Skip to main content

Showing 1–50 of 65 results for author: Abdallah, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.08508  [pdf

    cs.AI cs.LG q-bio.QM

    TrialMatchAI: An End-to-End AI-powered Clinical Trial Recommendation System to Streamline Patient-to-Trial Matching

    Authors: Majd Abdallah, Sigve Nakken, Mariska Bierkens, Johanna Galvis, Alexis Groppi, Slim Karkar, Lana Meiqari, Maria Alexandra Rujano, Steve Canham, Rodrigo Dienstmann, Remond Fijneman, Eivind Hovig, Gerrit Meijer, Macha Nikolski

    Abstract: Patient recruitment remains a major bottleneck in clinical trials, calling for scalable and automated solutions. We present TrialMatchAI, an AI-powered recommendation system that automates patient-to-trial matching by processing heterogeneous clinical data, including structured records and unstructured physician notes. Built on fine-tuned, open-source large language models (LLMs) within a retrieva… ▽ More

    Submitted 13 May, 2025; originally announced May 2025.

  2. arXiv:2504.14126  [pdf, other

    cs.AI cs.CL cs.LG

    Large Language Model Enhanced Particle Swarm Optimization for Hyperparameter Tuning for Deep Learning Models

    Authors: Saad Hameed, Basheer Qolomany, Samir Brahim Belhaouari, Mohamed Abdallah, Junaid Qadir, Ala Al-Fuqaha

    Abstract: Determining the ideal architecture for deep learning models, such as the number of layers and neurons, is a difficult and resource-intensive process that frequently relies on human tuning or computationally costly optimization approaches. While Particle Swarm Optimization (PSO) and Large Language Models (LLMs) have been individually applied in optimization and deep learning, their combined use for… ▽ More

    Submitted 18 April, 2025; originally announced April 2025.

  3. arXiv:2504.10168  [pdf

    cs.CL cs.AI

    HalluSearch at SemEval-2025 Task 3: A Search-Enhanced RAG Pipeline for Hallucination Detection

    Authors: Mohamed A. Abdallah, Samhaa R. El-Beltagy

    Abstract: In this paper, we present HalluSearch, a multilingual pipeline designed to detect fabricated text spans in Large Language Model (LLM) outputs. Developed as part of Mu-SHROOM, the Multilingual Shared-task on Hallucinations and Related Observable Overgeneration Mistakes, HalluSearch couples retrieval-augmented verification with fine-grained factual splitting to identify and localize hallucinations i… ▽ More

    Submitted 14 April, 2025; originally announced April 2025.

  4. arXiv:2503.03391  [pdf, other

    cs.LG cs.AI

    Multi-Agent DRL for Queue-Aware Task Offloading in Hierarchical MEC-Enabled Air-Ground Networks

    Authors: Muhammet Hevesli, Abegaz Mohammed Seid, Aiman Erbad, Mohamed Abdallah

    Abstract: Mobile edge computing (MEC)-enabled air-ground networks are a key component of 6G, employing aerial base stations (ABSs) such as unmanned aerial vehicles (UAVs) and high-altitude platform stations (HAPS) to provide dynamic services to ground IoT devices (IoTDs). These IoTDs support real-time applications (e.g., multimedia and Metaverse services) that demand high computational resources and strict… ▽ More

    Submitted 5 March, 2025; originally announced March 2025.

  5. arXiv:2502.04356  [pdf, other

    cs.CL cs.AI cs.LG

    Open Foundation Models in Healthcare: Challenges, Paradoxes, and Opportunities with GenAI Driven Personalized Prescription

    Authors: Mahdi Alkaeed, Sofiat Abioye, Adnan Qayyum, Yosra Magdi Mekki, Ilhem Berrou, Mohamad Abdallah, Ala Al-Fuqaha, Muhammad Bilal, Junaid Qadir

    Abstract: In response to the success of proprietary Large Language Models (LLMs) such as OpenAI's GPT-4, there is a growing interest in developing open, non-proprietary LLMs and AI foundation models (AIFMs) for transparent use in academic, scientific, and non-commercial applications. Despite their inability to match the refined functionalities of their proprietary counterparts, open models hold immense pote… ▽ More

    Submitted 4 February, 2025; originally announced February 2025.

  6. arXiv:2501.18565  [pdf, other

    cs.CR cs.AI cs.HC

    BounTCHA: A CAPTCHA Utilizing Boundary Identification in Guided Generative AI-extended Videos

    Authors: Lehao Lin, Ke Wang, Maha Abdallah, Wei Cai

    Abstract: In recent years, the rapid development of artificial intelligence (AI) especially multi-modal Large Language Models (MLLMs), has enabled it to understand text, images, videos, and other multimedia data, allowing AI systems to execute various tasks based on human-provided prompts. However, AI-powered bots have increasingly been able to bypass most existing CAPTCHA systems, posing significant securi… ▽ More

    Submitted 31 March, 2025; v1 submitted 30 January, 2025; originally announced January 2025.

