69,096 results on '"Amini, A"'
Search Results
2. Quantum Reservoir Computing and Risk Bounds
- Author
-
Chmielewski, Naomi Mona, Amini, Nina, and Mikael, Joseph
- Subjects
Computer Science - Machine Learning ,Statistics - Machine Learning - Abstract
We propose a way to bound the generalisation errors of several classes of quantum reservoirs using the Rademacher complexity. We give specific, parameter-dependent bounds for two particular quantum reservoir classes. We analyse how the generalisation bounds scale with growing numbers of qubits. Applying our results to classes with polynomial readout functions, we find that the risk bounds converge in the number of training samples. The explicit dependence on the quantum reservoir and readout parameters in our bounds can be used to control the generalisation error to a certain extent. It should be noted that the bounds scale exponentially with the number of qubits $n$. The upper bounds on the Rademacher complexity can be applied to other reservoir classes that fulfill a few hypotheses on the quantum dynamics and the readout function.
- Published
- 2025
3. Benchmarking Vision Foundation Models for Input Monitoring in Autonomous Driving
- Author
-
Keser, Nert, Orhan, Halil Ibrahim, Amini-Naieni, Niki, Schwalbe, Gesina, Knoll, Alois, and Rottmann, Matthias
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Deep neural networks (DNNs) remain challenged by distribution shifts in complex open-world domains like automated driving (AD): Absolute robustness against yet unknown novel objects (semantic shift) or styles like lighting conditions (covariate shift) cannot be guaranteed. Hence, reliable operation-time monitors for identification of out-of-training-data-distribution (OOD) scenarios are imperative. Current approaches for OOD classification are untested for complex domains like AD, are limited in the kinds of shifts they detect, or even require supervision with OOD samples. To prepare for unanticipated shifts, we instead establish a framework around a principled, unsupervised, and model-agnostic method that unifies detection of all kinds of shifts: Find a full model of the training data's feature distribution, to then use its density at new points as in-distribution (ID) score. To implement this, we propose to combine the newly available Vision Foundation Models (VFM) as feature extractors with one of four alternative density modeling techniques. In an extensive benchmark of 4 VFMs against 20 baselines, we show the superior performance of VFM feature encodings compared to shift-specific OOD monitors. Additionally, we find that sophisticated architectures outperform larger latent space dimensionality; and our method identifies samples with higher risk of errors on downstream tasks, despite being model-agnostic. This suggests that VFMs are promising to realize model-agnostic, unsupervised, reliable safety monitors in complex vision tasks.
- Published
- 2025
4. Transforming Social Science Research with Transfer Learning: Social Science Survey Data Integration with AI
- Author
-
Amini, Ali
- Subjects
Computer Science - Artificial Intelligence ,I.2.7, I.2.6, H.1.2, I.2.10 - Abstract
Large-N nationally representative surveys, which have profoundly shaped American politics scholarship, represent related but distinct domains -a key condition for transfer learning applications. These surveys are related through their shared demographic, party identification, and ideological variables, yet differ in that individual surveys often lack specific policy preference questions that researchers require. Our study introduces a novel application of transfer learning (TL) to address these gaps, marking the first systematic use of TL paradigms in the context of survey data. Specifically, models pre-trained on the Cooperative Election Study (CES) dataset are fine-tuned for use in the American National Election Studies (ANES) dataset to predict policy questions based on demographic variables. Even with a naive architecture, our transfer learning approach achieves approximately 92 percentage accuracy in predicting missing variables across surveys, demonstrating the robust potential of this method. Beyond this specific application, our paper argues that transfer learning is a promising framework for maximizing the utility of existing survey data. We contend that artificial intelligence, particularly transfer learning, opens new frontiers in social science methodology by enabling systematic knowledge transfer between well-administered surveys that share common variables but differ in their outcomes of interest., Comment: 22 pages, 5 figures, Presented and Submitted to SPSA 2025 (Political Methodology Panel)
- Published
- 2025
5. Benchmarking Different Application Types across Heterogeneous Cloud Compute Services
- Author
-
Duggi, Nivedhitha, Rafiei, Masoud, and Salehi, Mohsen Amini
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
Infrastructure as a Service (IaaS) clouds have become the predominant underlying infrastructure for the operation of modern and smart technology. IaaS clouds have proven to be useful for multiple reasons such as reduced costs, increased speed and efficiency, and better reliability and scalability. Compute services offered by such clouds are heterogeneous -- they offer a set of architecturally diverse machines that fit efficiently executing different workloads. However, there has been little study to shed light on the performance of popular application types on these heterogeneous compute servers across different clouds. Such a study can help organizations to optimally (in terms of cost, latency, throughput, consumed energy, carbon footprint, etc.) employ cloud compute services. At HPCC lab, we have focused on such benchmarks in different research projects and, in this report, we curate those benchmarks in a single document to help other researchers in the community using them. Specifically, we introduce our benchmarks datasets for three application types in three different domains, namely: Deep Neural Networks (DNN) Inference for industrial applications, Machine Learning (ML) Inference for assistive technology applications, and video transcoding for multimedia use cases., Comment: Technical Report. arXiv admin note: text overlap with arXiv:2011.11711 by other authors
- Published
- 2025
6. Optical Coherence Tomography in Soft Matter
- Author
-
Amini, Kasra, Wittig, Cornelius, Saoncella, Sofia, Tammisola, Outi, Lundell, Fredrik, and Bagheri, Shervin
- Subjects
Physics - Fluid Dynamics ,Condensed Matter - Soft Condensed Matter - Abstract
Optical Coherence Tomography (OCT) has become an indispensable tool for investigating mesoscopic features in soft matter and fluid mechanics. Its ability to provide high-resolution, non-invasive measurements in both spatial and temporal domains bridges critical gaps in experimental instrumentation, enabling the study of complex, confined, and dynamic systems. This review serves as both an introduction to OCT and a practical guide for researchers seeking to adopt this technology. A set of tutorials, complemented by Python scripts, are provided for both intensity- and Doppler-based techniques. The versatility of OCT is illustrated through case studies, including time-resolved velocimetry, particle-based velocity measurements, slip velocity characterization, detection of shear-induced structures, and analysis of fluid-fluid and fluid-structure interactions. Drawing on our experiences, we also present a set of practical guidelines for avoiding common pitfalls.
- Published
- 2025
7. On weight and variance uncertainty in neural networks for regression tasks
- Author
-
Monemi, Moein, Amini, Morteza, Taheri, S. Mahmoud, and Arashi, Mohammad
- Subjects
Statistics - Machine Learning ,Computer Science - Machine Learning - Abstract
We consider the problem of weight uncertainty proposed by [Blundell et al. (2015). Weight uncertainty in neural network. In International conference on machine learning, 1613-1622, PMLR.] in neural networks {(NNs)} specialized for regression tasks. {We further} investigate the effect of variance uncertainty in {their model}. We show that including the variance uncertainty can improve the prediction performance of the Bayesian {NN}. Variance uncertainty enhances the generalization of the model {by} considering the posterior distribution over the variance parameter. { We examine the generalization ability of the proposed model using a function approximation} example and {further illustrate it with} the riboflavin genetic data set. {We explore fully connected dense networks and dropout NNs with} Gaussian and spike-and-slab priors, respectively, for the network weights., Comment: Submitted to journal
- Published
- 2025
8. Test Input Validation for Vision-based DL Systems: An Active Learning Approach
- Author
-
Ghobari, Delaram, Amini, Mohammad Hossein, Tran, Dai Quoc, Park, Seunghee, Nejati, Shiva, and Sabetzadeh, Mehrdad
- Subjects
Computer Science - Software Engineering - Abstract
Testing deep learning (DL) systems requires extensive and diverse, yet valid, test inputs. While synthetic test input generation methods, such as metamorphic testing, are widely used for DL testing, they risk introducing invalid inputs that do not accurately reflect real-world scenarios. Invalid test inputs can lead to misleading results. Hence, there is a need for automated validation of test inputs to ensure effective assessment of DL systems. In this paper, we propose a test input validation approach for vision-based DL systems. Our approach uses active learning to balance the trade-off between accuracy and the manual effort required for test input validation. Further, by employing multiple image-comparison metrics, it achieves better results in classifying valid and invalid test inputs compared to methods that rely on single metrics. We evaluate our approach using an industrial and a public-domain dataset. Our evaluation shows that our multi-metric, active learning-based approach produces several optimal accuracy-effort trade-offs, including those deemed practical and desirable by our industry partner. Furthermore, provided with the same level of manual effort, our approach is significantly more accurate than two state-of-the-art test input validation methods, achieving an average accuracy of 97%. Specifically, the use of multiple metrics, rather than a single metric, results in an average improvement of at least 5.4% in overall accuracy compared to the state-of-the-art baselines. Incorporating an active learning loop for test input validation yields an additional 7.5% improvement in average accuracy, bringing the overall average improvement of our approach to at least 12.9% compared to the baselines., Comment: This paper has been accepted at the Software Engineering in Practice (SEIP) track of the 47th International Conference on Software Engineering (ICSE 2025)
- Published
- 2025
9. Blockchain-Empowered Cyber-Secure Federated Learning for Trustworthy Edge Computing
- Author
-
Moore, Ervin, Imteaj, Ahmed, Hossain, Md Zarif, Rezapour, Shabnam, and Amini, M. Hadi
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
Federated Learning (FL) is a privacy-preserving distributed machine learning scheme, where each participant data remains on the participating devices and only the local model generated utilizing the local computational power is transmitted throughout the database. However, the distributed computational nature of FL creates the necessity to develop a mechanism that can remotely trigger any network agents, track their activities, and prevent threats to the overall process posed by malicious participants. Particularly, the FL paradigm may become vulnerable due to an active attack from the network participants, called a poisonous attack. In such an attack, the malicious participant acts as a benign agent capable of affecting the global model quality by uploading an obfuscated poisoned local model update to the server. This paper presents a cross-device FL model that ensures trustworthiness, fairness, and authenticity in the underlying FL training process. We leverage trustworthiness by constructing a reputation-based trust model based on contributions of agents toward model convergence. We ensure fairness by identifying and removing malicious agents from the training process through an outlier detection technique. Further, we establish authenticity by generating a token for each participating device through a distributed sensing mechanism and storing that unique token in a blockchain smart contract. Further, we insert the trust scores of all agents into a blockchain and validate their reputations using various consensus mechanisms that consider the computational task.
