no code implementations • 15 Apr 2025 • Alireza Salehi, Mohammadreza Salehi, Reshad Hosseini, Cees G. M. Snoek, Makoto Yamada, Mohammad Sabokrou
Anomaly Detection (AD) involves identifying deviations from normal data distributions and is critical in fields such as medical diagnostics and industrial defect detection.
1 code implementation • 28 Jan 2025 • Hossein Mirzaei, Ali Ansari, Bahar Dibaei Nia, Mojtaba Nafez, Moein Madadi, Sepehr Rezaee, Zeinab Sadat Taghavi, Arad Maleki, Kian Shamsaie, Mahdi Hajialilue, Jafar Habibi, Mohammad Sabokrou, Mohammad Hossein Rohban
TRODO leverages the concept of "blind spots"--regions where trojaned classifiers erroneously identify out-of-distribution (OOD) samples as in-distribution (ID).
no code implementations • 28 Jan 2025 • Hossein Mirzaei, Mojtaba Nafez, Moein Madadi, Arad Maleki, Mahdi Hajialilue, Zeinab Sadat Taghavi, Sepehr Rezaee, Ali Ansari, Bahar Dibaei Nia, Kian Shamsaie, Mohammadreza Salehi, Mackenzie W. Mathis, Mahdieh Soleymani Baghshah, Mohammad Sabokrou, Mohammad Hossein Rohban
There have been several efforts to improve Novelty Detection (ND) performance.
1 code implementation • 26 Jan 2025 • Hossein Mirzaei, Mojtaba Nafez, Jafar Habibi, Mohammad Sabokrou, Mohammad Hossein Rohban
Then, we demonstrate that adversarial training with contrastive loss could serve as an ideal objective function, as it creates both inter- and intra-group perturbations.
1 code implementation • 25 Jan 2025 • Hossein Mirzaei, Mohammad Jafari, Hamid Reza Dehbashi, Zeinab Sadat Taghavi, Mohammad Sabokrou, Mohammad Hossein Rohban
By incorporating robust pretrained features into the k-NN algorithm, we establish a new standard for performance and robustness in the field of robust ND.
no code implementations • 11 Dec 2024 • Arsalan Masoudifard, Mohammad Mowlavi Sorond, Moein Madadi, Mohammad Sabokrou, Elahe Habibi
Ensuring that Software Requirements Specifications (SRS) align with higher-level organizational or national requirements is vital, particularly in regulated environments such as finance and aerospace.
1 code implementation • 9 Oct 2024 • Hossein Rezaei, Mohammad Sabokrou
In this paper, we highlight this issue and propose a simple yet effective strategy inspired by contrastive learning and data-centric principles to address it.
1 code implementation • CVPR 2024 • Hossein Mirzaei, Mojtaba Nafez, Mohammad Jafari, Mohammad Bagher Soltani, Mohammad Azizmalayeri, Jafar Habibi, Mohammad Sabokrou, Mohammad Hossein Rohban
More precisely, for novelty detection, distribution shifts may occur in the training set or the test set.
1 code implementation • 15 Jun 2024 • Mohammad Akhavan Anvari, Rojina Kashefi, Vahid Reza Khazaie, Mohammad Khalooei, Mohammad Sabokrou
Despite advancements in these benchmarks, contemporary anomaly detection methods often struggle with out-of-distribution generalization, particularly in classifying samples with subtle transformations during testing.
1 code implementation • 27 Nov 2023 • Hossein Rezaei, Mohammad Sabokrou
Continual learning (CL) aims to acquire new knowledge while preserving information from previous experiences without forgetting.
no code implementations • 12 Nov 2023 • Rojina Kashefi, Leili Barekatain, Mohammad Sabokrou, Fatemeh Aghaeipoor
Transformers have had a significant impact on natural language processing and have recently demonstrated their potential in computer vision.
no code implementations • 4 Jul 2023 • Raha Ahmadi, Mohammad Javad Rajabi, Mohammad Khalooie, Mohammad Sabokrou
In this paper, we propose a novel approach to address this issue and improve the learning of main concepts by image classifiers.
no code implementations • CVPR 2024 • Mozhgan PourKeshavarz, Mohammad Sabokrou, Amir Rasouli
In autonomous driving, behavior prediction is fundamental for safe motion planning, hence the security and robustness of prediction models against adversarial attacks are of paramount importance.
1 code implementation • 14 Jun 2023 • Zahra Rezvani, Soroor Shekarizeh, Mohammad Sabokrou
We devise a simple module called Global Advantage Stream (GAS) to learn and capture the holistic features of input samples (i. e., the global features).
no code implementations • 10 Jun 2023 • Mohammad Mahdi Mehmanchi, Mahbod Nouri, Mohammad Sabokrou
While a generalization test is one way to evaluate a trained model's performance, it can be costly and may not cover all scenarios to ensure that the model has learned the primary concepts.
no code implementations • 6 Jun 2023 • Fatemeh Aghaeipoor, Dorsa Asgarian, Mohammad Sabokrou
Explainability of Deep Neural Networks (DNNs) has been garnering increasing attention in recent years.
no code implementations • 30 May 2023 • Hossein Rezaei, Mohammad Sabokrou
To achieve this, we analyze the null space in the last layer of neural networks, which enables us to quantify overfitting without access to training data or knowledge of the accuracy of those data.
1 code implementation • 20 Nov 2022 • Vahid Reza Khazaie, Anthony Wong, Mohammad Sabokrou
This paper presents a novel evaluation framework for Out-of-Distribution (OOD) detection that aims to assess the performance of machine learning models in more realistic settings.
Out-of-Distribution Detection
Out of Distribution (OOD) Detection
1 code implementation • 22 Jul 2022 • Mohammad Hajizadeh, Mohammad Sabokrou, Adel Rahmani
We also developed a light neck FCPNLite for mobile devices that will aid with the detection of small objects.
1 code implementation • 28 May 2022 • Hossein Mirzaei, Mohammadreza Salehi, Sajjad Shahabi, Efstratios Gavves, Cees G. M. Snoek, Mohammad Sabokrou, Mohammad Hossein Rohban
Effectiveness of our method for both the near-distribution and standard novelty detection is assessed through extensive experiments on datasets in diverse applications such as medical images, object classification, and quality control.
Ranked #3 on
Anomaly Detection
on One-class CIFAR-10
(using extra training data)
1 code implementation • 31 Jan 2022 • Soroor Shekarizadeh, Razieh Rastgoo, Saif Al-Kuwari, Mohammad Sabokrou
In this paper, inspired by the success of Knowledge Distillation (KD) methods, we propose an unsupervised deep neural network to detect and localize damages in social media images.
no code implementations • 5 Jan 2022 • Razieh Rastgoo, Kourosh Kiani, Sergio Escalera, Vassilis Athitsos, Mohammad Sabokrou
To make an easy and mutual communication between the hearing-impaired and the hearing communities, building a robust system capable of translating the spoken language into sign language and vice versa is fundamental.
1 code implementation • 26 Oct 2021 • Mohammadreza Salehi, Hossein Mirzaei, Dan Hendrycks, Yixuan Li, Mohammad Hossein Rohban, Mohammad Sabokrou
To date, several research domains tackle the problem of detecting unfamiliar samples, including anomaly detection, novelty detection, one-class learning, open set recognition, and out-of-distribution detection.
no code implementations • ICLR 2022 • Mozhgan PourKeshavarzi, Guoying Zhao, Mohammad Sabokrou
In this paper, we shed light on an on-call transfer set to provide past experiences whenever a new task arises in the data stream.
no code implementations • 2 Sep 2021 • Razieh Rastgoo, Kourosh Kiani, Sergio Escalera, Mohammad Sabokrou
Zero-Shot Learning (ZSL) has rapidly advanced in recent years.
no code implementations • 29 Mar 2021 • Bahram Mohammadi, Mohammad Sabokrou
Learning new knowledge in the absence of data instances from previous classes or even imbalance samples of both old and new classes makes CIL an ongoing challenging problem.
1 code implementation • 29 Mar 2021 • Razieh Rastgoo, Kourosh Kiani, Sergio Escalera, Mohammad Sabokrou
Sign Language is the dominant yet non-primary form of communication language used in the deaf and hearing-impaired community.
no code implementations • 22 Mar 2021 • Mozhgan PourKeshavarz, Mohammad Sabokrou
In this paper, we shed light on an on-call transfer set to provide past experiences whenever a new class arises in the data stream.
no code implementations • 18 Mar 2021 • Masoud Pourreza, Mohammadreza Salehi, Mohammad Sabokrou
Video anomaly detection has proved to be a challenging task owing to its unsupervised training procedure and high spatio-temporal complexity existing in real-world scenarios.
no code implementations • 2 Mar 2021 • Bahram Mohammadi, Mahmood Fathy, Mohammad Sabokrou
AD strongly correlates with the important computer vision and image processing tasks such as image/video anomaly, irregularity and sudden event detection.
no code implementations • 23 Sep 2020 • Hanwool Park, Amirhossein Bayat, Mohammad Sabokrou, Jan S. Kirschke, Bjoern H. Menze
This paper presents a novel yet efficient defense framework for segmentation models against adversarial attacks in medical imaging.
no code implementations • 20 Jun 2020 • Masoud Pourreza, Bahram Mohammadi, Mostafa Khaki, Samir Bouindour, Hichem Snoussi, Mohammad Sabokrou
Previous researches solve this problem as a One-Class Classification (OCC) task where they train a reference model on all of the available samples.
no code implementations • 12 Feb 2020 • Mohammad Sabokrou, Masoud Pourreza, Xiaobai Li, Mahmood Fathy, Guoying Zhao
In this paper, we propose a simple yet efficient approach to benefit the advantages of the Deep Neural Network (DNN) by simplifying HR estimation from a complex task to learning from very correlated representation to HR.
no code implementations • 16 Jan 2020 • Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan
In this paper, we propose Code-Bridged Classifier (CBC), a framework for making a Convolutional Neural Network (CNNs) robust against adversarial attacks without increasing or even by decreasing the overall models' computational complexity.
