Skip to main content

Showing 1–6 of 6 results for author: Falahati, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.00970  [pdf, other

    cs.CL cs.AI cs.LG

    SentenceKV: Efficient LLM Inference via Sentence-Level Semantic KV Caching

    Authors: Yuxuan Zhu, Ali Falahati, David H. Yang, Mohammad Mohammadi Amiri

    Abstract: Large language models face significant computational and memory challenges when processing long contexts. During inference, efficient management of the key-value (KV) cache, which stores intermediate activations for autoregressive generation, is critical to reducing memory overhead and improving computational efficiency. Traditional token-level efficient KV caching methods overlook semantic inform… ▽ More

    Submitted 1 April, 2025; originally announced April 2025.

  2. arXiv:2408.12659  [pdf, other

    cs.LG cs.AI cs.IT stat.ML

    Disentangled Structural and Featural Representation for Task-Agnostic Graph Valuation

    Authors: Ali Falahati, Mohammad Mohammadi Amiri

    Abstract: With the emergence of data marketplaces, the demand for methods to assess the value of data has increased significantly. While numerous techniques have been proposed for this purpose, none have specifically addressed graphs as the main data modality. Graphs are widely used across various fields, ranging from chemical molecules to social networks. In this study, we break down graphs into two main c… ▽ More

    Submitted 22 August, 2024; originally announced August 2024.

  3. Efficient Bitrate Ladder Construction using Transfer Learning and Spatio-Temporal Features

    Authors: Ali Falahati, Mohammad Karim Safavi, Ardavan Elahi, Farhad Pakdaman, Moncef Gabbouj

    Abstract: Providing high-quality video with efficient bitrate is a main challenge in video industry. The traditional one-size-fits-all scheme for bitrate ladders is inefficient and reaching the best content-aware decision computationally impractical due to extensive encodings required. To mitigate this, we propose a bitrate and complexity efficient bitrate ladder prediction method using transfer learning an… ▽ More

    Submitted 13 March, 2024; v1 submitted 6 January, 2024; originally announced January 2024.

    Comments: 7 pages, 9 figures, 7 tables, Copyright 2024 IEEE - Presented in IEEE MVIP 2024

    ACM Class: I.4.2

    Journal ref: Proc. 2024 13th Iranian/3rd Int. Conf. Mach. Vis. Image Process. (MVIP) (2024) 1-7

  4. arXiv:2102.06969  [pdf

    cs.IT eess.SP eess.SY

    Alternative Detectors for Spectrum Sensing by Exploiting Excess Bandwidth

    Authors: Sirvan Gharib, Abolfazl Falahati, Vahid Ahmadi

    Abstract: The problems regarding spectrum sensing are studied by exploiting a priori and a posteriori in information of the received noise variance. First, the traditional Average Likelihood Ratio (ALR) and the General Likelihood Ratio Test (GLRT) detectors are investigated under a Gamma distributed function as a channel noise, for the first time, under the availability of a priori statistical distribution… ▽ More

    Submitted 13 February, 2021; originally announced February 2021.

    Comments: 20 pages and have 7 figures

  5. arXiv:1202.1971  [pdf

    cs.CR

    Cryptanalysis and enhancement of two low cost rfid authentication protocols

    Authors: Hoda Jannati, Abolfazl Falahati

    Abstract: Widespread attention is recently paid upon RFID system structure considering its ease of deployment over an extensive range of applications. Due to its several advantages, many technical articles are published to improve its capabilities over specific system implementations. Recently, a lightweight anti-de-synchronization RFID authentication protocol and a lightweight binding proof protocol to gua… ▽ More

    Submitted 9 February, 2012; originally announced February 2012.

    Comments: 9 pages, 5 figures

    Journal ref: International Journal of UbiComp (IJU), vol. 3, no.1, pp. 1-9, January 2012

  6. A Secure Variant of the Hill Cipher

    Authors: M. Toorani, A. Falahati

    Abstract: The Hill cipher is a classical symmetric encryption algorithm that succumbs to the know-plaintext attack. Although its vulnerability to cryptanalysis has rendered it unusable in practice, it still serves an important pedagogical role in cryptology and linear algebra. In this paper, a variant of the Hill cipher is introduced that makes the Hill cipher secure while it retains the efficiency. The pro… ▽ More

    Submitted 16 March, 2012; v1 submitted 18 February, 2010; originally announced February 2010.

    Comments: 4 Pages, 4 Figures

    MSC Class: 94A60 ACM Class: E.3; K.6.5; D.4.6; K.6.m

    Journal ref: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC'09), pp.313-316, July 2009