Skip to main content

Showing 1–7 of 7 results for author: Soltani, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.14897  [pdf, other

    cs.CE cs.CL cs.LG q-fin.ST

    Market-Derived Financial Sentiment Analysis: Context-Aware Language Models for Crypto Forecasting

    Authors: Hamid Moradi-Kamali, Mohammad-Hossein Rajabi-Ghozlou, Mahdi Ghazavi, Ali Soltani, Amirreza Sattarzadeh, Reza Entezari-Maleki

    Abstract: Financial Sentiment Analysis (FSA) traditionally relies on human-annotated sentiment labels to infer investor sentiment and forecast market movements. However, inferring the potential market impact of words based on their human-perceived intentions is inherently challenging. We hypothesize that the historical market reactions to words, offer a more reliable indicator of their potential impact on m… ▽ More

    Submitted 2 March, 2025; v1 submitted 17 February, 2025; originally announced February 2025.

    Comments: 13 pages, 6 figures

    MSC Class: 68T50 ACM Class: H.3.1; I.2.7; J.1

  2. arXiv:2408.07718  [pdf, other

    cs.LG cs.AI

    Impact of Inaccurate Contamination Ratio on Robust Unsupervised Anomaly Detection

    Authors: Jordan F. Masakuna, DJeff Kanda Nkashama, Arian Soltani, Marc Frappier, Pierre-Martin Tardif, Froduald Kabanza

    Abstract: Training data sets intended for unsupervised anomaly detection, typically presumed to be anomaly-free, often contain anomalies (or contamination), a challenge that significantly undermines model performance. Most robust unsupervised anomaly detection models rely on contamination ratio information to tackle contamination. However, in reality, contamination ratio may be inaccurate. We investigate on… ▽ More

    Submitted 14 August, 2024; originally announced August 2024.

    Comments: This is an accepted extended abstract at Black in AI Workshop which will be co-located with NeurIPS 2024 in Canada

  3. arXiv:2407.08838  [pdf, other

    cs.LG cs.CR cs.NI

    Deep Learning for Network Anomaly Detection under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation

    Authors: D'Jeff K. Nkashama, Jordan Masakuna Félicien, Arian Soltani, Jean-Charles Verdier, Pierre-Martin Tardif, Marc Frappier, Froduald Kabanza

    Abstract: Deep learning (DL) has emerged as a crucial tool in network anomaly detection (NAD) for cybersecurity. While DL models for anomaly detection excel at extracting features and learning patterns from data, they are vulnerable to data contamination -- the inadvertent inclusion of attack-related data in training sets presumed benign. This study evaluates the robustness of six unsupervised DL algorithms… ▽ More

    Submitted 12 September, 2024; v1 submitted 11 July, 2024; originally announced July 2024.

    Comments: arXiv admin note: text overlap with arXiv:2207.03576

  4. arXiv:2405.11621  [pdf

    cs.CV

    Computer Vision in the Food Industry: Accurate, Real-time, and Automatic Food Recognition with Pretrained MobileNetV2

    Authors: Shayan Rokhva, Babak Teimourpour, Amir Hossein Soltani

    Abstract: In contemporary society, the application of artificial intelligence for automatic food recognition offers substantial potential for nutrition tracking, reducing food waste, and enhancing productivity in food production and consumption scenarios. Modern technologies such as Computer Vision and Deep Learning are highly beneficial, enabling machines to learn automatically, thereby facilitating automa… ▽ More

    Submitted 19 May, 2024; originally announced May 2024.

  5. arXiv:2301.03711  [pdf, other

    q-bio.NC cs.AI cs.CV cs.LG

    3D Shape Perception Integrates Intuitive Physics and Analysis-by-Synthesis

    Authors: Ilker Yildirim, Max H. Siegel, Amir A. Soltani, Shraman Ray Chaudhari, Joshua B. Tenenbaum

    Abstract: Many surface cues support three-dimensional shape perception, but people can sometimes still see shape when these features are missing -- in extreme cases, even when an object is completely occluded, as when covered with a draped cloth. We propose a framework for 3D shape perception that explains perception in both typical and atypical cases as analysis-by-synthesis, or inference in a generative m… ▽ More

    Submitted 9 January, 2023; originally announced January 2023.

  6. arXiv:2207.03576  [pdf, other

    cs.CR cs.LG cs.NI

    Robustness Evaluation of Deep Unsupervised Learning Algorithms for Intrusion Detection Systems

    Authors: D'Jeff Kanda Nkashama, Arian Soltani, Jean-Charles Verdier, Marc Frappier, Pierre-Martin Tardif, Froduald Kabanza

    Abstract: Recently, advances in deep learning have been observed in various fields, including computer vision, natural language processing, and cybersecurity. Machine learning (ML) has demonstrated its ability as a potential tool for anomaly detection-based intrusion detection systems to build secure computer networks. Increasingly, ML approaches are widely adopted than heuristic approaches for cybersecurit… ▽ More

    Submitted 30 October, 2023; v1 submitted 24 June, 2022; originally announced July 2022.

    Comments: Machine Learning for Cybersecurity Workshop at the International Conference on Machine Learning(ICLR-ML4CY)

  7. arXiv:1411.6651  [pdf

    cs.AI stat.ML

    A Greedy, Flexible Algorithm to Learn an Optimal Bayesian Network Structure

    Authors: Amir Arsalan Soltani

    Abstract: In this report paper we first present a report of the Advanced Machine Learning Course Project on the provided data set and then present a novel heuristic algorithm for exact Bayesian network (BN) structure discovery that uses decomposable scoring functions. Our algorithm follows a different approach to solve the problem of BN structure discovery than the previously used methods such as Dynamic Pr… ▽ More

    Submitted 24 November, 2014; originally announced November 2014.

    Comments: This was my Advanced Machine Learning's course project in Spring 2014