Skip to main content

Showing 1–32 of 32 results for author: Rafiei, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.16215  [pdf, other

    cs.SE

    Identifying Process Improvement Opportunities through Process Execution Benchmarking

    Authors: Luka Abb, Majid Rafiei, Timotheus Kampik, Jana-Rebecca Rehse

    Abstract: Benchmarking functionalities in current commercial process mining tools allow organizations to contextualize their process performance through high-level performance indicators, such as completion rate or throughput time. However, they do not suggest any measures to close potential performance gaps. To address this limitation, we propose a prescriptive technique for process execution benchmarking… ▽ More

    Submitted 22 April, 2025; originally announced April 2025.

  2. arXiv:2504.06418  [pdf, other

    cs.LG cs.CR

    Releasing Differentially Private Event Logs Using Generative Models

    Authors: Frederik Wangelik, Majid Rafiei, Mahsa Pourbafrani, Wil M. P. van der Aalst

    Abstract: In recent years, the industry has been witnessing an extended usage of process mining and automated event data analysis. Consequently, there is a rising significance in addressing privacy apprehensions related to the inclusion of sensitive and private information within event data utilized by process mining algorithms. State-of-the-art research mainly focuses on providing quantifiable privacy guar… ▽ More

    Submitted 8 April, 2025; originally announced April 2025.

    Comments: arXiv admin note: text overlap with arXiv:2303.16704

  3. arXiv:2501.13576  [pdf, other

    cs.IR

    Federated Conformance Checking

    Authors: Majid Rafiei, Mahsa Pourbafrani, Wil M. P. van der Aalst

    Abstract: Conformance checking is a crucial aspect of process mining, where the main objective is to compare the actual execution of a process, as recorded in an event log, with a reference process model, e.g., in the form of a Petri net or a BPMN. Conformance checking enables identifying deviations, anomalies, or non-compliance instances. It offers different perspectives on problems in processes, bottlenec… ▽ More

    Submitted 23 January, 2025; originally announced January 2025.

  4. arXiv:2501.06128  [pdf, other

    cs.DC

    Benchmarking Different Application Types across Heterogeneous Cloud Compute Services

    Authors: Nivedhitha Duggi, Masoud Rafiei, Mohsen Amini Salehi

    Abstract: Infrastructure as a Service (IaaS) clouds have become the predominant underlying infrastructure for the operation of modern and smart technology. IaaS clouds have proven to be useful for multiple reasons such as reduced costs, increased speed and efficiency, and better reliability and scalability. Compute services offered by such clouds are heterogeneous -- they offer a set of architecturally dive… ▽ More

    Submitted 10 January, 2025; originally announced January 2025.

    Comments: Technical Report. arXiv admin note: text overlap with arXiv:2011.11711 by other authors

  5. MOFHEI: Model Optimizing Framework for Fast and Efficient Homomorphically Encrypted Neural Network Inference

    Authors: Parsa Ghazvinian, Robert Podschwadt, Prajwal Panzade, Mohammad H. Rafiei, Daniel Takabi

    Abstract: Due to the extensive application of machine learning (ML) in a wide range of fields and the necessity of data privacy, privacy-preserving machine learning (PPML) solutions have recently gained significant traction. One group of approaches relies on Homomorphic Encryption (HE), which enables us to perform ML tasks over encrypted data. However, even with state-of-the-art HE schemes, HE operations ar… ▽ More

    Submitted 10 December, 2024; originally announced December 2024.

    Comments: 10 pages, 5 Figures, IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications 2024

  6. arXiv:2410.12597  [pdf

    cs.LG

    Personalized Prediction Models for Changes in Knee Pain among Patients with Osteoarthritis Participating in Supervised Exercise and Education

    Authors: M. Rafiei, S. Das, M. Bakhtiari, E. M. Roos, S. T. Skou, D. T. Grønne, J. Baumbach, L. Baumbach

    Abstract: Knee osteoarthritis (OA) is a widespread chronic condition that impairs mobility and diminishes quality of life. Despite the proven benefits of exercise therapy and patient education in managing the OA symptoms pain and functional limitations, these strategies are often underutilized. Personalized outcome prediction models can help motivate and engage patients, but the accuracy of existing models… ▽ More

    Submitted 16 October, 2024; originally announced October 2024.

  7. arXiv:2406.04347  [pdf, other

    cs.SE cs.AI

    Process Variant Analysis Across Continuous Features: A Novel Framework

    Authors: Ali Norouzifar, Majid Rafiei, Marcus Dees, Wil van der Aalst

    Abstract: Extracted event data from information systems often contain a variety of process executions making the data complex and difficult to comprehend. Unlike current research which only identifies the variability over time, we focus on other dimensions that may play a role in the performance of the process. This research addresses the challenge of effectively segmenting cases within operational processe… ▽ More

    Submitted 6 May, 2024; originally announced June 2024.

    Comments: Accepted at the BPMDS 2024 conference and to be published in their proceedings

  8. arXiv:2406.00249  [pdf, other

    cs.LG cs.CR

    Privacy Challenges in Meta-Learning: An Investigation on Model-Agnostic Meta-Learning

    Authors: Mina Rafiei, Mohammadmahdi Maheri, Hamid R. Rabiee

    Abstract: Meta-learning involves multiple learners, each dedicated to specific tasks, collaborating in a data-constrained setting. In current meta-learning methods, task learners locally learn models from sensitive data, termed support sets. These task learners subsequently share model-related information, such as gradients or loss values, which is computed using another part of the data termed query set, w… ▽ More

    Submitted 31 May, 2024; originally announced June 2024.

  9. SSCAE -- Semantic, Syntactic, and Context-aware natural language Adversarial Examples generator

    Authors: Javad Rafiei Asl, Mohammad H. Rafiei, Manar Alohaly, Daniel Takabi

    Abstract: Machine learning models are vulnerable to maliciously crafted Adversarial Examples (AEs). Training a machine learning model with AEs improves its robustness and stability against adversarial attacks. It is essential to develop models that produce high-quality AEs. Developing such models has been much slower in natural language processing (NLP) than in areas such as computer vision. This paper intr… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

    Journal ref: IEEE Transactions on Dependable and Secure Computing (2024), pp. 1-17

  10. arXiv:2403.01975  [pdf, other

    cs.DB

    OCEL (Object-Centric Event Log) 2.0 Specification

    Authors: Alessandro Berti, Istvan Koren, Jan Niklas Adams, Gyunam Park, Benedikt Knopp, Nina Graves, Majid Rafiei, Lukas Liß, Leah Tacke Genannt Unterberg, Yisong Zhang, Christopher Schwanen, Marco Pegoraro, Wil M. P. van der Aalst

    Abstract: Object-Centric Event Logs (OCELs) form the basis for Object-Centric Process Mining (OCPM). OCEL 1.0 was first released in 2020 and triggered the development of a range of OCPM techniques. OCEL 2.0 forms the new, more expressive standard, allowing for more extensive process analyses while remaining in an easily exchangeable format. In contrast to the first OCEL standard, it can depict changes in ob… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  11. arXiv:2311.14506  [pdf, other

    cs.CV

    Multi-Class Anomaly Detection based on Regularized Discriminative Coupled hypersphere-based Feature Adaptation

    Authors: Mehdi Rafiei, Alexandros Iosifidis

    Abstract: In anomaly detection, identification of anomalies across diverse product categories is a complex task. This paper introduces a new model by including class discriminative properties obtained by a modified Regularized Discriminative Variational Auto-Encoder (RD-VAE) in the feature extraction process of Coupled-hypersphere-based Feature Adaptation (CFA). By doing so, the proposed Regularized Discrim… ▽ More

    Submitted 2 February, 2024; v1 submitted 24 November, 2023; originally announced November 2023.

