Skip to main content

Showing 1–20 of 20 results for author: Saif, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.22949  [pdf, ps, other

    cs.CR cs.AI cs.LG

    A Study on Semi-Supervised Detection of DDoS Attacks under Class Imbalance

    Authors: Ehsan Hallaji, Vaishnavi Shanmugam, Roozbeh Razavi-Far, Mehrdad Saif

    Abstract: One of the most difficult challenges in cybersecurity is eliminating Distributed Denial of Service (DDoS) attacks. Automating this task using artificial intelligence is a complex process due to the inherent class imbalance and lack of sufficient labeled samples of real-world datasets. This research investigates the use of Semi-Supervised Learning (SSL) techniques to improve DDoS attack detection w… ▽ More

    Submitted 28 June, 2025; originally announced June 2025.

    Comments: Accepted for publication in IEEE CCECE 2025

  2. arXiv:2505.00658  [pdf, other

    cs.IT eess.SP

    RIS Partitioning and User Clustering for Resilient Non-Orthogonal Multiple Access UAV Networks

    Authors: Mohammed Saif, Shahrokh Valaee

    Abstract: The integration of reconfigurable intelligent surfaces (RISs) and unmanned aerial vehicles (UAVs) has emerged as a promising solution for enhancing connectivity in future wireless networks. This paper designs well-connected and resilient UAV networks by deploying and virtually partitioning multiple RISs to create multiple RIS-aided links, focusing on a link-layer perspective. The RIS-aided links a… ▽ More

    Submitted 1 May, 2025; originally announced May 2025.

    Comments: 13, 9 figures, journal

  3. arXiv:2502.16406  [pdf, other

    cs.LG cs.AI cs.CR

    TrustChain: A Blockchain Framework for Auditing and Verifying Aggregators in Decentralized Federated Learning

    Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif

    Abstract: The server-less nature of Decentralized Federated Learning (DFL) requires allocating the aggregation role to specific participants in each federated round. Current DFL architectures ensure the trustworthiness of the aggregator node upon selection. However, most of these studies overlook the possibility that the aggregating node may turn rogue and act maliciously after being nominated. To address t… ▽ More

    Submitted 22 February, 2025; originally announced February 2025.

  4. arXiv:2502.16396  [pdf, other

    cs.LG cs.AI cs.CR

    FedNIA: Noise-Induced Activation Analysis for Mitigating Data Poisoning in FL

    Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif

    Abstract: Federated learning systems are increasingly threatened by data poisoning attacks, where malicious clients compromise global models by contributing tampered updates. Existing defenses often rely on impractical assumptions, such as access to a central test dataset, or fail to generalize across diverse attack types, particularly those involving multiple malicious clients working collaboratively. To a… ▽ More

    Submitted 22 February, 2025; originally announced February 2025.

  5. arXiv:2502.08808  [pdf, other

    cs.LG math.OC stat.ML

    A First-order Generative Bilevel Optimization Framework for Diffusion Models

    Authors: Quan Xiao, Hui Yuan, A F M Saif, Gaowen Liu, Ramana Kompella, Mengdi Wang, Tianyi Chen

    Abstract: Diffusion models, which iteratively denoise data samples to synthesize high-quality outputs, have achieved empirical success across domains. However, optimizing these models for downstream tasks often involves nested bilevel structures, such as tuning hyperparameters for fine-tuning tasks or noise schedules in training dynamics, where traditional bilevel methods fail due to the infinite-dimensiona… ▽ More

    Submitted 12 February, 2025; originally announced February 2025.

  6. arXiv:2502.07207  [pdf, other

    cs.CR cs.AI cs.LG

    A Study on the Importance of Features in Detecting Advanced Persistent Threats Using Machine Learning

    Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif

    Abstract: Advanced Persistent Threats (APTs) pose a significant security risk to organizations and industries. These attacks often lead to severe data breaches and compromise the system for a long time. Mitigating these sophisticated attacks is highly challenging due to the stealthy and persistent nature of APTs. Machine learning models are often employed to tackle this challenge by bringing automation and… ▽ More

    Submitted 10 February, 2025; originally announced February 2025.

    Comments: Accepted for publication in the 2024 International Conference on Computational Science and Computational Intelligence (CSCI'24)

  7. arXiv:2412.08548  [pdf, other

    cs.CL

    Bilevel Joint Unsupervised and Supervised Training for Automatic Speech Recognition

    Authors: Xiaodong Cui, A F M Saif, Songtao Lu, Lisha Chen, Tianyi Chen, Brian Kingsbury, George Saon

    Abstract: In this paper, we propose a bilevel joint unsupervised and supervised training (BL-JUST) framework for automatic speech recognition. Compared to the conventional pre-training and fine-tuning strategy which is a disconnected two-stage process, BL-JUST tries to optimize an acoustic model such that it simultaneously minimizes both the unsupervised and supervised loss functions. Because BL-JUST seeks… ▽ More

    Submitted 11 December, 2024; originally announced December 2024.

    Comments: Accepted by IEEE/ACM Transactions on Audio, Speech and Language Processing

  8. arXiv:2411.12166  [pdf, other

    eess.SP cs.ET

    From Centralized RAN to Open RAN: A Survey on the Evolution of Distributed Antenna Systems

    Authors: Mahmoud A. Hasabelnaby, Mohanad Obeed, Mohammed Saif, Anas Chaaban, M. J. Hossain

    Abstract: Next-generation mobile networks require evolved radio access network (RAN) architectures to meet the demands of high capacity, massive connectivity, reduced costs, and energy efficiency, and to realize communication with ultra-low latency and ultra-high reliability. {Meeting such} requirements for both mobile users and vertical industries in the next decade {requires novel solutions. One of the po… ▽ More

    Submitted 18 November, 2024; originally announced November 2024.

    Comments: 45 pages, 14 figures, survey paper

  9. arXiv:2411.10268  [pdf, other

    cs.LG

    Towards Sample-Efficiency and Generalization of Transfer and Inverse Reinforcement Learning: A Comprehensive Literature Review

    Authors: Hossein Hassani, Roozbeh Razavi-Far, Mehrdad Saif, Liang Lin

    Abstract: Reinforcement learning (RL) is a sub-domain of machine learning, mainly concerned with solving sequential decision-making problems by a learning agent that interacts with the decision environment to improve its behavior through the reward it receives from the environment. This learning paradigm is, however, well-known for being time-consuming due to the necessity of collecting a large amount of da… ▽ More

    Submitted 15 November, 2024; originally announced November 2024.

  10. arXiv:2410.17541  [pdf, other

    cs.IT

    Improving Connectivity of RIS-Assisted UAV Networks using RIS Partitioning and Deployment

    Authors: Mohammed Saif, Shahrokh Valaee

    Abstract: Reconfigurable intelligent surface (RIS) is pivotal for beyond 5G networks in regards to the surge demand for reliable communication in unmanned aerial vehicle (UAV) networks. This paper presents an innovative approach to maximize connectivity of UAV networks using RIS deployment and virtual partitioning, wherein an RIS is deployed to assist in the communications between an user-equipment (UE) and… ▽ More

    Submitted 22 October, 2024; originally announced October 2024.

    Comments: 6 pages, 5 figures, conference

  11. arXiv:2410.04687  [pdf, other

    cs.IT eess.SP

    Uni-polarized RIS Beamforming for Improving Connectivity of Multi-RIS-Assisted D2D Networks

    Authors: Mohammed Saif, Mohammad Javad-Kalbasi, Shahrokh Valaee

    Abstract: This paper introduces a novel method to enhance the connectivity of multi-reconfigurable intelligent surface-assisted device-to-device networks, referred to as multi-RIS-assisted D2D networks, through a unique phase shift determination. The proposed method aims to optimize the power-domain array factor (PDAF), targeting specific azimuth angles of reliable user equipments (UEs) and enhancing networ… ▽ More

    Submitted 6 October, 2024; originally announced October 2024.

    Comments: 6 pages, 5 figures, conference

  12. arXiv:2407.15752  [pdf, other

    cs.IT eess.SP

    Broad and Spectral-Efficient Beamforming for the Uni-polarized Reconfigurable Intelligent Surfaces

    Authors: Mohammad Javad-Kalbasi, Mohammed Saif, Shahrokh Valaee

    Abstract: A reconfigurable intelligent surface (RIS) is composed of low-cost elements that manipulate the propagation environment from a transmitter by intelligently applying phase shifts to incoming signals before they are reflected. This paper explores a uni-polarized RIS with linear shape aimed at transmitting a common signal to multiple user equipments (UEs) spread across a wide angular region. To achie… ▽ More

    Submitted 22 July, 2024; originally announced July 2024.

    Comments: 13 pages, 15 figures, Journal paper

  13. arXiv:2401.17319  [pdf, other

    cs.CR cs.AI cs.LG stat.ML

    Decentralized Federated Learning: A Survey on Security and Privacy

    Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif, Boyu Wang, Qiang Yang

    Abstract: Federated learning has been rapidly evolving and gaining popularity in recent years due to its privacy-preserving features, among other advantages. Nevertheless, the exchange of model updates and gradients in this architecture provides new attack surfaces for malicious users of the network which may jeopardize the model performance and user and data privacy. For this reason, one of the main motiva… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: Accepted for publication in IEEE Transactions on Big Data

    Journal ref: IEEE Transactions on Big Data, vol. 10, no. 2, pp. 194-213, 2024

  14. arXiv:2401.06980  [pdf, other

    cs.CL cs.LG stat.ML

    Joint Unsupervised and Supervised Training for Automatic Speech Recognition via Bilevel Optimization

    Authors: A F M Saif, Xiaodong Cui, Han Shen, Songtao Lu, Brian Kingsbury, Tianyi Chen

    Abstract: In this paper, we present a novel bilevel optimization-based training approach to training acoustic models for automatic speech recognition (ASR) tasks that we term {bi-level joint unsupervised and supervised training (BL-JUST)}. {BL-JUST employs a lower and upper level optimization with an unsupervised loss and a supervised loss respectively, leveraging recent advances in penalty-based bilevel op… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

    Comments: This paper has been accepted in ICASSP-2024 conference

  15. Learning From High-Dimensional Cyber-Physical Data Streams for Diagnosing Faults in Smart Grids

    Authors: Hossein Hassani, Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif

    Abstract: The performance of fault diagnosis systems is highly affected by data quality in cyber-physical power systems. These systems generate massive amounts of data that overburden the system with excessive computational costs. Another issue is the presence of noise in recorded measurements, which prevents building a precise decision model. Furthermore, the diagnostic model is often provided with a mixtu… ▽ More

    Submitted 14 March, 2023; originally announced March 2023.

    Comments: 7 pages, 2 figures

    Journal ref: Int. J. Mach. Learn. & Cyber. (2024)

  16. arXiv:2210.06729  [pdf, other

    cs.LG cs.CR cs.CV eess.SP eess.SY

    A Stream Learning Approach for Real-Time Identification of False Data Injection Attacks in Cyber-Physical Power Systems

    Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Meng Wang, Mehrdad Saif, Bruce Fardanesh

    Abstract: This paper presents a novel data-driven framework to aid in system state estimation when the power system is under unobservable false data injection attacks. The proposed framework dynamically detects and classifies false data injection attacks. Then, it retrieves the control signal using the acquired information. This process is accomplished in three main modules, with novel designs, for detectio… ▽ More

    Submitted 13 October, 2022; originally announced October 2022.

    Comments: Accepted for publication in IEEE Transactions on Information Forensics and Security

    Journal ref: IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3934-3945, 2022

  17. arXiv:2207.02337  [pdf, other

    cs.LG cs.AI cs.CR cs.CV cs.DC

    Federated and Transfer Learning: A Survey on Adversaries and Defense Mechanisms

    Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif

    Abstract: The advent of federated learning has facilitated large-scale data exchange amongst machine learning models while maintaining privacy. Despite its brief history, federated learning is rapidly evolving to make wider use more practical. One of the most significant advancements in this domain is the incorporation of transfer learning into federated learning, which overcomes fundamental constraints of… ▽ More

    Submitted 5 July, 2022; originally announced July 2022.

    Comments: Accepted for publication in edited book titled "Federated and Transfer Learning", Springer, Cham

    Journal ref: Federated and Transfer Learning, Springer International Publishing, Cham, pp. 29-55, 2023

  18. arXiv:2203.06721  [pdf

    cs.CV

    Food Recipe Recommendation Based on Ingredients Detection Using Deep Learning

    Authors: Md. Shafaat Jamil Rokon, Md Kishor Morol, Ishra Binte Hasan, A. M. Saif, Rafid Hussain Khan

    Abstract: Food is essential for human survival, and people always try to taste different types of delicious recipes. Frequently, people choose food ingredients without even knowing their names or pick up some food ingredients that are not obvious to them from a grocery store. Knowing which ingredients can be mixed to make a delicious food recipe is essential. Selecting the right recipe by choosing a list of… ▽ More

    Submitted 13 March, 2022; originally announced March 2022.

    Comments: Accepted at ICCA 2022

  19. A Survey of Deep Learning Techniques for the Analysis of COVID-19 and their usability for Detecting Omicron

    Authors: Asifullah Khan, Saddam Hussain Khan, Mahrukh Saif, Asiya Batool, Anabia Sohail, Muhammad Waleed Khan

    Abstract: The Coronavirus (COVID-19) outbreak in December 2019 has become an ongoing threat to humans worldwide, creating a health crisis that infected millions of lives, as well as devastating the global economy. Deep learning (DL) techniques have proved helpful in analysis and delineation of infectious regions in radiological images in a timely manner. This paper makes an in-depth survey of DL techniques… ▽ More

    Submitted 4 April, 2022; v1 submitted 13 February, 2022; originally announced February 2022.

    Comments: Pages: 44, Figures: 7, Tables: 14

  20. Alpha-N: Shortest Path Finder Automated Delivery Robot with Obstacle Detection and Avoiding System

    Authors: A. A. Neloy, R. A. Bindu, S. Alam, R. Haque, M. Saif, A. Khan, N. M. Mishu, S. Siddique

    Abstract: Alpha N A self-powered, wheel driven Automated Delivery Robot is presented in this paper. The ADR is capable of navigating autonomously by detecting and avoiding objects or obstacles in its path. It uses a vector map of the path and calculates the shortest path by Grid Count Method of Dijkstra Algorithm. Landmark determination with Radio Frequency Identification tags are placed in the path for ide… ▽ More

    Submitted 28 April, 2020; v1 submitted 26 February, 2020; originally announced February 2020.

    Comments: 12 pages, 7 figures, To be appear in the proceedings of 12th Asian Conference on Intelligent Information and Database Systems 23-26 March 2020 Phuket, Thailand

    Journal ref: Vietnam Journal of Computer Science, Vol 7, No 4 (2020)