default search action
Hossein Hosseini
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Mohsin M. Jamali, Sepehr Arbabi, Hossein Hosseini, Lokesh Saharan:
Active Student Engagement in STEM Fields to Improve Retention and Graduation Rates. ISCAS 2024: 1-5 - [c23]Lokesh Saharan, Mohsin M. Jamali, Sepehr Arbabi, Hossein Hosseini:
Impact of Summer Undergraduate Engineering Research on Student Performance Highlighted Through GPA Tracking. MWSCAS 2024: 1423-1426 - [i20]Hossein Hosseini, Mohammad Sobhan Zare, Amir Hossein Mohammadi, Arefeh Kazemi, Zahra Zojaji, Mohammad Ali Nematbakhsh:
PersianRAG: A Retrieval-Augmented Generation System for Persian Language. CoRR abs/2411.02832 (2024) - 2023
- [c22]Mohsin M. Jamali, Hossein Hosseini, Sepehr Arbabi, Harishchandra Aryal:
Role of Undergraduate Summer Research in Improving Retention of Engineering Students. ISCAS 2023: 1-5 - 2022
- [j9]Anastassios Dardas, Brent Hall, Jon Salter, Hossein Hosseini:
A geospatial workflow for the assessment of public transit system performance using near real-time data. Trans. GIS 26(4): 1642-1664 (2022) - [c21]Mohsin M. Jamali, Sepehr Arbabi, Hossein Hosseini, Harishchandra Aryal:
Addressing Retention and Improving Performance in Gateway Engineering Courses. ISCAS 2022: 2137-2141 - 2021
- [c20]Hossein Hosseini, Hyunsin Park, Sungrack Yun, Christos Louizos, Joseph Soriaga, Max Welling:
Federated Learning of User Verification Models Without Sharing Embeddings. ICML 2021: 4328-4336 - [i19]Hossein Hosseini, Hyunsin Park, Sungrack Yun, Christos Louizos, Joseph Soriaga, Max Welling:
Federated Learning of User Verification Models Without Sharing Embeddings. CoRR abs/2104.08776 (2021) - [i18]Mohammad Samragh, Hossein Hosseini, Aleksei Triastcyn, Kambiz Azarian, Joseph Soriaga, Farinaz Koushanfar:
Unsupervised Information Obfuscation for Split Inference of Neural Networks. CoRR abs/2104.11413 (2021) - 2020
- [i17]Hossein Hosseini, Sungrack Yun, Hyunsin Park, Christos Louizos, Joseph Soriaga, Max Welling:
Federated Learning of User Authentication Models. CoRR abs/2007.04618 (2020)
2010 – 2019
- 2019
- [j8]Abedalsalam Bani-Ahmed, Mohammad Rashidi, Adel Nasiri, Hossein Hosseini:
Reliability Analysis of a Decentralized Microgrid Control Architecture. IEEE Trans. Smart Grid 10(4): 3910-3918 (2019) - [c19]Shruti Misra, Shana Moothedath, Hossein Hosseini, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
Learning Equilibria in Stochastic Information Flow Tracking Games with Partial Knowledge. CDC 2019: 4053-4060 - [c18]Hossein Hosseini, Sreeram Kannan, Radha Poovendran:
Dropping Pixels for Adversarial Robustness. CVPR Workshops 2019: 91-97 - [i16]Hossein Hosseini, Sreeram Kannan, Radha Poovendran:
Dropping Pixels for Adversarial Robustness. CoRR abs/1905.00180 (2019) - [i15]Hossein Hosseini, Sreeram Kannan, Radha Poovendran:
Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples. CoRR abs/1907.12138 (2019) - 2018
- [j7]Hossein Hosseini, Seyed Mohamad Taghi Bathaee:
Designing three indicators to detect false data injection attacks on smart grid by dynamic state estimation. J. Intell. Fuzzy Syst. 35(5): 5593-5604 (2018) - [c17]Guosong Yang, Hossein Hosseini, Dinuka Sahabandu, Andrew Clark, João P. Hespanha, Radha Poovendran:
Modeling and Mitigating the Coremelt Attack. ACC 2018: 3410-3416 - [c16]Hossein Hosseini, Ali Hooshmand, Ratnesh Sharma:
Conditioning Neural Networks: A Case Study of Electricity Load Forecasting. IEEE BigData 2018: 2190-2196 - [c15]Hossein Hosseini, Radha Poovendran:
Semantic Adversarial Examples. CVPR Workshops 2018: 1614-1619 - [c14]Hossein Hosseini, Baicen Xiao, Mayoore Jaiswal, Radha Poovendran:
Assessing Shape Bias Property of Convolutional Neural Networks. CVPR Workshops 2018: 1923-1931 - [c13]Muhammed O. Sayin, Hossein Hosseini, Radha Poovendran, Tamer Basar:
A Game Theoretical Framework for Inter-process Adversarial Intervention Detection. GameSec 2018: 486-507 - [c12]Mehdi Assefi, Ali Hooshmand, Hossein Hosseini, Ratnesh Sharma:
Battery Degradation Temporal Modeling Using LSTM Networks. ICMLA 2018: 853-858 - [i14]Hossein Hosseini, Baicen Xiao, Mayoore Jaiswal, Radha Poovendran:
Assessing Shape Bias Property of Convolutional Neural Networks. CoRR abs/1803.07739 (2018) - [i13]Hossein Hosseini, Radha Poovendran:
Semantic Adversarial Examples. CoRR abs/1804.00499 (2018) - 2017
- [c11]Hossein Hosseini, Baicen Xiao, Andrew Clark, Radha Poovendran:
Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API. MPS@CCS 2017: 21-32 - [c10]Hossein Hosseini, Baicen Xiao, Radha Poovendran:
Deceiving Google's Cloud Video Intelligence API Built for Summarizing Videos. CVPR Workshops 2017: 1305-1309 - [c9]Hossein Hosseini, Baicen Xiao, Radha Poovendran:
Google's Cloud Vision API is Not Robust to Noise. ICMLA 2017: 101-105 - [c8]Hossein Hosseini, Baicen Xiao, Mayoore Jaiswal, Radha Poovendran:
On the Limitation of Convolutional Neural Networks in Recognizing Negative Images. ICMLA 2017: 352-358 - [i12]Hossein Hosseini, Sreeram Kannan, Baosen Zhang, Radha Poovendran:
Deceiving Google's Perspective API Built for Detecting Toxic Comments. CoRR abs/1702.08138 (2017) - [i11]Hossein Hosseini, Yize Chen, Sreeram Kannan, Baosen Zhang, Radha Poovendran:
Blocking Transferability of Adversarial Examples in Black-Box Learning Systems. CoRR abs/1703.04318 (2017) - [i10]Hossein Hosseini, Radha Poovendran:
Deep Neural Networks Do Not Recognize Negative Images. CoRR abs/1703.06857 (2017) - [i9]Hossein Hosseini, Baicen Xiao, Radha Poovendran:
Deceiving Google's Cloud Video Intelligence API Built for Summarizing Videos. CoRR abs/1703.09793 (2017) - [i8]Hossein Hosseini, Baicen Xiao, Radha Poovendran:
Google's Cloud Vision API Is Not Robust To Noise. CoRR abs/1704.05051 (2017) - [i7]Hossein Hosseini, Baicen Xiao, Andrew Clark, Radha Poovendran:
Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API. CoRR abs/1708.04301 (2017) - 2016
- [c7]Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran:
Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters. CNS 2016: 163-171 - [c6]Hossein Hosseini, Sreeram Kannan, Baosen Zhang, Radha Poovendran:
Learning Temporal Dependence from Time-Series Data with Latent Variables. DSAA 2016: 253-262 - [c5]Kamil Samara, Hossein Hosseini:
A routing protocol for wireless sensor networks with load balancing. EIT 2016: 156-161 - [i6]Hossein Hosseini, Sreeram Kannan, Baosen Zhang, Radha Poovendran:
Learning Temporal Dependence from Time-Series Data with Latent Variables. CoRR abs/1608.07636 (2016) - 2015
- [j6]Hossein Hosseini, Farzad Hessar, Farokh Marvasti:
Real-Time Impulse Noise Suppression from Images Using an Efficient Weighted-Average Filtering. IEEE Signal Process. Lett. 22(8): 1050-1054 (2015) - [c4]Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran:
Verifiable and privacy-preserving fine-grained data-collection for smart metering. CNS 2015: 655-658 - [c3]Kamil Samara, Hossein Hosseini:
A Routing Protocol for Wireless Sensor Networks with Reliable Delivery of Data. DSDIS 2015: 632-635 - 2014
- [j5]Hossein Hosseini, Behrooz Tousi, Navid Razmjooy:
Application of fuzzy subtractive clustering for optimal transient performance of automatic generation control in restructured power system. J. Intell. Fuzzy Syst. 26(3): 1155-1166 (2014) - [j4]Hossein Hosseini, Seyed Mohamad Taghi Bathaee, Ali Abedini, Majid Hosseina, Alireza Fereidunain:
Defending false data injection attack on smart grid network using neuro-fuzzy controller. J. Intell. Fuzzy Syst. 27(3): 1457-1467 (2014) - [j3]Seyed Hossein Rouhani, Abdolreza Sheikholeslami, Roya Ahmadi, Hossein Hosseini:
Using optimal fuzzy logic controller to improve transient fluctuations in deregulated power system with random variable load. J. Intell. Fuzzy Syst. 27(6): 3145-3157 (2014) - [j2]Navid Razmjooy, Bibi Somayeh Mousavi, Mohsen Khalilpour, Hossein Hosseini:
Automatic selection and fusion of color spaces for image thresholding. Signal Image Video Process. 8(4): 603-614 (2014) - [i5]Hossein Hosseini, Ali Goli, Neda Barzegar Marvasti, Masoume Azghani, Farokh Marvasti:
On Image Block Loss Restoration Using the Sparsity Pattern as Side Information. CoRR abs/1401.5966 (2014) - [i4]Hossein Hosseini, Farzad Hessar, Farokh Marvasti:
Real-Time Impulse Noise Suppression from Images Using an Efficient Weighted-Average Filtering. CoRR abs/1408.3139 (2014) - 2013
- [j1]Hossein Hosseini, Farokh Marvasti:
Fast restoration of natural images corrupted by high-density impulse noise. EURASIP J. Image Video Process. 2013: 15 (2013) - [i3]Hossein Hosseini, Behnam Bahrak, Farzad Hessar:
A GOST-like Blind Signature Scheme Based on Elliptic Curve Discrete Logarithm Problem. CoRR abs/1304.2094 (2013) - 2012
- [c2]Hossein Hosseini, Mohsen Kalantar:
An ECS-Control Scheme to Improve Power Quality in Grid Connected Wind Farms. Asia International Conference on Modelling and Simulation 2012: 173-178 - 2011
- [i2]Hossein Hosseini, Farokh Marvasti:
Fast Impulse Noise Removal from Highly Corrupted Images. CoRR abs/1105.2899 (2011) - 2010
- [i1]Hossein Hosseini, Neda Barzegar Marvasti, Farrokh Marvasti:
Image Inpainting Using Sparsity of the Transform Domain. CoRR abs/1011.5458 (2010)
2000 – 2009
- 2001
- [c1]Hossein Hosseini, Behrooz Rohani, Bijan Rohani:
Objective characterization of voice service quality in wideband CDMA. VTC Fall 2001: 2708-2711
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint