Skip to main content

Showing 1–30 of 30 results for author: Hamidi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.10877  [pdf, other

    cs.LG

    Distributed Quasi-Newton Method for Fair and Fast Federated Learning

    Authors: Shayan Mohajer Hamidi, Linfeng Ye

    Abstract: Federated learning (FL) is a promising technology that enables edge devices/clients to collaboratively and iteratively train a machine learning model under the coordination of a central server. The most common approach to FL is first-order methods, where clients send their local gradients to the server in each iteration. However, these methods often suffer from slow convergence rates. As a remedy,… ▽ More

    Submitted 18 January, 2025; originally announced January 2025.

  2. arXiv:2501.09849  [pdf, other

    cs.LG

    Coded Deep Learning: Framework and Algorithm

    Authors: En-hui Yang, Shayan Mohajer Hamidi

    Abstract: The success of deep learning (DL) is often achieved with large models and high complexity during both training and post-training inferences, hindering training in resource-limited settings. To alleviate these issues, this paper introduces a new framework dubbed ``coded deep learning'' (CDL), which integrates information-theoretic coding concepts into the inner workings of DL, to significantly comp… ▽ More

    Submitted 16 January, 2025; originally announced January 2025.

  3. arXiv:2501.03392  [pdf, other

    cs.LG cs.AI

    Over-the-Air Fair Federated Learning via Multi-Objective Optimization

    Authors: Shayan Mohajer Hamidi, Ali Bereyhi, Saba Asaad, H. Vincent Poor

    Abstract: In federated learning (FL), heterogeneity among the local dataset distributions of clients can result in unsatisfactory performance for some, leading to an unfair model. To address this challenge, we propose an over-the-air fair federated learning algorithm (OTA-FFL), which leverages over-the-air computation to train fair FL models. By formulating FL as a multi-objective minimization problem, we i… ▽ More

    Submitted 6 January, 2025; originally announced January 2025.

  4. arXiv:2501.02880  [pdf, other

    cs.LG stat.ML

    Conditional Mutual Information Based Diffusion Posterior Sampling for Solving Inverse Problems

    Authors: Shayan Mohajer Hamidi, En-Hui Yang

    Abstract: Inverse problems are prevalent across various disciplines in science and engineering. In the field of computer vision, tasks such as inpainting, deblurring, and super-resolution are commonly formulated as inverse problems. Recently, diffusion models (DMs) have emerged as a promising approach for addressing noisy linear inverse problems, offering effective solutions without requiring additional tas… ▽ More

    Submitted 6 January, 2025; originally announced January 2025.

  5. arXiv:2412.20045  [pdf, other

    cs.CV cs.AI

    Enhancing Diffusion Models for Inverse Problems with Covariance-Aware Posterior Sampling

    Authors: Shayan Mohajer Hamidi, En-Hui Yang

    Abstract: Inverse problems exist in many disciplines of science and engineering. In computer vision, for example, tasks such as inpainting, deblurring, and super resolution can be effectively modeled as inverse problems. Recently, denoising diffusion probabilistic models (DDPMs) are shown to provide a promising solution to noisy linear inverse problems without the need for additional task specific training.… ▽ More

    Submitted 28 December, 2024; originally announced December 2024.

  6. arXiv:2412.03867  [pdf, other

    cs.LG

    GP-FL: Model-Based Hessian Estimation for Second-Order Over-the-Air Federated Learning

    Authors: Shayan Mohajer Hamidi, Ali Bereyhi, Saba Asaad, H. Vincent Poor

    Abstract: Second-order methods are widely adopted to improve the convergence rate of learning algorithms. In federated learning (FL), these methods require the clients to share their local Hessian matrices with the parameter server (PS), which comes at a prohibitive communication cost. A classical solution to this issue is to approximate the global Hessian matrix from the first-order information. Unlike in… ▽ More

    Submitted 4 December, 2024; originally announced December 2024.

    Comments: The paper is submitted to IEEE Transactions on Signal Processing

  7. arXiv:2409.06319  [pdf, other

    cs.LG eess.SP

    Rate-Constrained Quantization for Communication-Efficient Federated Learning

    Authors: Shayan Mohajer Hamidi, Ali Bereyhi

    Abstract: Quantization is a common approach to mitigate the communication cost of federated learning (FL). In practice, the quantized local parameters are further encoded via an entropy coding technique, such as Huffman coding, for efficient data compression. In this case, the exact communication overhead is determined by the bit rate of the encoded gradients. Recognizing this fact, this work deviates from… ▽ More

    Submitted 10 September, 2024; originally announced September 2024.

  8. arXiv:2407.18041  [pdf, other

    cs.LG

    How to Train the Teacher Model for Effective Knowledge Distillation

    Authors: Shayan Mohajer Hamidi, Xizhen Deng, Renhao Tan, Linfeng Ye, Ahmed Hussein Salamah

    Abstract: Recently, it was shown that the role of the teacher in knowledge distillation (KD) is to provide the student with an estimate of the true Bayes conditional probability density (BCPD). Notably, the new findings propose that the student's error rate can be upper-bounded by the mean squared error (MSE) between the teacher's output and BCPD. Consequently, to enhance KD efficacy, the teacher should be… ▽ More

    Submitted 25 July, 2024; originally announced July 2024.

    Comments: The paper was accepted at ECCV2024

  9. arXiv:2407.12161  [pdf, other

    cs.AI

    Interpretability in Action: Exploratory Analysis of VPT, a Minecraft Agent

    Authors: Karolis Jucys, George Adamopoulos, Mehrab Hamidi, Stephanie Milani, Mohammad Reza Samsami, Artem Zholus, Sonia Joseph, Blake Richards, Irina Rish, Özgür Şimşek

    Abstract: Understanding the mechanisms behind decisions taken by large foundation models in sequential decision making tasks is critical to ensuring that such systems operate transparently and safely. In this work, we perform exploratory analysis on the Video PreTraining (VPT) Minecraft playing agent, one of the largest open-source vision-based agents. We aim to illuminate its reasoning mechanisms by applyi… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

    Comments: Mechanistic Interpretability Workshop at ICML 2024

  10. arXiv:2406.06262  [pdf, other

    cs.NE cs.AI

    Modular Growth of Hierarchical Networks: Efficient, General, and Robust Curriculum Learning

    Authors: Mani Hamidi, Sina Khajehabdollahi, Emmanouil Giannakakis, Tim Schäfer, Anna Levina, Charley M. Wu

    Abstract: Structural modularity is a pervasive feature of biological neural networks, which have been linked to several functional and computational advantages. Yet, the use of modular architectures in artificial neural networks has been relatively limited despite early successes. Here, we explore the performance and functional dynamics of a modular network trained on a memory task via an iterative growth c… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  11. arXiv:2405.13324  [pdf, other

    cs.LG cs.AI

    Adversarial Training via Adaptive Knowledge Amalgamation of an Ensemble of Teachers

    Authors: Shayan Mohajer Hamidi, Linfeng Ye

    Abstract: Adversarial training (AT) is a popular method for training robust deep neural networks (DNNs) against adversarial attacks. Yet, AT suffers from two shortcomings: (i) the robustness of DNNs trained by AT is highly intertwined with the size of the DNNs, posing challenges in achieving robustness in smaller models; and (ii) the adversarial samples employed during the AT process exhibit poor generaliza… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

  12. TartanAviation: Image, Speech, and ADS-B Trajectory Datasets for Terminal Airspace Operations

    Authors: Jay Patrikar, Joao Dantas, Brady Moon, Milad Hamidi, Sourish Ghosh, Nikhil Keetha, Ian Higgins, Atharva Chandak, Takashi Yoneyama, Sebastian Scherer

    Abstract: We introduce TartanAviation, an open-source multi-modal dataset focused on terminal-area airspace operations. TartanAviation provides a holistic view of the airport environment by concurrently collecting image, speech, and ADS-B trajectory data using setups installed inside airport boundaries. The datasets were collected at both towered and non-towered airfields across multiple months to capture d… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

    Comments: 8 pages, 6 figures, 2 tables

    Journal ref: Scientific Data volume 12, Article number: 468 (2025)

  13. arXiv:2401.08732  [pdf, other

    cs.LG cs.CV cs.IT

    Bayes Conditional Distribution Estimation for Knowledge Distillation Based on Conditional Mutual Information

    Authors: Linfeng Ye, Shayan Mohajer Hamidi, Renhao Tan, En-Hui Yang

    Abstract: It is believed that in knowledge distillation (KD), the role of the teacher is to provide an estimate for the unknown Bayes conditional probability distribution (BCPD) to be used in the student training process. Conventionally, this estimate is obtained by training the teacher using maximum log-likelihood (MLL) method. To improve this estimate for KD, in this paper we introduce the concept of cond… ▽ More

    Submitted 7 March, 2024; v1 submitted 16 January, 2024; originally announced January 2024.

    Comments: 32 pages, 19 figures, Published as a conference paper at ICLR 2024

    MSC Class: 68T30 ACM Class: I.2.6

    Journal ref: International Conference on Learning Representations 2024 (ICLR)

  14. arXiv:2401.07991  [pdf, other

    cs.LG cs.CR

    Robustness Against Adversarial Attacks via Learning Confined Adversarial Polytopes

    Authors: Shayan Mohajer Hamidi, Linfeng Ye

    Abstract: Deep neural networks (DNNs) could be deceived by generating human-imperceptible perturbations of clean samples. Therefore, enhancing the robustness of DNNs against adversarial attacks is a crucial task. In this paper, we aim to train robust DNNs by limiting the set of outputs reachable via a norm-bounded perturbation added to a clean sample. We refer to this set as adversarial polytope, and each c… ▽ More

    Submitted 20 January, 2024; v1 submitted 15 January, 2024; originally announced January 2024.

    Comments: The paper has been accepted in ICASSP 2024

  15. arXiv:2401.04993  [pdf, other

    cs.LG cs.AI

    AdaFed: Fair Federated Learning via Adaptive Common Descent Direction

    Authors: Shayan Mohajer Hamidi, En-Hui Yang

    Abstract: Federated learning (FL) is a promising technology via which some edge devices/clients collaboratively train a machine learning model orchestrated by a server. Learning an unfair model is known as a critical problem in federated learning, where the trained model may unfairly advantage or disadvantage some of the devices. To tackle this problem, in this work, we propose AdaFed. The goal of AdaFed is… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

    Comments: This paper has been accepted in Transactions on Machine Learning Research. This is the link to the paper: https://openreview.net/forum?id=rFecyFpFUp&referrer=%5Bthe%20profile%20of%20Shayan%20Mohajer%20Hamidi%5D(%2Fprofile%3Fid%3D~Shayan_Mohajer_Hamidi1)

  16. arXiv:2401.00532  [pdf, other

    cs.LG cs.AI

    On the Necessity of Metalearning: Learning Suitable Parameterizations for Learning Processes

    Authors: Massinissa Hamidi, Aomar Osmani

    Abstract: In this paper we will discuss metalearning and how we can go beyond the current classical learning paradigm. We will first address the importance of inductive biases in the learning process and what is at stake: the quantities of data necessary to learn. We will subsequently see the importance of choosing suitable parameterizations to end up with well-defined learning processes. Especially since i… ▽ More

    Submitted 31 December, 2023; originally announced January 2024.

  17. arXiv:2312.04675  [pdf, ps, other

    cs.LG

    Reverse Engineering Deep ReLU Networks An Optimization-based Algorithm

    Authors: Mehrab Hamidi

    Abstract: Reverse engineering deep ReLU networks is a critical problem in understanding the complex behavior and interpretability of neural networks. In this research, we present a novel method for reconstructing deep ReLU networks by leveraging convex optimization techniques and a sampling-based approach. Our method begins by sampling points in the input space and querying the black box model to obtain the… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

    Comments: 9 pages, 2 supplementary pages

  18. arXiv:2309.09123  [pdf, other

    cs.LG cs.AI

    Conditional Mutual Information Constrained Deep Learning for Classification

    Authors: En-Hui Yang, Shayan Mohajer Hamidi, Linfeng Ye, Renhao Tan, Beverly Yang

    Abstract: The concepts of conditional mutual information (CMI) and normalized conditional mutual information (NCMI) are introduced to measure the concentration and separation performance of a classification deep neural network (DNN) in the output probability distribution space of the DNN, where CMI and the ratio between CMI and NCMI represent the intra-class concentration and inter-class separation of the D… ▽ More

    Submitted 16 September, 2023; originally announced September 2023.

  19. arXiv:2211.06932  [pdf, other

    cs.RO

    Challenges in Close-Proximity Safe and Seamless Operation of Manned and Unmanned Aircraft in Shared Airspace

    Authors: Jay Patrikar, Joao P. A. Dantas, Sourish Ghosh, Parv Kapoor, Ian Higgins, Jasmine J. Aloor, Ingrid Navarro, Jimin Sun, Ben Stoler, Milad Hamidi, Rohan Baijal, Brady Moon, Jean Oh, Sebastian Scherer

    Abstract: We propose developing an integrated system to keep autonomous unmanned aircraft safely separated and behave as expected in conjunction with manned traffic. The main goal is to achieve safe manned-unmanned vehicle teaming to improve system performance, have each (robot/human) teammate learn from each other in various aircraft operations, and reduce the manning needs of manned aircraft. The proposed… ▽ More

    Submitted 13 November, 2022; originally announced November 2022.

  20. arXiv:2209.12849  [pdf, other

    cs.CV cs.LG cs.RO

    AirTrack: Onboard Deep Learning Framework for Long-Range Aircraft Detection and Tracking

    Authors: Sourish Ghosh, Jay Patrikar, Brady Moon, Milad Moghassem Hamidi, Sebastian Scherer

    Abstract: Detect-and-Avoid (DAA) capabilities are critical for safe operations of unmanned aircraft systems (UAS). This paper introduces, AirTrack, a real-time vision-only detect and tracking framework that respects the size, weight, and power (SWaP) constraints of sUAS systems. Given the low Signal-to-Noise ratios (SNR) of far away aircraft, we propose using full resolution images in a deep learning framew… ▽ More

    Submitted 20 March, 2023; v1 submitted 26 September, 2022; originally announced September 2022.

    Comments: 7 pages, 5 figures, ICRA 2023

  21. arXiv:2111.15046  [pdf, other

    cs.IT eess.SP

    A Secure Key Sharing Algorithm Exploiting Phase Reciprocity in Wireless Channels

    Authors: Shayan Mohajer Hamidi, Amir Keyvan Khandani, Ehsan Bateni

    Abstract: This article presents a secure key exchange algorithm that exploits reciprocity in wireless channels to share a secret key between two nodes $A$ and $B$. Reciprocity implies that the channel phases in the links $A\rightarrow B$ and $B\rightarrow A$ are the same. A number of such reciprocal phase values are measured at nodes $A$ and $B$, called shared phase values hereafter. Each shared phase value… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

  22. arXiv:2111.12305  [pdf, other

    cs.LG

    Thundernna: a white box adversarial attack

    Authors: Linfeng Ye, Shayan Mohajer Hamidi

    Abstract: The existing work shows that the neural network trained by naive gradient-based optimization method is prone to adversarial attacks, adds small malicious on the ordinary input is enough to make the neural network wrong. At the same time, the attack against a neural network is the key to improving its robustness. The training against adversarial examples can make neural networks resist some kinds o… ▽ More

    Submitted 21 January, 2024; v1 submitted 24 November, 2021; originally announced November 2021.

    Comments: 10 pages, 5 figures

    MSC Class: 92B20 ACM Class: I.2.m

  23. arXiv:2104.04889  [pdf, other

    cs.LG eess.SP

    Affinity-Based Hierarchical Learning of Dependent Concepts for Human Activity Recognition

    Authors: Aomar Osmani, Massinissa Hamidi, Pegah Alizadeh

    Abstract: In multi-class classification tasks, like human activity recognition, it is often assumed that classes are separable. In real applications, this assumption becomes strong and generates inconsistencies. Besides, the most commonly used approach is to learn classes one-by-one against the others. This computational simplification principle introduces strong inductive biases on the learned theories. In… ▽ More

    Submitted 10 April, 2021; originally announced April 2021.

  24. arXiv:2104.04885  [pdf, other

    cs.LG eess.SP

    Description of Structural Biases and Associated Data in Sensor-Rich Environments

    Authors: Massinissa Hamidi, Aomar Osmani

    Abstract: In this article, we study activity recognition in the context of sensor-rich environments. We address, in particular, the problem of inductive biases and their impact on the data collection process. To be effective and robust, activity recognition systems must take these biases into account at all levels and model them as hyperparameters by which they can be controlled. Whether it is a bias relate… ▽ More

    Submitted 10 April, 2021; originally announced April 2021.

  25. arXiv:2011.11736  [pdf, other

    eess.IV cs.CV cs.LG

    Accurate and Rapid Diagnosis of COVID-19 Pneumonia with Batch Effect Removal of Chest CT-Scans and Interpretable Artificial Intelligence

    Authors: Rassa Ghavami Modegh, Mehrab Hamidi, Saeed Masoudian, Amir Mohseni, Hamzeh Lotfalinezhad, Mohammad Ali Kazemi, Behnaz Moradi, Mahyar Ghafoori, Omid Motamedi, Omid Pournik, Kiara Rezaei-Kalantari, Amirreza Manteghinezhad, Shaghayegh Haghjooy Javanmard, Fateme Abdoli Nezhad, Ahmad Enhesari, Mohammad Saeed Kheyrkhah, Razieh Eghtesadi, Javid Azadbakht, Akbar Aliasgharzadeh, Mohammad Reza Sharif, Ali Khaleghi, Abbas Foroutan, Hossein Ghanaati, Hamed Dashti, Hamid R. Rabiee

    Abstract: COVID-19 is a virus with high transmission rate that demands rapid identification of the infected patients to reduce the spread of the disease. The current gold-standard test, Reverse-Transcription Polymerase Chain Reaction (RT-PCR), has a high rate of false negatives. Diagnosing from CT-scan images as a more accurate alternative has the challenge of distinguishing COVID-19 from other pneumonia di… ▽ More

    Submitted 8 January, 2021; v1 submitted 23 November, 2020; originally announced November 2020.

    Comments: 27 pages, 4 figures. Some minor changes have been applied to the text, some fomulae are added to help the descriptions become more clear, two names and two names are corrected (The full version of the names are included)

  26. A Robust Blind 3-D Mesh Watermarking based on Wavelet Transform for Copyright Protection

    Authors: Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi, Driss Aboutajdine

    Abstract: Nowadays, three-dimensional meshes have been extensively used in several applications such as, industrial, medical, computer-aided design (CAD) and entertainment due to the processing capability improvement of computers and the development of the network infrastructure. Unfortunately, like digital images and videos, 3-D meshes can be easily modified, duplicated and redistributed by unauthorized us… ▽ More

    Submitted 9 November, 2019; originally announced November 2019.

    Comments: 6 pages, 3 figures, International Conference on Advanced Technologies for Signal and Image Processing (ATSIP'2017)

  27. Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform

    Authors: Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi, Mohammed El Hassouni

    Abstract: In this paper, a robust blind image watermarking method is proposed for copyright protection of digital images. This hybrid method relies on combining two well-known transforms that are the discrete Fourier transform (DFT) and the discrete cosine transform (DCT). The motivation behind this combination is to enhance the imperceptibility and the robustness. The imperceptibility requirement is achiev… ▽ More

    Submitted 2 November, 2019; originally announced November 2019.

    Comments: 34 page, 17 figures, published in Multimedia Tools and Applications Springer, 2018

    Journal ref: Multimedia Tools and Applications, 77(20), 27181-27214 (2018)

  28. Blind Robust 3-D Mesh Watermarking based on Mesh Saliency and QIM quantization for Copyright Protection

    Authors: Mohamed Hamidi, Aladine Chetouani, Mohamed El Haziti, Mohammed El Hassouni, and Hocine Cherifi

    Abstract: Due to the recent demand of 3-D models in several applications like medical imaging, video games, among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased considerably. The majority of robust 3-D watermarking techniques have essentially focused on the robustness against attacks while the imperceptibility of these techniques is still a real… ▽ More

    Submitted 28 October, 2019; originally announced October 2019.

    Comments: 11 pages, 5 figures, published in IbPRIA 2019: 9th Iberian Conference on Pattern Recognition and Image Analysis. arXiv admin note: substantial text overlap with arXiv:1910.11211

  29. A Robust Blind 3-D Mesh Watermarking technique based on SCS quantization and mesh Saliency for Copyright Protection

    Authors: Mohamed Hamidi, Aladine Chetouani, Mohamed El Haziti1, Mohammed El Hassouni, Hocine Cherifi

    Abstract: Due to the recent demand of 3-D meshes in a wide range of applications such as video games, medical imaging, film special effect making, computer-aided design (CAD), among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased in the last decade. Nowadays, the majority of robust 3-D watermarking approaches have mainly focused on the robustness… ▽ More

    Submitted 24 October, 2019; originally announced October 2019.

    Comments: 10 pages, 11 figures, 5th International Conference on Mobile, Secure and Programmable Networking (MSPN'2019)

  30. A blind Robust Image Watermarking Approach exploiting the DFT Magnitude

    Authors: Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi, Driss Aboutajdine

    Abstract: Due to the current progress in Internet, digital contents (video, audio and images) are widely used. Distribution of multimedia contents is now faster and it allows for easy unauthorized reproduction of information. Digital watermarking came up while trying to solve this problem. Its main idea is to embed a watermark into a host digital content without affecting its quality. Moreover, watermarking… ▽ More

    Submitted 21 October, 2019; originally announced October 2019.

    Comments: 6 pages, 4 Figures, published in : (2015) IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA)