Jun 2024
I currently work as a research assistant in the machine learning laboratory (MLL) under the supervision of
Dr. Soleymani Baghshah and
Dr. Rohban.
Our main focus is on backdoor attacks. We developed a simple multi-trigger attack that can bypass Anti-Backdoor Learning, a state-of-the-art defense.
Jan 2023 Mar 2024
I worked as a software engineer at Snapp.
Snapp is the leading company in providing online taxi services with over 30 million users in Iran. As part of the Routing team, we were responsible for providing estimated time of arrival (ETA) and navigation services.
Here are some of the things I did:
Jun 2023 Sep 2023
I worked as a research assistant at the algorithms, graphs, and machine learning laboratory (AGML) under the supervision of Dr. Rahmati.
During this time, I studied machine learning with graphs. Our primary focus was on knowledge graph embeddings and their applications within drug interaction networks.
Sep 2020 Jan 2025
BSc at the Amirkabir University of Technology (Tehran Polytechnic) majoring in computer science.
I ranked in the top three students on multiple occasions due to cumulative GPA. So far I have graded 18.71 / 20.
pet projects
JNotes
Contains implementation of a diverse array of deep learning algorithms in Pytorch, Including GAN, VAE, DDPM, LSTM, and GPT architectures,
along with applications of CLIP, DINO, and StableDiffusion.
EvoluCopter
is an evolutionary agent that masters a simplistic helicopter game using genetic algorithms and neural network.
Diff-Net
is a tiny neural network framework that works with reverese mode automatic differentiation.
camel
is an interpreted programming language written in Golang. It supports arrays, dictionaries, functions, and closures.
JClash
is a clone of the game Clash Royale in Java.
xv6
is a fork of xv6 operating system that supports copy-on-write and lazy page allocation.
coyote
is a routing engine that uses Dijkstra, A*, and ATL algorithms to compute the shortest path on a road network.
visual cryptography
is a cryptographic technique which allows visual image to be encrypted in such a way that the decrypted information is a visual image.
misc unsorted
|