritten Japanese Characters Using Ensemble of Convolutional Neural Networks

    Authors: Angel I. Solis, Justin Zarkovacki, John Ly, Adham Atyabi

    Abstract: The Japanese writing system is complex, with three character types of Hiragana, Katakana, and Kanji. Kanji consists of thousands of unique characters, further adding to the complexity of character identification and literature understanding. Being able to translate handwritten Japanese characters into digital text is useful for data analysis, translation, learning and cultural preservation. In thi… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

  2. arXiv:2302.04108  [pdf, other

    cs.CV cs.AI cs.CC cs.GT

    Triplet Loss-less Center Loss Sampling Strategies in Facial Expression Recognition Scenarios

    Authors: Hossein Rajoli, Fatemeh Lotfi, Adham Atyabi, Fatemeh Afghah

    Abstract: Facial expressions convey massive information and play a crucial role in emotional expression. Deep neural network (DNN) accompanied by deep metric learning (DML) techniques boost the discriminative ability of the model in facial expression recognition (FER) applications. DNN, equipped with only classification loss functions such as Cross-Entropy cannot compact intra-class feature variation or sep… ▽ More

    Submitted 8 February, 2023; originally announced February 2023.

    Comments: The paper has been accepted in the CISS 2023 and will be published very soon

  3. arXiv:2203.08302  [pdf, other

    cs.CR cs.HC

    Internet-based Social Engineering Attacks, Defenses and Psychology: A Survey

    Authors: Theodore Longtchi, Rosana MontaƱez Rodriguez, Laith Al-Shawaf, Adham Atyabi, Shouhuai Xu

    Abstract: Social engineering attacks are a major cyber threat because they often serve as a first step for an attacker to break into an otherwise well-defended network, steal victims' credentials, and cause financial losses. The problem has received due amount of attention with many publications proposing defenses against them. Despite this, the situation has not improved. In this paper, we aim to understan… ▽ More

    Submitted 1 August, 2022; v1 submitted 15 March, 2022; originally announced March 2022.

    Comments: * Shared first-author

  4. arXiv:2203.04813  [pdf, other

    cs.CR cs.HC

    Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study

    Authors: Rosana MontaƱez Rodriguez, Adham Atyabi, Shouhuai

    Abstract: Social engineering attacks are phenomena that are equally applicable to both the physical world and cyberspace. These attacks in the physical world have been studied for a much longer time than their counterpart in cyberspace. This motivates us to investigate how social engineering attacks in the physical world and cyberspace relate to each other, including their common characteristics and unique… ▽ More

    Submitted 9 March, 2022; originally announced March 2022.

  5. arXiv:2108.05025  [pdf, other

    cs.CV cs.HC cs.LG

    Learning Oculomotor Behaviors from Scanpath

    Authors: Beibin Li, Nicholas Nuechterlein, Erin Barney, Claire Foster, Minah Kim, Monique Mahony, Adham Atyabi, Li Feng, Quan Wang, Pamela Ventola, Linda Shapiro, Frederick Shic

    Abstract: Identifying oculomotor behaviors relevant for eye-tracking applications is a critical but often challenging task. Aiming to automatically learn and extract knowledge from existing eye-tracking data, we develop a novel method that creates rich representations of oculomotor scanpaths to facilitate the learning of downstream tasks. The proposed stimulus-agnostic Oculomotor Behavior Framework (OBF) mo… ▽ More

    Submitted 11 August, 2021; originally announced August 2021.

    Comments: Accepted ACM ICMI 2021

  6. UUV's Hierarchical DE-based Motion Planning in a Semi Dynamic Underwater Wireless Sensor Network

    Authors: S. MahmoudZadeh, D. M. W Powers, A. Atyabi

    Abstract: This paper describes a reflexive multilayered mission planner with a mounted energy efficient local path planner for Unmanned Underwater Vehicle's (UUV) navigation throughout the complex subsea volume in a time-variant semi-dynamic operation network. The UUV routing protocol in Underwater Wireless Sensor Network (UNSW) is generalized with a homogeneous Dynamic Knapsack-Traveler Salesman Problem em… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.