- Published
- 2024
10. Model-Agnostic Meta-Learning for Fault Diagnosis of Induction Motors in Data-Scarce Environments with Varying Operating Conditions and Electric Drive Noise
- Author
-
Pourghoraba, Ali, KhajueeZadeh, MohammadSadegh, Amini, Ali, Vahedi, Abolfazl, Agah, Gholam Reza, and Rahideh, Akbar
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
Reliable mechanical fault detection with limited data is crucial for the effective operation of induction machines, particularly given the real-world challenges present in industrial datasets, such as significant imbalances between healthy and faulty samples and the scarcity of data representing faulty conditions. This research introduces an innovative meta-learning approach to address these issues, focusing on mechanical fault detection in induction motors across diverse operating conditions while mitigating the adverse effects of drive noise in scenarios with limited data. The process of identifying faults under varying operating conditions is framed as a few-shot classification challenge and approached through a model-agnostic meta-learning strategy. Specifically, this approach begins with training a meta-learner across multiple interconnected fault-diagnosis tasks conducted under different operating conditions. In this stage, cross-entropy is utilized to optimize parameters and develop a robust representation of the tasks. Subsequently, the parameters of the meta-learner are fine-tuned for new tasks, enabling rapid adaptation using only a small number of samples. This method achieves excellent accuracy in fault detection across various conditions, even when data availability is restricted. The findings indicate that the proposed model outperforms other sophisticated techniques, providing enhanced generalization and quicker adaptation. The accuracy of fault diagnosis reaches a minimum of 99%, underscoring the model's effectiveness for reliable fault identification.
- Published
- 2024
11. Solving the Inverse Problem of Magnetic Induction Tomography Using Gauss-Newton Iterative Method and Zoning Technique to Reduce Unknown Coefficients
- Author
-
Yousefi, Mohammad Reza, Dehghani, Amin, Amini, Ali Asghar, and Mirtalaei, S. M. Mehdi
- Subjects
Quantitative Biology - Quantitative Methods - Abstract
Magnetic Induction Tomography (MIT) is a promising modality for noninvasive imaging due to its contactless and nonionizing technology. In this imaging method, a primary magnetic field is applied by excitation coils to induce eddy currents in the material to be studied, and a secondary magnetic field is detected from these eddy currents using sensing coils. The image (spatial distribution of electrical conductivity) is then reconstructed using measurement data, the initial estimation of electrical conductivity, and the iterative solution of forward and inverse problems. The inverse problem can be solved using one-step linear, iterative nonlinear, and special methods. In general, the MIT inverse problem can be solved by Gauss- Newton iterative method with acceptable accuracy. In this paper, this algorithm is extended and the zoning technique is employed for the reduction of unknown coefficients. The simulation results obtained by the proposed method are compared with the real conductivity coefficients and the mean relative error rate is reduced to 24.22%. On the other hand, Gauss-Newton iterative method is extended for solving the inverse problem of the MIT, and sensitivity measurement matrices are extracted in different experimental and normalization conditions., Comment: in Persian language
- Published
- 2024
- Full Text
- View/download PDF
12. HE2C: A Holistic Approach for Allocating Latency-Sensitive AI Tasks across Edge-Cloud
- Author
-
Kim, Minseo, Shu, Wei, and Salehi, Mohsen Amini
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
The high computational, memory, and energy demands of Deep Learning (DL) applications often exceed the capabilities of battery-powered edge devices, creating difficulties in meeting task deadlines and accuracy requirements. Unlike previous solutions that optimize a single metric (e.g., accuracy or energy efficiency), HE2C framework is designed to holistically address the latency, memory, accuracy, throughput, and energy demands of DL applications across edge-cloud continuum, thereby, delivering a more comprehensive and effective user experience. HE2C comprises three key modules: (a) a "feasibility-check module that evaluates the likelihood of meeting deadlines across both edge and cloud resources; (b) a "resource allocation strategy" that maximizes energy efficiency without sacrificing the inference accuracy; and (c) a "rescue module" that enhances throughput by leveraging approximate computing to trade accuracy for latency when necessary. Our primary objective is to maximize system prolong battery lifespan, throughput, and accuracy while adhering to strict latency constraints. Experimental evaluations in the context of wearable technologies for blind and visually impaired users demonstrate that HE2C significantly improves task throughput via completing a larger number of tasks within their specified deadlines, while preserving edge device battery and maintaining prediction accuracy with minimal latency impact. These results underscore HE2C's potential as a robust solution for resource management in latency-sensitive, energy-constrained edge-to-cloud environments., Comment: Accepted in Utility Cloud Computing (UCC '24) Conference
- Published
- 2024
13. Action Engine: An LLM-based Framework for Automatic FaaS Workflow Generation
- Author
-
Esashi, Akiharu, Lertpongrujikorn, Pawissanutt, and Salehi, Mohsen Amini
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning ,Computer Science - Software Engineering - Abstract
Function as a Service (FaaS) is poised to become the foundation of the next generation of cloud systems due to its inherent advantages in scalability, cost-efficiency, and ease of use. However, challenges such as the need for specialized knowledge and difficulties in building function workflows persist for cloud-native application developers. To overcome these challenges and mitigate the burden of developing FaaS-based applications, in this paper, we propose a mechanism called Action Engine, that makes use of Tool-Augmented Large Language Models (LLMs) at its kernel to interpret human language queries and automates FaaS workflow generation, thereby, reducing the need for specialized expertise and manual design. Action Engine includes modules to identify relevant functions from the FaaS repository and seamlessly manage the data dependency between them, ensuring that the developer's query is processed and resolved. Beyond that, Action Engine can execute the generated workflow by feeding the user-provided parameters. Our evaluations show that Action Engine can generate workflows with up to 20\% higher correctness without developer involvement. We notice that Action Engine can unlock FaaS workflow generation for non-cloud-savvy developers and expedite the development cycles of cloud-native applications., Comment: Accepted at Utility Cloud Computing (UCC '24) conference
- Published
- 2024
14. Multi-Label Contrastive Learning : A Comprehensive Study
- Author
-
Audibert, Alexandre, Gauffre, Aurélien, and Amini, Massih-Reza
- Subjects
Computer Science - Machine Learning - Abstract
Multi-label classification, which involves assigning multiple labels to a single input, has emerged as a key area in both research and industry due to its wide-ranging applications. Designing effective loss functions is crucial for optimizing deep neural networks for this task, as they significantly influence model performance and efficiency. Traditional loss functions, which often maximize likelihood under the assumption of label independence, may struggle to capture complex label relationships. Recent research has turned to supervised contrastive learning, a method that aims to create a structured representation space by bringing similar instances closer together and pushing dissimilar ones apart. Although contrastive learning offers a promising approach, applying it to multi-label classification presents unique challenges, particularly in managing label interactions and data structure. In this paper, we conduct an in-depth study of contrastive learning loss for multi-label classification across diverse settings. These include datasets with both small and large numbers of labels, datasets with varying amounts of training data, and applications in both computer vision and natural language processing. Our empirical results indicate that the promising outcomes of contrastive learning are attributable not only to the consideration of label interactions but also to the robust optimization scheme of the contrastive loss. Furthermore, while the supervised contrastive loss function faces challenges with datasets containing a small number of labels and ranking-based metrics, it demonstrates excellent performance, particularly in terms of Macro-F1, on datasets with a large number of labels., Comment: 28 pages, 1 figure
- Published
- 2024
15. STAR: Synthesis of Tailored Architectures
- Author
-
Thomas, Armin W., Parnichkun, Rom, Amini, Alexander, Massaroli, Stefano, and Poli, Michael
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Neural and Evolutionary Computing - Abstract
Iterative improvement of model architectures is fundamental to deep learning: Transformers first enabled scaling, and recent advances in model hybridization have pushed the quality-efficiency frontier. However, optimizing architectures remains challenging and expensive. Current automated or manual approaches fall short, largely due to limited progress in the design of search spaces and due to the simplicity of resulting patterns and heuristics. In this work, we propose a new approach for the synthesis of tailored architectures (STAR). Our approach combines a novel search space based on the theory of linear input-varying systems, supporting a hierarchical numerical encoding into architecture genomes. STAR genomes are automatically refined and recombined with gradient-free, evolutionary algorithms to optimize for multiple model quality and efficiency metrics. Using STAR, we optimize large populations of new architectures, leveraging diverse computational units and interconnection patterns, improving over highly-optimized Transformers and striped hybrid models on the frontier of quality, parameter size, and inference cache for autoregressive language modeling.