    Comments: 14 pages, 6 figures, 6 tables

  12. arXiv:2310.16435  [pdf, other

    cs.CV

    On Pixel-level Performance Assessment in Anomaly Detection

    Authors: Mehdi Rafiei, Toby P. Breckon, Alexandros Iosifidis

    Abstract: Anomaly detection methods have demonstrated remarkable success across various applications. However, assessing their performance, particularly at the pixel-level, presents a complex challenge due to the severe imbalance that is most commonly present between normal and abnormal samples. Commonly adopted evaluation metrics designed for pixel-level detection may not effectively capture the nuanced pe… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

    Comments: 5 pages, 5 figures, 1 table

  13. arXiv:2310.02735  [pdf, other

    cs.LG

    Extracting Rules from Event Data for Study Planning

    Authors: Majid Rafiei, Duygu Bayrak, Mahsa Pourbafrani, Gyunam Park, Hayyan Helal, Gerhard Lakemeyer, Wil M. P. van der Aalst

    Abstract: In this study, we examine how event data from campus management systems can be used to analyze the study paths of higher education students. The main goal is to offer valuable guidance for their study planning. We employ process and data mining techniques to explore the impact of sequences of taken courses on academic success. Through the use of decision tree models, we generate data-driven recomm… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

  14. arXiv:2308.01438  [pdf, other

    cs.LG cs.AI physics.data-an

    Novel Physics-Based Machine-Learning Models for Indoor Air Quality Approximations

    Authors: Ahmad Mohammadshirazi, Aida Nadafian, Amin Karimi Monsefi, Mohammad H. Rafiei, Rajiv Ramnath

    Abstract: Cost-effective sensors are capable of real-time capturing a variety of air quality-related modalities from different pollutant concentrations to indoor/outdoor humidity and temperature. Machine learning (ML) models are capable of performing air-quality "ahead-of-time" approximations. Undoubtedly, accurate indoor air quality approximation significantly helps provide a healthy indoor environment, op… ▽ More

    Submitted 2 August, 2023; originally announced August 2023.

    ACM Class: I.2.6

  15. arXiv:2307.13766  [pdf, other

    cs.IR cs.AI cs.LG

    ClusterSeq: Enhancing Sequential Recommender Systems with Clustering based Meta-Learning

    Authors: Mohammmadmahdi Maheri, Reza Abdollahzadeh, Bardia Mohammadi, Mina Rafiei, Jafar Habibi, Hamid R. Rabiee

    Abstract: In practical scenarios, the effectiveness of sequential recommendation systems is hindered by the user cold-start problem, which arises due to limited interactions for accurately determining user preferences. Previous studies have attempted to address this issue by combining meta-learning with user and item-side information. However, these approaches face inherent challenges in modeling user prefe… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

  16. arXiv:2304.11734  [pdf, other

    cs.CV

    Class-Specific Variational Auto-Encoder for Content-Based Image Retrieval

    Authors: Mehdi Rafiei, Alexandros Iosifidis

    Abstract: Using a discriminative representation obtained by supervised deep learning methods showed promising results on diverse Content-Based Image Retrieval (CBIR) problems. However, existing methods exploiting labels during training try to discriminate all available classes, which is not ideal in cases where the retrieval problem focuses on a class of interest. In this paper, we propose a regularized los… ▽ More

    Submitted 23 April, 2023; originally announced April 2023.

    Comments: 8 pages, 7 figures, 6 tables, accepted at IJCNN conference

  17. arXiv:2303.16704  [pdf, other

    cs.LG cs.CR

    TraVaG: Differentially Private Trace Variant Generation Using GANs

    Authors: Majid Rafiei, Frederik Wangelik, Mahsa Pourbafrani, Wil M. P. van der Aalst

    Abstract: Process mining is rapidly growing in the industry. Consequently, privacy concerns regarding sensitive and private information included in event data, used by process mining algorithms, are becoming increasingly relevant. State-of-the-art research mainly focuses on providing privacy guarantees, e.g., differential privacy, for trace variants that are used by the main process mining techniques, e.g.,… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

  18. arXiv:2212.06514  [pdf, other

    cs.DB

    Interactive Process Identification and Selection from SAP ERP

    Authors: Julian Weber, Alessandro Berti, Gyunam Park, Majid Rafiei, Wil van der Aalst

    Abstract: SAP ERP is one of the most popular information systems supporting various organizational processes, e.g., O2C and P2P. However, the amount of processes and data contained in SAP ERP is enormous. Thus, the identification of the processes that are contained in a specific SAP instance, and the creation of a list of related tables is a significant challenge. Eventually, one needs to extract an event l… ▽ More

    Submitted 13 December, 2022; originally announced December 2022.

