no code implementations • sdp (COLING) 2022 • Nima Ebadi, Anthony Rios, Peyman Najafirad
Our results show that the model effectively leverages task similarity to improve the robustness to dataset shift.
no code implementations • EMNLP (NLP-COVID19) 2020 • David Hardage, Peyman Najafirad
As social distancing, self-quarantines, and travel restrictions have shifted a lot of pandemic conversations to social media so does the spread of hate speech.
Explainable Artificial Intelligence (XAI) Feature Importance +2
no code implementations • EMNLP (NLP-COVID19) 2020 • Brandon Lwowski, Peyman Najafirad
Public health surveillance and tracking virus via social media can be a useful digital tool for contact tracing and preventing the spread of the virus.
1 code implementation • 19 Jan 2024 • Mazal Bethany, Brandon Wherry, Nishant Vishwamitra, Peyman Najafirad
This process involves addressing two key problems: (1) the reason for obfuscating unsafe images demands the platform to provide an accurate rationale that must be grounded in unsafe image-specific attributes, and (2) the unsafe regions in the image must be minimally obfuscated while still depicting the safe regions.
no code implementations • 18 Jan 2024 • Mazal Bethany, Athanasios Galiopoulos, Emet Bethany, Mohammad Bahrami Karkevandi, Nishant Vishwamitra, Peyman Najafirad
The critical threat of phishing emails has been further exacerbated by the potential of LLMs to generate highly targeted, personalized, and automated spear phishing attacks.
1 code implementation • 17 Jan 2024 • Mazal Bethany, Brandon Wherry, Emet Bethany, Nishant Vishwamitra, Anthony Rios, Peyman Najafirad
We first study the effectiveness of state-of-the-art approaches and find that they are severely limited against text produced by diverse generators and domains in the real world.
no code implementations • 13 Jan 2024 • Nafis Tanveer Islam, Mohammad Bahrami Karkevandi, Peyman Najafirad
This imbalance between the lines needed for security measures and the functional code enforces the supervised fine-tuned model to prioritize generating functional code without adding proper security measures, which also benefits the model by resulting in minimal loss.
1 code implementation • 12 Jan 2024 • Caleb Robinson, Isaac Corley, Anthony Ortiz, Rahul Dodhia, Juan M. Lavista Ferres, Peyman Najafirad
In this work we propose a road segmentation benchmark dataset, Chesapeake Roads Spatial Context (RSC), for evaluating the spatial long-range context understanding of geospatial machine learning models and show how commonly used semantic segmentation models can fail at this task.
Ranked #1 on Road Segmentation on ChesapeakeRSC
no code implementations • 7 Jan 2024 • Nafis Tanveer Islam, Joseph Khoury, Andrew Seong, Mohammad Bahrami Karkevandi, Gonzalo De La Torre Parra, Elias Bou-Harb, Peyman Najafirad
In software development, the predominant emphasis on functionality often supersedes security concerns, a trend gaining momentum with AI-driven automation tools like GitHub Copilot.
1 code implementation • 22 May 2023 • Isaac Corley, Caleb Robinson, Rahul Dodhia, Juan M. Lavista Ferres, Peyman Najafirad
Research in self-supervised learning (SSL) with natural images has progressed rapidly in recent years and is now increasingly being applied to and benchmarked with datasets containing remotely sensed imagery.
no code implementations • 26 Apr 2023 • Isaac Corley, Peyman Najafirad
Digital Surface Models (DSM) offer a wealth of height information for understanding the Earth's surface as well as monitoring the existence or change in natural and man-made structures.
no code implementations • 26 Apr 2023 • Isaac Corley, Jonathan Lwowski, Peyman Najafirad
A crucial part of any home is the roof over our heads to protect us from the elements.
1 code implementation • 17 Apr 2023 • Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad
We present a training process utilizing a semantic vulnerability graph (SVG) representation from source code, created by integrating edges from a sequential flow, control flow, and data flow, as well as a novel flow dubbed Poacher Flow (PF).
1 code implementation • 26 Feb 2022 • Isaac Corley, Peyman Najafirad
Remote sensing change detection, identifying changes between scenes of the same location, is an active area of research with a broad range of applications.
no code implementations • 26 Jun 2021 • Nihar Bendre, Kevin Desai, Peyman Najafirad
To overcome this problem, we propose a Multimodal Variational Auto-Encoder (M-VAE) which can learn the shared latent space of image features and the semantic space.
no code implementations • 15 Jun 2021 • Nima Ebadi, Peyman Najafirad
Our model outperforms baselines in IE and IR tasks, respectively by micro-f score of 0. 08 (LCA-F score of 0. 05), and MAP of 0. 05 on average.
no code implementations • 15 May 2021 • Nihar Bendre, Kevin Desai, Peyman Najafirad
This results in achieving better understanding of complex questions and also provides reasoning as to why the module predicts a particular answer.
no code implementations • 5 Apr 2021 • Samuel Henrique Silva, Arun Das, Ian Scarff, Peyman Najafirad
In order to evaluate the most adequate SRD, we rely on the distance between robust latent representations and semantic cluster distributions.
no code implementations • 7 Oct 2020 • Nima Ebadi, Peyman Najafirad
We present a case study on a novel dataset that is based on COVID-19 papers published and manually indexed in PubMed.
no code implementations • 2 Oct 2020 • Arun Das, Jeffrey Mock, Henry Chacon, Farzan Irani, Edward Golob, Peyman Najafirad
during speech utterance.
no code implementations • 30 Jul 2020 • Nihar Bendre, Hugo Terashima Marín, Peyman Najafirad
Deep neural networks have been able to outperform humans in some cases like image recognition and image classification.
no code implementations • 1 Jul 2020 • Samuel Henrique Silva, Peyman Najafirad
We provide a taxonomy to classify adversarial attacks and defenses, formulate the Robust Optimization problem in a min-max setting and divide it into 3 subcategories, namely: Adversarial (re)Training, Regularization Approach, and Certified Defenses.