Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–16 of 16 results for author: Javadi, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.03751  [pdf, other

    math.NA cs.DS math.ST

    Asymptotics of the Sketched Pseudoinverse

    Authors: Daniel LeJeune, Pratik Patil, Hamid Javadi, Richard G. Baraniuk, Ryan J. Tibshirani

    Abstract: We take a random matrix theory approach to random sketching and show an asymptotic first-order equivalence of the regularized sketched pseudoinverse of a positive semidefinite matrix to a certain evaluation of the resolvent of the same matrix. We focus on real-valued regularization and extend previous results on an asymptotic equivalence of random matrices to the real setting, providing a precise… ▽ More

    Submitted 6 October, 2023; v1 submitted 7 November, 2022; originally announced November 2022.

    Comments: 45 pages, 9 figures

    MSC Class: 15B52; 46L54; 62J07

  2. arXiv:2205.14055  [pdf, other

    cs.LG stat.ML

    A Blessing of Dimensionality in Membership Inference through Regularization

    Authors: Jasper Tan, Daniel LeJeune, Blake Mason, Hamid Javadi, Richard G. Baraniuk

    Abstract: Is overparameterization a privacy liability? In this work, we study the effect that the number of parameters has on a classifier's vulnerability to membership inference attacks. We first demonstrate how the number of parameters of a model can induce a privacy--utility trade-off: increasing the number of parameters generally improves generalization performance at the expense of lower privacy. Howev… ▽ More

    Submitted 13 April, 2023; v1 submitted 27 May, 2022; originally announced May 2022.

    Comments: 26 pages, 14 figures

  3. arXiv:2202.01243  [pdf, other

    stat.ML cs.LG

    Parameters or Privacy: A Provable Tradeoff Between Overparameterization and Membership Inference

    Authors: Jasper Tan, Blake Mason, Hamid Javadi, Richard G. Baraniuk

    Abstract: A surprising phenomenon in modern machine learning is the ability of a highly overparameterized model to generalize well (small error on the test data) even when it is trained to memorize the training data (zero error on the training data). This has led to an arms race towards increasingly overparameterized models (c.f., deep learning). In this paper, we study an underexplored hidden cost of overp… ▽ More

    Submitted 30 November, 2022; v1 submitted 2 February, 2022; originally announced February 2022.

    Comments: 25 pages, 8 figures

  4. arXiv:2111.04653   

    cs.MM math.OC

    Adaptive Steganography Based on bargain Game

    Authors: Behbod Keshavarzi, Hamidreza Navidi, Parvaneh Asghari, Seyyed Hamid Haji Seyyed Javadi

    Abstract: The capacity and security of the confidential message on the channel are two important challenges in steganography. In this paper, a new block steganography model is presented using the bargain method so that a competitive model is introduced. In this game, the blocks are the same players. The bargain is provided with the aim of embedding information without reducing capacity as well as increasing… ▽ More

    Submitted 10 May, 2022; v1 submitted 8 November, 2021; originally announced November 2021.

    Comments: This paper requires major changes and is being revised

  5. arXiv:2110.00917  [pdf

    cs.IT cs.CR

    Binary code optimization

    Authors: Parviz Gharehbagheri, Sayeed Hamid Haji Sayeed Javadi, Parvaneh Asghari, Naser Gharehbagheri

    Abstract: This article shows that any type of binary data can be defined as a collection from codewords of variable length. This feature helps us to define an Injective and surjective function from the suggested codewords to the required codewords. Therefore, by replacing the new codewords, the binary data becomes another binary data regarding the intended goals. One of these goals is to reduce data size. I… ▽ More

    Submitted 2 October, 2021; originally announced October 2021.

    Comments: in Persian language

  6. arXiv:2106.07769  [pdf, other

    cs.LG stat.ML

    The Flip Side of the Reweighted Coin: Duality of Adaptive Dropout and Regularization

    Authors: Daniel LeJeune, Hamid Javadi, Richard G. Baraniuk

    Abstract: Among the most successful methods for sparsifying deep (neural) networks are those that adaptively mask the network weights throughout training. By examining this masking, or dropout, in the linear case, we uncover a duality between such adaptive methods and regularization through the so-called "$η$-trick" that casts both as iteratively reweighted optimizations. We show that any dropout strategy t… ▽ More

    Submitted 3 January, 2022; v1 submitted 14 June, 2021; originally announced June 2021.

    Comments: 19 pages, 2 figures. Appeared in NeurIPS 2021. Small typographical correction

  7. Providing a hybrid cryptography algorithm for lightweight authentication protocol in RFID with urban traffic usage case

    Authors: V. Chegeni, H. Haj Seyyed javadi, M. R Moazami Goudarzi, A. Rezakhani

    Abstract: Today, the Internet of Things (IoT) is one of the emerging technologies that enable the connection and transfer of information through communication networks. The main idea of the IoT is the widespread presence of objects such as mobile devices, sensors, and RFID. With the increase in traffic volume in urban areas, the existing intelligent urban traffic management system based on IoT can be vital.… ▽ More

    Submitted 15 April, 2021; originally announced April 2021.

    Comments: 10 pages,2 figures

  8. arXiv:2102.13340  [pdf

    cs.CR

    Lightweight Key-Dependent Dynamic S-Boxes based on Hyperelliptic Curve for IoT Devices

    Authors: Parvaneh Asghari, Seyyed Hamid Haj Seyyed Javadi

    Abstract: Security is one of the main issues in Internet of Things (IoT). Encryption plays a curtail role in making these systems secure. Substitution Box (S-Box) has an effective impact in block encryption methods. Due to the restricted resource capacities of IoT nodes, providing a lightweight S-Box is a challenging problem. This paper presents a key-dependent S-Box using Hyperelliptic curve. The proposed… ▽ More

    Submitted 26 February, 2021; originally announced February 2021.