- Published
- 2024
16. Clustering Time Series Data with Gaussian Mixture Embeddings in a Graph Autoencoder Framework
- Author
-
Afzali, Amirabbas, Hosseini, Hesam, Mirzai, Mohmmadamin, and Amini, Arash
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Time series data analysis is prevalent across various domains, including finance, healthcare, and environmental monitoring. Traditional time series clustering methods often struggle to capture the complex temporal dependencies inherent in such data. In this paper, we propose the Variational Mixture Graph Autoencoder (VMGAE), a graph-based approach for time series clustering that leverages the structural advantages of graphs to capture enriched data relationships and produces Gaussian mixture embeddings for improved separability. Comparisons with baseline methods are included with experimental results, demonstrating that our method significantly outperforms state-of-the-art time-series clustering techniques. We further validate our method on real-world financial data, highlighting its practical applications in finance. By uncovering community structures in stock markets, our method provides deeper insights into stock relationships, benefiting market prediction, portfolio optimization, and risk management., Comment: First two listed authors have equal contribution. Author ordering is determined by coin flip
- Published
- 2024
17. How Media Competition Fuels the Spread of Misinformation
- Author
-
Amini, Arash, Bayiz, Yigit Ege, Lee, Eun-Ju, Somer-Topcu, Zeynep, Marculescu, Radu, and Topcu, Ufuk
- Subjects
Computer Science - Social and Information Networks - Abstract
Competition among news sources may encourage some sources to share fake news and misinformation to influence the public. While sharing misinformation may lead to a short-term gain in audience engagement, it may damage the reputation of these sources, resulting in a loss of audience. To understand the rationale behind sharing misinformation, we model the competition as a zero-sum sequential game, where each news source influences individuals based on its credibility-how trustworthy the public perceives it-and the individual's opinion and susceptibility. In this game, news sources can decide whether to share factual information to enhance their credibility or disseminate misinformation for greater immediate attention at the cost of losing credibility. We employ the quantal response equilibrium concept, which accounts for the bounded rationality of human decision-making, allowing for imperfect or probabilistic choices. Our analysis shows that the resulting equilibria for this game reproduce the credibility-bias distribution observed in real-world news sources, with hyper-partisan sources more likely to spread misinformation than centrist ones. It further illustrates that disseminating misinformation can polarize the public. Notably, our model reveals that when one player increases misinformation dissemination, the other player is likely to follow, exacerbating the spread of misinformation. We conclude by discussing potential strategies to mitigate the spread of fake news and promote a more factual and reliable information landscape., Comment: 18 pages, 8 figures
- Published
- 2024
18. Hyper-parameter Optimization for Federated Learning with Step-wise Adaptive Mechanism
- Author
-
Saadati, Yasaman and Amini, M. Hadi
- Subjects
Computer Science - Machine Learning ,Computer Science - Distributed, Parallel, and Cluster Computing ,I.2.11 - Abstract
Federated Learning (FL) is a decentralized learning approach that protects sensitive information by utilizing local model parameters rather than sharing clients' raw datasets. While this privacy-preserving method is widely employed across various applications, it still requires significant development and optimization. Automated Machine Learning (Auto-ML) has been adapted for reducing the need for manual adjustments. Previous studies have explored the integration of AutoML with different FL algorithms to evaluate their effectiveness in enhancing FL settings. However, Automated FL (Auto-FL) faces additional challenges due to the involvement of a large cohort of clients and global training rounds between clients and the server, rendering the tuning process time-consuming and nearly impossible on resource-constrained edge devices (e.g., IoT devices). This paper investigates the deployment and integration of two lightweight Hyper-Parameter Optimization (HPO) tools, Raytune and Optuna, within the context of FL settings. A step-wise feedback mechanism has also been designed to accelerate the hyper-parameter tuning process and coordinate AutoML toolkits with the FL server. To this end, both local and global feedback mechanisms are integrated to limit the search space and expedite the HPO process. Further, a novel client selection technique is introduced to mitigate the straggler effect in Auto-FL. The selected hyper-parameter tuning tools are evaluated using two benchmark datasets, FEMNIST, and CIFAR10. Further, the paper discusses the essential properties of successful HPO tools, the integration mechanism with the FL pipeline, and the challenges posed by the distributed and heterogeneous nature of FL environments.
- Published
- 2024
19. ULTra: Unveiling Latent Token Interpretability in Transformer Based Understanding
- Author
-
Hosseini, Hesam, Mighan, Ghazal Hosseini, Afzali, Amirabbas, Amini, Sajjad, and Houmansadr, Amir
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Transformers have revolutionized Computer Vision (CV) and Natural Language Processing (NLP) through self-attention mechanisms. However, due to their complexity, their latent token representations are often difficult to interpret. We introduce a novel framework that interprets Transformer embeddings, uncovering meaningful semantic patterns within them. Based on this framework, we demonstrate that zero-shot unsupervised semantic segmentation can be performed effectively without any fine-tuning using a model pre-trained for tasks other than segmentation. Our method reveals the inherent capacity of Transformer models for understanding input semantics and achieves state-of-the-art performance in semantic segmentation, outperforming traditional segmentation models. Specifically, our approach achieves an accuracy of 67.2 % and an mIoU of 32.9 % on the COCO-Stuff dataset, as well as an mIoU of 51.9 % on the PASCAL VOC dataset. Additionally, we validate our interpretability framework on LLMs for text summarization, demonstrating its broad applicability and robustness.
- Published
- 2024
20. Impact of LLM-based Review Comment Generation in Practice: A Mixed Open-/Closed-source User Study
- Author
-
Olewicki, Doriane, Da Silva, Leuson, Mujahid, Suhaib, Amini, Arezou, Mah, Benjamin, Castelluccio, Marco, Habchi, Sarra, Khomh, Foutse, and Adams, Bram
- Subjects
Computer Science - Software Engineering - Abstract
We conduct a large-scale empirical user study in a live setup to evaluate the acceptance of LLM-generated comments and their impact on the review process. This user study was performed in two organizations, Mozilla (which has its codebase available as open source) and Ubisoft (fully closed-source). Inside their usual review environment, participants were given access to RevMate, an LLM-based assistive tool suggesting generated review comments using an off-the-shelf LLM with Retrieval Augmented Generation to provide extra code and review context, combined with LLM-as-a-Judge, to auto-evaluate the generated comments and discard irrelevant cases. Based on more than 587 patch reviews provided by RevMate, we observed that 8.1% and 7.2%, respectively, of LLM-generated comments were accepted by reviewers in each organization, while 14.6% and 20.5% other comments were still marked as valuable as review or development tips. Refactoring-related comments are more likely to be accepted than Functional comments (18.2% and 18.6% compared to 4.8% and 5.2%). The extra time spent by reviewers to inspect generated comments or edit accepted ones (36/119), yielding an overall median of 43s per patch, is reasonable. The accepted generated comments are as likely to yield future revisions of the revised patch as human-written comments (74% vs 73% at chunk-level)., Comment: 12pages
- Published
- 2024
21. QuanCrypt-FL: Quantized Homomorphic Encryption with Pruning for Secure Federated Learning
- Author
-
Mia, Md Jueal and Amini, M. Hadi
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence ,Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
Federated Learning has emerged as a leading approach for decentralized machine learning, enabling multiple clients to collaboratively train a shared model without exchanging private data. While FL enhances data privacy, it remains vulnerable to inference attacks, such as gradient inversion and membership inference, during both training and inference phases. Homomorphic Encryption provides a promising solution by encrypting model updates to protect against such attacks, but it introduces substantial communication overhead, slowing down training and increasing computational costs. To address these challenges, we propose QuanCrypt-FL, a novel algorithm that combines low-bit quantization and pruning techniques to enhance protection against attacks while significantly reducing computational costs during training. Further, we propose and implement mean-based clipping to mitigate quantization overflow or errors. By integrating these methods, QuanCrypt-FL creates a communication-efficient FL framework that ensures privacy protection with minimal impact on model accuracy, thereby improving both computational efficiency and attack resilience. We validate our approach on MNIST, CIFAR-10, and CIFAR-100 datasets, demonstrating superior performance compared to state-of-the-art methods. QuanCrypt-FL consistently outperforms existing method and matches Vanilla-FL in terms of accuracy across varying client. Further, QuanCrypt-FL achieves up to 9x faster encryption, 16x faster decryption, and 1.5x faster inference compared to BatchCrypt, with training time reduced by up to 3x.
- Published
- 2024
22. The impact of mobility, beam sweeping and smart jammers on security vulnerabilities of 5G cells
- Author
-
Asemian, Ghazal, Kulhandjian, Michel, Amini, Mohammadreza, Kantarci, Burak, D'Amours, Claude, and Erol-Kantarci, Melike
- Subjects
Computer Science - Cryptography and Security - Abstract
The vulnerability of 5G networks to jamming attacks has emerged as a significant concern. This paper contributes in two primary aspects. Firstly, it investigates the effect of a multi-jammer on 5G cell metrics, specifically throughput and goodput. The investigation is conducted within the context of a mobility model for user equipment (UE), with a focus on scenarios involving connected vehicles (CVs) engaged in a mission. Secondly, the vulnerability of synchronization signal block (SSB) components is examined concerning jamming power and beam sweeping. Notably, the study reveals that increasing jamming power beyond 40 dBm in our specific scenario configuration no longer decreases network throughput due to the re-transmission of packets through the hybrid automatic repeat request (HARQ) process. Furthermore, it is observed that under the same jamming power, the physical downlink shared channel (PDSCH) is more vulnerable than the primary synchronization signal (PSS) and secondary synchronization signal (SSS). However, a smart jammer can disrupt the cell search process by injecting less power and targeting PSS-SSS or physical broadcast channel (PBCH) data compared to a barrage jammer. On the other hand, beam sweeping proves effective in mitigating the impact of a smart jammer, reducing the error vector magnitude root mean square from 51.59% to 23.36% under the same jamming power., Comment: 8 pages, 11 figures, Wireless World: Research and Trends Magazine
- Published
- 2024
- Full Text
- View/download PDF
23. Combination of searches for singly and doubly charged Higgs bosons produced via vector-boson fusion in proton–proton collisions at s = 13 TeV with the ATLAS detector
- Author
-
Aad, G, Aakvaag, E, Abbott, B, Abdelhameed, S, Abeling, K, Abicht, NJ, Abidi, SH, Aboelela, M, Aboulhorma, A, Abramowicz, H, Abreu, H, Abulaiti, Y, Acharya, BS, Ackermann, A, Bourdarios, C Adam, Adamczyk, L, Addepalli, SV, Addison, MJ, Adelman, J, Adiguzel, A, Adye, T, Affolder, AA, Afik, Y, Agaras, MN, Agarwala, J, Aggarwal, A, Agheorghiesei, C, Ahmadov, F, Ahmed, WS, Ahuja, S, Ai, X, Aielli, G, Aikot, A, Tamlihat, M Ait, Aitbenchikh, B, Akbiyik, M, Åkesson, TPA, Akimov, AV, Akiyama, D, Akolkar, NN, Aktas, S, Al Khoury, K, Alberghi, GL, Albert, J, Albicocco, P, Albouy, GL, Alderweireldt, S, Alegria, ZL, Aleksa, M, Aleksandrov, IN, Alexa, C, Alexopoulos, T, Alfonsi, F, Algren, M, Alhroob, M, Ali, B, Ali, HMJ, Ali, S, Alibocus, SW, Aliev, M, Alimonti, G, Alkakhi, W, Allaire, C, Allbrooke, BMM, Allen, JS, Allen, JF, Flores, CA Allendes, Allport, PP, Aloisio, A, Alonso, F, Alpigiani, C, Alsolami, ZMK, Estevez, M Alvarez, Fernandez, A Alvarez, Cardoso, M Alves, Alviggi, MG, Aly, M, Coutinho, Y Amaral, Ambler, A, Amelung, C, Amerl, M, Ames, CG, Amidei, D, Amini, B, Amirie, KJ, Dos Santos, SP Amor, Amos, KR, Amperiadou, D, An, S, Ananiev, V, Anastopoulos, C, Andeen, T, Anders, JK, Anderson, AC, Andrean, SY, Andreazza, A, Angelidakis, S, Angerami, A, Anisenkov, AV, and Annovi, A
- Subjects
Nuclear and Plasma Physics ,Particle and High Energy Physics ,Physical Sciences ,Mathematical Physics ,Astronomical and Space Sciences ,Atomic ,Molecular ,Nuclear ,Particle and Plasma Physics ,Nuclear & Particles Physics ,Mathematical sciences ,Physical sciences - Published
- 2024
24. Search for R-parity violating supersymmetric decays of the top squark to a b-jet and a lepton in s=13 TeV pp collisions with the ATLAS detector
- Author
-
Aad, G, Aakvaag, E, Abbott, B, Abdelhameed, S, Abeling, K, Abicht, NJ, Abidi, SH, Aboelela, M, Aboulhorma, A, Abramowicz, H, Abreu, H, Abulaiti, Y, Acharya, BS, Ackermann, A, Bourdarios, C Adam, Adamczyk, L, Addepalli, SV, Addison, MJ, Adelman, J, Adiguzel, A, Adye, T, Affolder, AA, Afik, Y, Agaras, MN, Agarwala, J, Aggarwal, A, Agheorghiesei, C, Ahmadov, F, Ahmed, WS, Ahuja, S, Ai, X, Aielli, G, Aikot, A, Tamlihat, M Ait, Aitbenchikh, B, Akbiyik, M, Åkesson, TPA, Akimov, AV, Akiyama, D, Akolkar, NN, Aktas, S, Al Khoury, K, Alberghi, GL, Albert, J, Albicocco, P, Albouy, GL, Alderweireldt, S, Alegria, ZL, Aleksa, M, Aleksandrov, IN, Alexa, C, Alexopoulos, T, Alfonsi, F, Algren, M, Alhroob, M, Ali, B, Ali, HMJ, Ali, S, Alibocus, SW, Aliev, M, Alimonti, G, Alkakhi, W, Allaire, C, Allbrooke, BMM, Allen, JF, Flores, CA Allendes, Allport, PP, Aloisio, A, Alonso, F, Alpigiani, C, Alsolami, ZMK, Estevez, M Alvarez, Fernandez, A Alvarez, Cardoso, M Alves, Alviggi, MG, Aly, M, Coutinho, Y Amaral, Ambler, A, Amelung, C, Amerl, M, Ames, CG, Amidei, D, Amini, B, Amirie, KJ, Dos Santos, SP Amor, Amos, KR, Amperiadou, D, An, S, Ananiev, V, Anastopoulos, C, Andeen, T, Anders, JK, Anderson, AC, Andrean, SY, Andreazza, A, Angelidakis, S, Angerami, A, Anisenkov, AV, Annovi, A, and Antel, C
- Subjects
Nuclear and Plasma Physics ,Particle and High Energy Physics ,Physical Sciences - Abstract
A search is presented for direct pair production of the stop, the supersymmetric partner of the top quark, in a decay through an R-parity violating coupling to a charged lepton and a b-quark. The dataset corresponds to an integrated luminosity of 140 fb−1 of proton-proton collisions at a center-of-mass energy of s=13 TeV collected between 2015 and 2018 by the ATLAS detector at the LHC. The final state has two charged leptons (electrons or muons) and two b-jets. The results of the search are interpreted in the context of a Minimal Supersymmetric Standard Model with an additional B−L gauge symmetry that is spontaneously broken. No significant excess is observed over the Standard Model background, and exclusion limits on stop pair production are set at 95% confidence level. The corresponding lower limits on the stop mass for 100% branching ratios to a b-quark and an electron, muon, or tau-lepton are 1.9 TeV, 1.8 TeV and 800 GeV, respectively, extending the reach of previous LHC searches. © 2024 CERN, for the ATLAS Collaboration 2024 CERN
- Published
- 2024
25. A Multiphysics Analysis and Investigation of Soft Magnetics Effect on IPMSM: Case Study Dynamometer
- Author
-
Amini, Ali, KhajueeZadeh, MohammadSadegh, and Vahedi, Abolfazl
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
Nowadays, Interior Permanent Magnet Synchronous Motors (IPMSMs) are taken into attention in the industry owing to their advantages. Moreover, in many cases, performing static tests is not enough, and investigating electric machines under dynamic conditions is necessary. Accordingly, by employing a dynamometer system, the dynamic behavior of the electric machine under test is investigated. Among the dynamometers, the best is the Alternating (AC) dynamometer because the basic dynamometers cannot take loads with high complexity. So, in the following study, two IPMSM with V-type and Delta-type rotor configurations are designed and suggested to employ in AC dynamometer. Any non-ideality in the electric machines of AC dynamometers, electrically and mechanically, causes errors in the measurement of the motor under test. Electrically and mechanically, the behavior of a system significantly depends on the used soft magnetics besides its physical and magnetic configuration. Accordingly, by performing a Multiphysics analysis and using the FEM tool to change the soft magnetics in the rotor and stator core, comparing the electric motors' behavior in the AC dynamometer is investigated under the same operating conditions electrically and mechanically. Finally, which soft magnetics is more satisfactory for the AC dynamometer can be seen.