    Comments: 22 pages, 15 figures; references added, typos corrected, new keyword "guided" added, new experimental data and related results updated; new keyword "Generative AI" added for clarity

  7. arXiv:2501.07801  [pdf, other

    cs.CR cs.AI

    A Comparative Analysis of DNN-based White-Box Explainable AI Methods in Network Security

    Authors: Osvaldo Arreche, Mustafa Abdallah

    Abstract: New research focuses on creating artificial intelligence (AI) solutions for network intrusion detection systems (NIDS), drawing its inspiration from the ever-growing number of intrusions on networked systems, increasing its complexity and intelligibility. Hence, the use of explainable AI (XAI) techniques in real-world intrusion detection systems comes from the requirement to comprehend and elucida… ▽ More

    Submitted 13 January, 2025; originally announced January 2025.

  8. arXiv:2501.00211  [pdf, other

    eess.SP cs.ET

    Distributed Traffic Control in Complex Dynamic Roadblocks: A Multi-Agent Deep RL Approach

    Authors: Noor Aboueleneen, Yahuza Bello, Abdullatif Albaseer, Ahmed Refaey Hussein, Mohamed Abdallah, Ekram Hossain

    Abstract: Autonomous Vehicles (AVs) represent a transformative advancement in the transportation industry. These vehicles have sophisticated sensors, advanced algorithms, and powerful computing systems that allow them to navigate and operate without direct human intervention. However, AVs' systems still get overwhelmed when they encounter a complex dynamic change in the environment resulting from an acciden… ▽ More

    Submitted 30 December, 2024; originally announced January 2025.

  9. arXiv:2412.17081  [pdf, other

    cs.DC

    Efficient Data Labeling and Optimal Device Scheduling in HWNs Using Clustered Federated Semi-Supervised Learning

    Authors: Moqbel Hamood, Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha

    Abstract: Clustered Federated Multi-task Learning (CFL) has emerged as a promising technique to address statistical challenges, particularly with non-independent and identically distributed (non-IID) data across users. However, existing CFL studies entirely rely on the impractical assumption that devices possess access to accurate ground-truth labels. This assumption becomes problematic in hierarchical wire… ▽ More

    Submitted 22 December, 2024; originally announced December 2024.

    Comments: 17 pages, Journal

  10. arXiv:2412.10107  [pdf, other

    cs.NI cs.AI cs.ET cs.LG

    NetOrchLLM: Mastering Wireless Network Orchestration with Large Language Models

    Authors: Asmaa Abdallah, Abdullatif Albaseer, Abdulkadir Celik, Mohamed Abdallah, Ahmed M. Eltawil

    Abstract: The transition to 6G networks promises unprecedented advancements in wireless communication, with increased data rates, ultra-low latency, and enhanced capacity. However, the complexity of managing and optimizing these next-generation networks presents significant challenges. The advent of large language models (LLMs) has revolutionized various domains by leveraging their sophisticated natural lan… ▽ More

    Submitted 13 December, 2024; originally announced December 2024.

  11. arXiv:2411.03686  [pdf, other

    cs.NI

    Learn to Slice, Slice to Learn: Unveiling Online Optimization and Reinforcement Learning for Slicing AI Services

    Authors: Amr Abo-eleneen, Menna Helmy, Alaa Awad Abdellatif, Aiman Erbad, Amr Mohamed, Mohamed Abdallah

    Abstract: In the face of increasing demand for zero-touch networks to automate network management and operations, two pivotal concepts have emerged: "Learn to Slice" (L2S) and "Slice to Learn" (S2L). L2S involves leveraging Artificial intelligence (AI) techniques to optimize network slicing for general services, while S2L centers on tailoring network slices to meet the specific needs of various AI services.… ▽ More

    Submitted 6 November, 2024; originally announced November 2024.

    Comments: 9 pages, 2 figures and 2 tables magazine paper

  12. arXiv:2411.00608  [pdf, other

    cs.CV

    HopTrack: A Real-time Multi-Object Tracking System for Embedded Devices

    Authors: Xiang Li, Cheng Chen, Yuan-yao Lou, Mustafa Abdallah, Kwang Taik Kim, Saurabh Bagchi

    Abstract: Multi-Object Tracking (MOT) poses significant challenges in computer vision. Despite its wide application in robotics, autonomous driving, and smart manufacturing, there is limited literature addressing the specific challenges of running MOT on embedded devices. State-of-the-art MOT trackers designed for high-end GPUs often experience low processing rates (<11fps) when deployed on embedded devices… ▽ More

    Submitted 1 November, 2024; originally announced November 2024.

