Skip to main content

Showing 1–16 of 16 results for author: Haghighi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.17923  [pdf, other

    cs.ET cs.CE

    EAQGA: A Quantum-Enhanced Genetic Algorithm with Novel Entanglement-Aware Crossovers

    Authors: Mohammad Kashfi Haghighi, Matthieu Fortin-Deschênes, Christophe Pere, Mickaël Camus

    Abstract: Genetic algorithms are highly effective optimization techniques for many computationally challenging problems, including combinatorial optimization tasks like portfolio optimization. Quantum computing has also shown potential in addressing these complex challenges. Combining these approaches, quantum genetic algorithms leverage the principles of superposition and entanglement to enhance the perfor… ▽ More

    Submitted 24 April, 2025; originally announced April 2025.

    Comments: This work has been submitted to the IEEE (QCE25) for possible publication

  2. arXiv:2412.18874  [pdf, ps, other

    cs.CV cs.AI

    A Culturally-Aware Benchmark for Person Re-Identification in Modest Attire

    Authors: Alireza Sedighi Moghaddam, Fatemeh Anvari, Mohammadjavad Mirshekari Haghighi, Mohammadali Fakhari, Mohammad Reza Mohammadi

    Abstract: Person Re-Identification (ReID) is a fundamental task in computer vision with critical applications in surveillance and security. Despite progress in recent years, most existing ReID models often struggle to generalize across diverse cultural contexts, particularly in Islamic regions like Iran, where modest clothing styles are prevalent. Existing datasets predominantly feature Western and East Asi… ▽ More

    Submitted 10 June, 2025; v1 submitted 25 December, 2024; originally announced December 2024.

  3. arXiv:2307.08899  [pdf, other

    cs.CR

    A Note on the Security of ITS: Car Crash Analysis in Cruise Control Scenarios

    Authors: Mohammad Sayad Haghighi

    Abstract: Security of Intelligent Transportation Systems (ITS) heavily depends on the security of the underlying components that create such a smart ecosystem. Adaptive Cruise Control (ACC) is embedded into most modern vehicles. In this report, we study the situations that the two vehicles involved in a cruise control scenario create. More precisely, after breaking down the phases the two vehicle go through… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

    Report number: ANS1104

  4. Pseudo-Labeling Enhanced by Privileged Information and Its Application to In Situ Sequencing Images

    Authors: Marzieh Haghighi, Mario C. Cruz, Erin Weisbart, Beth A. Cimini, Avtar Singh, Julia Bauman, Maria E. Lozada, Sanam L. Kavari, James T. Neal, Paul C. Blainey, Anne E. Carpenter, Shantanu Singh

    Abstract: Various strategies for label-scarce object detection have been explored by the computer vision research community. These strategies mainly rely on assumptions that are specific to natural images and not directly applicable to the biological and biomedical vision domains. For example, most semi-supervised learning strategies rely on a small set of labeled data as a confident source of ground truth.… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

    Comments: This paper has been accepted for publication at IJCAI 2023

    Journal ref: Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence (IJCAI), Main Track, Pages 4775-4784, 2023

  5. arXiv:2204.01466  [pdf, other

    cond-mat.dis-nn cond-mat.mtrl-sci cs.LG

    A single Long Short-Term Memory network for enhancing the prediction of path-dependent plasticity with material heterogeneity and anisotropy

    Authors: Ehsan Motevali Haghighi, SeonHong Na

    Abstract: This study presents the applicability of conventional deep recurrent neural networks (RNN) to predict path-dependent plasticity associated with material heterogeneity and anisotropy. Although the architecture of RNN possesses inductive biases toward information over time, it is still challenging to learn the path-dependent material behavior as a function of the loading path considering the change… ▽ More

    Submitted 4 April, 2022; v1 submitted 28 March, 2022; originally announced April 2022.

