Skip to main content

Showing 1–15 of 15 results for author: Ziaei, A

  1. arXiv:2402.15021  [pdf, other

    cs.CV cs.CL

    CLoVe: Encoding Compositional Language in Contrastive Vision-Language Models

    Authors: Santiago Castro, Amir Ziai, Avneesh Saluja, Zhuoning Yuan, Rada Mihalcea

    Abstract: Recent years have witnessed a significant increase in the performance of Vision and Language tasks. Foundational Vision-Language Models (VLMs), such as CLIP, have been leveraged in multiple settings and demonstrated remarkable performance across several tasks. Such models excel at object-centric recognition yet learn text representations that seem invariant to word order, failing to compose known… ▽ More

    Submitted 29 February, 2024; v1 submitted 22 February, 2024; originally announced February 2024.

  2. arXiv:2402.06560  [pdf, other

    cs.CV cs.LG

    Video Annotator: A framework for efficiently building video classifiers using vision-language models and active learning

    Authors: Amir Ziai, Aneesh Vartakavi

    Abstract: High-quality and consistent annotations are fundamental to the successful development of robust machine learning models. Traditional data annotation methods are resource-intensive and inefficient, often leading to a reliance on third-party annotators who are not the domain experts. Hard samples, which are usually the most informative for model training, tend to be difficult to label accurately and… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

    Comments: Submitted for review to KDD '24 (ADS Track)

  3. arXiv:2312.06868  [pdf, other

    cs.CV cs.LG

    RAFIC: Retrieval-Augmented Few-shot Image Classification

    Authors: Hangfei Lin, Li Miao, Amir Ziai

    Abstract: Few-shot image classification is the task of classifying unseen images to one of N mutually exclusive classes, using only a small number of training examples for each class. The limited availability of these examples (denoted as K) presents a significant challenge to classification accuracy in some cases. To address this, we have developed a method for augmenting the set of K with an addition set… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

  4. arXiv:2308.00938  [pdf, other

    cs.DC

    DPA Load Balancer: Load balancing for Data Parallel Actor-based systems

    Authors: Ziheng Wang, Atem Aguer, Amir Ziai

    Abstract: In this project we explore ways to dynamically load balance actors in a streaming framework. This is used to address input data skew that might lead to stragglers. We continuously monitor actors' input queue lengths for load, and redistribute inputs among reducers using consistent hashing if we detect stragglers. To ensure consistent processing post-redistribution, we adopt an approach that uses i… ▽ More

    Submitted 2 August, 2023; originally announced August 2023.

    Comments: 7 pages

  5. arXiv:2212.02192  [pdf, other

    cs.HC

    Niimpy: a toolbox for behavioral data analysis

    Authors: A. Ikäheimonen, A. M. Triana, N. Luong, A. Ziaei, J. Rantaharju, R. Darst, T. Aledavood

    Abstract: Behavioral studies using personal digital devices typically produce rich longitudinal datasets of mixed data types. These data provide information about the behavior of users of these devices in real-time and in the users' natural environments. Analyzing the data requires multidisciplinary expertise and dedicated software. Currently, no generalizable, device-agnostic, freely available software exi… ▽ More

    Submitted 5 December, 2022; originally announced December 2022.

  6. arXiv:2210.05766  [pdf, other

    cs.CV cs.LG cs.MM

    Match Cutting: Finding Cuts with Smooth Visual Transitions

    Authors: Boris Chen, Amir Ziai, Rebecca Tucker, Yuchen Xie

    Abstract: A match cut is a transition between a pair of shots that uses similar framing, composition, or action to fluidly bring the viewer from one scene to the next. Match cuts are frequently used in film, television, and advertising. However, finding shots that work together is a highly manual and time-consuming process that can take days. We propose a modular and flexible system to efficiently find high… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

  7. arXiv:2203.02124  [pdf, other

    cs.LG cs.AI

    Abuse and Fraud Detection in Streaming Services Using Heuristic-Aware Machine Learning

    Authors: Soheil Esmaeilzadeh, Negin Salajegheh, Amir Ziai, Jeff Boote

    Abstract: This work presents a fraud and abuse detection framework for streaming services by modeling user streaming behavior. The goal is to discover anomalous and suspicious incidents and scale the investigation efforts by creating models that characterize the user behavior. We study the use of semi-supervised as well as supervised approaches for anomaly detection. In the semi-supervised approach, by leve… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

  8. arXiv:2105.08447  [pdf

    cs.CV

    Deep Active Contours Using Locally Controlled Distance Vector Flow

    Authors: Parastoo Akbari, Atefeh Ziaei, Hamed Azarnoush

    Abstract: Active contours Model (ACM) has been extensively used in computer vision and image processing. In recent studies, Convolutional Neural Networks (CNNs) have been combined with active contours replacing the user in the process of contour evolution and image segmentation to eliminate limitations associated with ACM's dependence on parameters of the energy functional and initialization. However, prior… ▽ More

    Submitted 18 May, 2021; originally announced May 2021.

