Skip to main content

Showing 1–16 of 16 results for author: Mahyari, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.08982  [pdf, other

    cs.CV

    Adaptive Additive Parameter Updates of Vision Transformers for Few-Shot Continual Learning

    Authors: Kyle Stein, Andrew Arash Mahyari, Guillermo Francia III, Eman El-Sheikh

    Abstract: Integrating new class information without losing previously acquired knowledge remains a central challenge in artificial intelligence, often referred to as catastrophic forgetting. Few-shot class incremental learning (FSCIL) addresses this by first training a model on a robust dataset of base classes and then incrementally adapting it in successive sessions using only a few labeled examples per no… ▽ More

    Submitted 3 May, 2025; v1 submitted 11 April, 2025; originally announced April 2025.

  2. arXiv:2504.00348  [pdf, other

    cs.CV

    Transductive One-Shot Learning Meet Subspace Decomposition

    Authors: Kyle Stein, Andrew A. Mahyari, Guillermo Francia III, Eman El-Sheikh

    Abstract: One-shot learning focuses on adapting pretrained models to recognize newly introduced and unseen classes based on a single labeled image. While variations of few-shot and zero-shot learning exist, one-shot learning remains a challenging yet crucial problem due to its ability to generalize knowledge to unseen classes from just one human-annotated image. In this paper, we introduce a transductive on… ▽ More

    Submitted 20 May, 2025; v1 submitted 31 March, 2025; originally announced April 2025.

  3. arXiv:2502.20292  [pdf, other

    cs.CV cs.LG

    Visual Adaptive Prompting for Compositional Zero-Shot Learning

    Authors: Kyle Stein, Arash Mahyari, Guillermo Francia, Eman El-Sheikh

    Abstract: Vision-Language Models (VLMs) have demonstrated impressive capabilities in learning joint representations of visual and textual data, making them powerful tools for tasks such as Compositional Zero-Shot Learning (CZSL). CZSL requires models to generalize to novel combinations of visual primitives-such as attributes and objects-that were not explicitly encountered during training. Recent works in p… ▽ More

    Submitted 2 May, 2025; v1 submitted 27 February, 2025; originally announced February 2025.

  4. arXiv:2412.08755  [pdf, other

    cs.CV cs.AI cs.CR cs.LG

    Proactive Adversarial Defense: Harnessing Prompt Tuning in Vision-Language Models to Detect Unseen Backdoored Images

    Authors: Kyle Stein, Andrew Arash Mahyari, Guillermo Francia, Eman El-Sheikh

    Abstract: Backdoor attacks pose a critical threat by embedding hidden triggers into inputs, causing models to misclassify them into target labels. While extensive research has focused on mitigating these attacks in object recognition models through weight fine-tuning, much less attention has been given to detecting backdoored samples directly. Given the vast datasets used in training, manual inspection for… ▽ More

    Submitted 7 April, 2025; v1 submitted 11 December, 2024; originally announced December 2024.

  5. arXiv:2410.14018  [pdf

    cs.CY

    Toward a Real-Time Digital Twin Framework for Infection Mitigation During Air Travel

    Authors: Ashok Srinivasan, Satkkeerthi Sriram, Sirish Namilae, Andrew Arash Mahyari

    Abstract: Pedestrian dynamics simulates the fine-scaled trajectories of individuals in a crowd. It has been used to suggest public health interventions to reduce infection risk in important components of air travel, such as during boarding and in airport security lines. Due to inherent variability in human behavior, it is difficult to generalize simulation results to new geographic, cultural, or temporal co… ▽ More

    Submitted 17 October, 2024; originally announced October 2024.

    Comments: Submitted to IEEE

  6. arXiv:2409.18219  [pdf, other

    cs.CR cs.AI cs.LG

    Packet Inspection Transformer: A Self-Supervised Journey to Unseen Malware Detection with Few Samples

    Authors: Kyle Stein, Arash Mahyari, Guillermo Francia III, Eman El-Sheikh

    Abstract: As networks continue to expand and become more interconnected, the need for novel malware detection methods becomes more pronounced. Traditional security measures are increasingly inadequate against the sophistication of modern cyber attacks. Deep Packet Inspection (DPI) has been pivotal in enhancing network security, offering an in-depth analysis of network traffic that surpasses conventional mon… ▽ More

    Submitted 21 February, 2025; v1 submitted 26 September, 2024; originally announced September 2024.

  7. arXiv:2409.11254  [pdf

    cs.CR cs.LG

    Towards Novel Malicious Packet Recognition: A Few-Shot Learning Approach

    Authors: Kyle Stein, Andrew A. Mahyari, Guillermo Francia III, Eman El-Sheikh

    Abstract: As the complexity and connectivity of networks increase, the need for novel malware detection approaches becomes imperative. Traditional security defenses are becoming less effective against the advanced tactics of today's cyberattacks. Deep Packet Inspection (DPI) has emerged as a key technology in strengthening network security, offering detailed analysis of network traffic that goes beyond simp… ▽ More

    Submitted 17 September, 2024; originally announced September 2024.

  8. arXiv:2408.03489  [pdf, other

    cs.SE cs.AI cs.CR

    Harnessing the Power of LLMs in Source Code Vulnerability Detection

    Authors: Andrew A Mahyari

    Abstract: Software vulnerabilities, caused by unintentional flaws in source code, are a primary root cause of cyberattacks. Static analysis of source code has been widely used to detect these unintentional defects introduced by software developers. Large Language Models (LLMs) have demonstrated human-like conversational abilities due to their capacity to capture complex patterns in sequential data, such as… ▽ More

    Submitted 6 August, 2024; originally announced August 2024.