    Journal ref: IEEE Transactions on Cybernetic, Volume: 49 , Issue: 8 , Aug. 2019

  7. Current Advancements on Autonomous Mission Planning and Management Systems: an AUV and UAV perspective

    Authors: Adham Atyabi, Somaiyeh MahmoudZadeh, Samia Nefti-Meziani

    Abstract: Advances in hardware technology have enabled more integration of sophisticated software, triggering progress in the development and employment of Unmanned Vehicles (UVs), and mitigating restraints for onboard intelligence. As a result, UVs can now take part in more complex mission where continuous transformation in environmental condition calls for a higher level of situational responsiveness. Thi… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.

    Journal ref: Journal of Annual Reviews in Control, Volume, 46, P.196-215, 2018

  8. arXiv:1604.07898  [pdf

    cs.RO

    A Hierarchal Planning Framework for AUV Mission Management in a Spatio-Temporal Varying Ocean

    Authors: Somaiyeh Mahmoud. Zadeh, Karl Sammut, David M. W Powers, Adham Atyabi, Amir Mehdi Yazdani

    Abstract: The purpose of this paper is to provide a hierarchical dynamic mission planning framework for a single autonomous underwater vehicle (AUV) to accomplish task-assign process in a limited time interval while operating in an uncertain undersea environment, where spatio-temporal variability of the operating field is taken into account. To this end, a high level reactive mission planner and a low level… ▽ More

    Submitted 19 November, 2017; v1 submitted 26 April, 2016; originally announced April 2016.

  9. arXiv:1604.07545  [pdf

    cs.RO

    An Efficient Hybrid Route-Path Planning Model For Dynamic Task Allocation and Safe Maneuvering of an Underwater Vehicle in a Realistic Environment

    Authors: Somaiyeh Mahmoud. Zadeh, David M. W Powers, Karl Sammut, Amir Mehdi Yazdani, Adham Atyabi

    Abstract: This paper presents a hybrid route-path planning model for an Autonomous Underwater Vehicle's task assignment and management while the AUV is operating through the variable littoral waters. Several prioritized tasks distributed in a large scale terrain is defined first; then, considering the limitations over the mission time, vehicle's battery, uncertainty and variability of the underlying operati… ▽ More

    Submitted 19 November, 2017; v1 submitted 26 April, 2016; originally announced April 2016.

  10. arXiv:1604.02523  [pdf

    cs.RO cs.AI

    Differential Evolution for Efficient AUV Path Planning in Time Variant Uncertain Underwater Environment

    Authors: S. Mahmoud Zadeh, D. M. W. Powers, A. Yazdani, K. Sammut, A Atyabi

    Abstract: The AUV three-dimension path planning in complex turbulent underwater environment is investigated in this research, in which static current map data and uncertain static-moving time variant obstacles are taken into account. Robustness of AUVs path planning to this strong variability is known as a complex NP-hard problem and is considered a critical issue to ensure vehicles safe deployment. Efficie… ▽ More

    Submitted 4 December, 2016; v1 submitted 9 April, 2016; originally announced April 2016.

    Comments: 9 Pages,6 figures

  11. arXiv:1602.02237  [pdf, other

    cs.NE

    Reducing training requirements through evolutionary based dimension reduction and subject transfer

    Authors: Adham Atyabi, Martin Luerssena, Sean P. Fitzgibbon, Trent Lewis, David M. W. Powersa

    Abstract: Training Brain Computer Interface (BCI) systems to understand the intention of a subject through Electroencephalogram (EEG) data currently requires multiple training sessions with a subject in order to develop the necessary expertise to distinguish signals for different tasks. Conventionally the task of training the subject is done by introducing a training and calibration stage during which some… ▽ More

    Submitted 6 February, 2016; originally announced February 2016.