Search Results for author: Peyman Najafirad

Found 34 papers, 9 papers with code

COVID-19 Surveillance through Twitter using Self-Supervised and Few Shot Learning

no code implementations EMNLP (NLP-COVID19) 2020 Brandon Lwowski, Peyman Najafirad

Public health surveillance and tracking virus via social media can be a useful digital tool for contact tracing and preventing the spread of the virus.

Few-Shot Learning

CAMOUFLAGE: Exploiting Misinformation Detection Systems Through LLM-driven Adversarial Claim Transformation

no code implementations3 May 2025 Mazal Bethany, Nishant Vishwamitra, Cho-Yu Jason Chiang, Peyman Najafirad

Existing black-box text-based adversarial attacks are ill-suited for evidence-based misinformation detection systems, as these attacks primarily focus on token-level substitutions involving gradient or logit-based optimization strategies, which are incapable of fooling the multi-component nature of these detection systems.

Misinformation Retrieval

Machine Learning Fairness in House Price Prediction: A Case Study of America's Expanding Metropolises

1 code implementation2 May 2025 Abdalwahab Almajed, Maryam Tabar, Peyman Najafirad

As a result, it finds that the ML-driven house price prediction models show various levels of bias towards protected attributes (i. e., race and ethnicity in this study).

Fairness

Enhancing Reverse Engineering: Investigating and Benchmarking Large Language Models for Vulnerability Analysis in Decompiled Binaries

no code implementations7 Nov 2024 Dylan Manuel, Nafis Tanveer Islam, Joseph Khoury, Ana Nunez, Elias Bou-Harb, Peyman Najafirad

Subsequently, we fine-tune state-of-the-art LLMs using DeBinVul and report on a performance increase of 19%, 24%, and 21% in the capabilities of CodeLlama, Llama3, and CodeGen2 respectively, in detecting binary code vulnerabilities.

Benchmarking

Improving LLM Reasoning with Multi-Agent Tree-of-Thought Validator Agent

1 code implementation17 Sep 2024 Fatemeh Haji, Mazal Bethany, Maryam Tabar, Jason Chiang, Anthony Rios, Peyman Najafirad

To leverage the strengths of both multi-agent reasoning and ToT strategies, we introduce a novel approach combining ToT-based Reasoner agents with a Thought Validator agent.

GSM8K Question Answering +1

Jailbreaking Large Language Models with Symbolic Mathematics

no code implementations17 Sep 2024 Emet Bethany, Mazal Bethany, Juan Arturo Nolazco Flores, Sumit Kumar Jha, Peyman Najafirad

Recent advancements in AI safety have led to increased efforts in training and red-teaming large language models (LLMs) to mitigate unsafe content generation.

Red Teaming

AutoSafeCoder: A Multi-Agent Framework for Securing LLM Code Generation through Static Analysis and Fuzz Testing

1 code implementation16 Sep 2024 Ana Nunez, Nafis Tanveer Islam, Sumit Kumar Jha, Peyman Najafirad

Recent advancements in automatic code generation using large language models (LLMs) have brought us closer to fully automated secure software development.

Code Generation Program Synthesis

Enhancing Source Code Security with LLMs: Demystifying The Challenges and Generating Reliable Repairs

no code implementations1 Sep 2024 Nafis Tanveer Islam, Joseph Khoury, Andrew Seong, Elias Bou-Harb, Peyman Najafirad

With the recent unprecedented advancements in Artificial Intelligence (AI) computing, progress in Large Language Models (LLMs) is accelerating rapidly, presenting challenges in establishing clear guidelines, particularly in the field of security.

Code Repair

Unintentional Security Flaws in Code: Automated Defense via Root Cause Analysis

no code implementations30 Aug 2024 Nafis Tanveer Islam, Mazal Bethany, Dylan Manuel, Murtuza Jadliwala, Peyman Najafirad

To address these challenges, we conducted a comprehensive study evaluating the efficacy of existing methods in helping junior developers secure their code.

Enhancing Event Reasoning in Large Language Models through Instruction Fine-Tuning with Semantic Causal Graphs

no code implementations30 Aug 2024 Mazal Bethany, Emet Bethany, Brandon Wherry, Cho-Yu Chiang, Nishant Vishwamitra, Anthony Rios, Peyman Najafirad

Our evaluations demonstrate that training LLMs with SCG Instructions outperforms standard instruction fine-tuning by an average of 35. 69\% on Event Trigger Classification.

Event Detection

Estimating Earthquake Magnitude in Sentinel-1 Imagery via Ranking

no code implementations25 Jul 2024 Daniele Rege Cambrin, Isaac Corley, Paolo Garza, Peyman Najafirad

Earthquakes are commonly estimated using physical seismic stations, however, due to the installation requirements and costs of these stations, global coverage quickly becomes impractical.

Earth Observation Metric Learning

On the Consistency of Fairness Measurement Methods for Regression Tasks

no code implementations19 Jun 2024 Abdalwahab Almajed, Maryam Tabar, Peyman Najafirad

With growing applications of Machine Learning (ML) techniques in the real world, it is highly important to ensure that these models work in an equitable manner.

Fairness regression

Image Safeguarding: Reasoning with Conditional Vision Language Model and Obfuscating Unsafe Content Counterfactually

1 code implementation19 Jan 2024 Mazal Bethany, Brandon Wherry, Nishant Vishwamitra, Peyman Najafirad

This process involves addressing two key problems: (1) the reason for obfuscating unsafe images demands the platform to provide an accurate rationale that must be grounded in unsafe image-specific attributes, and (2) the unsafe regions in the image must be minimally obfuscated while still depicting the safe regions.

counterfactual Counterfactual Explanation +3

Lateral Phishing With Large Language Models: A Large Organization Comparative Study

no code implementations18 Jan 2024 Mazal Bethany, Athanasios Galiopoulos, Emet Bethany, Mohammad Bahrami Karkevandi, Nicole Beebe, Nishant Vishwamitra, Peyman Najafirad

The emergence of Large Language Models (LLMs) has heightened the threat of phishing emails by enabling the generation of highly targeted, personalized, and automated attacks.

Language Modeling Language Modelling +1

Deciphering Textual Authenticity: A Generalized Strategy through the Lens of Large Language Semantics for Detecting Human vs. Machine-Generated Text

1 code implementation17 Jan 2024 Mazal Bethany, Brandon Wherry, Emet Bethany, Nishant Vishwamitra, Anthony Rios, Peyman Najafirad

We first study the effectiveness of state-of-the-art approaches and find that they are severely limited against text produced by diverse generators and domains in the real world.

Binary Classification

Code Security Vulnerability Repair Using Reinforcement Learning with Large Language Models

no code implementations13 Jan 2024 Nafis Tanveer Islam, Mohammad Bahrami Karkevandi, Peyman Najafirad

This imbalance between the lines needed for security measures and the functional code enforces the supervised fine-tuned model to prioritize generating functional code without adding proper security measures, which also benefits the model by resulting in minimal loss.

Code Generation Code Repair +1

Seeing the roads through the trees: A benchmark for modeling spatial dependencies with aerial imagery

2 code implementations12 Jan 2024 Caleb Robinson, Isaac Corley, Anthony Ortiz, Rahul Dodhia, Juan M. Lavista Ferres, Peyman Najafirad

In this work we propose a road segmentation benchmark dataset, Chesapeake Roads Spatial Context (RSC), for evaluating the spatial long-range context understanding of geospatial machine learning models and show how commonly used semantic segmentation models can fail at this task.

Object Recognition Road Segmentation +1

LLM-Powered Code Vulnerability Repair with Reinforcement Learning and Semantic Reward

no code implementations7 Jan 2024 Nafis Tanveer Islam, Joseph Khoury, Andrew Seong, Mohammad Bahrami Karkevandi, Gonzalo De La Torre Parra, Elias Bou-Harb, Peyman Najafirad

In software development, the predominant emphasis on functionality often supersedes security concerns, a trend gaining momentum with AI-driven automation tools like GitHub Copilot.

Language Modelling Large Language Model +1

Revisiting pre-trained remote sensing model benchmarks: resizing and normalization matters

1 code implementation22 May 2023 Isaac Corley, Caleb Robinson, Rahul Dodhia, Juan M. Lavista Ferres, Peyman Najafirad

Research in self-supervised learning (SSL) with natural images has progressed rapidly in recent years and is now increasingly being applied to and benchmarked with datasets containing remotely sensed imagery.

Self-Supervised Learning Transfer Learning

Single-View Height Estimation with Conditional Diffusion Probabilistic Models

no code implementations26 Apr 2023 Isaac Corley, Peyman Najafirad

Digital Surface Models (DSM) offer a wealth of height information for understanding the Earth's surface as well as monitoring the existence or change in natural and man-made structures.

Denoising Image Generation

An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph

1 code implementation17 Apr 2023 Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad

We present a training process utilizing a semantic vulnerability graph (SVG) representation from source code, created by integrating edges from a sequential flow, control flow, and data flow, as well as a novel flow dubbed Poacher Flow (PF).

Vulnerability Detection

Supervising Remote Sensing Change Detection Models with 3D Surface Semantics

1 code implementation26 Feb 2022 Isaac Corley, Peyman Najafirad

Remote sensing change detection, identifying changes between scenes of the same location, is an active area of research with a broad range of applications.

Change Detection Representation Learning

Generalized Zero-Shot Learning using Multimodal Variational Auto-Encoder with Semantic Concepts

no code implementations26 Jun 2021 Nihar Bendre, Kevin Desai, Peyman Najafirad

To overcome this problem, we propose a Multimodal Variational Auto-Encoder (M-VAE) which can learn the shared latent space of image features and the semantic space.

Decoder Few-Shot Learning +1

Interpretable Self-supervised Multi-task Learning for COVID-19 Information Retrieval and Extraction

no code implementations15 Jun 2021 Nima Ebadi, Peyman Najafirad

Our model outperforms baselines in IE and IR tasks, respectively by micro-f score of 0. 08 (LCA-F score of 0. 05), and MAP of 0. 05 on average.

Articles Decision Making +5

Show Why the Answer is Correct! Towards Explainable AI using Compositional Temporal Attention

no code implementations15 May 2021 Nihar Bendre, Kevin Desai, Peyman Najafirad

This results in achieving better understanding of complex questions and also provides reasoning as to why the module predicts a particular answer.

Question Answering Visual Question Answering

Adaptive Clustering of Robust Semantic Representations for Adversarial Image Purification

no code implementations5 Apr 2021 Samuel Henrique Silva, Arun Das, Ian Scarff, Peyman Najafirad

In order to evaluate the most adequate SRD, we rely on the distance between robust latent representations and semantic cluster distributions.

Clustering Semantic Similarity +1

A Self-supervised Approach for Semantic Indexing in the Context of COVID-19 Pandemic

no code implementations7 Oct 2020 Nima Ebadi, Peyman Najafirad

We present a case study on a novel dataset that is based on COVID-19 papers published and manually indexed in PubMed.

Representation Learning

Learning from Few Samples: A Survey

no code implementations30 Jul 2020 Nihar Bendre, Hugo Terashima Marín, Peyman Najafirad

Deep neural networks have been able to outperform humans in some cases like image recognition and image classification.

Data Augmentation Few-Shot Learning +3

Opportunities and Challenges in Deep Learning Adversarial Robustness: A Survey

no code implementations1 Jul 2020 Samuel Henrique Silva, Peyman Najafirad

We provide a taxonomy to classify adversarial attacks and defenses, formulate the Robust Optimization problem in a min-max setting and divide it into 3 subcategories, namely: Adversarial (re)Training, Regularization Approach, and Certified Defenses.

Adversarial Robustness BIG-bench Machine Learning +2

Cannot find the paper you are looking for? You can Submit a new open access paper.