Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 69 results for author: Khalil, I

.
  1. arXiv:2408.03335  [pdf, other

    cs.CR cs.AI

    Explainable AI-based Intrusion Detection System for Industry 5.0: An Overview of the Literature, associated Challenges, the existing Solutions, and Potential Research Directions

    Authors: Naseem Khan, Kashif Ahmad, Aref Al Tamimi, Mohammed M. Alani, Amine Bermak, Issa Khalil

    Abstract: Industry 5.0, which focuses on human and Artificial Intelligence (AI) collaboration for performing different tasks in manufacturing, involves a higher number of robots, Internet of Things (IoTs) devices and interconnections, Augmented/Virtual Reality (AR), and other smart devices. The huge involvement of these devices and interconnection in various critical areas, such as economy, health, educatio… ▽ More

    Submitted 21 July, 2024; originally announced August 2024.

    Comments: 57 pages, 6 figures

  2. arXiv:2406.16986  [pdf, ps, other

    cs.LG cs.AI cs.CR

    Machine Unlearning with Minimal Gradient Dependence for High Unlearning Ratios

    Authors: Tao Huang, Ziyang Chen, Jiayang Meng, Qingyu Huang, Xu Yang, Xun Yi, Ibrahim Khalil

    Abstract: In the context of machine unlearning, the primary challenge lies in effectively removing traces of private data from trained models while maintaining model performance and security against privacy attacks like membership inference attacks. Traditional gradient-based unlearning methods often rely on extensive historical gradients, which becomes impractical with high unlearning ratios and may reduce… ▽ More

    Submitted 23 June, 2024; originally announced June 2024.

  3. arXiv:2310.16625  [pdf, other

    eess.SP

    Power Optimization in Satellite Communication Using Multi-Intelligent Reflecting Surfaces

    Authors: Muhammad Ihsan Khalil

    Abstract: This study introduces two innovative methodologies aimed at augmenting energy efficiency in satellite-to-ground communication systems through the integration of multiple Reflective Intelligent Surfaces (RISs). The primary objective of these methodologies is to optimize overall energy efficiency under two distinct scenarios. In the first scenario, denoted as Ideal Environment (IE), we enhance energ… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

  4. arXiv:2308.11754  [pdf, other

    cs.CR cs.AI

    Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection

    Authors: Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma

    Abstract: Malicious domain detection (MDD) is an open security challenge that aims to detect if an Internet domain is associated with cyber-attacks. Among many approaches to this problem, graph neural networks (GNNs) are deemed highly effective. GNN-based MDD uses DNS logs to represent Internet domains as nodes in a maliciousness graph (DMG) and trains a GNN to infer their maliciousness by leveraging identi… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

    Comments: To Appear in the 45th IEEE Symposium on Security and Privacy (IEEE S\&P 2024), May 20-23, 2024

  5. Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System

    Authors: Ziaur Rahman, Xun Yi, Ibrahim Khalil, Adnan Anwar, Shantanu Pal

    Abstract: Since the beginning of this decade, several incidents report that false data injection attacks targeting intelligent connected vehicles cause huge industrial damage and loss of lives. Data Theft, Flooding, Fuzzing, Hijacking, Malware Spoofing and Advanced Persistent Threats have been immensely growing attack that leads to end-user conflict by abolishing trust on autonomous vehicle. Looking after t… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: 11 pages, 11 figures, 4 tables AsiaCCS conference 2023

    MSC Class: 11T71; 68T05 ACM Class: E.3.1; I.2.1

    Journal ref: ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2023)

  6. arXiv:2308.05452  [pdf, other

    eess.SP

    Optimizing Reconfigurable Intelligent Surfaces for Improved Space-based Communication Amidst Phase Shift Errors

    Authors: Muhammad I Khalil

    Abstract: Reconfigurable Intelligent Surfaces (RISs) have emerged as a promising technology for enhancing satellite communication systems by manipulating the phase of electromagnetic waves. This study addresses optimising phase shift values (φ_{R}) in RIS networks under both ideal and non-ideal conditions. For ideal scenarios, we introduce a novel approach that simplifies the traditional optimisation method… ▽ More

    Submitted 10 August, 2023; originally announced August 2023.

    Comments: Ten pages

  7. arXiv:2305.16474  [pdf, other

    cs.LG cs.CR cs.CY

    FairDP: Certified Fairness with Differential Privacy

    Authors: Khang Tran, Ferdinando Fioretto, Issa Khalil, My T. Thai, NhatHai Phan

    Abstract: This paper introduces FairDP, a novel mechanism designed to achieve certified fairness with differential privacy (DP). FairDP independently trains models for distinct individual groups, using group-specific clipping terms to assess and bound the disparate impacts of DP. Throughout the training process, the mechanism progressively integrates knowledge from group models to formulate a comprehensive… ▽ More

    Submitted 21 August, 2023; v1 submitted 25 May, 2023; originally announced May 2023.

  8. Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence

    Authors: Veronika Stephanie, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman

    Abstract: We propose a privacy-preserving ensemble infused enhanced Deep Neural Network (DNN) based learning framework in this paper for Internet-of-Things (IoT), edge, and cloud convergence in the context of healthcare. In the convergence, edge server is used for both storing IoT produced bioimage and hosting DNN algorithm for local model training. The cloud is used for ensembling local models. The DNN-bas… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

    Journal ref: IEEE Internet of Things Journal, vol. 10, no. 5, pp. 3763-3773, 1 March1, 2023

  9. Trustworthy Privacy-preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 with Blockchain

    Authors: Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi

    Abstract: The advancement of Internet and Communication Technologies (ICTs) has led to the era of Industry 4.0. This shift is followed by healthcare industries creating the term Healthcare 4.0. In Healthcare 4.0, the use of IoT-enabled medical imaging devices for early disease detection has enabled medical practitioners to increase healthcare institutions' quality of service. However, Healthcare 4.0 is stil… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

    Journal ref: IEEE Transactions on Industrial Informatics, 2022

  10. Smart Policy Control for Securing Federated Learning Management System

    Authors: Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammed Atiquzzaman

    Abstract: The widespread adoption of Internet of Things (IoT) devices in smart cities, intelligent healthcare systems, and various real-world applications have resulted in the generation of vast amounts of data, often analyzed using different Machine Learning (ML) models. Federated learning (FL) has been acknowledged as a privacy-preserving machine learning technology, where multiple parties cooperatively t… ▽ More

    Submitted 18 May, 2023; v1 submitted 15 May, 2023; originally announced May 2023.

    Journal ref: IEEE Transactions on Network and Service Management, 2023

  11. Blockchain-based Access Control for Secure Smart Industry Management Systems

    Authors: Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Abdelaziz Bouras

    Abstract: Smart manufacturing systems involve a large number of interconnected devices resulting in massive data generation. Cloud computing technology has recently gained increasing attention in smart manufacturing systems for facilitating cost-effective service provisioning and massive data management. In a cloud-based manufacturing system, ensuring authorized access to the data is crucial. A cloud platfo… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Journal ref: Network and System Security: 16th International Conference, NSS 2022, Denarau Island, Fiji, December, 2022

  12. Blockchain-based Federated Learning with SMPC Model Verification Against Poisoning Attack for Healthcare Systems

    Authors: Aditya Pribadi Kalapaaking, Ibrahim Khalil, Xun Yi

    Abstract: Due to the rising awareness of privacy and security in machine learning applications, federated learning (FL) has received widespread attention and applied to several areas, e.g., intelligence healthcare systems, IoT-based industries, and smart cities. FL enables clients to train a global model collaboratively without accessing their local training data. However, the current FL schemes are vulnera… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

  13. SMPC-based Federated Learning for 6G enabled Internet of Medical Things

    Authors: Aditya Pribadi Kalapaaking, Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor

    Abstract: Rapidly developing intelligent healthcare systems are underpinned by Sixth Generation (6G) connectivity, ubiquitous Internet of Things (IoT), and Deep Learning (DL) techniques. This portends a future where 6G powers the Internet of Medical Things (IoMT) with seamless, large-scale, and real-time connectivity amongst entities. This article proposes a Convolutional Neural Network (CNN) based Federate… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Journal ref: IEEE Network, vol. 36, no. 4, pp. 182-189, July/August 2022

