Skip to main content

Showing 1–4 of 4 results for author: Aliee, F S

Searching in archive cs. Search in all archives.
.
  1. A Lightweight and Secure Deep Learning Model for Privacy-Preserving Federated Learning in Intelligent Enterprises

    Authors: Reza Fotohi, Fereidoon Shams Aliee, Bahar Farahani

    Abstract: The ever growing Internet of Things (IoT) connections drive a new type of organization, the Intelligent Enterprise. In intelligent enterprises, machine learning based models are adopted to extract insights from data. Due to the efficiency and privacy challenges of these traditional models, a new federated learning (FL) paradigm has emerged. In FL, multiple enterprises can jointly train a model to… ▽ More

    Submitted 3 March, 2025; originally announced March 2025.

    Comments: 11 pages, 7 figures, IEEE Internet of Things Journal (2024)

  2. Decentralized and Robust Privacy-Preserving Model Using Blockchain-Enabled Federated Deep Learning in Intelligent Enterprises

    Authors: Reza Fotohi, Fereidoon Shams Aliee, Bahar Farahani

    Abstract: In Federated Deep Learning (FDL), multiple local enterprises are allowed to train a model jointly. Then, they submit their local updates to the central server, and the server aggregates the updates to create a global model. However, trained models usually perform worse than centralized models, especially when the training data distribution is non-independent and identically distributed (nonIID). N… ▽ More

    Submitted 18 February, 2025; originally announced February 2025.

    Comments: 28 pages, 10 figures, journal

    Journal ref: Applied Soft Computing, 161, 111764 (2024)

  3. Online rating system development using blockchain-based distributed ledger technology

    Authors: Monir Shaker, Fereidoon Shams Aliee, Reza Fotohi

    Abstract: In most websites, the online rating system provides the ratings of products and services to users. Lack of trust in data integrity and its manipulation has hindered fulfilling user satisfaction. Since existing online rating systems deal with a central server, all rating data is stored on the central server. Therefore, all rating data can be removed, modified, and manipulated by the system manager… ▽ More

    Submitted 11 January, 2021; originally announced January 2021.

    Comments: 25 figures, 5 tables, Journal Wireless Netw (2021)

  4. An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks

    Authors: Reza Fotohi, Eslam Nazemi, Fereidoon Shams Aliee

    Abstract: UAVNs (unmanned aerial vehicle networks) may become vulnerable to threats and attacks due to their characteristic features such as highly dynamic network topology, open-air wireless environments, and high mobility. Since previous work has focused on classical and metaheuristic-based approaches, none of these approaches have a self-adaptive approach. In this paper, the challenges and weaknesses of… ▽ More

    Submitted 3 June, 2020; originally announced June 2020.

    Comments: 35 pages, 12 figures, 14 tables, Journal

    Journal ref: Vehicular Communications. 2020 May 28:100267