Skip to main content

Showing 1–10 of 10 results for author: Hosseini, S M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.10648  [pdf, other

    cs.NI cs.IT

    Optimal Service Placement, Request Routing and CPU Sizing in Cooperative Mobile Edge Computing Networks for Delay-Sensitive Applications

    Authors: Naeimeh Omidvar, Mahdieh Ahmadi, Seyed Mohammad Hosseini

    Abstract: We study joint optimization of service placement, request routing, and CPU sizing in a cooperative MEC system. The problem is considered from the perspective of the service provider (SP), which delivers heterogeneous MEC-enabled delay-sensitive services, and needs to pay for the used resources to the mobile network operators and the cloud provider, while earning revenue from the served requests. W… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

  2. arXiv:2405.10622  [pdf, ps, other

    cs.GT cs.IT

    Differentially Private Machine Learning-powered Combinatorial Auction Design

    Authors: Arash Jamshidi, Seyed Mohammad Hosseini, Seyed Mahdi Noormousavi, Mahdi Jafari Siavoshani

    Abstract: We present a new approach to machine learning-powered combinatorial auctions, which is based on the principles of Differential Privacy. Our methodology guarantees that the auction mechanism is truthful, meaning that rational bidders have the incentive to reveal their true valuation functions. We achieve this by inducing truthfulness in the auction dynamics, ensuring that bidders consistently provi… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

  3. arXiv:2301.01240  [pdf, other

    cs.DC cs.CR cs.NI

    Modeling Effective Lifespan of Payment Channels

    Authors: Soheil Zibakhsh Shabgahi, Seyed Mahdi Hosseini, Seyed Pooya Shariatpanahi, Behnam Bahrak

    Abstract: While being decentralized, secure, and reliable, Bitcoin and many other blockchain-based cryptocurrencies suffer from scalability issues. One of the promising proposals to address this problem is off-chain payment channels. Since, not all nodes are connected directly to each other, they can use a payment network to route their payments. Each node allocates a balance that is frozen during the chann… ▽ More

    Submitted 11 September, 2022; originally announced January 2023.

  4. arXiv:2208.10919  [pdf, other

    cs.CR cs.AI cs.LG

    Cluster Based Secure Multi-Party Computation in Federated Learning for Histopathology Images

    Authors: S. Maryam Hosseini, Milad Sikaroudi, Morteza Babaei, H. R. Tizhoosh

    Abstract: Federated learning (FL) is a decentralized method enabling hospitals to collaboratively learn a model without sharing private patient data for training. In FL, participant hospitals periodically exchange training results rather than training samples with a central server. However, having access to model parameters or gradients can expose private training data samples. To address this challenge, we… ▽ More

    Submitted 21 August, 2022; originally announced August 2022.

    Comments: Accepted at MICCAI 2022 Workshop on Distributed, Collaborative and Federated Learning

  5. arXiv:2109.05681  [pdf, other

    eess.SP cs.IT

    Multi-User Scheduling in Hybrid Millimeter Wave Massive MIMO Systems

    Authors: Seyedeh Maryam Hosseini, Shahram Shahsavari, Catherine Rosenberg

    Abstract: While mmWave bands provide a large bandwidth for mobile broadband services, they suffer from severe path loss and shadowing. Multiple-antenna techniques such as beamforming (BF) can be applied to compensate the signal attenuation. We consider a special case of hybrid BF called per-stream hybrid BF (PSHBF) which is easier to implement than the general hybrid BF because it circumvents the need for j… ▽ More

    Submitted 12 September, 2021; originally announced September 2021.

  6. arXiv:2011.14908  [pdf

    eess.IV cs.CV cs.LG

    Image Denoising for Strong Gaussian Noises With Specialized CNNs for Different Frequency Components

    Authors: Seyed Mohsen Hosseini

    Abstract: In machine learning approach to image denoising a network is trained to recover a clean image from a noisy one. In this paper a novel structure is proposed based on training multiple specialized networks as opposed to existing structures that are base on a single network. The proposed model is an alternative for training a very deep network to avoid issues like vanishing or exploding gradient. By… ▽ More

    Submitted 26 November, 2020; originally announced November 2020.

  7. arXiv:2011.14196  [pdf

    eess.IV cs.CV cs.LG

    Lattice Fusion Networks for Image Denoising

    Authors: Seyed Mohsen Hosseini

    Abstract: A novel method for feature fusion in convolutional neural networks is proposed in this paper. Different feature fusion techniques are suggested to facilitate the flow of information and improve the training of deep neural networks. Some of these techniques as well as the proposed network can be considered a type of Directed Acyclic Graph (DAG) Network, where a layer can receive inputs from other l… ▽ More

    Submitted 1 July, 2021; v1 submitted 28 November, 2020; originally announced November 2020.

  8. Automatic detection and counting of retina cell nuclei using deep learning

    Authors: S. M. Hadi Hosseini, Hao Chen, Monica M. Jablonski

    Abstract: The ability to automatically detect, classify, calculate the size, number, and grade of retinal cells and other biological objects is critically important in eye disease like age-related macular degeneration (AMD). In this paper, we developed an automated tool based on deep learning technique and Mask R-CNN model to analyze large datasets of transmission electron microscopy (TEM) images and quanti… ▽ More

    Submitted 10 February, 2020; originally announced February 2020.

    Comments: 13 pages, 11 figures, 2 tables, SPIE. Medical Imaging 2020 Conference

    Journal ref: Proceedings Volume 11317, Medical Imaging 2020: Biomedical Applications in Molecular, Structural, and Functional Imaging; 113172I (2020)

  9. Digesting Network Traffic for Forensic Investigation Using Digital Signal Processing Techniques

    Authors: S. Mohammad Hosseini, Amirhossein Jahangir, Mehdi Kazemi

    Abstract: One of the most important practices of cybercrime investigations is to search a network traffic history for an excerpt of traffic, such as the disclosed information of an organization or a worm signature. In post-mortem investigations, criminals and targets are detected by attributing the excerpt to payloads of traffic flows. Since it is impossible to store the high volume of data related to long-… ▽ More

    Submitted 4 October, 2019; originally announced October 2019.

    Journal ref: IEEE Transactions on Information Forensics and Security (2019)

  10. An Effective Payload Attribution Scheme for Cybercriminal Detection Using Compressed Bitmap Index Tables and Traffic Downsampling

    Authors: S. Mohammad Hosseini, Amirhossein Jahangir

    Abstract: Payload attribution systems (PAS) are one of the most important tools of network forensics for detecting an offender after the occurrence of a cybercrime. A PAS stores the network traffic history in order to detect the source and destination pair of a certain data stream in case a malicious activity occurs on the network. The huge volume of information that is daily transferred in the network mean… ▽ More

    Submitted 12 June, 2019; originally announced June 2019.

    Journal ref: IEEE Transactions on Information Forensics and Security, 13.4, 2018