Skip to main content

Showing 1–50 of 54 results for author: Sabokrou, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2509.08104  [pdf, ps, other

    cs.CV cs.AI

    APML: Adaptive Probabilistic Matching Loss for Robust 3D Point Cloud Reconstruction

    Authors: Sasan Sharifipour, Constantino Álvarez Casado, Mohammad Sabokrou, Miguel Bordallo López

    Abstract: Training deep learning models for point cloud prediction tasks such as shape completion and generation depends critically on loss functions that measure discrepancies between predicted and ground-truth point sets. Commonly used functions such as Chamfer Distance (CD), HyperCD, and InfoCD rely on nearest-neighbor assignments, which often induce many-to-one correspondences, leading to point congesti… ▽ More

    Submitted 9 September, 2025; originally announced September 2025.

    Comments: 22 pages, 6 figures, conference, 7 tables, 15 formulas

  2. arXiv:2505.11129  [pdf, ps, other

    cs.CV cs.AI cs.LG

    PhiNet v2: A Mask-Free Brain-Inspired Vision Foundation Model from Video

    Authors: Makoto Yamada, Kian Ming A. Chai, Ayoub Rhim, Satoki Ishikawa, Mohammad Sabokrou, Yao-Hung Hubert Tsai

    Abstract: Recent advances in self-supervised learning (SSL) have revolutionized computer vision through innovative architectures and learning objectives, yet they have not fully leveraged insights from biological visual processing systems. Recently, a brain-inspired SSL model named PhiNet was proposed; it is based on a ResNet backbone and operates on static image inputs with strong augmentation. In this pap… ▽ More

    Submitted 16 May, 2025; originally announced May 2025.

    Comments: arXiv admin note: substantial text overlap with arXiv:2405.14650

  3. arXiv:2504.11055  [pdf, ps, other

    cs.CV

    Crane: Context-Guided Prompt Learning and Attention Refinement for Zero-Shot Anomaly Detection

    Authors: Alireza Salehi, Mohammadreza Salehi, Reshad Hosseini, Cees G. M. Snoek, Makoto Yamada, Mohammad Sabokrou

    Abstract: Anomaly Detection involves identifying deviations from normal data distributions and is critical in fields such as medical diagnostics and industrial defect detection. Traditional AD methods typically require the availability of normal training samples; however, this assumption is not always feasible. Recently, the rich pretraining knowledge of CLIP has shown promising zero-shot generalization in… ▽ More

    Submitted 11 August, 2025; v1 submitted 15 April, 2025; originally announced April 2025.

  4. arXiv:2501.17289  [pdf, other

    cs.CV

    A Contrastive Teacher-Student Framework for Novelty Detection under Style Shifts

    Authors: Hossein Mirzaei, Mojtaba Nafez, Moein Madadi, Arad Maleki, Mahdi Hajialilue, Zeinab Sadat Taghavi, Sepehr Rezaee, Ali Ansari, Bahar Dibaei Nia, Kian Shamsaie, Mohammadreza Salehi, Mackenzie W. Mathis, Mahdieh Soleymani Baghshah, Mohammad Sabokrou, Mohammad Hossein Rohban

    Abstract: There have been several efforts to improve Novelty Detection (ND) performance. However, ND methods often suffer significant performance drops under minor distribution shifts caused by changes in the environment, known as style shifts. This challenge arises from the ND setup, where the absence of out-of-distribution (OOD) samples during training causes the detector to be biased toward the dominant… ▽ More

    Submitted 28 January, 2025; originally announced January 2025.

    Comments: The code repository is available at: https://github.com/rohban-lab/CTS

  5. arXiv:2501.17151  [pdf, other

    cs.LG

    Scanning Trojaned Models Using Out-of-Distribution Samples

    Authors: Hossein Mirzaei, Ali Ansari, Bahar Dibaei Nia, Mojtaba Nafez, Moein Madadi, Sepehr Rezaee, Zeinab Sadat Taghavi, Arad Maleki, Kian Shamsaie, Mahdi Hajialilue, Jafar Habibi, Mohammad Sabokrou, Mohammad Hossein Rohban

    Abstract: Scanning for trojan (backdoor) in deep neural networks is crucial due to their significant real-world applications. There has been an increasing focus on developing effective general trojan scanning methods across various trojan attacks. Despite advancements, there remains a shortage of methods that perform effectively without preconceived assumptions about the backdoor attack method. Additionally… ▽ More

    Submitted 28 January, 2025; originally announced January 2025.