  9. arXiv:2403.18223  [pdf, other

    cs.CR cs.AI cs.LG

    A Transformer-Based Framework for Payload Malware Detection and Classification

    Authors: Kyle Stein, Arash Mahyari, Guillermo Francia III, Eman El-Sheikh

    Abstract: As malicious cyber threats become more sophisticated in breaching computer networks, the need for effective intrusion detection systems (IDSs) becomes crucial. Techniques such as Deep Packet Inspection (DPI) have been introduced to allow IDSs analyze the content of network packets, providing more context for identifying potential threats. IDSs traditionally rely on using anomaly-based and signatur… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

  10. arXiv:2211.08517  [pdf, other

    cs.CR cs.AI cs.LG cs.PL cs.SE

    A Hierarchical Deep Neural Network for Detecting Lines of Codes with Vulnerabilities

    Authors: Arash Mahyari

    Abstract: Software vulnerabilities, caused by unintentional flaws in source codes, are the main root cause of cyberattacks. Source code static analysis has been used extensively to detect the unintentional defects, i.e. vulnerabilities, introduced into the source codes by software developers. In this paper, we propose a deep learning approach to detect vulnerabilities from their LLVM IR representations base… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Comments: 22nd IEEE International Conference on Software, Quality, Reliability, and Security (QRS 2022)

    Journal ref: 22nd IEEE International Conference on Software, Quality, Reliability, and Security (QRS 2022)

  11. arXiv:2110.06287  [pdf, other

    cs.LG cs.AI cs.CV cs.HC stat.ML

    Real-Time Learning from An Expert in Deep Recommendation Systems with Marginal Distance Probability Distribution

    Authors: Arash Mahyari, Peter Pirolli, Jacqueline A. LeBlanc

    Abstract: Recommendation systems play an important role in today's digital world. They have found applications in various applications such as music platforms, e.g., Spotify, and movie streaming services, e.g., Netflix. Less research effort has been devoted to physical exercise recommendation systems. Sedentary lifestyles have become the major driver of several diseases as well as healthcare costs. In this… ▽ More

    Submitted 4 April, 2022; v1 submitted 12 October, 2021; originally announced October 2021.

    Journal ref: IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022

  12. arXiv:2102.05249  [pdf, other

    cs.LG cs.AI cs.CV cs.RO eess.SY

    Policy Augmentation: An Exploration Strategy for Faster Convergence of Deep Reinforcement Learning Algorithms

    Authors: Arash Mahyari

    Abstract: Despite advancements in deep reinforcement learning algorithms, developing an effective exploration strategy is still an open problem. Most existing exploration strategies either are based on simple heuristics, or require the model of the environment, or train additional deep neural networks to generate imagination-augmented paths. In this paper, a revolutionary algorithm, called Policy Augmentati… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

    Comments: proceedings of 46th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2021

  13. arXiv:2010.00482  [pdf

    cs.LG cs.AI cs.CV cs.IR cs.IT stat.ML

    Physical Exercise Recommendation and Success Prediction Using Interconnected Recurrent Neural Networks

    Authors: Arash Mahyari, Peter Pirolli

    Abstract: Unhealthy behaviors, e.g., physical inactivity and unhealthful food choice, are the primary healthcare cost drivers in developed countries. Pervasive computational, sensing, and communication technology provided by smartphones and smartwatches have made it possible to support individuals in their everyday lives to develop healthier lifestyles. In this paper, we propose an exercise recommendation s… ▽ More

    Submitted 27 January, 2021; v1 submitted 1 October, 2020; originally announced October 2020.

  14. arXiv:1809.08626  [pdf, other

    cs.RO cs.AI cs.CV cs.LG

    Domain Adaptation for Robot Predictive Maintenance Systems

    Authors: Arash Golibagh Mahyari, Thomas Locker

    Abstract: Industrial robots play an increasingly important role in a growing number of fields. For example, robotics is used to increase productivity while reducing costs in various aspects of manufacturing. Since robots are often set up in production lines, the breakdown of a single robot has a negative impact on the entire process, in the worst case bringing the whole line to a halt until the issue is res… ▽ More

    Submitted 24 February, 2020; v1 submitted 23 September, 2018; originally announced September 2018.

  15. arXiv:1510.02877   

    cs.IT

    Simultaneous Sparse Approximation and Common Component Extraction using Fast Distributed Compressive Sensing

    Authors: Arash Golibagh Mahyari, Selin Aviyente

    Abstract: Simultaneous sparse approximation is a generalization of the standard sparse approximation, for simultaneously representing a set of signals using a common sparsity model. Generalizing the compressive sensing concept to the simultaneous sparse approximation yields distributed compressive sensing (DCS). DCS finds the sparse representation of multiple correlated signals using the common + innovation… ▽ More

    Submitted 10 April, 2016; v1 submitted 10 October, 2015; originally announced October 2015.

    Comments: This paper has been withdrawn by the author because it is not completed

    Journal ref: Digital Signal Processing, Volume 60, January 2017, Pages 230-241

  16. arXiv:1410.0446  [pdf, ps, other

    cs.NE cs.LG q-bio.NC

    Identification of Dynamic functional brain network states Through Tensor Decomposition

    Authors: Arash Golibagh Mahyari, Selin Aviyente

    Abstract: With the advances in high resolution neuroimaging, there has been a growing interest in the detection of functional brain connectivity. Complex network theory has been proposed as an attractive mathematical representation of functional brain networks. However, most of the current studies of functional brain networks have focused on the computation of graph theoretic indices for static networks, i.… ▽ More

    Submitted 1 October, 2014; originally announced October 2014.

    Comments: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)