Skip to main content

Showing 1–13 of 13 results for author: Movahedi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.09560  [pdf, ps, other

    cs.AI cs.CL cs.CV

    EmbodiedBench: Comprehensive Benchmarking Multi-modal Large Language Models for Vision-Driven Embodied Agents

    Authors: Rui Yang, Hanyang Chen, Junyu Zhang, Mark Zhao, Cheng Qian, Kangrui Wang, Qineng Wang, Teja Venkat Koripella, Marziyeh Movahedi, Manling Li, Heng Ji, Huan Zhang, Tong Zhang

    Abstract: Leveraging Multi-modal Large Language Models (MLLMs) to create embodied agents offers a promising avenue for tackling real-world tasks. While language-centric embodied agents have garnered substantial attention, MLLM-based embodied agents remain underexplored due to the lack of comprehensive evaluation frameworks. To bridge this gap, we introduce EmbodiedBench, an extensive benchmark designed to e… ▽ More

    Submitted 5 June, 2025; v1 submitted 13 February, 2025; originally announced February 2025.

    Comments: Accepted to ICML 2025

  2. arXiv:2311.03224  [pdf

    cs.SE q-fin.RM

    Risk Analysis in the Selection of Project Managers Based on ANP and FMEA

    Authors: Armin Asaadi, Armita Atrian, Hesam Nik Hoseini, Mohammad Mahdi Movahedi

    Abstract: Project managers play a crucial role in the success of projects. The selection of an appropriate project manager is a primary concern for senior managers in firms. Typically, this process involves candidate interviews and assessments of their abilities. There are various criteria for selecting a project manager, and the importance of each criterion depends on the project type, its conditions, and… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

    Comments: 16 pages

  3. arXiv:2110.08177  [pdf, other

    cs.CR

    The Privacy-preserving Padding Problem: Non-negative Mechanisms for Conservative Answers with Differential Privacy

    Authors: Benjamin M. Case, James Honaker, Mahnush Movahedi

    Abstract: Differentially private noise mechanisms commonly use symmetric noise distributions. This is attractive both for achieving the differential privacy definition, and for unbiased expectations in the noised answers. However, there are contexts in which a noisy answer only has utility if it is conservative, that is, has known-signed error, which we call a padded answer. Seemingly, it is paradoxical to… ▽ More

    Submitted 15 October, 2021; originally announced October 2021.

    Comments: 20 pages, 7 figures

  4. arXiv:2101.04766  [pdf, other

    cs.CR cs.DC

    Privacy-Preserving Randomized Controlled Trials: A Protocol for Industry Scale Deployment

    Authors: Mahnush Movahedi, Benjamin M. Case, Andrew Knox, James Honaker, Li Li, Yiming Paul Li, Sanjay Saravanan, Shubho Sengupta, Erik Taubeneck

    Abstract: In this paper, we outline a way to deploy a privacy-preserving protocol for multiparty Randomized Controlled Trials on the scale of 500 million rows of data and more than a billion gates. Randomized Controlled Trials (RCTs) are widely used to improve business and policy decisions in various sectors such as healthcare, education, criminology, and marketing. A Randomized Controlled Trial is a scient… ▽ More

    Submitted 10 August, 2021; v1 submitted 12 January, 2021; originally announced January 2021.

  5. arXiv:1805.04548  [pdf, other

    cs.DC

    DFINITY Technology Overview Series, Consensus System

    Authors: Timo Hanke, Mahnush Movahedi, Dominic Williams

    Abstract: The DFINITY blockchain computer provides a secure, performant and flexible consensus mechanism. At its core, DFINITY contains a decentralized randomness beacon which acts as a verifiable random function (VRF) that produces a stream of outputs over time. The novel technique behind the beacon relies on the existence of a unique-deterministic, non-interactive, DKG-friendly threshold signatures scheme… ▽ More

    Submitted 11 May, 2018; originally announced May 2018.

  6. arXiv:1504.06316  [pdf, ps, other

    cs.DS cs.DC cs.IT cs.NI

    Interactive Communication with Unknown Noise Rate

    Authors: Varsha Dani, Thomas P. Hayes, Mahnush Movahedi, Jared Saia, Maxwell Young

    Abstract: Alice and Bob want to run a protocol over a noisy channel, where a certain number of bits are flipped adversarially. Several results take a protocol requiring $L$ bits of noise-free communication and make it robust over such a channel. In a recent breakthrough result, Haeupler described an algorithm that sends a number of bits that is conjectured to be near optimal in such a model. However, his al… ▽ More

    Submitted 13 August, 2015; v1 submitted 23 April, 2015; originally announced April 2015.