    Comments: Accepted at the Thirty-Eighth Annual Conference on Neural Information Processing Systems (NeurIPS) 2024. The code repository is available at: https://github.com/rohban-lab/TRODO

  6. arXiv:2501.15434  [pdf, other

    cs.CV

    Mitigating Spurious Negative Pairs for Robust Industrial Anomaly Detection

    Authors: Hossein Mirzaei, Mojtaba Nafez, Jafar Habibi, Mohammad Sabokrou, Mohammad Hossein Rohban

    Abstract: Despite significant progress in Anomaly Detection (AD), the robustness of existing detection methods against adversarial attacks remains a challenge, compromising their reliability in critical real-world applications such as autonomous driving. This issue primarily arises from the AD setup, which assumes that training data is limited to a group of unlabeled normal samples, making the detectors vul… ▽ More

    Submitted 26 January, 2025; originally announced January 2025.

    Comments: Accepted at the 13th International Conference on Learning Representations (ICLR) 2025

  7. arXiv:2501.15271  [pdf, other

    cs.LG

    Killing it with Zero-Shot: Adversarially Robust Novelty Detection

    Authors: Hossein Mirzaei, Mohammad Jafari, Hamid Reza Dehbashi, Zeinab Sadat Taghavi, Mohammad Sabokrou, Mohammad Hossein Rohban

    Abstract: Novelty Detection (ND) plays a crucial role in machine learning by identifying new or unseen data during model inference. This capability is especially important for the safe and reliable operation of automated systems. Despite advances in this field, existing techniques often fail to maintain their performance when subject to adversarial attacks. Our research addresses this gap by marrying the me… ▽ More

    Submitted 25 January, 2025; originally announced January 2025.

    Comments: Accepted to the Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2024

  8. arXiv:2412.08593  [pdf, other

    cs.SE cs.IR

    Leveraging Graph-RAG and Prompt Engineering to Enhance LLM-Based Automated Requirement Traceability and Compliance Checks

    Authors: Arsalan Masoudifard, Mohammad Mowlavi Sorond, Moein Madadi, Mohammad Sabokrou, Elahe Habibi

    Abstract: Ensuring that Software Requirements Specifications (SRS) align with higher-level organizational or national requirements is vital, particularly in regulated environments such as finance and aerospace. In these domains, maintaining consistency, adhering to regulatory frameworks, minimizing errors, and meeting critical expectations are essential for the reliable functioning of systems. The widesprea… ▽ More

    Submitted 11 December, 2024; originally announced December 2024.

  9. arXiv:2410.07110  [pdf, other

    cs.LG cs.CV

    Continual Learning: Less Forgetting, More OOD Generalization via Adaptive Contrastive Replay

    Authors: Hossein Rezaei, Mohammad Sabokrou

    Abstract: Machine learning models often suffer from catastrophic forgetting of previously learned knowledge when learning new classes. Various methods have been proposed to mitigate this issue. However, rehearsal-based learning, which retains samples from previous classes, typically achieves good performance but tends to memorize specific instances, struggling with Out-of-Distribution (OOD) generalization.… ▽ More

    Submitted 9 October, 2024; originally announced October 2024.

  10. arXiv:2408.10798  [pdf, other

    cs.LG

    Universal Novelty Detection Through Adaptive Contrastive Learning

    Authors: Hossein Mirzaei, Mojtaba Nafez, Mohammad Jafari, Mohammad Bagher Soltani, Mohammad Azizmalayeri, Jafar Habibi, Mohammad Sabokrou, Mohammad Hossein Rohban

    Abstract: Novelty detection is a critical task for deploying machine learning models in the open world. A crucial property of novelty detection methods is universality, which can be interpreted as generalization across various distributions of training or test data. More precisely, for novelty detection, distribution shifts may occur in the training set or the test set. Shifts in the training set refer to c… ▽ More

    Submitted 20 August, 2024; originally announced August 2024.

    Comments: 16 pages, 5 figures, conference

  11. arXiv:2406.10617  [pdf, other

    cs.CV

    Enhancing Anomaly Detection Generalization through Knowledge Exposure: The Dual Effects of Augmentation

    Authors: Mohammad Akhavan Anvari, Rojina Kashefi, Vahid Reza Khazaie, Mohammad Khalooei, Mohammad Sabokrou

    Abstract: Anomaly detection involves identifying instances within a dataset that deviate from the norm and occur infrequently. Current benchmarks tend to favor methods biased towards low diversity in normal data, which does not align with real-world scenarios. Despite advancements in these benchmarks, contemporary anomaly detection methods often struggle with out-of-distribution generalization, particularly… ▽ More

    Submitted 15 June, 2024; originally announced June 2024.

  12. arXiv:2311.16485  [pdf, other

    cs.LG cs.CV

    Class-Adaptive Sampling Policy for Efficient Continual Learning

    Authors: Hossein Rezaei, Mohammad Sabokrou

    Abstract: Continual learning (CL) aims to acquire new knowledge while preserving information from previous experiences without forgetting. Though buffer-based methods (i.e., retaining samples from previous tasks) have achieved acceptable performance, determining how to allocate the buffer remains a critical challenge. Most recent research focuses on refining these methods but often fails to sufficiently con… ▽ More

    Submitted 26 November, 2023; originally announced November 2023.

  13. arXiv:2311.06786  [pdf, other

    cs.CV

    Explainability of Vision Transformers: A Comprehensive Review and New Perspectives

    Authors: Rojina Kashefi, Leili Barekatain, Mohammad Sabokrou, Fatemeh Aghaeipoor

    Abstract: Transformers have had a significant impact on natural language processing and have recently demonstrated their potential in computer vision. They have shown promising results over convolution neural networks in fundamental computer vision tasks. However, the scientific community has not fully grasped the inner workings of vision transformers, nor the basis for their decision-making, which undersco… ▽ More

    Submitted 12 November, 2023; originally announced November 2023.

    Comments: 20 pages,5 figures

  14. arXiv:2310.05263  [pdf, other

    cs.CR

    Stealthy Backdoor Attack via Confidence-driven Sampling

    Authors: Pengfei He, Yue Xing, Han Xu, Jie Ren, Yingqian Cui, Shenglai Zeng, Jiliang Tang, Makoto Yamada, Mohammad Sabokrou

    Abstract: Backdoor attacks aim to surreptitiously insert malicious triggers into DNN models, granting unauthorized control during testing scenarios. Existing methods lack robustness against defense strategies and predominantly focus on enhancing trigger stealthiness while randomly selecting poisoned samples. Our research highlights the overlooked drawbacks of random sampling, which make that attack detectab… ▽ More

    Submitted 1 December, 2024; v1 submitted 8 October, 2023; originally announced October 2023.

    Comments: Accepted for TMLR

  15. arXiv:2307.01473  [pdf, other

    cs.CV cs.AI

    Mitigating Bias: Enhancing Image Classification by Improving Model Explanations

    Authors: Raha Ahmadi, Mohammad Javad Rajabi, Mohammad Khalooie, Mohammad Sabokrou

    Abstract: Deep learning models have demonstrated remarkable capabilities in learning complex patterns and concepts from training data. However, recent findings indicate that these models tend to rely heavily on simple and easily discernible features present in the background of images rather than the main concepts or objects they are intended to classify. This phenomenon poses a challenge to image classifie… ▽ More

    Submitted 22 September, 2023; v1 submitted 4 July, 2023; originally announced July 2023.

    Comments: Accepted to ACML2023

  16. arXiv:2306.15755  [pdf, other

    cs.CV

    Adversarial Backdoor Attack by Naturalistic Data Poisoning on Trajectory Prediction in Autonomous Driving

    Authors: Mozhgan Pourkeshavarz, Mohammad Sabokrou, Amir Rasouli

    Abstract: In autonomous driving, behavior prediction is fundamental for safe motion planning, hence the security and robustness of prediction models against adversarial attacks are of paramount importance. We propose a novel adversarial backdoor attack against trajectory prediction models as a means of studying their potential vulnerabilities. Our attack affects the victim at training time via naturalistic,… ▽ More

    Submitted 22 November, 2023; v1 submitted 27 June, 2023; originally announced June 2023.

  17. arXiv:2306.08336  [pdf, other

    cs.CV cs.AI

    Global-Local Processing in Convolutional Neural Networks

    Authors: Zahra Rezvani, Soroor Shekarizeh, Mohammad Sabokrou

    Abstract: Convolutional Neural Networks (CNNs) have achieved outstanding performance on image processing challenges. Actually, CNNs imitate the typically developed human brain structures at the micro-level (Artificial neurons). At the same time, they distance themselves from imitating natural visual perception in humans at the macro architectures (high-level cognition). Recently it has been investigated tha… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.

