default search action
Mohammadreza Ebrahimi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i14]MohammadReza Ebrahimi, Sunny Panchal, Roland Memisevic:
Your Context Is Not an Array: Unveiling Random Access Limitations in Transformers. CoRR abs/2408.05506 (2024) - [i13]Ashish Khisti, Mohammadreza Ebrahimi, Hassan Dbouk, Arash Behboodi, Roland Memisevic, Christos Louizos:
Multi-Draft Speculative Sampling: Canonical Architectures and Theoretical Limits. CoRR abs/2410.18234 (2024) - 2023
- [j7]Mohammadreza Ebrahimi, Yidong Chai, Hao Helen Zhang, Hsinchun Chen:
Heterogeneous Domain Adaptation With Adversarial Neural Representation Learning: Experiments on E-Commerce and Cybersecurity. IEEE Trans. Pattern Anal. Mach. Intell. 45(2): 1862-1875 (2023) - [c21]MohammadReza Ebrahimi, Navona Calarco, Colin Hawco, Aristotle N. Voineskos, Ashish Khisti:
Time-Resolved FMRI Shared Response Model Using Gaussian Process Factor Analysis. ICASSP 2023: 1-5 - [c20]Brian Etter, James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen:
Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach. ICDM 2023: 101-109 - [c19]Brian Etter, James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen:
Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach. ICDM (Workshops) 2023: 1313-1321 - [c18]Alysson De Oliveira Silveira, Arindam Ray, Mohammadreza Ebrahimi, Anol Bhattacherjee:
Automated Deductive Content Analysis of Text: A Deep Contrastive and Active Learning Based Approach. ICIS 2023 - [c17]Muralee Nikhil Krishnan, MohammadReza Ebrahimi, Ashish J. Khisti:
Sequential Gradient Coding For Straggler Mitigation. ICLR 2023 - [i12]Rouzbeh Behnia, Mohammadreza Ebrahimi, Arman Riasi, Balaji Padmanabhan, Thang Hoang:
Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning. CoRR abs/2304.03841 (2023) - [i11]Jeremiah Birrell, Mohammadreza Ebrahimi:
Adversarially Robust Deep Learning with Optimal-Transport-Regularized Divergences. CoRR abs/2309.03791 (2023) - 2022
- [j6]Mohammadreza Ebrahimi, Yidong Chai, Sagar Samtani, Hsinchun Chen:
Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning. MIS Q. 46(2): 1209-1226 (2022) - [j5]Bo Wen, Paul Jen-Hwa Hu, Mohammadreza Ebrahimi, Hsinchun Chen:
Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics: An Affordance Perspective. ACM Trans. Manag. Inf. Syst. 13(1): 10:1-10:24 (2022) - [j4]Ning Zhang, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen:
Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence. ACM Trans. Manag. Inf. Syst. 13(2): 21:1-21:21 (2022) - [c16]James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen:
Multi-view Representation Learning from Malware to Defend Against Adversarial Variants. ICDM (Workshops) 2022: 1-8 - [c15]Rouzbeh Behnia, MohammadReza Ebrahimi, Jason Pacheco, Balaji Padmanabhan:
EW-Tune: A Framework for Privately Fine-Tuning Large Language Models with Differential Privacy. ICDM (Workshops) 2022: 560-566 - [c14]MohammadReza Ebrahimi, Weifeng Li, Yidong Chai, Jason Pacheco, Hsinchun Chen:
An Adversarial Reinforcement Learning Framework for Robust Machine Learning-based Malware Detection. ICDM (Workshops) 2022: 567-576 - [c13]Ricardo Omar Chávez García, Matthew A. Estrada, Mohammadreza Ebrahimi, Francesco Zuppichini, Luca Maria Gambardella, Alessandro Giusti, Auke Jan Ijspeert:
Gait-dependent Traversability Estimation on the k-rock2 Robot. ICPR 2022: 4204-4210 - [i10]Ning Zhang, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen:
Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence. CoRR abs/2201.02799 (2022) - [i9]Mohammadreza Ebrahimi, Yidong Chai, Hao Helen Zhang, Hsinchun Chen:
Heterogeneous Domain Adaptation with Adversarial Neural Representation Learning: Experiments on E-Commerce and Cybersecurity. CoRR abs/2205.07853 (2022) - [i8]Rouzbeh Behnia, Mohammadreza Ebrahimi, Jason Pacheco, Balaji Padmanabhan:
EW-Tune: A Framework for Privately Fine-Tuning Large Language Models with Differential Privacy. CoRR abs/2210.15042 (2022) - [i7]James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen:
