Zobrazeno 1 - 10
of 5 568
pro vyhledávání: '"Khalaj, A."'
Autor:
Letafati, Mehdi, Kalkhoran, Seyyed Amirhossein Ameli, Erdemir, Ecenaz, Khalaj, Babak Hossein, Behroozi, Hamid, Gündüz, Deniz
Deep neural network (DNN)-based joint source and channel coding is proposed for end-to-end secure image transmission against multiple eavesdroppers. Both scenarios of colluding and non-colluding eavesdroppers are considered. Instead of idealistic ass
Externí odkaz:
http://arxiv.org/abs/2412.17110
Autor:
Saberi, Amir Hossein, Najafi, Amir, Emrani, Ala, Behjati, Amin, Zolfimoselo, Yasaman, Shadrooy, Mahdi, Motahari, Abolfazl, Khalaj, Babak H.
The aim of this paper is to address the challenge of gradual domain adaptation within a class of manifold-constrained data distributions. In particular, we consider a sequence of $T\ge2$ data distributions $P_1,\ldots,P_T$ undergoing a gradual shift,
Externí odkaz:
http://arxiv.org/abs/2410.14061
Autor:
Ghasemi, S. Mojtaba, Rostami-Shirazi, Ali, Khalaj, Pouria, Zonoozi, Akram Hasani, Haghi, Hosein
We investigate the impact of primordial mass segregation on the formation and evolution of dark star clusters (DSCs). Considering a wide range of initial conditions, we conducted $N$-body simulations of globular clusters (GCs) around the Milky Way. I
Externí odkaz:
http://arxiv.org/abs/2409.15280
The security of integrated circuits (ICs) can be broken by sophisticated physical attacks relying on failure analysis methods. Optical probing is one of the most prominent examples of such attacks, which can be accomplished in a matter of days, even
Externí odkaz:
http://arxiv.org/abs/2405.03632
Autor:
Karvandi, Mohammad Sina, Meghdadizanjani, Soroush, Arasteh, Sima, Monfared, Saleh Khalaj, Fallah, Mohammad K., Gorgin, Saeid, Lee, Jeong-A, van der Kouwe, Erik
Existing anti-malware software and reverse engineering toolkits struggle with stealthy sub-OS rootkits due to limitations of run-time kernel-level monitoring. A malicious kernel-level driver can bypass OS-level anti-virus mechanisms easily. Although
Externí odkaz:
http://arxiv.org/abs/2405.00298
Physical side-channel attacks can compromise the security of integrated circuits. Most physical side-channel attacks (e.g., power or electromagnetic) exploit the dynamic behavior of a chip, typically manifesting as changes in current consumption or v
Externí odkaz:
http://arxiv.org/abs/2401.08925
As artificial intelligence (AI) applications continue to expand in next-generation networks, there is a growing need for deep neural network (DNN) models. Although DNN models deployed at the edge are promising for providing AI as a service with low l
Externí odkaz:
http://arxiv.org/abs/2401.00631
Publikováno v:
Journal of Materials Research and Technology, Vol 33, Iss , Pp 2645-2660 (2024)
This study examined the microstructure and mechanical properties of explosively welded (EXW) Fe–Al multilayer laminated composite pipes, specifically SS321/AA1050/AA5083, with varying stand-off distances (SD) and post-weld heat treatments (PWHT). F
Externí odkaz:
https://doaj.org/article/0762b2ee13294b60b16afc5924ddf643
Identifying the possible ex-situ origin of the globular clusters of the Milky Way: A kinematic study
This is the second paper in a series, which studies the likelihood that some globular clusters (GCs) of the Milky Way (MW) could have originated from a dwarf satellite galaxy (DSG). Using a large suite of three-body simulations we determine the prese
Externí odkaz:
http://arxiv.org/abs/2310.04492
Autor:
Saberi, Amir Hossein, Najafi, Amir, Heidari, Alireza, Movasaghinia, Mohammad Hosein, Motahari, Abolfazl, Khalaj, Babak H.
We propose a novel framework for incorporating unlabeled data into semi-supervised classification problems, where scenarios involving the minimization of either i) adversarially robust or ii) non-robust loss functions have been considered. Notably, w
Externí odkaz:
http://arxiv.org/abs/2310.00027