  19. Computer Vision on X-ray Data in Industrial Production and Security Applications: A Comprehensive Survey

    Authors: Mehdi Rafiei, Jenni Raitoharju, Alexandros Iosifidis

    Abstract: X-ray imaging technology has been used for decades in clinical tasks to reveal the internal condition of different organs, and in recent years, it has become more common in other areas such as industry, security, and geography. The recent development of computer vision and machine learning techniques has also made it easier to automatically process X-ray images and several machine learning-based o… ▽ More

    Submitted 2 January, 2023; v1 submitted 10 November, 2022; originally announced November 2022.

    Comments: 32pages, 20 figures, 12 tables. A literature review paper. Journal

  20. Recognition of Defective Mineral Wool Using Pruned ResNet Models

    Authors: Mehdi Rafiei, Dat Thanh Tran, Alexandros Iosifidis

    Abstract: Mineral wool production is a non-linear process that makes it hard to control the final quality. Therefore, having a non-destructive method to analyze the product quality and recognize defective products is critical. For this purpose, we developed a visual quality control system for mineral wool. X-ray images of wool specimens were collected to create a training set of defective and non-defective… ▽ More

    Submitted 1 November, 2022; originally announced November 2022.

    Comments: 6 pages, 5 figures, 3 tables Submitted on IEEE Transactions on Industrial Informatics

  21. arXiv:2210.14951  [pdf, other

    cs.CR

    TraVaS: Differentially Private Trace Variant Selection for Process Mining

    Authors: Majid Rafiei, Frederik Wangelik, Wil M. P. van der Aalst

    Abstract: In the area of industrial process mining, privacy-preserving event data publication is becoming increasingly relevant. Consequently, the trade-off between high data utility and quantifiable privacy poses new challenges. State-of-the-art research mainly focuses on differentially private trace variant construction based on prefix expansion methods. However, these algorithms face several practical li… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

  22. arXiv:2208.01886  [pdf, other

    cs.CR

    Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing

    Authors: Majid Rafiei, Gamal Elkoumy, Wil M. P. van der Aalst

    Abstract: Process mining employs event data extracted from different types of information systems to discover and analyze actual processes. Event data often contain highly sensitive information about the people who carry out activities or the people for whom activities are performed. Therefore, privacy concerns in process mining are receiving increasing attention. To alleviate privacy-related risks, several… ▽ More

    Submitted 29 September, 2022; v1 submitted 3 August, 2022; originally announced August 2022.

  23. arXiv:2110.03467  [pdf, other

    cs.DB

    An Event Data Extraction Approach from SAP ERP for Process Mining

    Authors: Alessandro Berti, Gyunam Park, Majid Rafiei, Wil van der Aalst

    Abstract: The extraction, transformation, and loading of event logs from information systems is the first and the most expensive step in process mining. In particular, extracting event logs from popular ERP systems such as SAP poses major challenges, given the size and the structure of the data. Open-source support for ETL is scarce, while commercial process mining vendors maintain connectors to ERP systems… ▽ More

    Submitted 7 October, 2021; originally announced October 2021.

  24. arXiv:2110.02707  [pdf, other

    cs.SE cs.AI

    Trustworthy Artificial Intelligence and Process Mining: Challenges and Opportunities

    Authors: Andrew Pery, Majid Rafiei, Michael Simon, Wil M. P. van der Aalst

    Abstract: The premise of this paper is that compliance with Trustworthy AI governance best practices and regulatory frameworks is an inherently fragmented process spanning across diverse organizational units, external stakeholders, and systems of record, resulting in process uncertainties and in compliance gaps that may expose organizations to reputational and regulatory risks. Moreover, there are complexit… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

  25. arXiv:2107.14499  [pdf, other

    cs.CR

    PC4PM: A Tool for Privacy/Confidentiality Preservation in Process Mining

    Authors: Majid Rafiei, Alexander Schnitzler, Wil M. P. van der Aalst

    Abstract: Process mining enables business owners to discover and analyze their actual processes using event data that are widely available in information systems. Event data contain detailed information which is incredibly valuable for providing insights. However, such detailed data often include highly confidential and private information. Thus, concerns of privacy and confidentiality in process mining are… ▽ More

    Submitted 30 July, 2021; originally announced July 2021.