no code implementations • 8 Nov 2019 • Mohammed Gharib, Bahram Mohammadi, Shadi Hejareh Dastgerdi, Mohammad Sabokrou
These detectors are two encoder-decoder neural networks that are forced to provide a compressed and a sparse representation from the normal flows.
no code implementations • ICCV 2019 • Mohammad Sabokrou, Mohammad Khalooei, Ehsan Adeli
Conventional unsupervised learning methods only focused on training deep networks to understand the primitive characteristics of the visual data, mainly to be able to reconstruct the data from a latent space.
no code implementations • 12 Jul 2019 • Mohammad Tavakolian, Mohammad Sabokrou, Abdenour Hadid
The key idea is to represent videos by compressing them in the form of realistic images, which can be used in a variety of video-based scene analysis applications.
no code implementations • 25 Apr 2019 • Bahram Mohammadi, Mohammad Sabokrou
Inspired by the successes of Generative Adversarial Networks (GANs) for training deep models in semi-unsupervised setting, we have proposed an end-to-end deep architecture for IDS.
no code implementations • 24 Jun 2018 • Mohammad Hajizadeh Saffar, Mohsen Fayyaz, Mohammad Sabokrou, Mahmood Fathy
To deal with these difficulties and modeling the signatures efficiently, we propose a method that a one-class classifier per each user is built on discriminative features.
no code implementations • 16 Jun 2018 • Mohammad Hajizadeh Saffar, Mohsen Fayyaz, Mohammad Sabokrou, Mahmood Fathy
This paper gives an overview on semantic segmentation consists of an explanation of this field, it's status and relation with other vision fundamental tasks, different datasets and common evaluation parameters that have been used by researchers.
2 code implementations • 24 May 2018 • Mohammad Sabokrou, Masoud Pourreza, Mohsen Fayyaz, Rahim Entezari, Mahmood Fathy, Jürgen Gall, Ehsan Adeli
Real-time detection of irregularities in visual data is very invaluable and useful in many prospective applications including surveillance, patient monitoring systems, etc.
5 code implementations • CVPR 2018 • Mohammad Sabokrou, Mohammad Khalooei, Mahmood Fathy, Ehsan Adeli
Our architecture is composed of two deep networks, each of which trained by competing with each other while collaborating to understand the underlying concept in the target class, and then classify the testing samples.
1 code implementation • 17 Feb 2018 • Seyyed Hossein Hasanpour, Mohammad Rouhani, Mohsen Fayyaz, Mohammad Sabokrou, Ehsan Adeli
SimpNet outperforms the deeper and more complex architectures such as VGGNet, ResNet, WideResidualNet \etc, on several well-known benchmarks, while having 2 to 25 times fewer number of parameters and operations.
Ranked #118 on
Image Classification
on CIFAR-10
no code implementations • 3 Sep 2016 • Mohammad Sabokrou, Mohsen Fayyaz, Mahmood Fathy, Zahra Moayedd, Reinhard klette
The detection of abnormal behaviours in crowded scenes has to deal with many challenges.
9 code implementations • 22 Aug 2016 • Seyyed Hossein Hasanpour, Mohammad Rouhani, Mohsen Fayyaz, Mohammad Sabokrou
Our simple 13-layer architecture outperforms most of the deeper and complex architectures to date such as VGGNet, ResNet, and GoogleNet on several well-known benchmarks while having 2 to 25 times fewer number of parameters and operations.
Ranked #11 on
Image Classification
on MNIST
1 code implementation • 21 Aug 2016 • Mohsen Fayyaz, Mohammad Hajizadeh Saffar, Mohammad Sabokrou, Mahmood Fathy, Reinhard klette, Fay Huang
Current work on convolutional neural networks(CNNs) has shown that CNNs provide advanced spatial features supporting a very good performance of solutions for both image and video analysis, especially for the semantic segmentation task.
no code implementations • 21 Nov 2015 • Mohammad Sabokrou, Mahmood Fathy, Mojtaba Hosseini, Reinhard klette
In this paper, we propose a method for real-time anomaly detection and localization in crowded scenes.
no code implementations • 21 Nov 2015 • Mohammad Sabokrou, Mahmood Fathy, Mojtaba Hosseini
We propose a fusion strategy to combine the two descriptors as the output of our system.
no code implementations • 15 Aug 2015 • Mohsen Fayyaz, Masoud Pourreza, Mohammad Hajizadeh Saffar, Mohammad Sabokrou, Mahmood Fathy
In this paper, we propose a method for user Finger Vein Authentication (FVA) as a biometric system.
no code implementations • 30 May 2015 • Mohammad Sabokrou, Mahmood Fathy, Mojtaba Hoseini
One important application of the Wireless Sensor Network(WSN) is target tracking, the aim of this application is converging to an event or object in an area.
no code implementations • 29 May 2015 • Mohsen Fayyaz, Mohammad Hajizadeh_Saffar, Mohammad Sabokrou, Mahmood Fathy
Biometrics systems have been used in a wide range of applications and have improved people authentication.