    Comments: 22 pages with 12 figures

  9. arXiv:2011.06304  [pdf, other

    cs.NI cs.CR cs.LG

    Machine Learning Interpretability Meets TLS Fingerprinting

    Authors: Mahdi Jafari Siavoshani, Amir Hossein Khajepour, Amirmohammad Ziaei, Amir Ali Gatmiri, Ali Taheri

    Abstract: Protecting users' privacy over the Internet is of great importance; however, it becomes harder and harder to maintain due to the increasing complexity of network protocols and components. Therefore, investigating and understanding how data is leaked from the information transmission platforms and protocols can lead us to a more secure environment. In this paper, we propose a framework to systema… ▽ More

    Submitted 12 September, 2021; v1 submitted 12 November, 2020; originally announced November 2020.

  10. arXiv:2010.01400  [pdf, other

    cs.SI cs.LG

    Joint Inference of Diffusion and Structure in Partially Observed Social Networks Using Coupled Matrix Factorization

    Authors: Maryam Ramezani, Aryan Ahadinia, Amirmohammad Ziaei, Hamid R. Rabiee

    Abstract: Access to complete data in large-scale networks is often infeasible. Therefore, the problem of missing data is a crucial and unavoidable issue in the analysis and modeling of real-world social networks. However, most of the research on different aspects of social networks does not consider this limitation. One effective way to solve this problem is to recover the missing data as a pre-processing s… ▽ More

    Submitted 22 March, 2023; v1 submitted 3 October, 2020; originally announced October 2020.

  11. arXiv:1906.02458  [pdf

    cs.RO

    Kinematic & Dynamic Analysis of the Human Upper Limb Using the Theory of Screws

    Authors: Amir Ziai

    Abstract: Screw theory provides geometrical insight into the mechanics of rigid bodies. Screw axis is defined as the line coinciding with the joint axis. Line transformations in the form of a screw operator are used to determine the joint axes of a seven degree of freedom manipulator, representing the human upper limb. Multiplication of a unit screw axis with the joint angular velocity provides the joint tw… ▽ More

    Submitted 6 June, 2019; originally announced June 2019.

  12. arXiv:1906.01843  [pdf, other

    cs.CV cs.AI

    Detecting Kissing Scenes in a Database of Hollywood Films

    Authors: Amir Ziai

    Abstract: Detecting scene types in a movie can be very useful for application such as video editing, ratings assignment, and personalization. We propose a system for detecting kissing scenes in a movie. This system consists of two components. The first component is a binary classifier that predicts a binary label (i.e. kissing or not) given a features exctracted from both the still frames and audio waves of… ▽ More

    Submitted 5 June, 2019; originally announced June 2019.

  13. arXiv:1906.00529  [pdf

    cs.IR cs.CY

    Mining Data from the Congressional Record

    Authors: Zhengyu Ma, Tianjiao Qi, James Route, Amir Ziai

    Abstract: We propose a data storage and analysis method for using the US Congressional record as a policy analysis tool. We use Amazon Web Services and the Solr search engine to store and process Congressional record data from 1789 to the present, and then query Solr to find how frequently language related to tax increases and decreases appears. This frequency data is compared to six economic indicators. Ou… ▽ More

    Submitted 2 June, 2019; originally announced June 2019.

  14. arXiv:1905.11531  [pdf, other

    cs.CL cs.LG

    Compositional pre-training for neural semantic parsing

    Authors: Amir Ziai

    Abstract: Semantic parsing is the process of translating natural language utterances into logical forms, which has many important applications such as question answering and instruction following. Sequence-to-sequence models have been very successful across many NLP tasks. However, a lack of task-specific prior knowledge can be detrimental to the performance of these models. Prior work has used frameworks f… ▽ More

    Submitted 27 May, 2019; originally announced May 2019.

  15. arXiv:1904.01555  [pdf

    cs.LG cs.CR stat.ML

    Active Learning for Network Intrusion Detection

    Authors: Amir Ziai

    Abstract: Network operators are generally aware of common attack vectors that they defend against. For most networks the vast majority of traffic is legitimate. However new attack vectors are continually designed and attempted by bad actors which bypass detection and go unnoticed due to low volume. One strategy for finding such activity is to look for anomalous behavior. Investigating anomalous behavior req… ▽ More

    Submitted 2 April, 2019; originally announced April 2019.