  18. arXiv:2306.06414  [pdf, other

    cs.CV

    Revealing Model Biases: Assessing Deep Neural Networks via Recovered Sample Analysis

    Authors: Mohammad Mahdi Mehmanchi, Mahbod Nouri, Mohammad Sabokrou

    Abstract: This paper proposes a straightforward and cost-effective approach to assess whether a deep neural network (DNN) relies on the primary concepts of training samples or simply learns discriminative, yet simple and irrelevant features that can differentiate between classes. The paper highlights that DNNs, as discriminative classifiers, often find the simplest features to discriminate between classes,… ▽ More

    Submitted 10 June, 2023; originally announced June 2023.

  19. arXiv:2306.03531  [pdf, other

    cs.CV cs.AI

    A Unified Concept-Based System for Local, Global, and Misclassification Explanations

    Authors: Fatemeh Aghaeipoor, Dorsa Asgarian, Mohammad Sabokrou

    Abstract: Explainability of Deep Neural Networks (DNNs) has been garnering increasing attention in recent years. Of the various explainability approaches, concept-based techniques stand out for their ability to utilize human-meaningful concepts instead of focusing solely on individual pixels. However, there is a scarcity of methods that consistently provide both local and global explanations. Moreover, most… ▽ More

    Submitted 4 October, 2023; v1 submitted 6 June, 2023; originally announced June 2023.

    ACM Class: I.2

  20. arXiv:2305.19424  [pdf, other

    cs.LG cs.CR cs.CV

    Quantifying Overfitting: Evaluating Neural Network Performance through Analysis of Null Space

    Authors: Hossein Rezaei, Mohammad Sabokrou

    Abstract: Machine learning models that are overfitted/overtrained are more vulnerable to knowledge leakage, which poses a risk to privacy. Suppose we download or receive a model from a third-party collaborator without knowing its training accuracy. How can we determine if it has been overfitted or overtrained on its training data? It's possible that the model was intentionally over-trained to make it vulner… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

  21. arXiv:2211.10892  [pdf, other

    cs.CV

    Towards Realistic Out-of-Distribution Detection: A Novel Evaluation Framework for Improving Generalization in OOD Detection

    Authors: Vahid Reza Khazaie, Anthony Wong, Mohammad Sabokrou

    Abstract: This paper presents a novel evaluation framework for Out-of-Distribution (OOD) detection that aims to assess the performance of machine learning models in more realistic settings. We observed that the real-world requirements for testing OOD detection methods are not satisfied by the current testing protocols. They usually encourage methods to have a strong bias towards a low level of diversity in… ▽ More

    Submitted 31 August, 2023; v1 submitted 20 November, 2022; originally announced November 2022.

  22. arXiv:2207.11031  [pdf

    cs.CV cs.LG cs.NE

    MobileDenseNet: A new approach to object detection on mobile devices

    Authors: Mohammad Hajizadeh, Mohammad Sabokrou, Adel Rahmani

    Abstract: Object detection problem solving has developed greatly within the past few years. There is a need for lighter models in instances where hardware limitations exist, as well as a demand for models to be tailored to mobile devices. In this article, we will assess the methods used when creating algorithms that address these issues. The main goal of this article is to increase accuracy in state-of-the-… ▽ More

    Submitted 22 July, 2022; originally announced July 2022.

  23. arXiv:2205.14297  [pdf, other

    cs.CV cs.LG

    Fake It Till You Make It: Towards Accurate Near-Distribution Novelty Detection

    Authors: Hossein Mirzaei, Mohammadreza Salehi, Sajjad Shahabi, Efstratios Gavves, Cees G. M. Snoek, Mohammad Sabokrou, Mohammad Hossein Rohban

    Abstract: We aim for image-based novelty detection. Despite considerable progress, existing models either fail or face a dramatic drop under the so-called "near-distribution" setting, where the differences between normal and anomalous samples are subtle. We first demonstrate existing methods experience up to 20% decrease in performance in the near-distribution setting. Next, we propose to exploit a score-ba… ▽ More

    Submitted 28 November, 2022; v1 submitted 27 May, 2022; originally announced May 2022.

  24. arXiv:2202.00050  [pdf, other

    cs.CV

    Deep-Disaster: Unsupervised Disaster Detection and Localization Using Visual Data

    Authors: Soroor Shekarizadeh, Razieh Rastgoo, Saif Al-Kuwari, Mohammad Sabokrou

    Abstract: Social media plays a significant role in sharing essential information, which helps humanitarian organizations in rescue operations during and after disaster incidents. However, developing an efficient method that can provide rapid analysis of social media images in the early hours of disasters is still largely an open problem, mainly due to the lack of suitable datasets and the sheer complexity o… ▽ More

    Submitted 31 January, 2022; originally announced February 2022.

