Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Arjan Durresi

    Billions of Internet of Things (IoT) devices and sensors are expected to be supported by fifth-generation (5G) wireless cellular networks. This highly connected structure is predicted to attract different and unseen types of attacks on... more
    Billions of Internet of Things (IoT) devices and sensors are expected to be supported by fifth-generation (5G) wireless cellular networks. This highly connected structure is predicted to attract different and unseen types of attacks on devices, sensors, and networks that require advanced mitigation strategies and the active monitoring of the system components. Therefore, a paradigm shift is needed, from traditional prevention and detection approaches toward resilience. This study proposes a trust-based defense framework to ensure resilient IoT services on 5G multi-access edge computing (MEC) systems. This defense framework is based on the trustability metric, which is an extension of the concept of reliability and measures how much a system can be trusted to keep a given level of performance under a specific successful attack vector. Furthermore, trustability is used as a trade-off with system cost to measure the net utility of the system. Systems using multiple sensors with differe...
    Artificial intelligence (AI) and algorithmic decision making are having a profound impact on our daily lives. These systems are vastly used in different high-stakes applications like healthcare, business, government, education, and... more
    Artificial intelligence (AI) and algorithmic decision making are having a profound impact on our daily lives. These systems are vastly used in different high-stakes applications like healthcare, business, government, education, and justice, moving us toward a more algorithmic society. However, despite so many advantages of these systems, they sometimes directly or indirectly cause harm to the users and society. Therefore, it has become essential to make these systems safe, reliable, and trustworthy. Several requirements, such as fairness, explainability, accountability, reliability, and acceptance, have been proposed in this direction to make these systems trustworthy. This survey analyzes all of these different requirements through the lens of the literature. It provides an overview of different approaches that can help mitigate AI risks and increase trust and acceptance of the systems by utilizing the users and society. It also discusses existing strategies for validating and veri...
    We are developing a trust framework for social networks. The framework includes new metrics for trust evaluation and its confidence. We consider trust assessments similar to physical measurements. Therefore, we apply measurement theory of... more
    We are developing a trust framework for social networks. The framework includes new metrics for trust evaluation and its confidence. We consider trust assessments similar to physical measurements. Therefore, we apply measurement theory of errors in trust evaluation. We have tested our framework with real datasets from social networks. Our results confirm the validity of our approach. Furthermore, we show some great advantages of our framework, for example the trust view in an experiment was increased more than 2000 times. Our framework can be used to build security mechanisms for social networks, including filters against DDoS and untrusted information, detection of cliques of attackers and much more.
    Inspired by the similarities between human trust and physical measurements, we have proposed a trust framework for social networks, including defining new trust metrics and their combinations, which captures both human trust level and its... more
    Inspired by the similarities between human trust and physical measurements, we have proposed a trust framework for social networks, including defining new trust metrics and their combinations, which captures both human trust level and its uncertainty, while being intuitive and user friendly. We show some great advantages of our framework, for example the trust view in an experiment was increased more than 2000 times. Based on our trust framework, we propose several security mechanisms, including filtering information on social networks and increasing the efficiency of advertisement and influence on social networks. Experiments on synthesized and real social networks validate the potential of our trust framework to develop trust based mechanisms for social networks.
    The Internet is one of the most successful technological achievements of our time. The Internet mirrors and enhances all aspects of your lives, by creating unprecedented opportunities for advancing knowledge in all fields of human... more
    The Internet is one of the most successful technological achievements of our time. The Internet mirrors and enhances all aspects of your lives, by creating unprecedented opportunities for advancing knowledge in all fields of human activities. However, the 21st century society's needs may not be met by the current trajectory of incremental changes to the current Internet. Therefore, the research community worldwide, well supported by corresponding funding agencies, is engaged in exploring new architectures for the future Internet. We are working on one of the collaborative projects to design a new Internet architecture. Our larger team includes multidisciplinary expertise of researchers from US and the world, from institutions such as Washington University in Saint Louis, Purdue University, Seikei University in Tokyo Japan, and Technical University of Catalonia Spain. Our research in this field focuses on various major requirements of the future Internet, including security, resi...
    We experimented with the latency, throughput, fairness, and frame loss rate metrics. The results of these measurements are helpful in refining the baseline text. This revised version includes corrected and new measurements for throughput... more
    We experimented with the latency, throughput, fairness, and frame loss rate metrics. The results of these measurements are helpful in refining the baseline text. This revised version includes corrected and new measurements for throughput and latency. Source: Gojko Babic, Arjan Durresi, Raj Jain, Justin Dolske, Shabbir Shahpurwala The Ohio State University Department of CIS Columbus, OH 43210-1277 Phone: 614-292-3989, Fax: 614-292-2911, Email: Jain@ACM.Org The presentation of this contribution at the ATM Forum is sponsored by NASA.
    Internet mobile users are concerned more and more about their privacy nowadays as both researches and real world incidents show that leaking of communication and location privacy can lead to serious consequence, and many research works... more
    Internet mobile users are concerned more and more about their privacy nowadays as both researches and real world incidents show that leaking of communication and location privacy can lead to serious consequence, and many research works have been done to anonymize individual user from aggregated location data. However, just the communication itself between the mobile users and their peers or website could collect considerable privacy of the mobile users, such as location history, to other parties. In this paper, we investigated the potential privacy risk of mobile Internet users and proposed a scalable system built on top of public cloud services that can hide mobile user’s network location and traffic from communication peers. This system creates a dynamic distributed proxy network for each mobile user to minimize performance overhead and operation cost.
    We propose a Security based Cyber-Physical Architecture for Environment Protection (SCPAEP). Protecting the environment from many threats has become a priority worldwide. The existing sensor technologies enable the continuous monitoring... more
    We propose a Security based Cyber-Physical Architecture for Environment Protection (SCPAEP). Protecting the environment from many threats has become a priority worldwide. The existing sensor technologies enable the continuous monitoring of various environments parameters, such as air quality, waters, and many others. In this paper we propose a general Cyber-Physical architecture, tailored for environment protection, based on cellular networks to collect such sensors' information in real time. The cell phones can interact with the cellular network and the sensor networks at the same time. This unique ability can be leveraged to provide better authentication and security. We propose an architecture for these networks along with protocols that can be used to establish security.
    We propose, Trustworthy Explainability Acceptance metric to evaluate explainable AI systems using expert-in-the-loop. Our metric calculates acceptance by quantifying the distance between the explanations generated by the AI system and the... more
    We propose, Trustworthy Explainability Acceptance metric to evaluate explainable AI systems using expert-in-the-loop. Our metric calculates acceptance by quantifying the distance between the explanations generated by the AI system and the reasoning provided by the experts based on their expertise and experience. Our metric also evaluates the trust of the experts to include different groups of experts using our trust mechanism. Our metric can be easily adapted to any Interpretable AI system and be used in the standardization process of trustworthy AI systems. We illustrate the proposed metric using the high-stake medical AI application of Predicting Ductal Carcinoma in Situ (DCIS) Recurrence. Our metric successfully captures the explainability of AI systems in DCIS recurrence by experts. Davinder Kaur Indiana University-Purdue University Indianapolis, Indianapolis, IN, USA e-mail: davikaur@iu.edu Suleyman Uslu Indiana University-Purdue University Indianapolis, Indianapolis, IN, USA e-mail: suslu@iu.edu Arjan Durresi Indiana University-Purdue University Indianapolis, Indianapolis, IN, USA e-mail: adurresi@iupui.edu Sunil Badve Indiana University-Purdue University Indianapolis, Indianapolis, IN, USA e-mail: sbadve@iupui.edu Murat Dundar Indiana University-Purdue University Indianapolis, Indianapolis, IN, USA e-mail: mdundar@iupui.edu
    In today’s world, it is challenging to find an application in any field that does not necessitate or cannot benefit from a sophisticated decision-making mechanism. This arises from the trend for more complex approaches to problems and... more
    In today’s world, it is challenging to find an application in any field that does not necessitate or cannot benefit from a sophisticated decision-making mechanism. This arises from the trend for more complex approaches to problems and their functionalities. The process of decision making becomes more demanding and complicated as the number of parameters is on the rise. One example of such a field that the decisions have a major influence on a large number of people is Food-Energy-Water where many parameters and stakeholders are included in decision makings. In this paper, we presented a Decision Support System using a Trust Management Framework which calculates and anticipates trust among participants using their direct pairwise interactions and help them reach consensus. Results showed that our system can detect unfair ratings by participants and knowledge by an actor that would be widely accepted by other stakeholders.
    Decision-making is an essential part of all processes where humans are involved. As the number of parameters to consider increases, the decision-making process becomes more challenging. Food-Energy-Water is one of the fields where... more
    Decision-making is an essential part of all processes where humans are involved. As the number of parameters to consider increases, the decision-making process becomes more challenging. Food-Energy-Water is one of the fields where decisions not only have substantial impacts on a large number of people; they also have both many parameters and involve a significant number of participants. In this paper, we build a Decision Support System and integrate a trust management framework to measure trust among stakeholders to help consensus in decision-making. Our results show that when stakeholders acknowledge trust, and they act considering their trust, consensus can be reached using less effort, that is a lower number of rounds in decision making. Also, we showed that acting based on trust helps stakeholders to change their behavior positively in long-term.
    The aim of this paper is to present the ‘Power’ of SDN Technology and MEC Technic in improving the delivering of IPTV Service. Those days, the IPTV end –users are tremendous increased all over the world , but in the same time also the... more
    The aim of this paper is to present the ‘Power’ of SDN Technology and MEC Technic in improving the delivering of IPTV Service. Those days, the IPTV end –users are tremendous increased all over the world , but in the same time also the complains for receiving these prepaid real time multimedial services like; high latency, high bandwidth, low performance and low QoE/QoS. On the other end, IPTV Distributors need a new system, technics, network solutions to distribute content continuesly and simultaneously to all active end-users with high-quality, lowlatency and high Performance, thus monitoring and re-configuring this ‘Big Data’ require high Bandwidth by causing difficult problems by offering it affecting in the same time the price and QoE/QoSperformance of delivered service. For this reason, we have achieved to optimize the IPTV service by applying SDN solution in a MEC Architecture (Multiple-Access Edge Computing). In this way , through MEC Technology and SDN, it is possible to rec...
    Over the past few years, cloud computing has rapidly emerged as a widely accepted computing paradigm built around core concepts such as on-demand computing resources, elastic scaling, elimination of up-front capital and operational... more
    Over the past few years, cloud computing has rapidly emerged as a widely accepted computing paradigm built around core concepts such as on-demand computing resources, elastic scaling, elimination of up-front capital and operational expenses, and establishing a pay-as-you-go business model for computing and information technology services. With the widespread adoption of virtualization, service oriented architectures, and utility computing there has been a significant development in the creation of cloud support structures to deliver IT services within QoS bounds, service level agreements, and security and privacy requirements. While cloud data centers are dominated by the server and infrastructure costs followed by networking and power, it turns out that networking and systems innovations are the key to the success of the cloud. The capital cost of networking
    Due to the opportunities provided by the Internet, more and more people are taking advantage of distance learning courses and during the last few years enormous research efforts have been dedicated to the development of distance learning... more
    Due to the opportunities provided by the Internet, more and more people are taking advantage of distance learning courses and during the last few years enormous research efforts have been dedicated to the development of distance learning systems. So far, many e-learning systems are proposed and used practically. However, in these systems the e-learning completion rate is about 30 percents. One of the reasons is the low study desire when the learner studies the learning materials. In this research, we propose an e-learning system, which includes three subsystems: the learning subsystem, learner support subsystem, and teacher support subsystem. The learning subsystem improves the learners study desire. The learner support subsystem supports the learner during the study, and the teacher support subsystem support the teacher to get the learner's study state. In the future work, we would like to add other functions to improve more the system performance.
    Program Committee Rachid Anane, University of Coventry, UK Irfan Awan, University of Bradford, UK Kuo-Ming Chao, University of Coventry, UK Arjan Durresi, Indiana University Perdue University Indianapolis, USA Katherine Guo, Bell Labs,... more
    Program Committee Rachid Anane, University of Coventry, UK Irfan Awan, University of Bradford, UK Kuo-Ming Chao, University of Coventry, UK Arjan Durresi, Indiana University Perdue University Indianapolis, USA Katherine Guo, Bell Labs, USA Takahiro Hara, Osaka University, Japan Hui-Huang Hsu, Tamkang University, Taiwan Runhe Huang, Hosei University, Japan Qun Jin, Waseda University, Japan Hiroaki Kikuchi, Tokai University, Japan Akio Koyama, Yamagata University, Japan Jiandong Li, Xidian University, China Kuan-Ching Li, Providence University, Taiwan Janhua Ma, Hosei University, Japan Takuo Nakashima, Tokai University, Japan Hiroaki Nishino, Oita University, Japan Masato Oguchi, Ochanomizu University, Japan Wenny Rahayu, La Trobe University, Australia Fumiaki Sato, Toho University, Japan Elhadi Shakshuki, Acadia University, Canada Timothy K. Shih, Tamkang University, Taiwan David Taniar, Monash University, Australia Cristian Tchepnda, France Telecom R&D, France Minoru Uehara, Toyo Un...
    One of the examples for a field that involves significant decisions is Food-Energy-Water (FEW) sectors. The decisions in this sector can affect a large number of people, their results may not disappear in a short period of time, and... more
    One of the examples for a field that involves significant decisions is Food-Energy-Water (FEW) sectors. The decisions in this sector can affect a large number of people, their results may not disappear in a short period of time, and multiple stakeholders are involved in the decision-making process. In this paper, we proposed an advanced decision support system for FEW actors and experimented scenarios including different solution proposal criteria and solution evaluation methods as well as scenarios with different trust sensitivities of the actors. Results showed that when actors follow proposal criteria considering their trust, proposed solutions receive a higher acceptance rate by the community. Also, when the actors are sensitive to the trust measured by the framework, they are more likely to propose move on to the solution with a higher acceptance rate.
    The growing interest in applications that demand certain end-to-end performance guarantees and the introduction of imaging and video sensors have posed additional challenges. Transmission of data in such cases requires both energy and QoS... more
    The growing interest in applications that demand certain end-to-end performance guarantees and the introduction of imaging and video sensors have posed additional challenges. Transmission of data in such cases requires both energy and QoS aware network management in order to ensure efficient usage of the sensor resources and effective access to the gathered measurements. In this paper we present LEAS, a Lightweight Energy-efficient Scheduling Scheme, a novel power management and routing scheme for heterogeneous wireless sensor networks.
    We propose a new Per Hop Behavior (PHB) for differentiated services in IP networks. In this PHB, each network subscriber (or flow) receives a bandwidth allocation proportional to the subscribed information rate. This new PHB is called... more
    We propose a new Per Hop Behavior (PHB) for differentiated services in IP networks. In this PHB, each network subscriber (or flow) receives a bandwidth allocation proportional to the subscribed information rate. This new PHB is called "Proportional Forwarding PHB" or PF PHB. The marking mechanism at the source or ingress router and the queuing and discard behavior at core routers are clearly described.
    In today’s world, with the shifting nature of artificial intelligence (AI) to explainable AI, which involves humans and machines working and complementing each other, there is a need for a mechanism to govern their collaboration. We have... more
    In today’s world, with the shifting nature of artificial intelligence (AI) to explainable AI, which involves humans and machines working and complementing each other, there is a need for a mechanism to govern their collaboration. We have proposed a trust-based mechanism to manage collaboration between them. Our trust-based mechanism has the ability to quantify human trust into a mathematical model. The proposed trust-based framework will facilitate decision making when humans and machines are involved in a process. This framework will ensure that either of them never under trust or over trust each other by computing trust information based on their history. To validate our proposed framework, experiments are performed on Indianapolis Crime Data which contains actual crime information, machine predictions, and police feedback. Results have shown that how the trust of both entities can impact the decision making of the police towards machine predictions.

    And 381 more