Search

Your search keyword '"Khorrami, Farshad"' showing total 376 results

Search Constraints

Start Over You searched for: Author "Khorrami, Farshad" Remove constraint Author: "Khorrami, Farshad"
376 results on '"Khorrami, Farshad"'

Search Results

1. Data-Efficient System Identification via Lipschitz Neural Networks

2. Collision Avoidance for Convex Primitives via Differentiable Optimization Based High-Order Control Barrier Functions

3. OrionNav: Online Planning for Robot Autonomy with Context-Aware LLM and Open-Vocabulary Semantic Scene Graphs

4. EMMA: Efficient Visual Alignment in Multi-Modal LLMs

5. FlashMix: Fast Map-Free LiDAR Localization via Feature Mixing and Contrastive-Constrained Accelerated Training

6. MultiTalk: Introspective and Extrospective Dialogue for Human-Environment-LLM Alignment

7. EnIGMA: Enhanced Interactive Generative Model Agent for CTF Challenges

8. Combining Switching Mechanism with Re-Initialization and Anomaly Detection for Resiliency of Cyber-Physical Systems

9. HiFi-CS: Towards Open Vocabulary Visual Grounding For Robotic Grasping Using Vision-Language Models

10. Robotic Shepherding in Cluttered and Unknown Environments using Control Barrier Functions

11. SENTAUR: Security EnhaNced Trojan Assessment Using LLMs Against Undesirable Revisions

12. SALSA: Swift Adaptive Lightweight Self-Attention for Enhanced LiDAR Place Recognition

13. Efficient and Distributed Large-Scale 3D Map Registration using Tomographic Features

14. Tracking Real-time Anomalies in Cyber-Physical Systems Through Dynamic Behavioral Analysis

15. NYU CTF Dataset: A Scalable Open-Source Benchmark Dataset for Evaluating LLMs in Offensive Security

16. CLIPScope: Enhancing Zero-Shot OOD Detection with Bayesian Scoring

17. Prescribed-Time Stability Properties of Interconnected Systems

18. OffRAMPS: An FPGA-based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems

19. Sailing Through Point Clouds: Safe Navigation Using Point Cloud Based Control Barrier Functions

20. Confidence-Aware Safe and Stable Control of Control-Affine Systems

21. On the (In)feasibility of ML Backdoor Detection as an Hypothesis Testing Problem

22. Grounding LLMs For Robot Task Planning Using Closed-loop State Feedback

23. Novel Quadratic Constraints for Extending LipSDP beyond Slope-Restricted Activations

24. LipSim: A Provably Robust Perceptual Similarity Metric

25. Learning a Better Control Barrier Function Under Uncertain Dynamics

26. Differentiable Optimization Based Time-Varying Control Barrier Functions for Dynamic Obstacle Avoidance

27. High-Dimensional Controller Tuning through Latent Representations

28. Safe Aerial Manipulator Maneuvering and Force Exertion via Control Barrier Functions

29. R-LPIPS: An Adversarially Robust Perceptual Similarity Metric

30. Using Circulation to Mitigate Spurious Equilibria in Control Barrier Function -- Extended Version

31. Differential Analysis of Triggers and Benign Features for Black-Box DNN Backdoor Detection

32. Towards Better Certified Segmentation via Diffusion Models

35. REMaQE: Reverse Engineering Math Equations from Executables

36. State Constrained Stochastic Optimal Control for Continuous and Hybrid Dynamical Systems Using DFBSDE

37. Safe Navigation and Obstacle Avoidance Using Differentiable Optimization Based Control Barrier Functions

38. Neural Lyapunov Control for Nonlinear Systems with Unstructured Uncertainties

39. Data-Driven Deep Learning Based Feedback Linearization of Systems with Unknown Dynamics

40. Data-Efficient Control Barrier Function Refinement

41. A Deep Neural Network Algorithm for Linear-Quadratic Portfolio Optimization with MGARCH and Small Transaction Costs

42. An Upper Bound for the Distribution Overlap Index and Its Applications

43. Privacy-Preserving Collaborative Learning through Feature Extraction

45. Modular Multi-Copter Structure Control for Cooperative Aerial Cargo Transportation

46. Matrix Pencil Based On-Line Computation of Controller Parameters in Dynamic High-Gain Scaling Controllers for Strict-Feedback Systems

47. Learning a Better Control Barrier Function

48. Pop Quiz! Can a Large Language Model Help With Reverse Engineering?

49. ESAFE: Enterprise Security and Forensics at Scale

Catalog

Books, media, physical & digital resources