  13. arXiv:2410.15597  [pdf, other

    cs.CR cs.AI cs.LG

    A Comprehensive Comparative Study of Individual ML Models and Ensemble Strategies for Network Intrusion Detection Systems

    Authors: Ismail Bibers, Osvaldo Arreche, Mustafa Abdallah

    Abstract: The escalating frequency of intrusions in networked systems has spurred the exploration of new research avenues in devising artificial intelligence (AI) techniques for intrusion detection systems (IDS). Various AI techniques have been used to automate network intrusion detection tasks, yet each model possesses distinct strengths and weaknesses. Selecting the optimal model for a given dataset can p… ▽ More

    Submitted 20 October, 2024; originally announced October 2024.

  14. arXiv:2410.15405  [pdf, other

    cs.AI

    XAI-based Feature Ensemble for Enhanced Anomaly Detection in Autonomous Driving Systems

    Authors: Sazid Nazat, Mustafa Abdallah

    Abstract: The rapid advancement of autonomous vehicle (AV) technology has introduced significant challenges in ensuring transportation security and reliability. Traditional AI models for anomaly detection in AVs are often opaque, posing difficulties in understanding and trusting their decision making processes. This paper proposes a novel feature ensemble framework that integrates multiple Explainable AI (X… ▽ More

    Submitted 20 October, 2024; originally announced October 2024.

    Comments: 31 pages, 4 figures (including the subfigures)

  15. arXiv:2410.10050  [pdf, other

    cs.CR cs.AI

    XAI-based Feature Selection for Improved Network Intrusion Detection Systems

    Authors: Osvaldo Arreche, Tanish Guntur, Mustafa Abdallah

    Abstract: Explainability and evaluation of AI models are crucial parts of the security of modern intrusion detection systems (IDS) in the network security field, yet they are lacking. Accordingly, feature selection is essential for such parts in IDS because it identifies the most paramount features, enhancing attack detection and its description. In this work, we tackle the feature selection problem for IDS… ▽ More

    Submitted 13 October, 2024; originally announced October 2024.

    Comments: 24 pages, 4 figures

  16. arXiv:2410.00285  [pdf, other

    cs.CV

    Performance Evaluation of Deep Learning-based Quadrotor UAV Detection and Tracking Methods

    Authors: Mohssen E. Elshaar, Zeyad M. Manaa, Mohammed R. Elbalshy, Abdul Jabbar Siddiqui, Ayman M. Abdallah

    Abstract: Unmanned Aerial Vehicles (UAVs) are becoming more popular in various sectors, offering many benefits, yet introducing significant challenges to privacy and safety. This paper investigates state-of-the-art solutions for detecting and tracking quadrotor UAVs to address these concerns. Cutting-edge deep learning models, specifically the YOLOv5 and YOLOv8 series, are evaluated for their performance in… ▽ More

    Submitted 30 September, 2024; originally announced October 2024.

  17. arXiv:2409.18741  [pdf, other

    cs.RO math.DS

    Optimum Configuration for Hovering n-Quadrotors carrying a Slung Payload

    Authors: Mohssen E. Elshaar, Pansie A. khodary, Meral L. Badr, Mohamad A. Sayegh, Zeyad M. Manaa, Ayman M. Abdallah

    Abstract: This work proposes a strategy for organising quadrotors around a payload to enable hovering without external stimuli, together with a MATLAB software for modelling the dynamics of a quadrotor-payload system. Based on geometric concepts, the proposed design keeps the payload and system centre of mass aligned. Hovering tests that are successful confirm the method's efficiency. Moreover, the algorith… ▽ More

    Submitted 24 November, 2024; v1 submitted 27 September, 2024; originally announced September 2024.

    Comments: accepted for publication at AIAA SCITECH 2025

  18. arXiv:2409.10839  [pdf, other

    cs.NI cs.DC

    Dynamic DAG-Application Scheduling for Multi-Tier Edge Computing in Heterogeneous Networks

    Authors: Xiang Li, Mustafa Abdallah, Yuan-Yao Lou, Mung Chiang, Kwang Taik Kim, Saurabh Bagchi

    Abstract: Edge computing is deemed a promising technique to execute latency-sensitive applications by offloading computation-intensive tasks to edge servers. Extensive research has been conducted in the field of end-device to edge server task offloading for several goals, including latency minimization, energy optimization, and resource optimization. However, few of them consider our mobile computing device… ▽ More

    Submitted 16 September, 2024; originally announced September 2024.

    Comments: 12 pages

  19. arXiv:2408.07425  [pdf

    cs.CL cs.AI

    Exploring Retrieval Augmented Generation in Arabic

    Authors: Samhaa R. El-Beltagy, Mohamed A. Abdallah

    Abstract: Recently, Retrieval Augmented Generation (RAG) has emerged as a powerful technique in natural language processing, combining the strengths of retrieval-based and generation-based models to enhance text generation tasks. However, the application of RAG in Arabic, a language with unique characteristics and resource constraints, remains underexplored. This paper presents a comprehensive case study on… ▽ More

    Submitted 14 August, 2024; originally announced August 2024.

  20. arXiv:2408.00964  [pdf, other

    cs.GT cs.CR eess.SY

    A Quantal Response Analysis of Defender-Attacker Sequential Security Games

    Authors: Md Reya Shad Azim, Mustafa Abdallah

    Abstract: We explore a scenario involving two sites and a sequential game between a defender and an attacker, where the defender is responsible for securing the sites while the attacker aims to attack them. Each site holds a loss value for the defender when compromised, along with a probability of successful attack. The defender can reduce these probabilities through security investments at each site. The a… ▽ More

    Submitted 1 August, 2024; originally announced August 2024.

  21. arXiv:2407.09219  [pdf, other

    cs.NI

    Optimized Federated Multitask Learning in Mobile Edge Networks: A Hybrid Client Selection and Model Aggregation Approach

    Authors: Moqbel Hamood, Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha, Amr Mohamed

    Abstract: We propose clustered federated multitask learning to address statistical challenges in non-independent and identically distributed data across clients. Our approach tackles complexities in hierarchical wireless networks by clustering clients based on data distribution similarities and assigning specialized models to each cluster. These complexities include slower convergence and mismatched model a… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

    Comments: 17 pages, 11 figures, Journal

  22. arXiv:2407.03729  [pdf, other

    cs.CR cs.NI

    Charging Ahead: A Hierarchical Adversarial Framework for Counteracting Advanced Cyber Threats in EV Charging Stations

    Authors: Mohammed Al-Mehdhar, Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha

    Abstract: The increasing popularity of electric vehicles (EVs) necessitates robust defenses against sophisticated cyber threats. A significant challenge arises when EVs intentionally provide false information to gain higher charging priority, potentially causing grid instability. While various approaches have been proposed in existing literature to address this issue, they often overlook the possibility of… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    Comments: Accepted for IEEE VTC Spring 2024

  23. arXiv:2407.02845  [pdf, other

    cs.NI

    FedPot: A Quality-Aware Collaborative and Incentivized Honeypot-Based Detector for Smart Grid Networks

    Authors: Abdullatif Albaseer, Nima Abdi, Mohamed Abdallah, Marwa Qaraqe, Saif Alkuwari

    Abstract: Honeypot technologies provide an effective defense strategy for the Industrial Internet of Things (IIoT), particularly in enhancing the Advanced Metering Infrastructure's (AMI) security by bolstering the network intrusion detection system. For this security paradigm to be fully realized, it necessitates the active participation of small-scale power suppliers (SPSs) in implementing honeypots and en… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

    Comments: Accepted for IEEE TNSM

  24. arXiv:2401.15924  [pdf, other

    cs.NI

    Energy-Aware Service Offloading for Semantic Communications in Wireless Networks

    Authors: Hassan Saadat, Abdullatif Albaseer, Mohamed Abdallah, Amr Mohamed, Aiman Erbad

    Abstract: Today, wireless networks are becoming responsible for serving intelligent applications, such as extended reality and metaverse, holographic telepresence, autonomous transportation, and collaborative robots. Although current fifth-generation (5G) networks can provide high data rates in terms of Gigabytes/second, they cannot cope with the high demands of the aforementioned applications, especially i… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

    Comments: Accepted for IEEE ICC 2024

  25. arXiv:2401.10646  [pdf, other

    cs.NI cs.LG

    Empowering HWNs with Efficient Data Labeling: A Clustered Federated Semi-Supervised Learning Approach

    Authors: Moqbel Hamood, Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha

    Abstract: Clustered Federated Multitask Learning (CFL) has gained considerable attention as an effective strategy for overcoming statistical challenges, particularly when dealing with non independent and identically distributed (non IID) data across multiple users. However, much of the existing research on CFL operates under the unrealistic premise that devices have access to accurate ground truth labels. T… ▽ More

    Submitted 19 January, 2024; originally announced January 2024.

    Comments: Accepted for IEEE Wireless Communications and Networking Conference (WCNC) 2024

  26. arXiv:2401.10214  [pdf, other

    cs.NI

    Tailoring Semantic Communication at Network Edge: A Novel Approach Using Dynamic Knowledge Distillation

    Authors: Abdullatif Albaseer, Mohamed Abdallah

    Abstract: Semantic Communication (SemCom) systems, empowered by deep learning (DL), represent a paradigm shift in data transmission. These systems prioritize the significance of content over sheer data volume. However, existing SemCom designs face challenges when applied to diverse computational capabilities and network conditions, particularly in time-sensitive applications. A key challenge is the assumpti… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

    Comments: Accepted for the International Conference on Communications (ICC) 2024

  27. arXiv:2401.05896  [pdf, other

    cs.CR cs.LG cs.NI

    The Role of Deep Learning in Advancing Proactive Cybersecurity Measures for Smart Grid Networks: A Survey

    Authors: Nima Abdi, Abdullatif Albaseer, Mohamed Abdallah

    Abstract: As smart grids (SG) increasingly rely on advanced technologies like sensors and communication systems for efficient energy generation, distribution, and consumption, they become enticing targets for sophisticated cyberattacks. These evolving threats demand robust security measures to maintain the stability and resilience of modern energy systems. While extensive research has been conducted, a comp… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

    Comments: To appear in the IEEE internet of Things journal

  28. arXiv:2310.03614  [pdf

    cs.LG cs.CY

    Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally

    Authors: Shawqi Al-Maliki, Adnan Qayyum, Hassan Ali, Mohamed Abdallah, Junaid Qadir, Dinh Thai Hoang, Dusit Niyato, Ala Al-Fuqaha

    Abstract: Deep Neural Networks (DNNs) have been the driving force behind many of the recent advances in machine learning. However, research has shown that DNNs are vulnerable to adversarial examples -- input samples that have been perturbed to force DNN-based models to make errors. As a result, Adversarial Machine Learning (AdvML) has gained a lot of attention, and researchers have investigated these vulner… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  29. arXiv:2309.01281  [pdf, other

    cs.CR cs.DC cs.GT

    Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions

    Authors: Mustafa Abdallah, Saurabh Bagchi, Shaunak D. Bopardikar, Kevin Chan, Xing Gao, Murat Kantarcioglu, Congmiao Li, Peng Liu, Quanyan Zhu

    Abstract: Many of our critical infrastructure systems and personal computing systems have a distributed computing systems structure. The incentives to attack them have been growing rapidly as has their attack surface due to increasing levels of connectedness. Therefore, we feel it is time to bring in rigorous reasoning to secure such systems. The distributed system security and the game theory technical com… ▽ More

    Submitted 28 May, 2024; v1 submitted 3 September, 2023; originally announced September 2023.

    Comments: Accepted to appear at the IEEE Security & Privacy Magazine

  30. arXiv:2304.13423  [pdf, other

    cs.NI

    Fair Selection of Edge Nodes to Participate in Clustered Federated Multitask Learning

    Authors: Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha, Abegaz Mohammed, Aiman Erbad, Octavia A. Dobre

    Abstract: Clustered federated Multitask learning is introduced as an efficient technique when data is unbalanced and distributed amongst clients in a non-independent and identically distributed manner. While a similarity metric can provide client groups with specialized models according to their data distribution, this process can be time-consuming because the server needs to capture all data distribution f… ▽ More

    Submitted 29 April, 2023; v1 submitted 26 April, 2023; originally announced April 2023.

    Comments: To appear in IEEE Transactions on Network and Service Management, Special issue on Federated Learning for the Management of Networked Systems

  31. arXiv:2301.09278  [pdf, other

    cs.DC cs.NI

    DAG-based Task Orchestration for Edge Computing

    Authors: Xiang Li, Mustafa Abdallah, Shikhar Suryavansh, Mung Chiang, Saurabh Bagchi

    Abstract: As we increase the number of personal computing devices that we carry (mobile devices, tablets, e-readers, and laptops) and these come equipped with increasing resources, there is a vast potential computation power that can be utilized from those devices. Edge computing promises to exploit these underlying computation resources closer to users to help run latency-sensitive applications such as aug… ▽ More

    Submitted 23 January, 2023; originally announced January 2023.

  32. arXiv:2211.01315  [pdf

    cs.LG

    Addressing Data Distribution Shifts in Online Machine Learning Powered Smart City Applications Using Augmented Test-Time Adaptation

    Authors: Shawqi Al-Maliki, Faissal El Bouanani, Mohamed Abdallah, Junaid Qadir, Ala Al-Fuqaha

    Abstract: Data distribution shift is a common problem in machine learning-powered smart city applications where the test data differs from the training data. Augmenting smart city applications with online machine learning models can handle this issue at test time, albeit with high cost and unreliable performance. To overcome this limitation, we propose to endow test-time adaptation with a systematic active… ▽ More

    Submitted 23 May, 2023; v1 submitted 2 November, 2022; originally announced November 2022.

  33. arXiv:2206.06355  [pdf, ps, other

    cs.LG cs.AI cs.NE

    Anomaly Detection and Inter-Sensor Transfer Learning on Smart Manufacturing Datasets

    Authors: Mustafa Abdallah, Byung-Gun Joung, Wo Jae Lee, Charilaos Mousoulis, John W. Sutherland, Saurabh Bagchi

    Abstract: Smart manufacturing systems are being deployed at a growing rate because of their ability to interpret a wide variety of sensed information and act on the knowledge gleaned from system observations. In many cases, the principal goal of the smart manufacturing system is to rapidly detect (or anticipate) failures to reduce operational cost and eliminate downtime. This often boils down to detecting a… ▽ More

    Submitted 13 June, 2022; originally announced June 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2102.05814

  34. arXiv:2204.14020  [pdf, other

    cs.DC cs.LG

    Exploration and Exploitation in Federated Learning to Exclude Clients with Poisoned Data

    Authors: Shadha Tabatabai, Ihab Mohammed, Basheer Qolomany, Abdullatif Albasser, Kashif Ahmad, Mohamed Abdallah, Ala Al-Fuqaha

    Abstract: Federated Learning (FL) is one of the hot research topics, and it utilizes Machine Learning (ML) in a distributed manner without directly accessing private data on clients. However, FL faces many challenges, including the difficulty to obtain high accuracy, high communication cost between clients and the server, and security attacks related to adversarial ML. To tackle these three challenges, we p… ▽ More

    Submitted 29 April, 2022; originally announced April 2022.

    Comments: Accepted at 2022 IWCMC

  35. arXiv:2202.13652  [pdf, other

    eess.SP cs.AI cs.LG

    Hierarchical Multi-Agent DRL-Based Framework for Joint Multi-RAT Assignment and Dynamic Resource Allocation in Next-Generation HetNets

    Authors: Abdulmalik Alwarafy, Bekir Sait Ciftler, Mohamed Abdallah, Mounir Hamdi, Naofal Al-Dhahir

    Abstract: This paper considers the problem of cost-aware downlink sum-rate maximization via joint optimal radio access technologies (RATs) assignment and power allocation in next-generation heterogeneous wireless networks (HetNets). We consider a future HetNet comprised of multi-RATs and serving multi-connectivity edge devices (EDs), and we formulate the problem as mixed-integer non-linear programming (MINP… ▽ More

    Submitted 28 February, 2022; originally announced February 2022.

    Report number: 05 April 2022

    Journal ref: IEEE Transactions on Network Science and Engineering, 2022

  36. arXiv:2108.08768  [pdf, other

    cs.DC cs.LG

    Client Selection Approach in Support of Clustered Federated Learning over Wireless Edge Networks

    Authors: Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha, Aiman Erbad

    Abstract: Clustered Federated Multitask Learning (CFL) was introduced as an efficient scheme to obtain reliable specialized models when data is imbalanced and distributed in a non-i.i.d. (non-independent and identically distributed) fashion amongst clients. While a similarity measure metric, like the cosine similarity, can be used to endow groups of the client with a specialized model, this process can be a… ▽ More

    Submitted 16 August, 2021; originally announced August 2021.

    Comments: 4 figures, 7 pages

  37. arXiv:2107.05989  [pdf, ps, other

    cs.LG cs.NE

    Emotion Recognition for Healthcare Surveillance Systems Using Neural Networks: A Survey

    Authors: Marwan Dhuheir, Abdullatif Albaseer, Emna Baccour, Aiman Erbad, Mohamed Abdallah, Mounir Hamdi

    Abstract: Recognizing the patient's emotions using deep learning techniques has attracted significant attention recently due to technological advancements. Automatically identifying the emotions can help build smart healthcare centers that can detect depression and stress among the patients in order to start the medication early. Using advanced technology to identify emotions is one of the most exciting top… ▽ More

    Submitted 13 July, 2021; originally announced July 2021.

    Comments: conference paper accepted and presented at 17th Int. Wireless Communications & Mobile Computing Conference - IWCMC 2021, Harbin, China

  38. arXiv:2106.12561  [pdf, other

    cs.LG

    Fine-Grained Data Selection for Improved Energy Efficiency of Federated Edge Learning

    Authors: Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha, Aiman Erbad

    Abstract: In Federated edge learning (FEEL), energy-constrained devices at the network edge consume significant energy when training and uploading their local machine learning models, leading to a decrease in their lifetime. This work proposes novel solutions for energy-efficient FEEL by jointly considering local training data, available computation, and communications resources, and deadline constraints of… ▽ More

    Submitted 20 June, 2021; originally announced June 2021.

  39. arXiv:2104.05509  [pdf, other

    cs.LG cs.DC cs.NI

    Threshold-Based Data Exclusion Approach for Energy-Efficient Federated Edge Learning

    Authors: Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha, Aiman Erbad

    Abstract: Federated edge learning (FEEL) is a promising distributed learning technique for next-generation wireless networks. FEEL preserves the user's privacy, reduces the communication costs, and exploits the unprecedented capabilities of edge devices to train a shared global model by leveraging a massive amount of data generated at the network edge. However, FEEL might significantly shorten energy-constr… ▽ More

    Submitted 30 March, 2021; originally announced April 2021.

    Comments: accepted to IEEE ICC 2021 WS

  40. arXiv:2104.01414  [pdf, ps, other

    cs.IT cs.LG

    Deep Reinforcement Learning Powered IRS-Assisted Downlink NOMA

    Authors: Muhammad Shehab, Bekir S. Ciftler, Tamer Khattab, Mohamed Abdallah, Daniele Trinchero

    Abstract: In this work, we examine an intelligent reflecting surface (IRS) assisted downlink non-orthogonal multiple access (NOMA) scenario with the aim of maximizing the sum rate of users. The optimization problem at the IRS is quite complicated, and non-convex, since it requires the tuning of the phase shift reflection matrix. Driven by the rising deployment of deep reinforcement learning (DRL) techniques… ▽ More

    Submitted 3 April, 2021; originally announced April 2021.

  41. arXiv:2103.03392  [pdf, ps, other

    eess.SY cs.GT

    The Effect of Behavioral Probability Weighting in a Simultaneous Multi-Target Attacker-Defender Game

    Authors: Mustafa Abdallah, Timothy Cason, Saurabh Bagchi, Shreyas Sundaram

    Abstract: We consider a security game in a setting consisting of two players (an attacker and a defender), each with a given budget to allocate towards attack and defense, respectively, of a set of nodes. Each node has a certain value to the attacker and the defender, along with a probability of being successfully compromised, which is a function of the investments in that node by both players. For such gam… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

    Comments: Accepted to appear at European Control Conference 2021

  42. arXiv:2102.05814  [pdf, other

    cs.LG cs.NE

    Anomaly Detection through Transfer Learning in Agriculture and Manufacturing IoT Systems

    Authors: Mustafa Abdallah, Wo Jae Lee, Nithin Raghunathan, Charilaos Mousoulis, John W. Sutherland, Saurabh Bagchi

    Abstract: IoT systems have been facing increasingly sophisticated technical problems due to the growing complexity of these systems and their fast deployment practices. Consequently, IoT managers have to judiciously detect failures (anomalies) in order to reduce their cyber risk and operational cost. While there is a rich literature on anomaly detection in many IoT-based systems, there is no existing work t… ▽ More

    Submitted 10 February, 2021; originally announced February 2021.

  43. arXiv:2102.01884  [pdf, other

    cs.NI

    DQN-Based Multi-User Power Allocation for Hybrid RF/VLC Networks

    Authors: Bekir Sait Ciftler, Abdulmalik Alwarafy, Mohamed Abdallah, Mounir Hamdi

    Abstract: In this paper, a Deep Q-Network (DQN) based multi-agent multi-user power allocation algorithm is proposed for hybrid networks composed of radio frequency (RF) and visible light communication (VLC) access points (APs). The users are capable of multihoming, which can bridge RF and VLC links for accommodating their bandwidth requirements. By leveraging a non-cooperative multi-agent DQN algorithm, whe… ▽ More

    Submitted 3 February, 2021; originally announced February 2021.

    Comments: 6 pages, 4 figures, accepted to IEEE ICC 2021

  44. arXiv:2012.06974  [pdf, other

    cs.NI

    Federated Mimic Learning for Privacy Preserving Intrusion Detection

    Authors: Noor Ali Al-Athba Al-Marri, Bekir Sait Ciftler, Mohamed Abdallah

    Abstract: Internet of things (IoT) devices are prone to attacks due to the limitation of their privacy and security components. These attacks vary from exploiting backdoors to disrupting the communication network of the devices. Intrusion Detection Systems (IDS) play an essential role in ensuring information privacy and security of IoT devices against these attacks. Recently, deep learning-based IDS techniq… ▽ More

    Submitted 13 December, 2020; originally announced December 2020.