    Comments: Made substantial improvements to the algorithm and analysis. Previous version had a subtle error involving the adversary's ability to attack fingerprints

  7. arXiv:1408.4487  [pdf, other

    cs.DC cs.NE

    On Optimal Decision-Making in Ant Colonies

    Authors: Mahnush Movahedi, Mahdi Zamani

    Abstract: Colonies of ants can collectively choose the best of several nests, even when many of the active ants who organize the move visit only one site. Understanding such a behavior can help us design efficient distributed decision making algorithms. Marshall et al. propose a model for house-hunting in colonies of ant Temnothorax albipennis. Unfortunately, their model does not achieve optimal decision-ma… ▽ More

    Submitted 19 August, 2014; originally announced August 2014.

    Comments: Workshop on Biological Distributed Algorithms (BDA 2014)

  8. arXiv:1405.5326  [pdf, ps, other

    cs.DC cs.CR

    Secure Anonymous Broadcast

    Authors: Mahnush Movahedi, Jared Saia, Mahdi Zamani

    Abstract: In anonymous broadcast, one or more parties want to anonymously send messages to all parties. This problem is increasingly important as a black-box in many privacy-preserving applications such as anonymous communication, distributed auctions, and multi-party computation. In this paper, we design decentralized protocols for anonymous broadcast that require each party to send (and compute) a polylog… ▽ More

    Submitted 21 May, 2014; originally announced May 2014.

    Comments: 18 Pages, 1 figure

  9. arXiv:1401.0102  [pdf

    cs.DC cs.AI cs.CR cs.MA

    A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents

    Authors: Mahdi Zamani, Mahnush Movahedi, Mohammad Ebadzadeh, Hossein Pedram

    Abstract: We propose an artificial immune model for intrusion detection in distributed systems based on a relatively recent theory in immunology called Danger theory. Based on Danger theory, immune response in natural systems is a result of sensing corruption as well as sensing unknown substances. In contrast, traditional self-nonself discrimination theory states that immune response is only initiated by se… ▽ More

    Submitted 28 December, 2014; v1 submitted 31 December, 2013; originally announced January 2014.

    Comments: 10 pages, 3 figure

    ACM Class: C.2.1; C.2.2; I.2.11; C.2.0

  10. arXiv:1312.2177  [pdf, other

    cs.CR cs.LG cs.NI

    Machine Learning Techniques for Intrusion Detection

    Authors: Mahdi Zamani, Mahnush Movahedi

    Abstract: An Intrusion Detection System (IDS) is a software that monitors a single or a network of computers for malicious activities (attacks) that are aimed at stealing or censoring information or corrupting network protocols. Most techniques used in today's IDS are not able to deal with the dynamic and complex nature of cyber attacks on computer networks. Hence, efficient adaptive methods like various te… ▽ More

    Submitted 9 May, 2015; v1 submitted 8 December, 2013; originally announced December 2013.

    Comments: 11 pages

    Report number: UNM-48066-F13 ACM Class: C.2.0; K.6.5

  11. arXiv:1310.3486  [pdf, other

    cs.DS cs.CR cs.DC

    Quorums Quicken Queries: Efficient Asynchronous Secure Multiparty Computation

    Authors: Varsha Dani, Valerie King, Mahnush Movahedi, Jared Saia

    Abstract: We describe an asynchronous algorithm to solve secure multiparty computation (MPC) over n players, when strictly less than a 1/8 fraction of the players are controlled by a static adversary. For any function f over a field that can be computed by a circuit with m gates, our algorithm requires each player to send a number of field elements and perform an amount of computation that is O (m/n + \sqrt… ▽ More

    Submitted 13 October, 2013; originally announced October 2013.

    Comments: ICDCN version: 15 pages

  12. arXiv:1205.0581  [pdf, other

    cs.DS

    Scalable Mechanisms for Rational Secret Sharing

    Authors: Varsha Dani, Mahnush Movahedi, Jared Saia

    Abstract: We consider the classical secret sharing problem in the case where all agents are selfish but rational. In recent work, Kol and Naor show that, when there are two players, in the non-simultaneous communication model, i.e. when rushing is possible, there is no Nash equilibrium that ensures both players learn the secret. However, they describe a mechanism for this problem, for any number of players,… ▽ More

    Submitted 2 May, 2012; originally announced May 2012.

    Comments: 30 pages, 2 figures

  13. arXiv:1203.0289  [pdf, other

    cs.DS

    Secure Multi-Party Computation in Large Networks

    Authors: Varsha Dani, Valerie King, Mahnush Movahedi, Jared Saia, Mahdi Zamani

    Abstract: We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a large number of parties. We consider both the synchronous and the asynchronous communication models. In the synchronous setting, our protocol is secure against a static malicious adversary corrupting less than a $1/3$ fraction of the parties. In the asynchronous setting, we allow the adversary to co… ▽ More

    Submitted 27 September, 2015; v1 submitted 1 March, 2012; originally announced March 2012.

    Comments: 51 pages