  25. arXiv:2201.01609  [pdf, other

    cs.CV cs.CL

    All You Need In Sign Language Production

    Authors: Razieh Rastgoo, Kourosh Kiani, Sergio Escalera, Vassilis Athitsos, Mohammad Sabokrou

    Abstract: Sign Language is the dominant form of communication language used in the deaf and hearing-impaired community. To make an easy and mutual communication between the hearing-impaired and the hearing communities, building a robust system capable of translating the spoken language into sign language and vice versa is fundamental. To this end, sign language recognition and production are two necessary p… ▽ More

    Submitted 6 January, 2022; v1 submitted 5 January, 2022; originally announced January 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2103.15910

  26. arXiv:2110.14051  [pdf, other

    cs.CV cs.LG

    A Unified Survey on Anomaly, Novelty, Open-Set, and Out-of-Distribution Detection: Solutions and Future Challenges

    Authors: Mohammadreza Salehi, Hossein Mirzaei, Dan Hendrycks, Yixuan Li, Mohammad Hossein Rohban, Mohammad Sabokrou

    Abstract: Machine learning models often encounter samples that are diverged from the training distribution. Failure to recognize an out-of-distribution (OOD) sample, and consequently assign that sample to an in-class label significantly compromises the reliability of a model. The problem has gained significant attention due to its importance for safety deploying models in open-world settings. Detecting OOD… ▽ More

    Submitted 3 December, 2022; v1 submitted 26 October, 2021; originally announced October 2021.

    Comments: Published in Transaction on Machine Learning (TMLR)

  27. arXiv:2109.00796  [pdf, other

    cs.CV

    Multi-Modal Zero-Shot Sign Language Recognition

    Authors: Razieh Rastgoo, Kourosh Kiani, Sergio Escalera, Mohammad Sabokrou

    Abstract: Zero-Shot Learning (ZSL) has rapidly advanced in recent years. Towards overcoming the annotation bottleneck in the Sign Language Recognition (SLR), we explore the idea of Zero-Shot Sign Language Recognition (ZS-SLR) with no annotated visual examples, by leveraging their textual descriptions. In this way, we propose a multi-modal Zero-Shot Sign Language Recognition (ZS-SLR) model harnessing from th… ▽ More

    Submitted 2 September, 2021; originally announced September 2021.

    Comments: arXiv admin note: text overlap with arXiv:2108.10059

  28. arXiv:2103.15910  [pdf, other

    cs.CV

    Sign Language Production: A Review

    Authors: Razieh Rastgoo, Kourosh Kiani, Sergio Escalera, Mohammad Sabokrou

    Abstract: Sign Language is the dominant yet non-primary form of communication language used in the deaf and hearing-impaired community. To make an easy and mutual communication between the hearing-impaired and the hearing communities, building a robust system capable of translating the spoken language into sign language and vice versa is fundamental. To this end, sign language recognition and production are… ▽ More

    Submitted 29 March, 2021; originally announced March 2021.

  29. arXiv:2103.15486  [pdf, other

    cs.LG cs.CV

    ClaRe: Practical Class Incremental Learning By Remembering Previous Class Representations

    Authors: Bahram Mohammadi, Mohammad Sabokrou

    Abstract: This paper presents a practical and simple yet efficient method to effectively deal with the catastrophic forgetting for Class Incremental Learning (CIL) tasks. CIL tends to learn new concepts perfectly, but not at the expense of performance and accuracy for old data. Learning new knowledge in the absence of data instances from previous classes or even imbalance samples of both old and new classes… ▽ More

    Submitted 29 March, 2021; originally announced March 2021.

  30. arXiv:2103.12216  [pdf, other

    cs.CV

    ZS-IL: Looking Back on Learned Experiences For Zero-Shot Incremental Learning

    Authors: Mozhgan PourKeshavarz, Mohammad Sabokrou

    Abstract: Classical deep neural networks are limited in their ability to learn from emerging streams of training data. When trained sequentially on new or evolving tasks, their performance degrades sharply, making them inappropriate in real-world use cases. Existing methods tackle it by either storing old data samples or only updating a parameter set of DNNs, which, however, demands a large memory budget or… ▽ More

    Submitted 22 March, 2021; originally announced March 2021.