- Published
- 2024
26. Streamlining Cloud-Native Application Development and Deployment with Robust Encapsulation
- Author
-
Lertpongrujikorn, Pawissanutt, Nguyen, Hai Duc, and Salehi, Mohsen Amini
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Programming Languages - Abstract
Current Serverless abstractions (e.g., FaaS) poorly support non-functional requirements (e.g., QoS and constraints), are provider-dependent, and are incompatible with other cloud abstractions (e.g., databases). As a result, application developers have to undergo numerous rounds of development and manual deployment refinements to finally achieve their desired quality and efficiency. In this paper, we present Object-as-a-Service (OaaS) -- a novel serverless paradigm that borrows the object-oriented programming concepts to encapsulate business logic, data, and non-functional requirements into a single deployment package, thereby streamlining provider-agnostic cloud-native application development. We also propose a declarative interface for the non-functional requirements of applications that relieves developers from daunting refinements to meet their desired QoS and deployment constraint targets. We realized the OaaS paradigm through a platform called Oparaca and evaluated it against various real-world applications and scenarios. The evaluation results demonstrate that Oparaca can enhance application performance by 60X and improve reliability by 50X through latency, throughput, and availability enforcement -- all with remarkably less development and deployment time and effort., Comment: Accepted at ACM Symposium of Cloud Computing (SoCC '24)
- Published
- 2024
27. Residue polytopes
- Author
-
Amini, Omid, Esteves, Eduardo, and Garcez, Eduardo
- Subjects
Mathematics - Combinatorics ,Mathematics - Algebraic Geometry - Abstract
A level graph is the data of a pair $(G,\pi)$ consisting of a finite graph $G$ and an ordered partition $\pi$ on the set of vertices of $G$. To each level graph on $n$ vertices we associate a polytope in $\mathbb R^n$ called its residue polytope. We show that residue polytopes are compatible with each other in the sense that if $\pi'$ is a coarsening of $\pi$, then the polytope associated to $(G,\pi)$ is a face of the one associated to $(G,\pi')$. Moreover, they form all the faces of the residue polytope of $G$, defined as the polytope associated to the level graph with the trivial ordered partition. The results are used in a companion work to describe limits of spaces of Abelian differentials on families of Riemann surfaces approaching a stable Riemann surface on the boundary of the moduli space., Comment: 18 pages, 3 figures
- Published
- 2024
28. Limit canonical series
- Author
-
Amini, Omid, Esteves, Eduardo, and Garcez, Eduardo
- Subjects
Mathematics - Algebraic Geometry ,Mathematics - Combinatorics - Abstract
We describe the limits of canonical series along families of curves degenerating to a nodal curve which is general for its topology, in the weak sense that the branches over nodes on each of its components are in general position. We define a fan structure on the space of edge lengths on the dual graph of the limit curve, and construct a projective variety parametrizing the limits, organized in strata associated to the cones of this fan., Comment: 79 pages, 10 figures, 3 appendices
- Published
- 2024
29. Membership Testing for Semantic Regular Expressions
- Author
-
Huang, Yifei, Amini, Matin, Glaunec, Alexis Le, Mamouras, Konstantinos, and Raghothaman, Mukund
- Subjects
Computer Science - Programming Languages - Abstract
SMORE (Chen et al., 2023) recently proposed the concept of semantic regular expressions that extend the classical formalism with a primitive to query external oracles such as databases and large language models (LLMs). Such patterns can be used to identify lines of text containing references to semantic concepts such as cities, celebrities, political entities, etc. The focus in their paper was on automatically synthesizing semantic regular expressions from positive and negative examples. In this paper, we study the membership testing problem: First, We present a two-pass NFA-based algorithm to determine whether a string $w$ matches a semantic regular expression (SemRE) $r$ in $O(|r|^2 |w|^2 + |r| |w|^3)$ time, assuming the oracle responds to each query in unit time. In common situations, where oracle queries are not nested, we show that this procedure runs in $O(|r|^2 |w|^2)$ time. Experiments with a prototype implementation of this algorithm validate our theoretical analysis, and show that the procedure massively outperforms a dynamic programming-based baseline, and incurs a $\approx 2 \times$ overhead over the time needed for interaction with the oracle. Next, We establish connections between SemRE membership testing and the triangle finding problem from graph theory, which suggest that developing algorithms which are simultaneously practical and asymptotically faster might be challenging. Furthermore, algorithms for classical regular expressions primarily aim to optimize their time and memory consumption. In contrast, an important consideration in our setting is to minimize the cost of invoking the oracle. We demonstrate an $\Omega(|w|^2)$ lower bound on the number of oracle queries necessary to make this determination.
- Published
- 2024
30. Reverse-Engineering the Reader
- Author
-
Kiegeland, Samuel, Wilcox, Ethan Gotlieb, Amini, Afra, Reich, David Robert, and Cotterell, Ryan
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Numerous previous studies have sought to determine to what extent language models, pretrained on natural language text, can serve as useful models of human cognition. In this paper, we are interested in the opposite question: whether we can directly optimize a language model to be a useful cognitive model by aligning it to human psychometric data. To achieve this, we introduce a novel alignment technique in which we fine-tune a language model to implicitly optimize the parameters of a linear regressor that directly predicts humans' reading times of in-context linguistic units, e.g., phonemes, morphemes, or words, using surprisal estimates derived from the language model. Using words as a test case, we evaluate our technique across multiple model sizes and datasets and find that it improves language models' psychometric predictive power. However, we find an inverse relationship between psychometric power and a model's performance on downstream NLP tasks as well as its perplexity on held-out test data. While this latter trend has been observed before (Oh et al., 2022; Shain et al., 2024), we are the first to induce it by manipulating a model's alignment to psychometric data.
- Published
- 2024
31. CrediRAG: Network-Augmented Credibility-Based Retrieval for Misinformation Detection in Reddit
- Author
-
Ram, Ashwin, Bayiz, Yigit Ege, Amini, Arash, Munir, Mustafa, and Marculescu, Radu
- Subjects
Computer Science - Social and Information Networks ,Computer Science - Artificial Intelligence - Abstract
Fake news threatens democracy and exacerbates the polarization and divisions in society; therefore, accurately detecting online misinformation is the foundation of addressing this issue. We present CrediRAG, the first fake news detection model that combines language models with access to a rich external political knowledge base with a dense social network to detect fake news across social media at scale. CrediRAG uses a news retriever to initially assign a misinformation score to each post based on the source credibility of similar news articles to the post title content. CrediRAG then improves the initial retrieval estimations through a novel weighted post-to-post network connected based on shared commenters and weighted by the average stance of all shared commenters across every pair of posts. We achieve 11% increase in the F1-score in detecting misinformative posts over state-of-the-art methods. Extensive experiments conducted on curated real-world Reddit data of over 200,000 posts demonstrate the superior performance of CrediRAG on existing baselines. Thus, our approach offers a more accurate and scalable solution to combat the spread of fake news across social media platforms.
- Published
- 2024
32. Strain-induced two-dimensional topological crystalline insulator
- Author
-
Jing, Liwei, Amini, Mohammad, Fumega, Adolfo O., Silveira, Orlando J., Lado, Jose L., Liljeroth, Peter, and Kezilebieke, Shawulienu
- Subjects
Condensed Matter - Mesoscale and Nanoscale Physics ,Condensed Matter - Materials Science - Abstract
Topological crystalline insulators (TCIs) host topological phases of matter protected by crystal symmetries. Topological surface states in three-dimensional TCIs have been predicted and observed in IV-VI SnTe-class semiconductors. Despite the prediction of a two-dimensional (2D) TCI characterized by two pairs of edge states inside the bulk gap, materials challenges have thus far prevented its experimental realization. Here we report the growth and characterization of bilayer SnTe on the 2$H$-NbSe$_2$ substrate by molecular beam epitaxy and scanning tunneling microscopy. We experimentally observe two anticorrelated, periodically modulated pairs of conducting edge states along the perimeters of the sample with a large band gap exceeding $0.2$ eV. We identify these states with a 2D TCI through first principles calculations. Finally, we probe the coupling of adjacent topological edge states and demonstrate the resulting energy shift driven by a combination of electrostatic interactions and tunneling coupling. Our work opens the door to investigations of tunable topological states in 2D TCIs, of potential impact for spintronics and nanoelectronics applications at room temperature.
- Published
- 2024
33. Towards deep learning sequence-structure co-generation for protein design
- Author
-
Wang, Chentong, Alamdari, Sarah, Domingo-Enrich, Carles, Amini, Ava, and Yang, Kevin K.
- Subjects
Quantitative Biology - Biomolecules - Abstract
Deep generative models that learn from the distribution of natural protein sequences and structures may enable the design of new proteins with valuable functions. While the majority of today's models focus on generating either sequences or structures, emerging co-generation methods promise more accurate and controllable protein design, ideally achieved by modeling both modalities simultaneously. Here we review recent advances in deep generative models for protein design, with a particular focus on sequence-structure co-generation methods. We describe the key methodological and evaluation principles underlying these methods, highlight recent advances from the literature, and discuss opportunities for continued development of sequence-structure co-generation approaches.
- Published
- 2024
34. TwinArray Sort: An Ultrarapid Conditional Non-Comparison Based Sorting Algorithm
- Author
-
Amini, Amin
- Subjects
Computer Science - Data Structures and Algorithms ,Computer Science - Computational Complexity - Abstract
In computer science, sorting algorithms are crucial for data processing and machine learning. Large datasets and high efficiency requirements provide challenges for comparison-based algorithms like Quicksort and Merge sort, which achieve O(n log n) time complexity. Non-comparison-based algorithms like Spreadsort and Counting Sort have memory consumption issues and a relatively high computational demand, even if they can attain linear time complexity under certain circumstances. We present TwinArray Sort, a novel conditional non-comparison-based sorting algorithm that effectively uses array indices. When it comes to worst-case time and space complexities, TwinArray Sort achieves O(n+k). The approach remains efficient under all settings and works well with datasets with randomly sorted, reverse-sorted, or nearly sorted distributions. TwinArray Sort can handle duplicates and optimize memory efficiently since thanks to its two auxiliary arrays for value storage and frequency counting, as well as a conditional distinct array verifier. TwinArray Sort constantly performs better than conventional algorithms, according to experimental assessments and particularly when sorting unique arrays under all data distribution scenarios. The approach is suitable for massive data processing and machine learning dataset management due to its creative use of dual auxiliary arrays and a conditional distinct array verification, which improves memory use and duplication handling. TwinArray Sort overcomes conventional sorting algorithmic constraints by combining cutting-edge methods with non-comparison-based sorting advantages. Its reliable performance in a range of data distributions makes it an adaptable and effective answer for contemporary computing requirements.
- Published
- 2024
35. In-depth Analysis of Privacy Threats in Federated Learning for Medical Data
- Author
-
Das, Badhan Chandra, Amini, M. Hadi, and Wu, Yanzhao
- Subjects
Computer Science - Machine Learning - Abstract
Federated learning is emerging as a promising machine learning technique in the medical field for analyzing medical images, as it is considered an effective method to safeguard sensitive patient data and comply with privacy regulations. However, recent studies have revealed that the default settings of federated learning may inadvertently expose private training data to privacy attacks. Thus, the intensity of such privacy risks and potential mitigation strategies in the medical domain remain unclear. In this paper, we make three original contributions to privacy risk analysis and mitigation in federated learning for medical data. First, we propose a holistic framework, MedPFL, for analyzing privacy risks in processing medical data in the federated learning environment and developing effective mitigation strategies for protecting privacy. Second, through our empirical analysis, we demonstrate the severe privacy risks in federated learning to process medical images, where adversaries can accurately reconstruct private medical images by performing privacy attacks. Third, we illustrate that the prevalent defense mechanism of adding random noises may not always be effective in protecting medical images against privacy attacks in federated learning, which poses unique and pressing challenges related to protecting the privacy of medical data. Furthermore, the paper discusses several unique research questions related to the privacy protection of medical data in the federated learning environment. We conduct extensive experiments on several benchmark medical image datasets to analyze and mitigate the privacy risks associated with federated learning for medical data.
- Published
- 2024
36. Unveiling Ontological Commitment in Multi-Modal Foundation Models
- Author
-
Keser, Mert, Schwalbe, Gesina, Amini-Naieni, Niki, Rottmann, Matthias, and Knoll, Alois
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
Ontological commitment, i.e., used concepts, relations, and assumptions, are a corner stone of qualitative reasoning (QR) models. The state-of-the-art for processing raw inputs, though, are deep neural networks (DNNs), nowadays often based off from multimodal foundation models. These automatically learn rich representations of concepts and respective reasoning. Unfortunately, the learned qualitative knowledge is opaque, preventing easy inspection, validation, or adaptation against available QR models. So far, it is possible to associate pre-defined concepts with latent representations of DNNs, but extractable relations are mostly limited to semantic similarity. As a next step towards QR for validation and verification of DNNs: Concretely, we propose a method that extracts the learned superclass hierarchy from a multimodal DNN for a given set of leaf concepts. Under the hood we (1) obtain leaf concept embeddings using the DNN's textual input modality; (2) apply hierarchical clustering to them, using that DNNs encode semantic similarities via vector distances; and (3) label the such-obtained parent concepts using search in available ontologies from QR. An initial evaluation study shows that meaningful ontological class hierarchies can be extracted from state-of-the-art foundation models. Furthermore, we demonstrate how to validate and verify a DNN's learned representations against given ontologies. Lastly, we discuss potential future applications in the context of QR., Comment: Qualitative Reasoning Workshop 2024 (QR2024) colocated with ECAI2024, camera-ready submission; first two authors contributed equally; 10 pages, 4 figures, 3 tables
- Published
- 2024
37. Artificial Intelligence for Secured Information Systems in Smart Cities: Collaborative IoT Computing with Deep Reinforcement Learning and Blockchain
- Author
-
Far, Amin Zakaie, Far, Mohammad Zakaie, Gharibzadeh, Sonia, Zangeneh, Shiva, Amini, Leila, and Rahimi, Morteza
- Subjects
Computer Science - Artificial Intelligence ,Computer Science - Cryptography and Security - Abstract
The accelerated expansion of the Internet of Things (IoT) has raised critical challenges associated with privacy, security, and data integrity, specifically in infrastructures such as smart cities or smart manufacturing. Blockchain technology provides immutable, scalable, and decentralized solutions to address these challenges, and integrating deep reinforcement learning (DRL) into the IoT environment offers enhanced adaptability and decision-making. This paper investigates the integration of blockchain and DRL to optimize mobile transmission and secure data exchange in IoT-assisted smart cities. Through the clustering and categorization of IoT application systems, the combination of DRL and blockchain is shown to enhance the performance of IoT networks by maintaining privacy and security. Based on the review of papers published between 2015 and 2024, we have classified the presented approaches and offered practical taxonomies, which provide researchers with critical perspectives and highlight potential areas for future exploration and research. Our investigation shows how combining blockchain's decentralized framework with DRL can address privacy and security issues, improve mobile transmission efficiency, and guarantee robust, privacy-preserving IoT systems. Additionally, we explore blockchain integration for DRL and outline the notable applications of DRL technology. By addressing the challenges of machine learning and blockchain integration, this study proposes novel perspectives for researchers and serves as a foundational exploration from an interdisciplinary standpoint.
- Published
- 2024
38. A Multi-Level Approach for Class Imbalance Problem in Federated Learning for Remote Industry 4.0 Applications
- Author
-
Hussain, Razin Farhan and Salehi, Mohsen Amini
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Systems and Control - Abstract
Deep neural network (DNN) models are effective solutions for industry 4.0 applications (\eg oil spill detection, fire detection, anomaly detection). However, training a DNN network model needs a considerable amount of data collected from various sources and transferred to the central cloud server that can be expensive and sensitive to privacy. For instance, in the remote offshore oil field where network connectivity is vulnerable, a federated fog environment can be a potential computing platform. Hence it is feasible to perform computation within the federation. On the contrary, performing a DNN model training using fog systems poses a security issue that the federated learning (FL) technique can resolve. In this case, the new challenge is the class imbalance problem that can be inherited in local data sets and can degrade the performance of the global model. Therefore, FL training needs to be performed considering the class imbalance problem locally. In addition, an efficient technique to select the relevant worker model needs to be adopted at the global level to increase the robustness of the global model. Accordingly, we utilize one of the suitable loss functions addressing the class imbalance in workers at the local level. In addition, we employ a dynamic threshold mechanism with user-defined worker's weight to efficiently select workers for aggregation that improve the global model's robustness. Finally, we perform an extensive empirical evaluation to explore the benefits of our solution and find up to 3-5% performance improvement than baseline federated learning methods.
- Published
- 2024
39. CorBin-FL: A Differentially Private Federated Learning Mechanism using Common Randomness
- Author
-
Salehi, Hojat Allah, Mia, Md Jueal, Pradhan, S. Sandeep, Amini, M. Hadi, and Shirani, Farhad
- Subjects
Computer Science - Machine Learning ,Computer Science - Cryptography and Security ,Computer Science - Information Theory - Abstract
Federated learning (FL) has emerged as a promising framework for distributed machine learning. It enables collaborative learning among multiple clients, utilizing distributed data and computing resources. However, FL faces challenges in balancing privacy guarantees, communication efficiency, and overall model accuracy. In this work, we introduce CorBin-FL, a privacy mechanism that uses correlated binary stochastic quantization to achieve differential privacy while maintaining overall model accuracy. The approach uses secure multi-party computation techniques to enable clients to perform correlated quantization of their local model updates without compromising individual privacy. We provide theoretical analysis showing that CorBin-FL achieves parameter-level local differential privacy (PLDP), and that it asymptotically optimizes the privacy-utility trade-off between the mean square error utility measure and the PLDP privacy measure. We further propose AugCorBin-FL, an extension that, in addition to PLDP, achieves user-level and sample-level central differential privacy guarantees. For both mechanisms, we derive bounds on privacy parameters and mean squared error performance measures. Extensive experiments on MNIST and CIFAR10 datasets demonstrate that our mechanisms outperform existing differentially private FL mechanisms, including Gaussian and Laplacian mechanisms, in terms of model accuracy under equal PLDP privacy budgets.
- Published
- 2024
40. Twin branching in shape memory alloys: a 1D model with energy dissipation effects
- Author
-
Stupkiewicz, Stanislaw, Amini, Seyedshoja, and Rezaee-Hajidehi, Mohsen
- Subjects
Condensed Matter - Materials Science - Abstract
We develop a 1D model of twin branching in shape memory alloys. The free energy of the branched microstructure comprises the interfacial and elastic strain energy contributions, both expressed in terms of the average twin spacing treated as a continuous function of the position. The total free energy is then minimized, and the corresponding Euler-Lagrange equation is solved numerically using the finite element method. The model can be considered as a continuous counterpart of the recent discrete model of Seiner et al. (2020), and our results show a very good agreement with that model in the entire range of physically relevant parameters. Furthermore, our continuous setting facilitates incorporation of energy dissipation into the model. The effect of rate-independent dissipation on the evolution of the branched microstructure is thus studied. The results show that significant effects on the microstructure and energy of the system are expected only for relatively small domain sizes.
- Published
- 2024
41. A Unified Contrastive Loss for Self-Training
- Author
-
Gauffre, Aurelien, Horvat, Julien, and Amini, Massih-Reza
- Subjects
Computer Science - Machine Learning ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Self-training methods have proven to be effective in exploiting abundant unlabeled data in semi-supervised learning, particularly when labeled data is scarce. While many of these approaches rely on a cross-entropy loss function (CE), recent advances have shown that the supervised contrastive loss function (SupCon) can be more effective. Additionally, unsupervised contrastive learning approaches have also been shown to capture high quality data representations in the unsupervised setting. To benefit from these advantages in a semi-supervised setting, we propose a general framework to enhance self-training methods, which replaces all instances of CE losses with a unique contrastive loss. By using class prototypes, which are a set of class-wise trainable parameters, we recover the probability distributions of the CE setting and show a theoretical equivalence with it. Our framework, when applied to popular self-training methods, results in significant performance improvements across three different datasets with a limited number of labeled data. Additionally, we demonstrate further improvements in convergence speed, transfer ability, and hyperparameter stability. The code is available at \url{https://github.com/AurelienGauffre/semisupcon/}.
- Published
- 2024
- Full Text
- View/download PDF
42. Unified Framework for Neural Network Compression via Decomposition and Optimal Rank Selection
- Author
-
Aghababaei-Harandi, Ali and Amini, Massih-Reza
- Subjects
Computer Science - Machine Learning ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Despite their high accuracy, complex neural networks demand significant computational resources, posing challenges for deployment on resource-constrained devices such as mobile phones and embedded systems. Compression algorithms have been developed to address these challenges by reducing model size and computational demands while maintaining accuracy. Among these approaches, factorization methods based on tensor decomposition are theoretically sound and effective. However, they face difficulties in selecting the appropriate rank for decomposition. This paper tackles this issue by presenting a unified framework that simultaneously applies decomposition and optimal rank selection, employing a composite compression loss within defined rank constraints. Our approach includes an automatic rank search in a continuous space, efficiently identifying optimal rank configurations without the use of training data, making it computationally efficient. Combined with a subsequent fine-tuning step, our approach maintains the performance of highly compressed models on par with their original counterparts. Using various benchmark datasets, we demonstrate the efficacy of our method through a comprehensive analysis.
- Published
- 2024
43. Estimation Enhancing in Optoelectronic Property: A Novel Approach Using Orbital Interaction Parameters and Tight-Binding
- Author
-
Zargar, Ali Haji Ebrahim, Amini, Ali, and Ayatollahi, Ahmad
- Subjects
Quantum Physics ,Condensed Matter - Materials Science ,Physics - Atomic Physics ,Physics - Computational Physics ,Physics - Optics - Abstract
This paper advocates for an innovative approach designed for estimating optoelectronic properties of quantum structures utilizing Tight-Binding (TB) theory. Predicated on the comparative analysis between estimated and actual properties, the study strives to validate the efficacy of this proposed technique; focusing notably on the computation of bandgap energy. It is observed that preceding methodologies offered a restricted accuracy when predicting complex structures like super-lattices and quantum wells. To address this gap, we propose a methodology involving three distinct phases using orbital interaction parameters (OIPs) and the TB theory. The research employed Aluminium Arsenide (AlAs) and Gallium Arsenide (GaAs) as the primary bulk materials. Our novel approach introduces a computation framework that first focuses on bulk computation, subsequently expanding to super-lattice structures. The findings of this research demonstrate promising results regarding the accuracy of predicated optoelectronic properties, particularly the cut-off wavelength. This study paves the way for future research, potentially enhancing the precision of the proposed methodology and its application scope within the field of quantum optoelectronics., Comment: This paper is published in the journal of Micro and Nanostructures
- Published
- 2024
- Full Text
- View/download PDF
44. Bridging the Gap between Real-world and Synthetic Images for Testing Autonomous Driving Systems
- Author
-
Amini, Mohammad Hossein and Nejati, Shiva
- Subjects
Computer Science - Software Engineering ,Computer Science - Artificial Intelligence - Abstract
Deep Neural Networks (DNNs) for Autonomous Driving Systems (ADS) are typically trained on real-world images and tested using synthetic simulator images. This approach results in training and test datasets with dissimilar distributions, which can potentially lead to erroneously decreased test accuracy. To address this issue, the literature suggests applying domain-to-domain translators to test datasets to bring them closer to the training datasets. However, translating images used for testing may unpredictably affect the reliability, effectiveness and efficiency of the testing process. Hence, this paper investigates the following questions in the context of ADS: Could translators reduce the effectiveness of images used for ADS-DNN testing and their ability to reveal faults in ADS-DNNs? Can translators result in excessive time overhead during simulation-based testing? To address these questions, we consider three domain-to-domain translators: CycleGAN and neural style transfer, from the literature, and SAEVAE, our proposed translator. Our results for two critical ADS tasks -- lane keeping and object detection -- indicate that translators significantly narrow the gap in ADS test accuracy caused by distribution dissimilarities between training and test data, with SAEVAE outperforming the other two translators. We show that, based on the recent diversity, coverage, and fault-revealing ability metrics for testing deep-learning systems, translators do not compromise the diversity and the coverage of test data, nor do they lead to revealing fewer faults in ADS-DNNs. Further, among the translators considered, SAEVAE incurs a negligible overhead in simulation time and can be efficiently integrated into simulation-based testing. Finally, we show that translators increase the correlation between offline and simulation-based testing results, which can help reduce the cost of simulation-based testing., Comment: Accepted for publication by the International Conference on Automated Software Engineering (ASE 2024)
- Published
- 2024
45. Optimal Quantum Circuit Design via Unitary Neural Networks
- Author
-
Zomorodi, M., Amini, H., Abbaszadeh, M., Sohrabi, J., Salari, V., and Plawiak, P.
- Subjects
Quantum Physics ,Computer Science - Artificial Intelligence - Abstract
The process of translating a quantum algorithm into a form suitable for implementation on a quantum computing platform is crucial but yet challenging. This entails specifying quantum operations with precision, a typically intricate task. In this paper, we present an alternative approach: an automated method for synthesizing the functionality of a quantum algorithm into a quantum circuit model representation. Our methodology involves training a neural network model using diverse input-output mappings of the quantum algorithm. We demonstrate that this trained model can effectively generate a quantum circuit model equivalent to the original algorithm. Remarkably, our observations indicate that the trained model achieves near-perfect mapping of unseen inputs to their respective outputs.
- Published
- 2024
46. CNN-based Labelled Crack Detection for Image Annotation
- Author
-
Ilani, Mohsen Asghari, Amini, Leila, Karimi, Hossein, and Kuhshuri, Maryam Shavali
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Numerous image processing techniques (IPTs) have been employed to detect crack defects, offering an alternative to human-conducted onsite inspections. These IPTs manipulate images to extract defect features, particularly cracks in surfaces produced through Additive Manufacturing (AM). This article presents a vision-based approach that utilizes deep convolutional neural networks (CNNs) for crack detection in AM surfaces. Traditional image processing techniques face challenges with diverse real-world scenarios and varying crack types. To overcome these challenges, our proposed method leverages CNNs, eliminating the need for extensive feature extraction. Annotation for CNN training is facilitated by LabelImg without the requirement for additional IPTs. The trained CNN, enhanced by OpenCV preprocessing techniques, achieves an outstanding 99.54% accuracy on a dataset of 14,982 annotated images with resolutions of 1536 x 1103 pixels. Evaluation metrics exceeding 96% precision, 98% recall, and a 97% F1-score highlight the precision and effectiveness of the entire process.
- Published
- 2024
47. On the non-Markovian quantum control dynamics
- Author
-
Ding, Haijin, Amini, Nina H., Gough, John E., and Zhang, Guofeng
- Subjects
Quantum Physics ,Physics - Atomic Physics - Abstract
In this paper, we study both open-loop control and closed-loop measurement feedback control of non-Markovian quantum dynamics resulting from the interaction between a quantum system and its environment. We use the widely studied cavity quantum electrodynamics (cavity-QED) system as an example, where an atom interacts with the environment composed of a collection of oscillators. In this scenario, the stochastic interactions between the atom and the environment can introduce non-Markovian characteristics into the evolution of quantum states, differing from the conventional Markovian dynamics observed in open quantum systems. As a result, the atom's decay rate to the environment varies with time and can be described by nonlinear equations. The solutions to these nonlinear equations can be analyzed in terms of the stability of a nonlinear control system. Consequently, the evolution of quantum state amplitudes follows linear time-varying equations as a result of the non-Markovian quantum transient process. Additionally, by using measurement feedback through homodyne detection of the cavity output, we can modulate the steady atomic and photonic states in the non-Markovian process. When multiple coupled cavity-QED systems are involved, measurement-based feedback control can influence the dynamics of high-dimensional quantum states, as well as the resulting stable and unstable subspaces.
- Published
- 2024
48. Object as a Service: Simplifying Cloud-Native Development through Serverless Object Abstraction
- Author
-
Lertpongrujikorn, Pawissanutt and Salehi, Mohsen Amini
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Operating Systems ,Computer Science - Software Engineering - Abstract
The function-as-a-service (FaaS) paradigm is envisioned as the next generation of cloud computing systems that mitigate the burden for cloud-native application developers by abstracting them from cloud resource management. However, it does not deal with the application data aspects. As such, developers have to intervene and undergo the burden of managing the application data, often via separate cloud storage services. To further streamline cloud-native application development, in this work, we propose a new paradigm, known as Object as a Service (OaaS) that encapsulates application data and functions into the cloud object abstraction. OaaS relieves developers from resource and data management burden while offering built-in optimization features. Inspired by OOP, OaaS incorporates access modifiers and inheritance into the serverless paradigm that: (a) prevents developers from compromising the system via accidentally accessing underlying data; and (b) enables software reuse in cloud-native application development. Furthermore, OaaS natively supports dataflow semantics. It enables developers to define function workflows while transparently handling data navigation, synchronization, and parallelism issues. To establish the OaaS paradigm, we develop a platform named Oparaca that offers state abstraction for structured and unstructured data with consistency and fault-tolerant guarantees. We evaluated Oparaca under real-world settings against state-of-the-art platforms with respect to the imposed overhead, scalability, and ease of use. The results demonstrate that the object abstraction provided by OaaS can streamline flexible and scalable cloud-native application development with an insignificant overhead on the underlying serverless system.
- Published
- 2024
49. Observed quantum particles system with graphon interaction
- Author
-
Chalal, Sofiane, Amini, Nina H., Guo, Gaoyue, and Amini, Hamed
- Subjects
Mathematics - Analysis of PDEs ,Mathematics - Optimization and Control ,Mathematics - Probability ,Quantum Physics - Abstract
In this paper, we consider a system of heterogeneously interacting quantum particles subject to indirect continuous measurement. The interaction is assumed to be of the mean-field type. We derive a new limiting quantum graphon system, prove the well-posedness of this system, and establish a stability result.
- Published
- 2024
50. Implementation Quality of Cooperative Learning and Teacher Beliefs--A Mixed Methods Study
- Author
-
Katja Adl-Amini, Vanessa A. Völlinger, and Agnes Eckart
- Abstract
Cooperative learning (CL) refers to teaching methods in which students work in small groups to help one another learn and improve their learning outcomes. Often CL is described by five basic elements: (1) positive interdependence, (2) individual accountability, (3) promotive interaction, (4) social skills and (5) group processing. The positive effects of CL have been extensively documented. The quality of implementation, mostly determined by application of the five basic elements of CL, has been shown to be significantly related to the effectiveness of the methods. However, due to the complex demands that designing CL sequences places on teachers, the question of how and why they implement CL methods is not trivial. The present study used an explanatory mixed methods design with sequential phases (quantitative-qualitative) to investigate the implementation of CL in school practice. A survey, structured interviews with teachers and classroom observations rated on an observation scale including indicators of the basic elements of CL were used to gather data in a total of 49 German classrooms. Results show that the implementation quality of CL lessons was rather low. Only 7% of the observed teachers implemented the basic elements. Even group goals and individual accountability, the two most important elements of CL, were implemented in only 17% of the lessons observed. Survey results indicated that implementation quality is related to teachers' evaluation of CL with regard to its appropriateness for different learning goals (r = 0.40*) and diverse students (r = 0.36*). Qualitative analysis of the teacher interviews analysed by thematic coding showed differences between teachers with high and low implementation quality regarding their beliefs. Teachers with high implementation quality see more value in social learning processes and feel more responsible for the success of CL. The results show a theory-practice gap and point to the relevance of beliefs for CL implementation.
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.