no code implementations • 20 Aug 2021 • Mahdi Soltani, Behzad Ousat, Mahdi Jafari Siavoshani, Amir Hossein Jahangir
In this paper, we propose a framework for deep learning-based IDSes addressing new attacks.
no code implementations • 14 Jan 2021 • Mahdi Jafari Siavoshani, Seyed Pooya Shariatpanahi
Compute-and-forward is a promising strategy to tackle interference and obtain high rates between the transmitting users in a wireless network.
Information Theory Networking and Internet Architecture Information Theory
no code implementations • 12 Nov 2020 • Mahdi Jafari Siavoshani, Amir Hossein Khajepour, Amirmohammad Ziaei, Amir Ali Gatmiri, Ali Taheri
Protecting users' privacy over the Internet is of great importance; however, it becomes harder and harder to maintain due to the increasing complexity of network protocols and components.
no code implementations • 8 Oct 2020 • Amir Hossein Estiri, Mohammad Reza Sabramooz, Ali Banaei, Amir Hossein Dehghan, Benyamin Jamialahmadi, Mahdi Jafari Siavoshani
Recent advancements in information technology and the widespread use of the Internet have led to easier access to data worldwide.
no code implementations • 19 Sep 2020 • Aida Ramezani, Amirhossein Khajehpour, Mahdi Jafari Siavoshani
In this paper, we propose a deep learning approach to generate a multi-label classifier that can predict the websites visited by a user in a certain period.
no code implementations • 14 Jan 2020 • Mahdi Soltani, Mahdi Jafari Siavoshani, Amir Hossein Jahangir
In this work, we propose a framework, called deep intrusion detection (DID) system, that uses the pure content of traffic flows in addition to traffic metadata in the learning and detection phases of a passive DNN IDS.
no code implementations • 1 Jun 2019 • Saeed Masoudian, Ali Arabzadeh, Mahdi Jafari Siavoshani, Milad Jalal, Alireza Amouzad
Finally, as a representative application of our proposed algorithm, we study the problem of learning the best regularizer from a family of regularizers for Online Mirror Descent.
5 code implementations • 8 Sep 2017 • Mohammad Lotfollahi, Ramin Shirali Hossein Zade, Mahdi Jafari Siavoshani, Mohammdsadegh Saberian
Our proposed scheme, called "Deep Packet," can handle both \emph{traffic characterization} in which the network traffic is categorized into major classes (\eg, FTP and P2P) and application identification in which end-user applications (\eg, BitTorrent and Skype) identification is desired.
no code implementations • 6 May 2016 • Farzin Haddadpour, Mahdi Jafari Siavoshani, Morteza Noshad
However, this reduction can be larger than only one order of magnitude in alphabet size.