    Comments: 6 pages, 6 figures, accepted to Blackseacom 2020

  45. arXiv:2011.06933  [pdf, other

    cs.CR cs.AI cs.GT

    Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems

    Authors: Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi

    Abstract: We model the behavioral biases of human decision-making in securing interdependent systems and show that such behavioral decision-making leads to a suboptimal pattern of resource allocation compared to non-behavioral (rational) decision-making. We provide empirical evidence for the existence of such behavioral bias model through a controlled subject study with 145 participants. We then propose thr… ▽ More

    Submitted 22 November, 2020; v1 submitted 12 November, 2020; originally announced November 2020.

    Comments: Accepted to appear at the 16th ACM Asia Conference on Computer and Communications Security (ASIACCS), 2021. arXiv admin note: text overlap with arXiv:2004.01958

  46. arXiv:2008.03252  [pdf

    cs.NI cs.CR

    A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet of Things

    Authors: Abdulmalik Alwarafy, Khaled A. Al-Thelaya, Mohamed Abdallah, Jens Schneider, Mounir Hamdi

    Abstract: Internet of Things (IoT) is an innovative paradigm envisioned to provide massive applications that are now part of our daily lives. Millions of smart devices are deployed within complex networks to provide vibrant functionalities including communications, monitoring, and controlling of critical infrastructures. However, this massive growth of IoT devices and the corresponding huge data traffic gen… ▽ More

    Submitted 5 August, 2020; originally announced August 2020.

  47. arXiv:2007.04086  [pdf, ps, other

    cs.CR

    Green-PoW: An Energy-Efficient Blockchain Proof-of-Work Consensus Algorithm

    Authors: Noureddine Lasla, Lina Alsahan, Mohamed Abdallah, Mohamed Younis

    Abstract: This paper opts to mitigate the energy-inefficiency of the Blockchain Proof-of-Work (PoW) consensus algorithm by rationally repurposing the power spent during the mining process. The original PoW mining scheme is designed to consider one block at a time and assign a reward to the first place winner of a computation race. To reduce the mining-related energy consumption, we propose to compensate the… ▽ More

    Submitted 8 July, 2020; originally announced July 2020.

  48. arXiv:2005.13003  [pdf, other

    cs.NI eess.SP

    Context-Aware Collaborative-Intelligence with Spatio-Temporal In-Sensor-Analytics in a Large-Area IoT Testbed

    Authors: Baibhab Chatterjee, Dong-Hyun Seo, Shramana Chakraborty, Shitij Avlani, Xiaofan Jiang, Heng Zhang, Mustafa Abdallah, Nithin Raghunathan, Charilaos Mousoulis, Ali Shakouri, Saurabh Bagchi, Dimitrios Peroulis, Shreyas Sen

    Abstract: Decades of continuous scaling has reduced the energy of unit computing to virtually zero, while energy-efficient communication has remained the primary bottleneck in achieving fully energy-autonomous IoT nodes. This paper presents and analyzes the trade-offs between the energies required for communication and computation in a wireless sensor network, deployed in a mesh architecture over a 2400-acr… ▽ More

    Submitted 4 November, 2020; v1 submitted 26 May, 2020; originally announced May 2020.

    Comments: 15 pages with author info, 18 figures

    Journal ref: Published in IEEE Internet of Things Journal (Early access would be available: Dec 2020)

  49. Outage Analysis of Cognitive Electric Vehicular Networks over Mixed RF/VLC Channels

    Authors: Galymzhan Nauryzbayev, Mohamed Abdallah, Naofal Al-Dhahir

    Abstract: Modern transportation infrastructures are considered as one of the main sources of the greenhouse gases emitted into the atmosphere. This situation requires the decision-making players to enact the mass use of electric vehicles (EVs) which, in turn, highly demand novel secure communication technologies robust to various cyber-attacks. Therefore, in this paper, we propose a novel jamming-robust com… ▽ More

    Submitted 23 April, 2020; originally announced April 2020.

    Comments: 11 pages, 6 figures

    Journal ref: IEEE Transactions on Cognitive Communications and Networking, vol. 6, no. 3, pp. 1096-1107, September 2020

  50. arXiv:2004.01958  [pdf, other

    cs.CR cs.GT

    BASCPS: How does behavioral decision making impact the security of cyber-physical systems?

    Authors: Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi

    Abstract: We study the security of large-scale cyber-physical systems (CPS) consisting of multiple interdependent subsystems, each managed by a different defender. Defenders invest their security budgets with the goal of thwarting the spread of cyber attacks to their critical assets. We model the security investment decisions made by the defenders as a security game. While prior work has used security games… ▽ More

    Submitted 7 April, 2020; v1 submitted 4 April, 2020; originally announced April 2020.

    Comments: 32 pages