Skip to main content

Showing 1–31 of 31 results for author: Nejad, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2412.05591  [pdf

    cs.CL cs.AI cs.LG

    BERTCaps: BERT Capsule for Persian Multi-Domain Sentiment Analysis

    Authors: Mohammadali Memari, Soghra Mikaeyl Nejad, Amir Parsa Rabiei, Mehrshad Eisaei, Saba Hesaraki

    Abstract: Multidomain sentiment analysis involves estimating the polarity of an unstructured text by exploiting domain specific information. One of the main issues common to the approaches discussed in the literature is their poor applicability to domains that differ from those used to construct opinion models.This paper aims to present a new method for Persian multidomain SA analysis using deep learning ap… ▽ More

    Submitted 7 December, 2024; originally announced December 2024.

  2. arXiv:2410.21319  [pdf, other

    cs.LG cs.AI q-bio.NC

    Towards Continuous Skin Sympathetic Nerve Activity Monitoring: Removing Muscle Noise

    Authors: Farnoush Baghestani, Mahdi Pirayesh Shirazi Nejad, Youngsun Kong, Ki H. Chon

    Abstract: Continuous monitoring of non-invasive skin sympathetic nerve activity (SKNA) holds promise for understanding the sympathetic nervous system (SNS) dynamics in various physiological and pathological conditions. However, muscle noise artifacts present a challenge in accurate SKNA analysis, particularly in real-life scenarios. This study proposes a deep convolutional neural network (CNN) approach to d… ▽ More

    Submitted 26 October, 2024; originally announced October 2024.

    Comments: 4 pages, 5 figures, 1 table, IEEE-EMBS International Conference on Body Sensor Networks: NextGen Health: Sensor Innovation, AI, and Social Responsibility (IEEE BSN 2024)

  3. arXiv:2407.21001  [pdf, other

    cs.CV cs.AI cs.LG

    GABInsight: Exploring Gender-Activity Binding Bias in Vision-Language Models

    Authors: Ali Abdollahi, Mahdi Ghaznavi, Mohammad Reza Karimi Nejad, Arash Mari Oriyad, Reza Abbasi, Ali Salesi, Melika Behjati, Mohammad Hossein Rohban, Mahdieh Soleymani Baghshah

    Abstract: Vision-language models (VLMs) are intensively used in many downstream tasks, including those requiring assessments of individuals appearing in the images. While VLMs perform well in simple single-person scenarios, in real-world applications, we often face complex situations in which there are persons of different genders doing different activities. We show that in such cases, VLMs are biased towar… ▽ More

    Submitted 25 October, 2024; v1 submitted 30 July, 2024; originally announced July 2024.

    Journal ref: Volume 392 of ECAI 2024, Pages 729 - 736

  4. arXiv:2407.12226  [pdf, other

    cs.LG

    Individualized Federated Learning for Traffic Prediction with Error Driven Aggregation

    Authors: Hang Chen, Collin Meese, Mark Nejad, Chien-Chung Shen

    Abstract: Low-latency traffic prediction is vital for smart city traffic management. Federated Learning has emerged as a promising technique for Traffic Prediction (FLTP), offering several advantages such as privacy preservation, reduced communication overhead, improved prediction accuracy, and enhanced adaptability to changing traffic conditions. However, majority of the current FLTP frameworks lack a real… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

    Comments: 16 pages, 4 figures

  5. OAC: Output-adaptive Calibration for Accurate Post-training Quantization

    Authors: Ali Edalati, Alireza Ghaffari, Mahsa Ghazvini Nejad, Lu Hou, Boxing Chen, Masoud Asgharian, Vahid Partovi Nia

    Abstract: Deployment of Large Language Models (LLMs) has major computational costs, due to their rapidly expanding size. Compression of LLMs reduces the memory footprint, latency, and energy required for their inference. Post-training Quantization (PTQ) techniques have been developed to compress LLMs while avoiding expensive re-training. Most PTQ approaches formulate the quantization error based on a layer-… ▽ More

    Submitted 5 May, 2025; v1 submitted 23 May, 2024; originally announced May 2024.