  14. Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things

    Authors: Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor

    Abstract: This paper proposes a blockchain-based Federated Learning (FL) framework with Intel Software Guard Extension (SGX)-based Trusted Execution Environment (TEE) to securely aggregate local models in Industrial Internet-of-Things (IIoTs). In FL, local models can be tampered with by attackers. Hence, a global model generated from the tampered local models can be erroneous. Therefore, the proposed framew… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Journal ref: IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp. 1703-1714, Feb. 2023

  15. arXiv:2304.08429   

    cs.CR

    Security and Privacy Issues for Urban Smart Traffic Infrastructure

    Authors: Anubhab Baksi, Ahmed Ibrahim Samir Khalil, Anupam Chattopadhyay

    Abstract: In recent times, the research works relating to smart traffic infrastructure have gained serious attention. As a result, research has been carried out in multiple directions to ensure that such infrastructure can improve upon our existing (mostly) human-controlled traffic infrastructure, without violating the safety margins. For this reason, cyber security issues of such infrastructure are of para… ▽ More

    Submitted 27 September, 2023; v1 submitted 17 April, 2023; originally announced April 2023.

    Comments: The study is partly outdated

  16. arXiv:2212.14102  [pdf, other

    cs.LG cs.AI cs.CL cs.CY q-bio.QM

    Customizing Knowledge Graph Embedding to Improve Clinical Study Recommendation

    Authors: Xiong Liu, Iya Khalil, Murthy Devarakonda

    Abstract: Inferring knowledge from clinical trials using knowledge graph embedding is an emerging area. However, customizing graph embeddings for different use cases remains a significant challenge. We propose custom2vec, an algorithmic framework to customize graph embeddings by incorporating user preferences in training the embeddings. It captures user preferences by adding custom nodes and links derived f… ▽ More

    Submitted 28 December, 2022; originally announced December 2022.

  17. arXiv:2212.04951  [pdf, other

    eess.SP cs.HC cs.LG q-bio.NC

    EEG-NeXt: A Modernized ConvNet for The Classification of Cognitive Activity from EEG

    Authors: Andac Demir, Iya Khalil, Bulent Kiziltan

    Abstract: One of the main challenges in electroencephalogram (EEG) based brain-computer interface (BCI) systems is learning the subject/session invariant features to classify cognitive activities within an end-to-end discriminative setting. We propose a novel end-to-end machine learning pipeline, EEG-NeXt, which facilitates transfer learning by: i) aligning the EEG trials from different subjects in the Eucl… ▽ More

    Submitted 8 December, 2022; originally announced December 2022.

  18. arXiv:2211.05766  [pdf, other

    cs.LG cs.CR

    Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks

    Authors: Khang Tran, Phung Lai, NhatHai Phan, Issa Khalil, Yao Ma, Abdallah Khreishah, My Thai, Xintao Wu

    Abstract: Graph neural networks (GNNs) are susceptible to privacy inference attacks (PIAs), given their ability to learn joint representation from features and edges among nodes in graph data. To prevent privacy leakages in GNNs, we propose a novel heterogeneous randomized response (HeteroRR) mechanism to protect nodes' features and edges against PIAs under differential privacy (DP) guarantees without an un… ▽ More

    Submitted 10 November, 2022; originally announced November 2022.

    Comments: Accepted in IEEE BigData 2022 (short paper)

  19. arXiv:2210.01797  [pdf, other

    cs.LG cs.AI cs.IR

    Ten Years after ImageNet: A 360° Perspective on AI

    Authors: Sanjay Chawla, Preslav Nakov, Ahmed Ali, Wendy Hall, Issa Khalil, Xiaosong Ma, Husrev Taha Sencar, Ingmar Weber, Michael Wooldridge, Ting Yu

    Abstract: It is ten years since neural networks made their spectacular comeback. Prompted by this anniversary, we take a holistic perspective on Artificial Intelligence (AI). Supervised Learning for cognitive tasks is effectively solved - provided we have enough high-quality labeled data. However, deep neural network models are not easily interpretable, and thus the debate between blackbox and whitebox mode… ▽ More

    Submitted 30 September, 2022; originally announced October 2022.