Multi-view Representation Learning from Malware to Defend Against Adversarial Variants. CoRR abs/2210.15429 (2022) - [i6]M. Nikhil Krishnan, MohammadReza Ebrahimi, Ashish Khisti:
Sequential Gradient Coding For Straggler Mitigation. CoRR abs/2211.13802 (2022) - 2021
- [b1]Mohammadreza Ebrahimi:
AI-Enabled Cybersecurity Analytics: Detecting and Defending Against Cyber Threats. University of Arizona, Tucson, USA, 2021 - [c12]James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen:
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach. ISI 2021: 1-6 - [c11]Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen:
Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach. ISI 2021: 1-6 - [c10]Mohammadreza Ebrahimi, Jason Pacheco, Weifeng Li, James Lee Hu, Hsinchun Chen:
Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces. SP (Workshops) 2021: 85-91 - [i5]Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen:
Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach. CoRR abs/2111.09415 (2021) - [i4]James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen:
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach. CoRR abs/2112.01724 (2021) - 2020
- [j3]Mohammadreza Ebrahimi, Jay F. Nunamaker Jr., Hsinchun Chen:
Semi-Supervised Cyber Threat Identification in Dark Net Markets: A Transductive and Deep Learning Approach. J. Manag. Inf. Syst. 37(3): 694-722 (2020) - [j2]Mohammadreza Ebrahimi, Farshad Lahouti, Victoria Kostina:
Two-Layer Coded Channel Access With Collision Resolution: Design and Analysis. IEEE Trans. Wirel. Commun. 19(12): 7986-7997 (2020) - [c9]Fang Yu Lin, Yizhi Liu, Mohammadreza Ebrahimi, Zara Ahmad-Post, James Lee Hu, Jingyu Xin, Sagar Samtani, Weifeng Li, Hsinchun Chen:
Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach. ICDM (Workshops) 2020: 488-495 - [c8]Yizhi Liu, Fang Yu Lin, Zara Ahmad-Post, Mohammadreza Ebrahimi, Ning Zhang, James Lee Hu, Jingyu Xin, Weifeng Li, Hsinchun Chen:
Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web. ISI 2020: 1-6 - [c7]Ning Zhang, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen:
A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark Web. ISI 2020: 1-6 - [c6]Mohammadreza Ebrahimi, Sagar Samtani, Yidong Chai, Hsinchun Chen:
Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach. SP (Workshops) 2020: 20-26 - [i3]MohammadReza Ebrahimi, Navona Calarco, Kieran Campbell, Colin Hawco, Aristotle N. Voineskos, Ashish Khisti:
Time-Resolved fMRI Shared Response Model using Gaussian Process Factor Analysis. CoRR abs/2006.05572 (2020) - [i2]Mohammadreza Ebrahimi, Ning Zhang, James Lee Hu, Muhammad Taqi Raza, Hsinchun Chen:
Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model. CoRR abs/2012.07994 (2020)
2010 – 2019
- 2019
- [j1]Mohammadreza Ebrahimi, J. Daniel Martinez:
Involuntary Embarrassing Exposures in Online Social Networks: A Replication Study. AIS Trans. Replication Res. 5: 7 (2019) - [c5]Nolan Arnold, Mohammadreza Ebrahimi, Ning Zhang, Ben Lazarine, Mark W. Patton, Hsinchun Chen, Sagar Samtani:
Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool. ISI 2019: 92-97 - [c4]Po-Yi Du, Mohammadreza Ebrahimi, Ning Zhang, Hsinchun Chen, Randall A. Brown, Sagar Samtani:
Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach. ISI 2019: 110-115 - [i1]MohammadReza Ebrahimi, Farshad Lahouti, Victoria Kostina:
Two-layer Coded Channel Access with Collision Resolution: Design and Analysis. CoRR abs/1909.00065 (2019) - 2018
- [c3]Po-Yi Du, Ning Zhang, Mohammadreza Ebrahimi, Sagar Samtani, Ben Lazarine, Nolan Arnold, Rachael Dunn, Sandeep Suntwal, Guadalupe Angeles, Robert Schweitzer, Hsinchun Chen:
Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs. ISI 2018: 70-75 - [c2]Mohammadreza Ebrahimi, Mihai Surdeanu, Sagar Samtani, Hsinchun Chen:
Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach. ISI 2018: 85-90 - 2017
- [c1]MohammadReza Ebrahimi, Farshad Lahouti, Victoria Kostina:
Coded random access design for constrained outage. ISIT 2017: 2732-2736
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 21:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint