Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–6 of 6 results for author: Ahvanooey, M T

.
  1. arXiv:2311.17394  [pdf, ps, other

    cs.CR

    Deepfakes, Misinformation, and Disinformation in the Era of Frontier AI, Generative AI, and Large AI Models

    Authors: Mohamed R. Shoaib, Zefan Wang, Milad Taleby Ahvanooey, Jun Zhao

    Abstract: With the advent of sophisticated artificial intelligence (AI) technologies, the proliferation of deepfakes and the spread of m/disinformation have emerged as formidable threats to the integrity of information ecosystems worldwide. This paper provides an overview of the current literature. Within the frontier AI's crucial application in developing defense mechanisms for detecting deepfakes, we high… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

    Comments: This paper appears in IEEE International Conference on Computer and Applications (ICCA) 2023

  2. arXiv:2206.13761  [pdf, other

    cs.LG

    Classification of ADHD Patients Using Kernel Hierarchical Extreme Learning Machine

    Authors: Sartaj Ahmed Salman, Zhichao Lian, Milad Taleby Ahvanooey, Hiroki Takahashi, Yuduo Zhang

    Abstract: Recently, the application of deep learning models to diagnose neuropsychiatric diseases from brain imaging data has received more and more attention. However, in practice, exploring interactions in brain functional connectivity based on operational magnetic resonance imaging data is critical for studying mental illness. Since Attention-Deficit and Hyperactivity Disorder (ADHD) is a type of chronic… ▽ More

    Submitted 28 June, 2022; originally announced June 2022.

    Comments: 8 pages, 6 figures. arXiv admin note: substantial text overlap with arXiv:2202.08953

  3. arXiv:2003.12386  [pdf

    cs.LG stat.ML

    A New Gene Selection Algorithm using Fuzzy-Rough Set Theory for Tumor Classification

    Authors: Seyedeh Faezeh Farahbakhshian, Milad Taleby Ahvanooey

    Abstract: In statistics and machine learning, feature selection is the process of picking a subset of relevant attributes for utilizing in a predictive model. Recently, rough set-based feature selection techniques, that employ feature dependency to perform selection process, have been drawn attention. Classification of tumors based on gene expression is utilized to diagnose proper treatment and prognosis of… ▽ More

    Submitted 26 March, 2020; originally announced March 2020.

    Comments: 10 pages, 3 figures, 6 Tables

    Journal ref: Control Engineering and Applied Informatics, Vol.22, No.1 pp. 14-23, 2020

  4. arXiv:2002.03750  [pdf

    cs.CV

    An Overview of Two Age Synthesis and Estimation Techniques

    Authors: Milad Taleby Ahvanooey, Qianmu Li

    Abstract: Age estimation is a technique for predicting human ages from digital facial images, which analyzes a person's face image and estimates his/her age based on the year measure. Nowadays, intelligent age estimation and age synthesis have become particularly prevalent research topics in computer vision and face verification systems. Age synthesis is defined to render a facial image aesthetically with r… ▽ More

    Submitted 26 January, 2020; originally announced February 2020.

    Comments: 16 pages, 5 figures. International Congress on Engineering Science and Sustainable Urban Development Denmark, Copenhagen, September 2018

    Report number: GA-01089-AB

  5. An Effective Automatic Image Annotation Model Via Attention Model and Data Equilibrium

    Authors: Amir Vatani, Milad Taleby Ahvanooey, Mostafa Rahimi

    Abstract: Nowadays, a huge number of images are available. However, retrieving a required image for an ordinary user is a challenging task in computer vision systems. During the past two decades, many types of research have been introduced to improve the performance of the automatic annotation of images, which are traditionally focused on content-based image retrieval. Although, recent research demonstrates… ▽ More

    Submitted 26 January, 2020; originally announced January 2020.

    Comments: 9 pages, 3 figures

    Journal ref: Int. J. Adv. Comput. Sci. Appl, 9(3), pp.269-277 (2018)

  6. A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks

    Authors: Milad Taleby Ahvanooey, Qianmu Li, Mahdi Rabbani, Ahmed Raza Rajput

    Abstract: Nowadays, the usage of smartphones and their applications have become rapidly increasing popular in people's daily life. Over the last decade, availability of mobile money services such as mobile-payment systems and app markets have significantly increased due to the different forms of apps and connectivity provided by mobile devices such as 3G, 4G, GPRS, and Wi-Fi, etc. In the same trend, the num… ▽ More

    Submitted 26 January, 2020; originally announced January 2020.

    Comments: 16 pages, 9 figures, International Journal of Advanced Computer Science and Applications

    Journal ref: International Journal of Advanced Computer Science and Applications, 8(10), p.2017