  20. arXiv:2209.13848  [pdf

    cs.CV cs.AI

    Deep Learning based Automatic Quantification of Urethral Plate Quality using the Plate Objective Scoring Tool (POST)

    Authors: Tariq O. Abbas, Mohamed AbdelMoniem, Ibrahim Khalil, Md Sakib Abrar Hossain, Muhammad E. H. Chowdhury

    Abstract: Objectives: To explore the capacity of deep learning algorithm to further streamline and optimize urethral plate (UP) quality appraisal on 2D images using the plate objective scoring tool (POST), aiming to increase the objectivity and reproducibility of UP appraisal in hypospadias repair. Methods: The five key POST landmarks were marked by specialists in a 691-image dataset of prepubertal boys und… ▽ More

    Submitted 28 September, 2022; originally announced September 2022.

    Comments: 20 pages, 5 figures, 1 table

  21. arXiv:2209.01721  [pdf, other

    cs.CR cs.CV

    An Adaptive Black-box Defense against Trojan Attacks (TrojDef)

    Authors: Guanxiong Liu, Abdallah Khreishah, Fatima Sharadgah, Issa Khalil

    Abstract: Trojan backdoor is a poisoning attack against Neural Network (NN) classifiers in which adversaries try to exploit the (highly desirable) model reuse property to implant Trojans into model parameters for backdoor breaches through a poisoned training process. Most of the proposed defenses against Trojan attacks assume a white-box setup, in which the defender either has access to the inner state of N… ▽ More

    Submitted 4 September, 2022; originally announced September 2022.

  22. arXiv:2206.05679  [pdf, other

    cs.CR

    Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior

    Authors: Enes Altinisik, Husrev Taha Sencar, Mohamed Nabeel, Issa Khalil, Ting Yu

    Abstract: Enterprise networks are one of the major targets for cyber attacks due to the vast amount of sensitive and valuable data they contain. A common approach to detecting attacks in the enterprise environment relies on modeling the behavior of users and systems to identify unexpected deviations. The feasibility of this approach crucially depends on how well attack-related events can be isolated from be… ▽ More

    Submitted 12 June, 2022; originally announced June 2022.

  23. arXiv:2205.13155  [pdf, other

    cs.CR

    A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs

    Authors: Euijin Choo, Mohamed Nabeel, Ravindu De Silva, Ting Yu, Issa Khalil

    Abstract: VirusTotal (VT) provides aggregated threat intelligence on various entities including URLs, IP addresses, and binaries. It is widely used by researchers and practitioners to collect ground truth and evaluate the maliciousness of entities. In this work, we provide a comprehensive analysis of VT URL scanning reports containing the results of 95 scanners for 1.577 Billion URLs over two years. Individ… ▽ More

    Submitted 26 May, 2022; originally announced May 2022.

  24. arXiv:2204.02654  [pdf, other

    cs.CR cs.DC

    Adversarial Analysis of the Differentially-Private Federated Learning in Cyber-Physical Critical Infrastructures

    Authors: Md Tamjid Hossain, Shahriar Badsha, Hung La, Haoting Shen, Shafkat Islam, Ibrahim Khalil, Xun Yi

    Abstract: Federated Learning (FL) has become increasingly popular to perform data-driven analysis in cyber-physical critical infrastructures. Since the FL process may involve the client's confidential information, Differential Privacy (DP) has been proposed lately to secure it from adversarial inference. However, we find that while DP greatly alleviates the privacy concerns, the additional DP-noise opens a… ▽ More

    Submitted 1 December, 2022; v1 submitted 6 April, 2022; originally announced April 2022.

    Comments: 16 pages, 9 figures, 5 tables. This work has been submitted to IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  25. arXiv:2202.06053  [pdf, other

    cs.CR cs.DB

    Local Differential Privacy for Federated Learning

    Authors: M. A. P. Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertok, Ibrahim Khalil

    Abstract: Advanced adversarial attacks such as membership inference and model memorization can make federated learning (FL) vulnerable and potentially leak sensitive private data. Local differentially private (LDP) approaches are gaining more popularity due to stronger privacy notions and native support for data distribution compared to other differentially private (DP) solutions. However, DP approaches ass… ▽ More

    Submitted 3 August, 2022; v1 submitted 12 February, 2022; originally announced February 2022.

