Skip to main content

Showing 1–3 of 3 results for author: Chehri, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2411.03355  [pdf, other

    cs.CR cs.AI cs.LG

    Exploring Feature Importance and Explainability Towards Enhanced ML-Based DoS Detection in AI Systems

    Authors: Paul Badu Yakubu, Evans Owusu, Lesther Santana, Mohamed Rahouti, Abdellah Chehri, Kaiqi Xiong

    Abstract: Denial of Service (DoS) attacks pose a significant threat in the realm of AI systems security, causing substantial financial losses and downtime. However, AI systems' high computational demands, dynamic behavior, and data variability make monitoring and detecting DoS attacks challenging. Nowadays, statistical and machine learning (ML)-based DoS classification and detection approaches utilize a bro… ▽ More

    Submitted 4 November, 2024; originally announced November 2024.

    Comments: 6 pages, 2 figures, IEEE VTC2024-Fall

  2. Enabling Trustworthy Federated Learning in Industrial IoT: Bridging the Gap Between Interpretability and Robustness

    Authors: Senthil Kumar Jagatheesaperumal, Mohamed Rahouti, Ali Alfatemi, Nasir Ghani, Vu Khanh Quy, Abdellah Chehri

    Abstract: Federated Learning (FL) represents a paradigm shift in machine learning, allowing collaborative model training while keeping data localized. This approach is particularly pertinent in the Industrial Internet of Things (IIoT) context, where data privacy, security, and efficient utilization of distributed resources are paramount. The essence of FL in IIoT lies in its ability to learn from diverse, d… ▽ More

    Submitted 1 September, 2024; originally announced September 2024.

    Comments: 7 pages, 2 figures

    MSC Class: 68Txx ACM Class: I.2.6

    Journal ref: IEEE Internet of Things Magazine, Year: 2024, Volume: 7, Issue: 5

  3. arXiv:2312.06928  [pdf, other

    cs.CR cs.RO

    Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach

    Authors: Senthil Kumar Jagatheesaperumal, Mohamed Rahouti, Kaiqi Xiong, Abdellah Chehri, Nasir Ghani, Jan Bieniek

    Abstract: Unmanned Aerial Vehicles (UAVs), previously favored by enthusiasts, have evolved into indispensable tools for effectively managing disasters and responding to emergencies. For example, one of their most critical applications is to provide seamless wireless communication services in remote rural areas. Thus, it is substantial to identify and consider the different security challenges in the researc… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Comments: 25 pages, 6 figures, 3 tables