  26. arXiv:2106.00388  [pdf, ps, other

    cs.CR cs.DB

    Privacy and Confidentiality in Process Mining -- Threats and Research Challenges

    Authors: Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Mohammadreza Fani Sani, Agnes Koschmider, Felix Mannhardt, Saskia Nuñez von Voigt, Majid Rafiei, Leopold von Waldthausen

    Abstract: Privacy and confidentiality are very important prerequisites for applying process mining in order to comply with regulations and keep company secrets. This paper provides a foundation for future research on privacy-preserving and confidential process mining techniques. Main threats are identified and related to an motivation application scenario in a hospital context as well as to the current body… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: Accepted for publication in ACM Transactions on Management Information Systems

  27. arXiv:2105.11991  [pdf, other

    cs.CR

    Privacy-Preserving Continuous Event Data Publishing

    Authors: Majid Rafiei, Wil M. P. van der Aalst

    Abstract: Process mining enables organizations to discover and analyze their actual processes using event data. Event data can be extracted from any information system supporting operational processes, e.g., SAP. Whereas the data inside such systems is protected using access control mechanisms, the extracted event data contain sensitive information that needs to be protected. This creates a new risk and a p… ▽ More

    Submitted 25 May, 2021; originally announced May 2021.

  28. arXiv:2105.11983  [pdf, other

    cs.DB cs.CR

    Group-Based Privacy Preservation Techniques for Process Mining

    Authors: Majid Rafiei, Wil M. P. van der Aalst

    Abstract: Process mining techniques help to improve processes using event data. Such data are widely available in information systems. However, they often contain highly sensitive information. For example, healthcare information systems record event data that can be utilized by process mining techniques to improve the treatment process, reduce patient's waiting times, improve resource productivity, etc. How… ▽ More

    Submitted 25 May, 2021; originally announced May 2021.

  29. Privacy-Preserving Data Publishing in Process Mining

    Authors: Majid Rafiei, Wil M. P. van der Aalst

    Abstract: Process mining aims to provide insights into the actual processes based on event data. These data are often recorded by information systems and are widely available. However, they often contain sensitive private information that should be analyzed responsibly. Therefore, privacy issues in process mining are recently receiving more attention. Privacy preservation techniques obviously need to modify… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

  30. arXiv:2012.12031  [pdf, other

    cs.DB cs.CR

    Towards Quantifying Privacy in Process Mining

    Authors: Majid Rafiei, Wil M. P. van der Aalst

    Abstract: Process mining employs event logs to provide insights into the actual processes. Event logs are recorded by information systems and contain valuable information helping organizations to improve their processes. However, these data also include highly sensitive private information which is a major concern when applying process mining. Therefore, privacy preservation in process mining is growing in… ▽ More

    Submitted 21 December, 2020; originally announced December 2020.

  31. arXiv:2009.11542  [pdf, other

    cs.CR

    Practical Aspect of Privacy-Preserving Data Publishing in Process Mining

    Authors: Majid Rafiei, Wil M. P. van der Aalst

    Abstract: Process mining techniques such as process discovery and conformance checking provide insights into actual processes by analyzing event data that are widely available in information systems. These data are very valuable, but often contain sensitive information, and process analysts need to balance confidentiality and utility. Privacy issues in process mining are recently receiving more attention fr… ▽ More

    Submitted 24 September, 2020; originally announced September 2020.

  32. arXiv:1906.03423  [pdf, other

    cs.SI cs.CL cs.LG

    News Labeling as Early as Possible: Real or Fake?

    Authors: Maryam Ramezani, Mina Rafiei, Soroush Omranpour, Hamid R. Rabiee

    Abstract: Making disguise between real and fake news propagation through online social networks is an important issue in many applications. The time gap between the news release time and detection of its label is a significant step towards broadcasting the real information and avoiding the fake. Therefore, one of the challenging tasks in this area is to identify fake and real news in early stages of propaga… ▽ More

    Submitted 8 June, 2019; originally announced June 2019.