- Farshid Farhat 's Google-SiteYou will find the links to other resources related to Farshid Farhathttps://sites.google.com
/site/farshidfarhat/ - Behavioral Analog Topology Synthesizerطراحی کننده توپولوژي مدارهاي آنالوگ درحوزه سيگنال كوچك و فركانس پايينhttps://sites.google.com/
site/netlist2scheme/ - Cool Teen Buddy
https://sites.google.com/site/coolteenbuddy/ - Diman Zad-Tootaghaj 's Academic WebsiteDiman Zad-Tootaghaj 's Academic Website سایت گوگل دیمن زاد توت آغاجhttps://sites.google.com/s
ite/dimantootaghaj/ - Eigenvalues-based Steganalysis
https://sites.google.com/site/eigenvaluesbasedsteganalysis/ - FARHATفرحتhttps://sites.google
.com/site/farhat83site/ - Farsheed FarhatFarshiid Farsheed Farshead Farshied Farsheid Farshyd فرشید فرشيد فرحت فرهت فرحط فرهطhttps://sites.google.com/s
ite/farsheed83/ - Farshid Farhat 's Google-Pageصفحه گوگل فرشيد فرحتhttps://sites.google.com/s
ite/farshidfarhat2/ - frash downloads
https://sites.google.com/site/frashdownloads/ - frashpix
https://sites.google.com/site/frashpix/ - Game Theoretic Network SimulatorGame Theory Network Simulator Game Strategies in Network Security Simulation by Visual C++https://sites.google.com/si
te/gametheoreticnetworksimulat or/ - Multi-Dimensional Correlated SteganalysisMulti-Dimensional Correlated Steganalysis (MDCS) Multi-Dimensional Correlation (MDC) Steganalysis by Dimensional Cross Correlationhttps://sites.googl
e.com/site/mdimcorrsteganalysi s/ - Optical CDMA Network Simulator
https://sites.google.com/site/opticalcdmanetworksimulator/ - Sharif Students 79دانشجویان شریف ورودی سال 1379https://sites.google.com/s
ite/sharifstudents79/ - Sharif Students Servicesسرویس های فن آوری اطلاعات توسط دانشجویان شریفhttps://sites.google.com/s
ite/sharifstudentsservices/ - Student Branch of Iranian Society of CryptologyStudent Branch of Iranian Society of Cryptology at Sharif University of Technologyhttps://sites.google
.com/site/sbisc4sharif/ - Wireless Mobile Adhoc Network Simulatorشبیه ساز شبکه ادهاکhttps://sites.google.com/
site/wmanetsecsim/ - آموزشگاه موسیقی نوای سه گاهhttps://sites.goog
le.com/site/navayesegah/ - سایت گوگل فرشيد فرحتسایت گوگل فرشيد فرحتhttps://sites.google.com/s
ite/farshid83site/ - شاخه دانشجویي انجمن رمز ایران در دانشگاه صنعتی شریفشاخه دانشجوئی انجمن رمز ایران در دانشگاه صنعتی شریفhttps://sites.google.com/s
ite/sbisc4sut/ - فراامنیتمدیریت حل سیستم فراتر از امنیتhttps://sites.google.com/
site/xtra4security/
Wednesday, November 8, 2017
Google Sites
Thursday, November 2, 2017
Sites@psu.edu
Optical CDMA Network Simulator (OCNS)
Persian Boy Names
Persian Girl Names
Extended Authentication and Key Agreement Protocol
Secure Multipath Adaptive Routing Protocol
Authentication and Key Agreement Protocol in 4G
Risk of attack coefficient effect on availability of adhoc networks
Game-theoretic model to mitigate packet dropping
Multi-dimensional correlation steganalysis
SVD and Noise Estimation based Image Steganalysis
Eigenvalues-based LSB steganalysis
Security Weaknesses in PGP Protocol
Performance Modeling and Optimization of MapReduce
Image Steganalysis of Low Rate Embedding in Spatial Domain
Modeling and Optimization of Straggling Mappers
Blind detection of low-rate embedding
Big Data Computing: Modeling and Optimization
Towards Stochastically Optimizing Data Computing Flows
Optimal Placement in Network On-Chip
Optimal Scheduling in Parallel Programming Frameworks
Node Architecture and Cloud Workload Characteristics Analysis
Thumbnail Generation by Smart Cropping
Stochastic Modeling and Optimization of Stragglers
Chinese Academy of Sciences
Vanishing Point Detection in Photo Composition Analysis
Aesthetic Rating for Photos
Shape matching for automated bow echo detection
Detecting Dominant Vanishing Points in Natural Scenes
Skeleton Matching for Severe Weather Detection
Discovering Triangles in Portraits and Landscapes
Leveraging big visual data to predict severe weather
IAAP Scholarship Award
Deep-learned Models and Photography Idea Retrieval
Maryam Mirzakhani, the mother who won Fields Medal
Calculate AT&T Shares in a Shared Data Plan
Travel Grant from CSE Department
CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment
Tuesday, October 10, 2017
Wednesday, September 27, 2017
personal.psu.edu/fuf111
Publications
Discovering Triangles in Portraits for Supporting Photographic Creation, S He, Z Zhou, F Farhat, JZ Wang, IEEE Transactions on Multimedia, Aug 2017.
Intelligent Portrait Composition Assistance — Integrating Deep-learned Models and Photography Idea Retrieval, F Farhat, MM Kamani, S Mishra, JZ Wang, July 2017.
Skeleton Matching with Applications in Severe Weather Detection, MM Kamani, F Farhat, S Wistar, JZ Wang, Applied Soft Computing, May 2017.
Detecting Dominant Vanishing Points in Natural Scenes with Application to Composition-Sensitive Image Retrieval, Z Zhou, F Farhat, JZ Wang, IEEE Transactions on Multimedia, May 2017.
Shape matching using skeleton context for automated bow echo detection, MM Kamani, F Farhat, S Wistar, JZ Wang, Big Data (Big Data), 2016 IEEE International Conference on, 901-908, Dec 2016.
Detecting Vanishing Points in Natural Scenes with Application in Photo Composition Analysis, Z Zhou, F Farhat, JZ Wang, arXiv preprint arXiv:1608.04267, 2016.
Optimal Placement of Cores, Caches and Memory Controllers in Network On-Chip, DZ Tootaghaj, F Farhat, arXiv preprint arXiv:1607.04298, 2016.
Towards Stochastically Optimizing Data Computing Flows, F Farhat, DZ Tootaghaj, M Arjomand, arXiv preprint arXiv:1607.04334, 2016.
Stochastic Modeling and Optimization of Stragglers, F Farhat, D Zad Tootaghaj, Y He, et al. IEEE Transaction on Cloud Computing, 2016.
Fork-Join Queue Modeling and Optimal Scheduling in Parallel Programming Frameworks, F Farhat, EECS Thesis, The Pennsylvania State University, 2015.
Evaluating the Combined Impact of Node Architecture and Cloud Workload Characteristics on Network Traffic and Performance/Cost, DZ Tootaghaj, F Farhat, M Arjomand, P Faraboschi et al. Workload characterization (IISWC), 2015 IEEE international symposium on, 203-212, 2015.
Towards blind detection of low-rate spatial embedding in image steganalysis, F Farhat, S Ghaemmaghami, IET Image Processing 9 (1), 31-42, 2015.
Modeling and optimization of straggling mappers, F Farhat, DZ Tootaghaj, A Sivasubramaniam, MT Kandemir, CR Das, Technical report, Technical Report CSE-14-006, Pennsylvania State University, 2014.
Security Weaknesses in PGP Protocol, F Farhat, M Heydari, MR Aref, 2013.
Eigenvalues-based LSB steganalysis, F Farhat, A Diyanat, S Ghaemmaghami, MR Aref, The ISC International Journal of Information Security 4 (2), 97-106, 2012.
Image steganalysis based on SVD and noise estimation: Improve sensitivity to spatial LSB embedding families, A Diyanat, F Farhat, S Ghaemmaghami, TENCON 2011-2011 IEEE Region 10 Conference, 1266-1270, 2011.
Multi-dimensional correlation steganalysis, F Farhat, A Diyanat, S Ghaemmaghami, MR Aref, Multimedia Signal Processing (MMSP), 2011 IEEE 13th International Workshop, 2011.
Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks, DZ Tootaghaj, F Farhat, MR Pakravan, MR Aref, Consumer Communications and Networking Conference (CCNC), 2011 IEEE, 163-165, 2011.
Risk of attack coefficient effect on availability of Ad-hoc networks, DZ Tootaghaj, F Farhat, MR Pakravan, MR Aref, Consumer Communications and Networking Conference (CCNC), 2011 IEEE, 166-168, 2011.
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup, F Farhat, S Salimi, A Salahi, IACR Cryptology ePrint Archive, 2011.
Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes, F Farhat, MR Pakravan, M Salmasizadeh, MR Aref, International Conference on Information Security Practice and Experience, 2010.
An Extended Authentication and Key Agreement Protocol of UMTS, F Farhat, S Salimi, A Salahi, International Conference on Information Security Practice and Experience, 2009.
Click HOME to go to main page!
Friday, September 22, 2017
Authentication and Key Agreement Protocol in 4G
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup
Farshid Farhat, Somayeh Salimi, Ahmad Salahi
Abstract
Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient bandwidth consumption. In this article we consider UMTS AKA and some other proposed schemes. Then we explain the known weaknesses of the previous frameworks suggested for the UMTS AKA protocol. After that we propose a new protocol called private identification, authentication, and key agreement protocol (PIAKAP), for UMTS mobile network. Our suggested protocol combines identification and AKA stages of UMTS AKA protocol while eliminates disadvantages of related works and brings some new features to improve the UMTS AKA mechanism. These features consist of reducing the interactive rounds of the UMTS AKA with security mode setup and user privacy establishment.
Full manuscript > piakap
Thursday, August 17, 2017
Sites@PennState
Big Visual Data Computing, Image Retrieval and Deep Learning, Smart Cropping, Aesthetic Scoring, Portrait Photography, Computer Vision and Pattern Recognition, Distributed and Parallel Systems, Network Security
Thursday, August 10, 2017
Deep Learning in Photography
Intelligent Portrait Composition Assistance, Farshid Farhat, Mohammad Mahdi Kamani, Sahil Mishra, James Wang, ACM Multimedia 2017, Mountain View, CA, USA.
ABSTRACT: Retrieving photography ideas corresponding to a given location facilitates the usage of smart cameras, where there is a high interest among amateurs and enthusiasts to take astonishing photos at anytime and in any location. Existing research captures some aesthetic techniques such as the rule of thirds, triangle, and perspective-ness, and retrieves useful feedbacks based on one technique. However, they are restricted to a particular technique and the retrieved results have room to improve as they can be limited to the quality of the query. There is a lack of a holistic framework to capture important aspects of a given scene and give a novice photographer informative feedback to take a better shot in his/her photography adventure. This work proposes an intelligent framework of portrait composition using our deep-learned models and image retrieval methods. A highly-rated web-crawled portrait dataset is exploited for retrieval purposes. Our framework detects and extracts ingredients of a given scene representing as a correlated hierarchical model. It then matches extracted semantics with the dataset of aesthetically composed photos to investigate a ranked list of photography ideas, and gradually optimizes the human pose and other artistic aspects of the composed scene supposed to be captured. The conducted user study demonstrates that our approach is more helpful than the other constructed feedback retrieval systems.
Saturday, July 15, 2017
Maryam Mirzakhani
Monday, July 10, 2017
Deep Learning @ Penn State
Integrating Deep-learned Models and Photography Idea Retrieval
Tuesday, May 2, 2017
EECS @ Penn State
Publications
- Detecting Dominant Vanishing Points in Natural Scenes with Application to Composition-Sensitive Image Retrieval, Z Zhou, F Farhat, JZ Wang, IEEE Transactions on Multimedia, 2017. [code][dataset]
- Shape matching using skeleton context for automated bow echo detection, MM Kamani, F Farhat, S Wistar, JZ Wang, Big Data (Big Data), 2016 IEEE International Conference on, 901-908, 2016.
- Detecting Vanishing Points in Natural Scenes with Application in Photo Composition Analysis, Z Zhou, F Farhat, JZ Wang, arXiv preprint arXiv:1608.04267, 2016.
- Optimal Placement of Cores, Caches and Memory Controllers in Network On-Chip, DZ Tootaghaj, F Farhat, arXiv preprint arXiv:1607.04298, 2016.
- Towards Stochastically Optimizing Data Computing Flows, F Farhat, DZ Tootaghaj, M Arjomand, arXiv preprint arXiv:1607.04334, 2016.
- Stochastic Modeling and Optimization of Stragglers, F Farhat, D Zad Tootaghaj, Y He, et al. IEEE Transaction on Cloud Computing, 14, 6, 2016.
- Stochastic modeling and optimization of stragglers in mapreduce framework, F Farhat, The Pennsylvania State University, 2015.
- Evaluating the Combined Impact of Node Architecture and Cloud Workload Characteristics on Network Traffic and Performance/Cost, DZ Tootaghaj, F Farhat, M Arjomand, P Faraboschi et al. Workload characterization (IISWC), 2015 IEEE international symposium on, 203-212, 2015.
- Towards blind detection of low-rate spatial embedding in image steganalysis, F Farhat, S Ghaemmaghami, IET Image Processing 9 (1), 31-42, 2015.
- Modeling and optimization of straggling mappers, F Farhat, DZ Tootaghaj, A Sivasubramaniam, MT Kandemir, CR Das, Technical report, Technical Report CSE-14-006, Pennsylvania State University, 2014.
- Security Weaknesses in PGP Protocol, F Farhat, M Heydari, MR Aref, 2013.
- Eigenvalues-based LSB steganalysis, F Farhat, A Diyanat, S Ghaemmaghami, MR Aref, The ISC International Journal of Information Security 4 (2), 97-106, 2012.
- Image steganalysis based on SVD and noise estimation: Improve sensitivity to spatial LSB embedding families, A Diyanat, F Farhat, S Ghaemmaghami, TENCON 2011-2011 IEEE Region 10 Conference, 1266-1270, 2011.
- Multi-dimensional correlation steganalysis, F Farhat, A Diyanat, S Ghaemmaghami, MR Aref, Multimedia Signal Processing (MMSP), 2011 IEEE 13th International Workshop, 2011.
- Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks, DZ Tootaghaj, F Farhat, MR Pakravan, MR Aref, Consumer Communications and Networking Conference (CCNC), 2011 IEEE, 163-165, 2011.
- Risk of attack coefficient effect on availability of Ad-hoc networks, DZ Tootaghaj, F Farhat, MR Pakravan, MR Aref, Consumer Communications and Networking Conference (CCNC), 2011 IEEE, 166-168, 2011.
- Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup, F Farhat, S Salimi, A Salahi, IACR Cryptology ePrint Archive, 2011.
- Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes, F Farhat, MR Pakravan, M Salmasizadeh, MR Aref, International Conference on Information Security Practice and Experience, 2010.
- An Extended Authentication and Key Agreement Protocol of UMTS, F Farhat, S Salimi, A Salahi, International Conference on Information Security Practice and Experience, 2009.