    Comments: 22 pages, 4 figures

    Journal ref: Proceedings of the AAAI Conference on Artificial Intelligence 2025

  6. arXiv:2312.09211  [pdf, other

    cs.CL

    Mitigating Outlier Activations in Low-Precision Fine-Tuning of Language Models

    Authors: Alireza Ghaffari, Justin Yu, Mahsa Ghazvini Nejad, Masoud Asgharian, Boxing Chen, Vahid Partovi Nia

    Abstract: Low-precision fine-tuning of language models has gained prominence as a cost-effective and energy-efficient approach to deploying large-scale models in various applications. However, this approach is susceptible to the existence of outlier values in activation. The outlier values in the activation can negatively affect the performance of fine-tuning language models in the low-precision regime sinc… ▽ More

    Submitted 13 January, 2024; v1 submitted 14 December, 2023; originally announced December 2023.

  7. arXiv:2310.14669  [pdf, other

    cs.CR cs.AI cs.DC

    B^2SFL: A Bi-level Blockchained Architecture for Secure Federated Learning-based Traffic Prediction

    Authors: Hao Guo, Collin Meese, Wanxin Li, Chien-Chung Shen, Mark Nejad

    Abstract: Federated Learning (FL) is a privacy-preserving machine learning (ML) technology that enables collaborative training and learning of a global ML model based on aggregating distributed local model updates. However, security and privacy guarantees could be compromised due to malicious participants and the centralized FL server. This article proposed a bi-level blockchained architecture for secure fe… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

    Comments: Paper accepted for publication in IEEE Transactions on Services Computing (TSC)

  8. arXiv:2309.08289  [pdf, other

    cs.CV cs.AI cs.LG

    Large Intestine 3D Shape Refinement Using Point Diffusion Models for Digital Phantom Generation

    Authors: Kaouther Mouheb, Mobina Ghojogh Nejad, Lavsen Dahal, Ehsan Samei, Kyle J. Lafata, W. Paul Segars, Joseph Y. Lo

    Abstract: Accurate 3D modeling of human organs plays a crucial role in building computational phantoms for virtual imaging trials. However, generating anatomically plausible reconstructions of organ surfaces from computed tomography scans remains challenging for many structures in the human body. This challenge is particularly evident when dealing with the large intestine. In this study, we leverage recent… ▽ More

    Submitted 20 May, 2024; v1 submitted 15 September, 2023; originally announced September 2023.

  9. arXiv:2308.15950  [pdf, other

    cs.RO

    High Performance Networking Layer for Simulation Applications

    Authors: Amir Mohammad Zarif Shahsavan Nejad, Amir Mahdi Zarif Shahsavan Nejad, Amirali Setayeshi, Soroush Sadeghnejad

    Abstract: Autonomous vehicles are one of the most popular and also fast-growing technologies in the world. As we go further, there are still a lot of challenges that are unsolved and may cause problems in the future when it comes to testing in real world. Simulations on the other hand have always had a huge impact in the fields of science, technology, physics, etc. The simulation also powers real-world Auto… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

    Comments: 13 pages, 7 figures

  10. Aggregated Zero-knowledge Proof and Blockchain-Empowered Authentication for Autonomous Truck Platooning

    Authors: Wanxin Li, Collin Meese, Hao Guo, Mark Nejad

    Abstract: Platooning technologies enable trucks to drive cooperatively and automatically, providing benefits including less fuel consumption, greater road capacity, and safety. This paper introduces an aggregated zero-knowledge proof and blockchain-empowered system for privacy-preserving identity verification in the mixed fleet platooning environment. The correctness proof and the security analysis of the p… ▽ More

    Submitted 31 May, 2023; originally announced May 2023.

    Comments: Accepted for publication in IEEE Transactions on Intelligent Transportation Systems

  11. A Hybrid Blockchain-Edge Architecture for Electronic Health Records Management with Attribute-based Cryptographic Mechanisms

    Authors: Hao Guo, Wanxin Li, Mark Nejad, Chien-Chung Shen

    Abstract: This paper presents a hybrid blockchain-edge architecture for managing Electronic Health Records (EHRs) with attribute-based cryptographic mechanisms. The architecture introduces a novel attribute-based signature aggregation (ABSA) scheme and multi-authority attribute-based encryption (MA-ABE) integrated with Paillier homomorphic encryption (HE) to protect patients' anonymity and safeguard their E… ▽ More

    Submitted 31 May, 2023; originally announced May 2023.

    Comments: Accepted for publication in IEEE Transactions on Network and Service Management (TNSM)

  12. Traffic Prediction using Artificial Intelligence: Review of Recent Advances and Emerging Opportunities

    Authors: Maryam Shaygan, Collin Meese, Wanxin Li, Xiaolong Zhao, Mark Nejad

    Abstract: Traffic prediction plays a crucial role in alleviating traffic congestion which represents a critical problem globally, resulting in negative consequences such as lost hours of additional travel time and increased fuel consumption. Integrating emerging technologies into transportation systems provides opportunities for improving traffic prediction significantly and brings about new research proble… ▽ More

    Submitted 4 June, 2023; v1 submitted 31 May, 2023; originally announced May 2023.

    Comments: Published in Transportation Research Part C: Emerging Technologies (TR_C), Volume 145, 2022

  13. A Hierarchical and Location-aware Consensus Protocol for IoT-Blockchain Applications

    Authors: Hao Guo, Wanxin Li, Mark Nejad

    Abstract: Blockchain-based IoT systems can manage IoT devices and achieve a high level of data integrity, security, and provenance. However, incorporating existing consensus protocols in many IoT systems limits scalability and leads to high computational cost and consensus latency. In addition, location-centric characteristics of many IoT applications paired with limited storage and computing power of IoT d… ▽ More

    Submitted 28 May, 2023; originally announced May 2023.

    Comments: Published in IEEE Transactions on Network and Service Management ( Volume: 19, Issue: 3, September 2022). arXiv admin note: text overlap with arXiv:2305.16962

  14. BFRT: Blockchained Federated Learning for Real-time Traffic Flow Prediction

    Authors: Collin Meese, Hang Chen, Syed Ali Asif, Wanxin Li, Chien-Chung Shen, Mark Nejad

    Abstract: Accurate real-time traffic flow prediction can be leveraged to relieve traffic congestion and associated negative impacts. The existing centralized deep learning methodologies have demonstrated high prediction accuracy, but suffer from privacy concerns due to the sensitive nature of transportation data. Moreover, the emerging literature on traffic prediction by distributed learning approaches, inc… ▽ More

    Submitted 28 May, 2023; originally announced May 2023.

    Comments: Published in 2022 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid)

  15. A Location-based and Hierarchical Framework for Fast Consensus in Blockchain Networks

    Authors: Hao Guo, Wanxin Li, Mark Nejad

    Abstract: Blockchain-based IoT systems can manage IoT devices and achieve a high level of data integrity, security, and provenance. However, incorporating the existing consensus protocols in many IoT systems limits scalability and leads to high computational cost and network latency. We propose a hierar-chical and location-aware consensus protocol for IoI-blockchain applications inspired by the original Raf… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

    Comments: Published in 2021 4th International Conference on Hot Information-Centric Networking (HotICN)

  16. P-CFT: A Privacy-preserving and Crash Fault Tolerant Consensus Algorithm for Permissioned Blockchains

    Authors: Wanxin Li, Collin Meese, Mark Nejad, Hao Guo

    Abstract: Consensus algorithms play a critical role in blockchains and directly impact their performance. During consensus processing, nodes need to validate and order the pending transactions into a new block, which requires verifying the application-specific data encapsulated within a transaction. This exposes the underlying data to the consensus nodes, presenting privacy concerns. Existing consensus algo… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

    Comments: Published in 2021 4th International Conference on Hot Information-Centric Networking (HotICN)

  17. Location-aware Verification for Autonomous Truck Platooning Based on Blockchain and Zero-knowledge Proof

    Authors: Wanxin Li, Collin Meese, Zijia Zhong, Hao Guo, Mark Nejad

    Abstract: Platooning technologies enable trucks to drive cooperatively and automatically, which bring benefits including less fuel consumption, more road capacity and safety. In order to establish trust during dynamic platoon formation, ensure vehicular data integrity, and guard platoons against potential attackers, it is pivotal to verify any given vehicle's identity information before granting it access t… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

    Comments: Published in 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). arXiv admin note: text overlap with arXiv:2010.14037

  18. arXiv:2304.04005  [pdf

    cs.LG

    A new transformation for embedded convolutional neural network approach toward real-time servo motor overload fault-detection

    Authors: Seyed Mohammad Hossein Abedy Nejad, Mohammad Amin Behzadi, Abdolrahim Taheri

    Abstract: Overloading in DC servo motors is a major concern in industries, as many companies face the problem of finding expert operators, and also human monitoring may not be an effective solution. Therefore, this paper proposed an embedded Artificial intelligence (AI) approach using a Convolutional Neural Network (CNN) using a new transformation to extract faults from real-time input signals without human… ▽ More

    Submitted 8 April, 2023; originally announced April 2023.

  19. arXiv:2205.00265  [pdf, other

    cs.IR

    Designing a Sequential Recommendation System for Heterogeneous Interactions Using Transformers

    Authors: Mehdi Soleiman Nejad, Meysam Varasteh, Hadi Moradi, Mohammad Amin Sadeghi

    Abstract: While many production-ready and robust algorithms are available for the task of recommendation systems, many of these systems do not take the order of user's consumption into account. The order of consumption can be very useful and matters in many scenarios. One such scenario is an educational content recommendation, where users generally follow a progressive path towards more advanced courses. Re… ▽ More

    Submitted 30 April, 2022; originally announced May 2022.

  20. arXiv:2109.05516  [pdf, other

    cs.IR

    An Improved Hybrid Recommender System: Integrating Document Context-Based and Behavior-Based Methods

    Authors: Meysam Varasteh, Mehdi Soleiman Nejad, Hadi Moradi, Mohammad Amin Sadeghi, Ahmad Kalhor

    Abstract: One of the main challenges in recommender systems is data sparsity which leads to high variance. Several attempts have been made to improve the bias-variance trade-off using auxiliary information. In particular, document modeling-based methods have improved the model's accuracy by using textual data such as reviews, abstracts, and storylines when the user-to-item rating matrix is sparse. However,… ▽ More

    Submitted 12 September, 2021; originally announced September 2021.

  21. arXiv:2010.14037  [pdf, other

    cs.CR cs.DC cs.NI

    Blockchain-enabled Identity Verification for Safe Ridesharing Leveraging Zero-Knowledge Proof

    Authors: Wanxin Li, Collin Meese, Hao Guo, Mark Nejad

    Abstract: The on-demand mobility market, including ridesharing, is becoming increasingly important with e-hailing fares growing at a rate of approximately 130% per annum since 2013. By increasing utilization of existing vehicles and empty seats, ridesharing can provide many benefits including reduced traffic congestion and environmental impact from vehicle usage and production. However, the safety of riders… ▽ More

    Submitted 1 November, 2020; v1 submitted 26 October, 2020; originally announced October 2020.

    Comments: This paper has been accepted at IEEE International Conference on Hot Information-Centric Networking (IEEE HotICN), Hefei, China, December 12-14, 2020

  22. Autonomous and Semi-Autonomous Intersection Management: A Survey

    Authors: Zijia Zhong, Mark Nejad, Earl E. Lee

    Abstract: Intersection is a major source of traffic delays and accidents within modern transportation systems. Compared to signalized intersection management, autonomous intersection management (AIM) coordinates the intersection crossing at an individual vehicle level with additional flexibility. AIM can potentially eliminate stopping in intersection crossing due to traffic lights while maintaining a safe s… ▽ More

    Submitted 31 October, 2020; v1 submitted 23 June, 2020; originally announced June 2020.

    Comments: 16 pages, 10 figures

    Journal ref: IEEE Intelligent Transportation Systems Magazine, 2020

  23. Influence of CAV Clustering Strategies on Mixed Traffic Flow Characteristics: An Analysis of Vehicle Trajectory Data

    Authors: Zijia Zhong, Earl E. Lee, Mark Nejad, Joyoung Lee

    Abstract: Being one of the most promising applications enabled by connected and automated vehicles (CAV) technology, Cooperative Adaptive Cruise Control (CACC) is expected to be deployed in the near term on public roads.} Thus far, the majority of the CACC studies have been focusing on the overall network performance with limited insights on the potential impacts of CAVs on human-driven vehicles (HVs).This… ▽ More

    Submitted 10 February, 2021; v1 submitted 16 March, 2020; originally announced March 2020.

    Comments: 22 pages, 17 figures. arXiv admin note: substantial text overlap with arXiv:1909.13204

    Journal ref: Transportation Research Part C: Emerging Technologies, 115, 2020, 102611

  24. arXiv:2002.11078  [pdf, other

    cs.CR

    Attribute-based Multi-Signature and Encryption for EHR Management: A Blockchain-based Solution

    Authors: Hao Guo, Wanxin Li, Ehsan Meamari, Chien-Chung Shen, Mark Nejad

    Abstract: The global Electronic Health Record (EHR) market is growing dramatically and has already hit $31.5 billion in 2018. To safeguard the security of EHR data and privacy of patients, fine-grained information access and sharing mechanisms are essential for EHR management. This paper proposes a hybrid architecture of blockchain and edge nodes to facilitate EHR management. In this architecture, we utiliz… ▽ More

    Submitted 25 February, 2020; originally announced February 2020.

    Comments: This paper is accepted to the Short Paper track by 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2020)

  25. arXiv:1912.13308  [pdf, other

    cs.SE

    Building Confidence in Scientific Computing Software Via Assurance Cases

    Authors: Spencer Smith, Mojdeh Sayari Nejad, Alan Wassyng

    Abstract: Assurance cases provide an organized and explicit argument for correctness. They can dramatically improve the certification of Scientific Computing Software (SCS). Assurance cases have already been effectively used for safety cases for real time systems. Their advantages for SCS include engaging domain experts, producing only necessary documentation, and providing evidence that can be verified/rep… ▽ More

    Submitted 31 December, 2019; originally announced December 2019.

    Comments: 17 pages, 9 figures, submitted to Reliability Engineering & Safety Systems

  26. arXiv:1909.13204  [pdf, ps, other

    cs.MA

    Clustering Strategies of Cooperative Adaptive Cruise Control: Impacts on Human-driven Vehicles

    Authors: Zijia Zhong, Mark Nejad, Earl E. Lee, Joyoung Lee

    Abstract: As a promising application of connected and automated vehicles (CAVs), Cooperative Adaptive Cruise Control (CACC) is expected to be deployed on the public road in the near term. Thus far the majority of the CACC studies have been focusing on the overall network performance with limited insight on the potential impact of CAVs on human-driven vehicles (HVs). This paper aims to quantify the influence… ▽ More

    Submitted 29 September, 2019; originally announced September 2019.

    Comments: 7 pages, 6 figures, 2019 IEEE 2nd Connected and Automated Vehicles Symposium

  27. arXiv:1906.02628  [pdf

    cs.NI cs.CR cs.DC

    A Blockchain-Based Architecture for Traffic Signal Control Systems

    Authors: Wanxin Li, Mark Nejad, Rui Zhang

    Abstract: Ever-growing incorporation of connected vehicle (CV) technologies into intelligent traffic signal control systems bring about significant data security issues in the connected vehicular networks. This paper presents a novel decentralized and secure by design architecture for connected vehicle data security, which is based on the emerging blockchain paradigm. In a simulation study, we applied this… ▽ More

    Submitted 13 September, 2019; v1 submitted 6 June, 2019; originally announced June 2019.

    Comments: This paper has been accepted at IEEE International Congress on Internet of Things (IEEE ICIOT 2019), Milan, Italy

  28. arXiv:1906.01188  [pdf, other

    cs.CR cs.NI

    Access Control for Electronic Health Records with Hybrid Blockchain-Edge Architecture

    Authors: Hao Guo, Wanxin Li, Mark Nejad, Chien-Chung Shen

    Abstract: The global Electronic Health Record (EHR) market is growing dramatically and expected to reach $39.7 billions by 2022. To safe-guard security and privacy of EHR, access control is an essential mechanism for managing EHR data. This paper proposes a hybrid architecture to facilitate access control of EHR data by using both blockchain and edge node. Within the architecture, a blockchain-based control… ▽ More

    Submitted 4 June, 2019; originally announced June 2019.

    Comments: Accepted to Proc. of the IEEE 2nd International Conference on Blockchain (Blockchain-2019), Atlanta, USA

  29. arXiv:1902.02176  [pdf

    cs.CL

    A Linear-complexity Multi-biometric Forensic Document Analysis System, by Fusing the Stylome and Signature Modalities

    Authors: Sayyed-Ali Hossayni, Yousef Alizadeh-Q, Vahid Tavana, Seyed M. Hosseini Nejad, Mohammad-R Akbarzadeh-T, Esteve Del Acebo, Josep Lluis De la Rosa i Esteva, Enrico Grosso, Massimo Tistarelli, Przemyslaw Kudlacik

    Abstract: Forensic Document Analysis (FDA) addresses the problem of finding the authorship of a given document. Identification of the document writer via a number of its modalities (e.g. handwriting, signature, linguistic writing style (i.e. stylome), etc.) has been studied in the FDA state-of-the-art. But, no research is conducted on the fusion of stylome and signature modalities. In this paper, we propose… ▽ More

    Submitted 26 January, 2019; originally announced February 2019.

  30. arXiv:1803.11017  [pdf

    cs.ET cs.LO

    Reversible Gates in Emerging Quantum-dot Cellular Automata Technology: An Innovative Approach to Design and Simulation

    Authors: Moein Sarvaghad-Moghaddam, Ali A. Orouji, Zeinab Ramezani, Iraj Sadegh Amiri, Alireza Mahdavi Nejad

    Abstract: Power dissipation is known as the most notable limiting factor in all nano-electronic design techniques including Quantum-dot Cellular Automata (QCA). The familiar reversible computing approach is used as a reasonably reliable solution, mitigating power dissipation. This study presents, a comprehensive multi-objective method for designing R-Fs in emerging QCA technology. The results are investigat… ▽ More

    Submitted 9 December, 2019; v1 submitted 29 March, 2018; originally announced March 2018.

    Comments: arXiv admin note: text overlap with arXiv:1803.11016

  31. arXiv:1611.06538  [pdf, other

    cs.IT

    On Storage Allocation in Cache-Enabled Interference Channels with Mixed CSIT

    Authors: Mohammad Ali Tahmasbi Nejad, Seyed Pooya Shariatpanahi, Babak Hossein Khalaj

    Abstract: Recently, it has been shown that in a cache-enabled interference channel, the storage at the transmit and receive sides are of equal value in terms of Degrees of Freedom (DoF). This is derived by assuming full Channel State Information at the Transmitter (CSIT). In this paper, we consider a more practical scenario, where a training/feedback phase should exist for obtaining CSIT, during which insta… ▽ More

    Submitted 21 January, 2017; v1 submitted 20 November, 2016; originally announced November 2016.

    Comments: arXiv admin note: text overlap with arXiv:1209.5807 by other authors