Skip to main content

Showing 1–4 of 4 results for author: Miri, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.12067  [pdf, other

    cs.CV

    A Comprehensive Survey on Knowledge Distillation

    Authors: Amir M. Mansourian, Rozhan Ahmadi, Masoud Ghafouri, Amir Mohammad Babaei, Elaheh Badali Golezani, Zeynab Yasamani Ghamchi, Vida Ramezanian, Alireza Taherian, Kimia Dinashi, Amirali Miri, Shohreh Kasaei

    Abstract: Deep Neural Networks (DNNs) have achieved notable performance in the fields of computer vision and natural language processing with various applications in both academia and industry. However, with recent advancements in DNNs and transformer models with a tremendous number of parameters, deploying these large models on edge devices causes serious issues such as high runtime and memory consumption.… ▽ More

    Submitted 15 March, 2025; originally announced March 2025.

    Comments: 47 pages, 10 figures, 13 tables

  2. arXiv:2310.00070  [pdf, other

    cs.CR

    Adversarial Explainability: Utilizing Explainable Machine Learning in Bypassing IoT Botnet Detection Systems

    Authors: Mohammed M. Alani, Atefeh Mashatan, Ali Miri

    Abstract: Botnet detection based on machine learning have witnessed significant leaps in recent years, with the availability of large and reliable datasets that are extracted from real-life scenarios. Consequently, adversarial attacks on machine learning-based cybersecurity systems are posing a significant threat to the practicality of these solutions. In this paper, we introduce a novel attack that utilize… ▽ More

    Submitted 29 September, 2023; originally announced October 2023.

  3. arXiv:2205.11406  [pdf, other

    cs.SE cs.CR

    A Model-Driven-Engineering Approach for Detecting Privilege Escalation in IoT Systems

    Authors: Atheer Abu Zaid, Manar H. Alalfi, Ali Miri

    Abstract: Software vulnerabilities in access control models can represent a serious threat in a system. In fact, OWASP lists broken access control as number 5 in severity among the top 10 vulnerabilities. In this paper, we study the permission model of an emerging Smart-Home platform, SmartThings, and explore an approach that detects privilege escalation in its permission model. Our approach is based on Mod… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

  4. arXiv:1908.04473  [pdf, other

    cs.LG cs.AI stat.ML

    On Defending Against Label Flipping Attacks on Malware Detection Systems

    Authors: Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti

    Abstract: Label manipulation attacks are a subclass of data poisoning attacks in adversarial machine learning used against different applications, such as malware detection. These types of attacks represent a serious threat to detection systems in environments having high noise rate or uncertainty, such as complex networks and Internet of Thing (IoT). Recent work in the literature has suggested using the… ▽ More

    Submitted 16 June, 2020; v1 submitted 12 August, 2019; originally announced August 2019.

    Comments: 21 pages, 6 figures, 4 tables, NCAA Springer Journal