    Comments: in Persian language

  9. arXiv:2102.07137  [pdf

    cs.CR

    A novel key pre-distribution scheme based on $μ$-PBIBD combinatorial design in the resource-constrained IoT network

    Authors: Akbar Morshed Aski, Hamid Haj Seyyed Javadi

    Abstract: In a resource-constrained IoT network, end nodes like WSN, RFID, and embedded systems are used which have memory, processing, and energy limitations. One of the key distribution solutions in these types of networks is to use the key pre-distribution scheme, which accomplishes the key distribution operation offline before the resource-constrained devices deployment in the environment. Also, in orde… ▽ More

    Submitted 14 February, 2021; originally announced February 2021.

    Comments: in Persian language

    Journal ref: The CSI Journal on Computing Science and Information Technology Vol. 18, No.1, 2020

  10. arXiv:1910.04743  [pdf, other

    stat.ML cs.LG

    The Implicit Regularization of Ordinary Least Squares Ensembles

    Authors: Daniel LeJeune, Hamid Javadi, Richard G. Baraniuk

    Abstract: Ensemble methods that average over a collection of independent predictors that are each limited to a subsampling of both the examples and features of the training data command a significant presence in machine learning, such as the ever-popular random forest, yet the nature of the subsampling effect, particularly of the features, is not well understood. We study the case of an ensemble of linear p… ▽ More

    Submitted 24 March, 2020; v1 submitted 10 October, 2019; originally announced October 2019.

    Comments: 18 pages, 4 figures. To appear in AISTATS 2020

  11. arXiv:1905.11639  [pdf, other

    cs.LG stat.ML

    Implicit Rugosity Regularization via Data Augmentation

    Authors: Daniel LeJeune, Randall Balestriero, Hamid Javadi, Richard G. Baraniuk

    Abstract: Deep (neural) networks have been applied productively in a wide range of supervised and unsupervised learning tasks. Unlike classical machine learning algorithms, deep networks typically operate in the \emph{overparameterized} regime, where the number of parameters is larger than the number of training data points. Consequently, understanding the generalization properties and the role of (explicit… ▽ More

    Submitted 10 October, 2019; v1 submitted 28 May, 2019; originally announced May 2019.

    Comments: 15 pages, 12 figures

  12. arXiv:1803.04464  [pdf, other

    stat.ME cs.IT cs.LG math.ST stat.ML

    False Discovery Rate Control via Debiased Lasso

    Authors: Adel Javanmard, Hamid Javadi

    Abstract: We consider the problem of variable selection in high-dimensional statistical models where the goal is to report a set of variables, out of many predictors $X_1, \dotsc, X_p$, that are relevant to a response of interest. For linear high-dimensional model, where the number of parameters exceeds the number of samples $(p>n)$, we propose a procedure for variables selection and prove that it controls… ▽ More

    Submitted 19 March, 2019; v1 submitted 12 March, 2018; originally announced March 2018.

    Comments: accepted for publication in the Electronic Journal of statistics

  13. arXiv:1711.02053  [pdf, other

    cs.SI physics.soc-ph

    Detecting Community Structure in Dynamic Social Networks Using the Concept of Leadership

    Authors: Saeed Haji Seyed Javadi, Pedram Gharani, Shahram Khadivi

    Abstract: Detecting community structure in social networks is a fundamental problem empowering us to identify groups of actors with similar interests. There have been extensive works focusing on finding communities in static networks, however, in reality, due to dynamic nature of social networks, they are evolving continuously. Ignoring the dynamic aspect of social networks, neither allows us to capture evo… ▽ More

    Submitted 6 November, 2017; originally announced November 2017.

  14. arXiv:1710.02196  [pdf, other

    stat.ML cs.LG

    Porcupine Neural Networks: (Almost) All Local Optima are Global

    Authors: Soheil Feizi, Hamid Javadi, Jesse Zhang, David Tse

    Abstract: Neural networks have been used prominently in several machine learning and statistics applications. In general, the underlying optimization of neural networks is non-convex which makes their performance analysis challenging. In this paper, we take a novel approach to this problem by asking whether one can constrain neural network weights to make its optimization landscape have good theoretical pro… ▽ More

    Submitted 5 October, 2017; originally announced October 2017.

  15. arXiv:1705.02994  [pdf, other

    stat.ML cs.LG

    Non-negative Matrix Factorization via Archetypal Analysis

    Authors: Hamid Javadi, Andrea Montanari

    Abstract: Given a collection of data points, non-negative matrix factorization (NMF) suggests to express them as convex combinations of a small set of `archetypes' with non-negative entries. This decomposition is unique only if the true archetypes are non-negative and sufficiently sparse (or the weights are sufficiently sparse), a regime that is captured by the separability condition and its generalizations… ▽ More

    Submitted 8 May, 2017; originally announced May 2017.

    Comments: 39 pages; 11 pdf figures

  16. arXiv:1511.05254  [pdf, other

    math.ST cs.DM cs.IT

    A Statistical Model for Motifs Detection

    Authors: Hamid Javadi, Andrea Montanari

    Abstract: We consider a statistical model for the problem of finding subgraphs with specified topology in an otherwise random graph. This task plays an important role in the analysis of social and biological networks. In these types of networks, small subgraphs with a specific structure have important functional roles, and they are referred to as `motifs.' Within this model, one or multiple copies of a su… ▽ More

    Submitted 20 October, 2017; v1 submitted 16 November, 2015; originally announced November 2015.

    Comments: 40 pages, 1 pdf figure