  6. arXiv:2105.07501  [pdf, other

    cs.CR cs.MA

    Analysis of Bitcoin Vulnerability to Bribery Attacks Launched Through Large Transactions

    Authors: Ghader Ebrahimpour, Mohammad Sayad Haghighi

    Abstract: Bitcoin uses blockchain technology to maintain transactions order and provides probabilistic guarantee to prevent double-spending, assuming that an attacker's computational power does not exceed %50 of the network power. In this paper, we design a novel bribery attack and show that this guarantee can be hugely undermined. Miners are assumed to be rational in this setup and they are given incentive… ▽ More

    Submitted 16 May, 2021; originally announced May 2021.

    Comments: This work is under review for formal publication

    ACM Class: G.3; H.2; H.4; E.2; E.3; F.2

    Journal ref: ACM Transactions on Privacy and Security, Vol. 27, Issue 2, 2024

  7. arXiv:2009.03645  [pdf

    cs.CR cs.AI

    Detection of Anomalies and Faults in Industrial IoT Systems by Data Mining: Study of CHRIST Osmotron Water Purification System

    Authors: Mohammad Sadegh Sadeghi Garmaroodi, Faezeh Farivar, Mohammad Sayad Haghighi, Mahdi Aliyari Shoorehdeli, Alireza Jolfaei

    Abstract: Industry 4.0 will make manufacturing processes smarter but this smartness requires more environmental awareness, which in case of Industrial Internet of Things, is realized by the help of sensors. This article is about industrial pharmaceutical systems and more specifically, water purification systems. Purified water which has certain conductivity is an important ingredient in many pharmaceutical… ▽ More

    Submitted 8 September, 2020; originally announced September 2020.

    Comments: this paper is under review in IEEE IoTJ

    ACM Class: H.4; I.5; I.2; C.3

  8. arXiv:2008.08672  [pdf

    cs.CR

    A Computationally Intelligent Hierarchical Authentication and Key Establishment Framework for Internet of Things

    Authors: Mohammad Sayad Haghighi, Orwa Nader, Alireza Jolfaei

    Abstract: Our high expectations from Internet of Things (IoT) and how it will positively influence our lifestyles depend on a secure and trusted implementation of it, especially in the sensitive sectors such as health or financial. IoT platforms and solutions must provide Confidentiality, Integrity and Availability (CIA) in a secure and transparent way. Due to the extremely large scales of IoT, traditional… ▽ More

    Submitted 19 August, 2020; originally announced August 2020.

    Comments: This paper is to appear in IEEE Internet of Things Magazine

    ACM Class: E.3; C.2

  9. arXiv:2008.00414  [pdf, ps, other

    cs.CR eess.SY

    On the Security of Networked Control Systems in Smart Vehicle and its Adaptive Cruise Control

    Authors: Faezeh Farivar, Mohammad Sayad Haghighi, Alireza Jolfaei, Sheng Wen

    Abstract: With the benefits of Internet of Vehicles (IoV) paradigm, come along unprecedented security challenges. Among many applications of inter-connected systems, vehicular networks and smart cars are examples that are already rolled out. Smart vehicles not only have networks connecting their internal components e.g. via Controller Area Network (CAN) bus, but also are connected to the outside world throu… ▽ More

    Submitted 4 August, 2020; v1 submitted 2 August, 2020; originally announced August 2020.

    Comments: This paper has been accepted and is to appear in IEEE Transactions on Intelligent Transportation Systems

    ACM Class: I.2.8; J.6; H.4

  10. arXiv:2004.06432  [pdf, other

    cs.CR

    A Machine Learning-based Approach to Build Zero False-Positive IPSs for Industrial IoT and CPS with a Case Study on Power Grids Security

    Authors: Mohammad Sayad Haghighi, Faezeh Farivar

    Abstract: Intrusion Prevention Systems (IPS), have long been the first layer of defense against malicious attacks. Most sensitive systems employ instances of them (e.g. Firewalls) to secure the network perimeter and filter out attacks or unwanted traffic. A firewall, similar to classifiers, has a boundary to decide which traffic sample is normal and which one is not. This boundary is defined by configuratio… ▽ More

    Submitted 14 April, 2020; originally announced April 2020.

    ACM Class: I.2; I.5; H.4

  11. arXiv:2003.00829  [pdf, other

    cs.NI

    Critical Study of Markovian Approaches for Batch Arrival Modeling in IEEE 802.15.4-based Networks

    Authors: Mohammad Sayad Haghighi

    Abstract: The transient non-stationary nature of network reaction to batch arrivals has led to complex models in order to estimate the network quantities of interest. In this report we focus on the IEEE 802.15.4 standard MAC layer and try to deeply study the current approaches in modeling the network reaction to one-shot data arrivals. In addition to the general description of models, we mention the positiv… ▽ More

    Submitted 14 February, 2020; originally announced March 2020.

    Comments: This is a lightly updated version of a technical report published in 2013

    Report number: 1204-495-2019 ACM Class: C.2; C.4; H.1; J.7

  12. arXiv:2002.05798  [pdf

    cs.CR

    Compensation of Linear Attacks to Cyber Physical Systems through ARX System Identification

    Authors: Soheila Barchinezhad, Mohammad Sayad Haghighi

    Abstract: Cyber-Physical Systems (CPSs) are vastly used in today's cities critical infrastructure. The cyber part of these systems usually has a network component through which cyber attacks can be launched. In this paper, we first design an intrusion detection system (IDS) by identifying the plant. We assume the initial operation period of the CPS is attack-free and learn the plant model. Then, we compare… ▽ More

    Submitted 13 February, 2020; originally announced February 2020.

    Comments: 9 figures, conference

    ACM Class: I.5; B.1; C.2; J.7

    Journal ref: IKT 2019 proceedings

  13. arXiv:1910.10109  [pdf, other

    cs.MA cs.LG cs.RO eess.SP eess.SY

    Distributed interference cancellation in multi-agent scenarios

    Authors: Mahdi Shamsi, Alireza Moslemi Haghighi, Farokh Marvasti

    Abstract: This paper considers the problem of detecting impaired and noisy nodes over network. In a distributed algorithm, lots of processing units are incorporating and communicating with each other to reach a global goal. Due to each one's state in the shared environment, they can help the other nodes or mislead them (due to noise or a deliberate attempt). Previous works mainly focused on proper locating… ▽ More

    Submitted 22 October, 2019; originally announced October 2019.

  14. arXiv:1712.07022  [pdf, other

    cs.CV stat.ML

    Automatic Renal Segmentation in DCE-MRI using Convolutional Neural Networks

    Authors: Marzieh Haghighi, Simon K. Warfield, Sila Kurugol

    Abstract: Kidney function evaluation using dynamic contrast-enhanced MRI (DCE-MRI) images could help in diagnosis and treatment of kidney diseases of children. Automatic segmentation of renal parenchyma is an important step in this process. In this paper, we propose a time and memory efficient fully automated segmentation method which achieves high segmentation accuracy with running time in the order of sec… ▽ More

    Submitted 19 December, 2017; originally announced December 2017.

  15. arXiv:1703.02938  [pdf, other

    cs.HC

    Context-Aware Recursive Bayesian Graph Traversal in BCIs

    Authors: Seyed Sadegh Mohseni Salehi, Mohammad Moghadamfalahi, Hooman Nezamfar, Marzieh Haghighi, Deniz Erdogmus

    Abstract: Noninvasive brain computer interfaces (BCI), and more specifically Electroencephalography (EEG) based systems for intent detection need to compensate for the low signal to noise ratio of EEG signals. In many applications, the temporal dependency information from consecutive decisions and contextual data can be used to provide a prior probability for the upcoming decision. In this study we proposed… ▽ More

    Submitted 8 March, 2017; originally announced March 2017.

    Comments: This work has been submitted to EMBC 2017

  16. arXiv:0912.1007  [pdf

    cs.LG cs.NE

    Designing Kernel Scheme for Classifiers Fusion

    Authors: Mehdi Salkhordeh Haghighi, Hadi Sadoghi Yazdi, Abedin Vahedian, Hamed Modaghegh

    Abstract: In this paper, we propose a special fusion method for combining ensembles of base classifiers utilizing new neural networks in order to improve overall efficiency of classification. While ensembles are designed such that each classifier is trained independently while the decision fusion is performed as a final procedure, in this method, we would be interested in making the fusion process more ad… ▽ More

    Submitted 5 December, 2009; originally announced December 2009.

    Comments: 7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 239-248, November 2009, USA