  31. arXiv:2103.10502   

    cs.CV

    Ano-Graph: Learning Normal Scene Contextual Graphs to Detect Video Anomalies

    Authors: Masoud Pourreza, Mohammadreza Salehi, Mohammad Sabokrou

    Abstract: Video anomaly detection has proved to be a challenging task owing to its unsupervised training procedure and high spatio-temporal complexity existing in real-world scenarios. In the absence of anomalous training samples, state-of-the-art methods try to extract features that fully grasp normal behaviors in both space and time domains using different approaches such as autoencoders, or generative ad… ▽ More

    Submitted 16 November, 2022; v1 submitted 18 March, 2021; originally announced March 2021.

    Comments: Inconsistencies in the results

  32. arXiv:2103.01739  [pdf, other

    cs.CV

    Image/Video Deep Anomaly Detection: A Survey

    Authors: Bahram Mohammadi, Mahmood Fathy, Mohammad Sabokrou

    Abstract: The considerable significance of Anomaly Detection (AD) problem has recently drawn the attention of many researchers. Consequently, the number of proposed methods in this research field has been increased steadily. AD strongly correlates with the important computer vision and image processing tasks such as image/video anomaly, irregularity and sudden event detection. More recently, Deep Neural Net… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

  33. arXiv:2009.11090  [pdf, other

    eess.IV cs.CV

    Robustification of Segmentation Models Against Adversarial Perturbations In Medical Imaging

    Authors: Hanwool Park, Amirhossein Bayat, Mohammad Sabokrou, Jan S. Kirschke, Bjoern H. Menze

    Abstract: This paper presents a novel yet efficient defense framework for segmentation models against adversarial attacks in medical imaging. In contrary to the defense methods against adversarial attacks for classification models which widely are investigated, such defense methods for segmentation models has been less explored. Our proposed method can be used for any deep learning models without revising t… ▽ More

    Submitted 23 September, 2020; originally announced September 2020.

  34. arXiv:2006.11629  [pdf, other

    cs.CV cs.LG

    G2D: Generate to Detect Anomaly

    Authors: Masoud Pourreza, Bahram Mohammadi, Mostafa Khaki, Samir Bouindour, Hichem Snoussi, Mohammad Sabokrou

    Abstract: In this paper, we propose a novel method for irregularity detection. Previous researches solve this problem as a One-Class Classification (OCC) task where they train a reference model on all of the available samples. Then, they consider a test sample as an anomaly if it has a diversion from the reference model. Generative Adversarial Networks (GANs) have achieved the most promising results for OCC… ▽ More

    Submitted 27 June, 2020; v1 submitted 20 June, 2020; originally announced June 2020.

  35. arXiv:2002.04821  [pdf, other

    cs.CV

    Deep-HR: Fast Heart Rate Estimation from Face Video Under Realistic Conditions

    Authors: Mohammad Sabokrou, Masoud Pourreza, Xiaobai Li, Mahmood Fathy, Guoying Zhao

    Abstract: This paper presents a novel method for remote heart rate (HR) estimation. Recent studies have proved that blood pumping by the heart is highly correlated to the intense color of face pixels, and surprisingly can be utilized for remote HR estimation. Researchers successfully proposed several methods for this task, but making it work in realistic situations is still a challenging problem in computer… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

  36. arXiv:2001.06099  [pdf, other

    cs.LG cs.CV stat.ML

    Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks

    Authors: Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we propose Code-Bridged Classifier (CBC), a framework for making a Convolutional Neural Network (CNNs) robust against adversarial attacks without increasing or even by decreasing the overall models' computational complexity. More specifically, we propose a stacked encoder-convolutional model, in which the input image is first encoded by the encoder module of a denoising auto-encoder… ▽ More

    Submitted 16 January, 2020; originally announced January 2020.

    Comments: 6 pages, Accepted and to appear in ISQED 2020

  37. arXiv:1911.03306  [pdf, other

    cs.LG cs.CR stat.ML

    AutoIDS: Auto-encoder Based Method for Intrusion Detection System

    Authors: Mohammed Gharib, Bahram Mohammadi, Shadi Hejareh Dastgerdi, Mohammad Sabokrou

    Abstract: Intrusion Detection System (IDS) is one of the most effective solutions for providing primary security services. IDSs are generally working based on attack signatures or by detecting anomalies. In this paper, we have presented AutoIDS, a novel yet efficient solution for IDS, based on a semi-supervised machine learning technique. AutoIDS can distinguish abnormal packet flows from normal ones by tak… ▽ More

    Submitted 8 November, 2019; originally announced November 2019.

  38. arXiv:1908.10455  [pdf, other

    cs.CV

    Self-Supervised Representation Learning via Neighborhood-Relational Encoding

    Authors: Mohammad Sabokrou, Mohammad Khalooei, Ehsan Adeli

    Abstract: In this paper, we propose a novel self-supervised representation learning by taking advantage of a neighborhood-relational encoding (NRE) among the training data. Conventional unsupervised learning methods only focused on training deep networks to understand the primitive characteristics of the visual data, mainly to be able to reconstruct the data from a latent space. They often neglected the rel… ▽ More

    Submitted 27 August, 2019; originally announced August 2019.

    Comments: Accepted in International Conference on Computer Vision (ICCV) 2019

  39. arXiv:1907.05640  [pdf, other

    cs.CV

    AVD: Adversarial Video Distillation

    Authors: Mohammad Tavakolian, Mohammad Sabokrou, Abdenour Hadid

    Abstract: In this paper, we present a simple yet efficient approach for video representation, called Adversarial Video Distillation (AVD). The key idea is to represent videos by compressing them in the form of realistic images, which can be used in a variety of video-based scene analysis applications. Representing a video as a single image enables us to address the problem of video analysis by image analysi… ▽ More

    Submitted 12 July, 2019; originally announced July 2019.

  40. arXiv:1904.11577  [pdf, other

    cs.LG cs.CR stat.ML

    End-to-End Adversarial Learning for Intrusion Detection in Computer Networks

    Authors: Bahram Mohammadi, Mohammad Sabokrou

    Abstract: This paper presents a simple yet efficient method for an anomaly-based Intrusion Detection System (IDS). In reality, IDSs can be defined as a one-class classification system, where the normal traffic is the target class. The high diversity of network attacks in addition to the need for generalization, motivate us to propose a semi-supervised method. Inspired by the successes of Generative Adversar… ▽ More

    Submitted 25 April, 2019; originally announced April 2019.

  41. arXiv:1806.09986  [pdf

    cs.CV

    Online Signature Verification using Deep Representation: A new Descriptor

    Authors: Mohammad Hajizadeh Saffar, Mohsen Fayyaz, Mohammad Sabokrou, Mahmood Fathy

    Abstract: This paper presents an accurate method for verifying online signatures. The main difficulty of signature verification come from: (1) Lacking enough training samples (2) The methods must be spatial change invariant. To deal with these difficulties and modeling the signatures efficiently, we propose a method that a one-class classifier per each user is built on discriminative features. First, we pre… ▽ More

    Submitted 23 June, 2018; originally announced June 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1505.08153

  42. arXiv:1806.06172  [pdf

    cs.CV

    Semantic Video Segmentation: A Review on Recent Approaches

    Authors: Mohammad Hajizadeh Saffar, Mohsen Fayyaz, Mohammad Sabokrou, Mahmood Fathy

    Abstract: This paper gives an overview on semantic segmentation consists of an explanation of this field, it's status and relation with other vision fundamental tasks, different datasets and common evaluation parameters that have been used by researchers. This survey also includes an overall review on a variety of recent approaches (RDF, MRF, CRF, etc.) and their advantages and challenges and shows the supe… ▽ More

    Submitted 15 June, 2018; originally announced June 2018.

  43. arXiv:1805.09521  [pdf, other

    cs.CV

    AVID: Adversarial Visual Irregularity Detection

    Authors: Mohammad Sabokrou, Masoud Pourreza, Mohsen Fayyaz, Rahim Entezari, Mahmood Fathy, Jürgen Gall, Ehsan Adeli

    Abstract: Real-time detection of irregularities in visual data is very invaluable and useful in many prospective applications including surveillance, patient monitoring systems, etc. With the surge of deep learning methods in the recent years, researchers have tried a wide spectrum of methods for different applications. However, for the case of irregularity or anomaly detection in videos, training an end-to… ▽ More

    Submitted 17 July, 2018; v1 submitted 24 May, 2018; originally announced May 2018.

  44. arXiv:1802.09088  [pdf, other

    cs.CV

    Adversarially Learned One-Class Classifier for Novelty Detection

    Authors: Mohammad Sabokrou, Mohammad Khalooei, Mahmood Fathy, Ehsan Adeli

    Abstract: Novelty detection is the process of identifying the observation(s) that differ in some respect from the training observations (the target class). In reality, the novelty class is often absent during training, poorly sampled or not well defined. Therefore, one-class classifiers can efficiently model such problems. However, due to the unavailability of data from the novelty class, training an end-to… ▽ More

    Submitted 24 May, 2018; v1 submitted 25 February, 2018; originally announced February 2018.

    Comments: CVPR 2018 Paper

  45. arXiv:1802.06205  [pdf, other

    cs.CV

    Towards Principled Design of Deep Convolutional Networks: Introducing SimpNet

    Authors: Seyyed Hossein Hasanpour, Mohammad Rouhani, Mohsen Fayyaz, Mohammad Sabokrou, Ehsan Adeli

    Abstract: Major winning Convolutional Neural Networks (CNNs), such as VGGNet, ResNet, DenseNet, \etc, include tens to hundreds of millions of parameters, which impose considerable computation and memory overheads. This limits their practical usage in training and optimizing for real-world applications. On the contrary, light-weight architectures, such as SqueezeNet, are being proposed to address this issue.… ▽ More

    Submitted 17 February, 2018; originally announced February 2018.

    Comments: The Submitted version to the IEEE TIP on December 2017, replaced high resolution images with low-res counterparts due to arXiv size limitation, 19 pages

  46. arXiv:1609.00866  [pdf, other

    cs.CV

    Deep-Anomaly: Fully Convolutional Neural Network for Fast Anomaly Detection in Crowded Scenes

    Authors: Mohammad Sabokrou, Mohsen Fayyaz, Mahmood Fathy, Zahra Moayedd, Reinhard klette

    Abstract: The detection of abnormal behaviours in crowded scenes has to deal with many challenges. This paper presents an efficient method for detection and localization of anomalies in videos. Using fully convolutional neural networks (FCNs) and temporal data, a pre-trained supervised FCN is transferred into an unsupervised FCN ensuring the detection of (global) anomalies in scenes. High performance in ter… ▽ More

    Submitted 30 April, 2017; v1 submitted 3 September, 2016; originally announced September 2016.

  47. arXiv:1608.06037  [pdf, other

    cs.CV cs.NE

    Lets keep it simple, Using simple architectures to outperform deeper and more complex architectures

    Authors: Seyyed Hossein Hasanpour, Mohammad Rouhani, Mohsen Fayyaz, Mohammad Sabokrou

    Abstract: Major winning Convolutional Neural Networks (CNNs), such as AlexNet, VGGNet, ResNet, GoogleNet, include tens to hundreds of millions of parameters, which impose considerable computation and memory overhead. This limits their practical use for training, optimization and memory efficiency. On the contrary, light-weight architectures, being proposed to address this issue, mainly suffer from low accur… ▽ More

    Submitted 27 April, 2023; v1 submitted 21 August, 2016; originally announced August 2016.

    Comments: Added the long-overdue ImageNet results and updated the missed cifar10/100 results from 2018

  48. arXiv:1608.05971  [pdf, other

    cs.CV

    STFCN: Spatio-Temporal FCN for Semantic Video Segmentation

    Authors: Mohsen Fayyaz, Mohammad Hajizadeh Saffar, Mohammad Sabokrou, Mahmood Fathy, Reinhard Klette, Fay Huang

    Abstract: This paper presents a novel method to involve both spatial and temporal features for semantic video segmentation. Current work on convolutional neural networks(CNNs) has shown that CNNs provide advanced spatial features supporting a very good performance of solutions for both image and video analysis, especially for the semantic segmentation task. We investigate how involving temporal features als… ▽ More

    Submitted 2 September, 2016; v1 submitted 21 August, 2016; originally announced August 2016.

  49. An Evolvable Fuzzy Logic System for handoff management in heterogeneous Wireless Networks

    Authors: Hossein Fayyazi, Mohammad Sabokrou

    Abstract: One of the features of the Next Generation Wireless Networks (NGWNs) is its heterogeneous communication environment. Heterogeneous networks are ranging from wireless WAN, LAN, MAN and PAN. The most important parameters in this regard are different data rates and coverage of these networks. In this paper, we propose an evolvable fuzzy logic-based algorithm for managing handover process in heterogen… ▽ More

    Submitted 8 March, 2016; originally announced March 2016.

  50. arXiv:1511.07425   

    cs.CV

    Real-Time Anomalous Behavior Detection and Localization in Crowded Scenes

    Authors: Mohammad Sabokrou, Mahmood Fathy, Mojtaba Hosseini

    Abstract: In this paper, we propose an accurate and real-time anomaly detection and localization in crowded scenes, and two descriptors for representing anomalous behavior in video are proposed. We consider a video as being a set of cubic patches. Based on the low likelihood of an anomaly occurrence, and the redundancy of structures in normal patches in videos, two (global and local) views are considered fo… ▽ More

    Submitted 2 January, 2016; v1 submitted 21 November, 2015; originally announced November 2015.

    Comments: This paper has been withdrawn by the author due to some error in experimental result. There are some mistakes