    Comments: 17 pages

  26. Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat

    Authors: Ziaur Rahman, Xun Yi Ibrahim Khalil

    Abstract: Industry 4.0 is all about doing things in a concurrent, secure, and fine-grained manner. IoT edge-sensors and their associated data play a predominant role in today's industry ecosystem. Breaching data or forging source devices after injecting advanced persistent threats (APT) damages the industry owners' money and loss of operators' lives. The existing challenges include APT injection attacks tar… ▽ More

    Submitted 30 January, 2022; originally announced January 2022.

    Comments: 10 Pages, 9 Figures, 3 Tables Published in the IEEE Internet of Things Journal

    ACM Class: I.2; J.6

    Journal ref: IEEE Internet of Things Journal Jan 2022

  27. arXiv:2201.07063  [pdf, other

    cs.LG cs.CR

    How to Backdoor HyperNetwork in Personalized Federated Learning?

    Authors: Phung Lai, NhatHai Phan, Issa Khalil, Abdallah Khreishah, Xintao Wu

    Abstract: This paper explores previously unknown backdoor risks in HyperNet-based personalized federated learning (HyperNetFL) through poisoning attacks. Based upon that, we propose a novel model transferring attack (called HNTroj), i.e., the first of its kind, to transfer a local backdoor infected model to all legitimate and personalized local models, which are generated by the HyperNetFL model, through co… ▽ More

    Submitted 11 December, 2023; v1 submitted 18 January, 2022; originally announced January 2022.

  28. arXiv:2112.11547  [pdf, other

    cs.CV cs.AI cs.LG cs.MM

    Decompose the Sounds and Pixels, Recompose the Events

    Authors: Varshanth R. Rao, Md Ibrahim Khalil, Haoda Li, Peng Dai, Juwei Lu

    Abstract: In this paper, we propose a framework centering around a novel architecture called the Event Decomposition Recomposition Network (EDRNet) to tackle the Audio-Visual Event (AVE) localization problem in the supervised and weakly supervised settings. AVEs in the real world exhibit common unravelling patterns (termed as Event Progress Checkpoints (EPC)), which humans can perceive through the cooperati… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

    Comments: Accepted at AAAI 2022

  29. Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security

    Authors: Ziaur Rahman, Xun Yi, Ibrahim Khalil, Mousumi Sumi

    Abstract: Several efforts have been seen claiming the lightweight block ciphers as a necessarily suitable substitute in securing the Internet of Things. Currently, it has been able to envisage as a pervasive frame of reference almost all across the privacy preserving of smart and sensor-oriented appliances. Different approaches are likely to be inefficient, bringing desired degree of security considering th… ▽ More

    Submitted 22 November, 2021; originally announced November 2021.

    Comments: 17 Pages, 3 Tables, 7 Figures, Conference

    ACM Class: H.4.1

  30. Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability

    Authors: Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev

    Abstract: The world has been experiencing a mind-blowing expansion of blockchain technology since it was first introduced as an emerging means of cryptocurrency called bitcoin. Currently, it has been regarded as a pervasive frame of reference across almost all research domains, ranging from virtual cash to agriculture or even supply-chain to the Internet of Things. The ability to have a self-administering r… ▽ More

    Submitted 22 November, 2021; originally announced November 2021.

    Comments: 18 Pages, 9 Figures, 1 Table Conference

    ACM Class: H.1.1

  31. arXiv:2110.10027  [pdf

    q-bio.QM cs.CL cs.LG

    Clinical Trial Information Extraction with BERT

    Authors: Xiong Liu, Greg L. Hersch, Iya Khalil, Murthy Devarakonda

    Abstract: Natural language processing (NLP) of clinical trial documents can be useful in new trial design. Here we identify entity types relevant to clinical trial design and propose a framework called CT-BERT for information extraction from clinical trial text. We trained named entity recognition (NER) models to extract eligibility criteria entities by fine-tuning a set of pre-trained BERT models. We then… ▽ More

    Submitted 11 September, 2021; originally announced October 2021.

    Comments: HealthNLP 2021, IEEE International Conference on Healthcare Informatics (ICHI 2021)

  32. arXiv:2109.02808  [pdf, other

    cs.CL cs.AI cs.CY cs.LG q-bio.QM

    A Scalable AI Approach for Clinical Trial Cohort Optimization

    Authors: Xiong Liu, Cheng Shi, Uday Deore, Yingbo Wang, Myah Tran, Iya Khalil, Murthy Devarakonda

    Abstract: FDA has been promoting enrollment practices that could enhance the diversity of clinical trial populations, through broadening eligibility criteria. However, how to broaden eligibility remains a significant challenge. We propose an AI approach to Cohort Optimization (AICO) through transformer-based natural language processing of the eligibility criteria and evaluation of the criteria using real-wo… ▽ More

    Submitted 6 September, 2021; originally announced September 2021.

    Comments: PharML 2021 (Machine Learning for Pharma and Healthcare Applications) at the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD 2021)

  33. arXiv:2109.01275  [pdf, other

    cs.CR cs.LG

    A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples

    Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah, NhatHai Phan

    Abstract: In this work, we show how to jointly exploit adversarial perturbation and model poisoning vulnerabilities to practically launch a new stealthy attack, dubbed AdvTrojan. AdvTrojan is stealthy because it can be activated only when: 1) a carefully crafted adversarial perturbation is injected into the input examples during inference, and 2) a Trojan backdoor is implanted during the training process of… ▽ More

    Submitted 2 September, 2021; originally announced September 2021.

  34. Blockchain-based Security Framework for Critical Industry 4.0 Cyber-physical System

    Authors: Ziaur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman

    Abstract: There has been an intense concern for security alternatives because of the recent rise of cyber attacks, mainly targeting critical systems such as industry, medical, or energy ecosystem. Though the latest industry infrastructures largely depend on AI-driven maintenance, the prediction based on corrupted data undoubtedly results in loss of life and capital. Admittedly, an inadequate data-protection… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

    Comments: 07 Pages, 4 Figures, IEEE Communication Magazine

    ACM Class: E.3

    Journal ref: in IEEE Communications Magazine, vol. 59, no. 5, pp. 128-134, May 2021

  35. arXiv:2106.07466  [pdf, other

    physics.ins-det

    An open-source automated magnetic optical density meter for analysis of suspensions of magnetic cells and particles

    Authors: Marcel K. Welleweerd, Tijmen Hageman, Marc Pichel, Dave van As, Hans Keizer, Jordi Hendrix, Mina M. Micheal, Islam S. M. Khalil, Alveena Mir, Nuriye Korkmaz, Robbert Kräwinkel, Daniel Chevrier, Damien Faivre, Alfred Fernandez-Castane, Daniel Pfeiffer, Leon Abelmann

    Abstract: We present a spectrophotometer (optical density meter) combined with electromagnets dedicated to the analysis of suspensions of magnetotactic bacteria. The instrument can also be applied to suspensions of other magnetic cells and magnetic particles. We have ensured that our system, called MagOD, can be easily reproduced by providing the source of the 3D prints for the housing, electronic designs,… ▽ More

    Submitted 11 August, 2022; v1 submitted 9 June, 2021; originally announced June 2021.

  36. arXiv:2103.04673  [pdf, other

    cs.CR cs.SI

    Social Media Identity Deception Detection: A Survey

    Authors: Ahmed Alharbi, Hai Dong, Xun Yi, Zahir Tari, Ibrahim Khalil

    Abstract: Social media have been growing rapidly and become essential elements of many people's lives. Meanwhile, social media have also come to be a popular source for identity deception. Many social media identity deception cases have arisen over the past few years. Recent studies have been conducted to prevent and detect identity deception. This survey analyses various identity deception attacks, which c… ▽ More

    Submitted 22 April, 2021; v1 submitted 8 March, 2021; originally announced March 2021.

    Comments: Accepted for publication in ACM Computing Surveys

    Journal ref: ACM Computing Surveys (CSUR), 54(3), 1-35 (2021)

  37. arXiv:2012.13971  [pdf, other

    cs.LG cs.CR

    Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users

    Authors: Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, Sencun Zhu

    Abstract: Autoencoder-based anomaly detection methods have been used in identifying anomalous users from large-scale enterprise logs with the assumption that adversarial activities do not follow past habitual patterns. Most existing approaches typically build models by reconstructing single-day and individual-user behaviors. However, without capturing long-term signals and group-correlation signals, the mod… ▽ More

    Submitted 27 December, 2020; originally announced December 2020.

  38. arXiv:2012.10063  [pdf

    cs.CL cs.LG

    Attention-Based LSTM Network for COVID-19 Clinical Trial Parsing

    Authors: Xiong Liu, Luca A. Finelli, Greg L. Hersch, Iya Khalil

    Abstract: COVID-19 clinical trial design is a critical task in developing therapeutics for the prevention and treatment of COVID-19. In this study, we apply a deep learning approach to extract eligibility criteria variables from COVID-19 trials to enable quantitative analysis of trial design and optimization. Specifically, we train attention-based bidirectional Long Short-Term Memory (Att-BiLSTM) models and… ▽ More

    Submitted 18 December, 2020; originally announced December 2020.

    Journal ref: 2020 IEEE International Conference on Big Data (IEEE BigData 2020)

  39. arXiv:2011.06933  [pdf, other

    cs.CR cs.AI cs.GT

    Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems

    Authors: Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi

    Abstract: We model the behavioral biases of human decision-making in securing interdependent systems and show that such behavioral decision-making leads to a suboptimal pattern of resource allocation compared to non-behavioral (rational) decision-making. We provide empirical evidence for the existence of such behavioral bias model through a controlled subject study with 145 participants. We then propose thr… ▽ More

    Submitted 22 November, 2020; v1 submitted 12 November, 2020; originally announced November 2020.

    Comments: Accepted to appear at the 16th ACM Asia Conference on Computer and Communications Security (ASIACCS), 2021. arXiv admin note: text overlap with arXiv:2004.01958

  40. arXiv:2007.05817  [pdf, other

    cs.CR cs.LG stat.ML

    ManiGen: A Manifold Aided Black-box Generator of Adversarial Examples

    Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah, Abdulelah Algosaibi, Adel Aldalbahi, Mohammed Alaneem, Abdulaziz Alhumam, Mohammed Anan

    Abstract: Machine learning models, especially neural network (NN) classifiers, have acceptable performance and accuracy that leads to their wide adoption in different aspects of our daily lives. The underlying assumption is that these models are generated and used in attack free scenarios. However, it has been shown that neural network based classifiers are vulnerable to adversarial examples. Adversarial ex… ▽ More

    Submitted 11 July, 2020; originally announced July 2020.

  41. PPaaS: Privacy Preservation as a Service

    Authors: Pathum Chamikara Mahawaga Arachchige, Peter Bertok, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe

    Abstract: Personally identifiable information (PII) can find its way into cyberspace through various channels, and many potential sources can leak such information. Data sharing (e.g. cross-agency data sharing) for machine learning and analytics is one of the important components in data science. However, due to privacy concerns, data should be enforced with strong privacy guarantees before sharing. Differe… ▽ More

    Submitted 21 April, 2021; v1 submitted 4 July, 2020; originally announced July 2020.

  42. arXiv:2006.03208  [pdf, other

    eess.SP cs.DC

    Can the Multi-Incoming Smart Meter Compressed Streams be Re-Compressed?

    Authors: Sharif Abuadbba, Ayman Ibaida, Ibrahim Khalil, Naveen Chilamkurti, Surya Nepal, Xinghuo Yu

    Abstract: Smart meters have currently attracted attention because of their high efficiency and throughput performance. They transmit a massive volume of continuously collected waveform readings (e.g. monitoring). Although many compression models are proposed, the unexpected size of these compressed streams required endless storage and management space which poses a unique challenge. Therefore, this paper ex… ▽ More

    Submitted 4 June, 2020; originally announced June 2020.

    Comments: 8 pages. Submitted to IEEE Transaction on Smart Grid

  43. Privacy Preserving Face Recognition Utilizing Differential Privacy

    Authors: M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe

    Abstract: Facial recognition technologies are implemented in many areas, including but not limited to, citizen surveillance, crime control, activity monitoring, and facial expression evaluation. However, processing biometric information is a resource-intensive task that often involves third-party servers, which can be accessed by adversaries with malicious intent. Biometric information delivered to untruste… ▽ More

    Submitted 4 July, 2020; v1 submitted 21 May, 2020; originally announced May 2020.

  44. Privacy Preserving Distributed Machine Learning with Federated Learning

    Authors: M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe

    Abstract: Edge computing and distributed machine learning have advanced to a level that can revolutionize a particular organization. Distributed devices such as the Internet of Things (IoT) often produce a large amount of data, eventually resulting in big data that can be vital in uncovering hidden patterns, and other insights in numerous fields such as healthcare, banking, and policing. Data related to are… ▽ More

    Submitted 25 February, 2021; v1 submitted 25 April, 2020; originally announced April 2020.

  45. arXiv:2004.01958  [pdf, other

    cs.CR cs.GT

    BASCPS: How does behavioral decision making impact the security of cyber-physical systems?

    Authors: Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi

    Abstract: We study the security of large-scale cyber-physical systems (CPS) consisting of multiple interdependent subsystems, each managed by a different defender. Defenders invest their security budgets with the goal of thwarting the spread of cyber attacks to their critical assets. We model the security investment decisions made by the defenders as a security game. While prior work has used security games… ▽ More

    Submitted 7 April, 2020; v1 submitted 4 April, 2020; originally announced April 2020.

    Comments: 32 pages

  46. arXiv:2003.13721  [pdf, other

    cs.CL cs.LG

    Amharic Abstractive Text Summarization

    Authors: Amr M. Zaki, Mahmoud I. Khalil, Hazem M. Abbas

    Abstract: Text Summarization is the task of condensing long text into just a handful of sentences. Many approaches have been proposed for this task, some of the very first were building statistical models (Extractive Methods) capable of selecting important words and copying them to the output, however these models lacked the ability to paraphrase sentences, as they simply select important words without actu… ▽ More

    Submitted 30 March, 2020; originally announced March 2020.

    Comments: content 3 pages, reference 2 pages, 2 figures, presented to AfricaNLP workshop ICLR 2020

  47. arXiv:2002.09632  [pdf, other

    cs.LG cs.CR stat.ML

    Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples

    Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah

    Abstract: Adversarial examples have become one of the largest challenges that machine learning models, especially neural network classifiers, face. These adversarial examples break the assumption of attack-free scenario and fool state-of-the-art (SOTA) classifiers with insignificant perturbations to human. So far, researchers achieved great progress in utilizing adversarial training as a defense. However, t… ▽ More

    Submitted 27 February, 2020; v1 submitted 22 February, 2020; originally announced February 2020.

  48. arXiv:1911.12080  [pdf, other

    cs.CR

    DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference

    Authors: Euijin Choo, Mohamed Nabeel, Mashael Alsabah, Issa Khalil, Ting Yu, Wei Wang

    Abstract: In this paper, we propose to identify compromised mobile devices from a network administrator's point of view. Intuitively, inadvertent users (and thus their devices) who download apps through untrustworthy markets are often allured to install malicious apps through in-app advertisement or phishing. We thus hypothesize that devices sharing a similar set of apps will have a similar probability of b… ▽ More

    Submitted 27 November, 2019; originally announced November 2019.

  49. arXiv:1911.00604  [pdf, ps, other

    cs.CR

    IoTSign: Protecting Privacy and Authenticity of IoT using Discrete Cosine Based Steganography

    Authors: Sharif Abuadbba, Ayman Ibaida, Ibrahim Khalil

    Abstract: Remotely generated data by Intent of Things (IoT) has recently had a lot of attention for their huge benefits such as efficient monitoring and risk reduction. The transmitted streams usually consist of periodical streams (e.g. activities) and highly private information (e.g. IDs). Despite the obvious benefits, the concerns are the secrecy and the originality of the transferred data. Surprisingly,… ▽ More

    Submitted 1 April, 2022; v1 submitted 1 November, 2019; originally announced November 2019.

    Comments: 12 pages

  50. Local Differential Privacy for Deep Learning

    Authors: M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe, M. Atiquzzaman

    Abstract: The internet of things (IoT) is transforming major industries including but not limited to healthcare, agriculture, finance, energy, and transportation. IoT platforms are continually improving with innovations such as the amalgamation of software-defined networks (SDN) and network function virtualization (NFV) in the edge-cloud interplay. Deep learning (DL) is becoming popular due to its remarkabl… ▽ More

    Submitted 9 November, 2019; v1 submitted 8 August, 2019; originally announced August 2019.