Skip to main content

Showing 1–47 of 47 results for author: Hassan, U

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.06226  [pdf, ps, other

    cs.CR

    PROVSYN: Synthesizing Provenance Graphs for Data Augmentation in Intrusion Detection Systems

    Authors: Yi Huang, Wajih UI Hassan, Yao Guo, Xiangqun Chen, Ding Li

    Abstract: Provenance graph analysis plays a vital role in intrusion detection, particularly against Advanced Persistent Threats (APTs), by exposing complex attack patterns. While recent systems combine graph neural networks (GNNs) with natural language processing (NLP) to capture structural and semantic features, their effectiveness is limited by class imbalance in real-world data. To address this, we intro… ▽ More

    Submitted 6 June, 2025; originally announced June 2025.

  2. arXiv:2505.18944  [pdf, other

    cs.CR cs.ET

    Exemplifying Emerging Phishing: QR-based Browser-in-The-Browser (BiTB) Attack

    Authors: Muhammad Wahid Akram, Keshav Sood, Muneeb Ul Hassan, Basant Subba

    Abstract: Lately, cybercriminals constantly formulate productive approaches to exploit individuals. This article exemplifies an innovative attack, namely QR-based Browser-in-The-Browser (BiTB), using proficiencies of Large Language Model (LLM) i.e. Google Gemini. The presented attack is a fusion of two emerging attacks: BiTB and Quishing (QR code phishing). Our study underscores attack's simplistic implemen… ▽ More

    Submitted 24 May, 2025; originally announced May 2025.

    Comments: This manuscript is of 5 pages including 7 figures and 2 algorithms

  3. arXiv:2505.12834  [pdf

    cs.CV

    A Study on the Refining Handwritten Font by Mixing Font Styles

    Authors: Avinash Kumar, Kyeolhee Kang, Ammar ul Hassan, Jaeyoung Choi

    Abstract: Handwritten fonts have a distinct expressive character, but they are often difficult to read due to unclear or inconsistent handwriting. FontFusionGAN (FFGAN) is a novel method for improving handwritten fonts by combining them with printed fonts. Our method implements generative adversarial network (GAN) to generate font that mix the desirable features of handwritten and printed fonts. By training… ▽ More

    Submitted 19 May, 2025; originally announced May 2025.

    Comments: 4 pages, 3 figures, MITA 2023 (The 19th International Conference on Multimedia Information Technology and Applications July. 11 ~ July 14, 2023, Technical University of Ostrava, Ostrava, Czech)

  4. arXiv:2503.20281  [pdf, other

    cs.CR cs.AI

    Are We There Yet? Unraveling the State-of-the-Art Graph Network Intrusion Detection Systems

    Authors: Chenglong Wang, Pujia Zheng, Jiaping Gui, Cunqing Hua, Wajih Ul Hassan

    Abstract: Network Intrusion Detection Systems (NIDS) are vital for ensuring enterprise security. Recently, Graph-based NIDS (GIDS) have attracted considerable attention because of their capability to effectively capture the complex relationships within the graph structures of data communications. Despite their promise, the reproducibility and replicability of these GIDS remain largely unexplored, posing cha… ▽ More

    Submitted 26 March, 2025; originally announced March 2025.

  5. arXiv:2502.08650  [pdf, other

    cs.CY

    Who is Responsible? The Data, Models, Users or Regulations? A Comprehensive Survey on Responsible Generative AI for a Sustainable Future

    Authors: Shaina Raza, Rizwan Qureshi, Anam Zahid, Joseph Fioresi, Ferhat Sadak, Muhammad Saeed, Ranjan Sapkota, Aditya Jain, Anas Zafar, Muneeb Ul Hassan, Aizan Zafar, Hasan Maqbool, Ashmal Vayani, Jia Wu, Maged Shoman

    Abstract: Responsible Artificial Intelligence (RAI) has emerged as a crucial framework for addressing ethical concerns in the development and deployment of Artificial Intelligence (AI) systems. A significant body of literature exists, primarily focusing on either RAI guidelines and principles or the technical aspects of RAI, largely within the realm of traditional AI. However, a notable gap persists in brid… ▽ More

    Submitted 28 April, 2025; v1 submitted 15 January, 2025; originally announced February 2025.

    Comments: under review

  6. arXiv:2412.04622  [pdf, other

    cs.ET cs.LG

    Mixed Delay/Nondelay Embeddings Based Neuromorphic Computing with Patterned Nanomagnet Arrays

    Authors: Changpeng Ti, Usman Hassan, Sairam Sri Vatsavai, Margaret McCarter, Aastha Vasdev, Jincheng An, Barat Achinuq, Ulrich Welp, Sen-Ching Cheung, Ishan G Thakkar, J. Todd Hastings

    Abstract: Patterned nanomagnet arrays (PNAs) have been shown to exhibit a strong geometrically frustrated dipole interaction. Some PNAs have also shown emergent domain wall dynamics. Previous works have demonstrated methods to physically probe these magnetization dynamics of PNAs to realize neuromorphic reservoir systems that exhibit chaotic dynamical behavior and high-dimensional nonlinearity. These PNA re… ▽ More

    Submitted 5 December, 2024; originally announced December 2024.

  7. arXiv:2411.19690  [pdf, other

    cs.CV cs.CY cs.LG

    Gated-Attention Feature-Fusion Based Framework for Poverty Prediction

    Authors: Muhammad Umer Ramzan, Wahab Khaddim, Muhammad Ehsan Rana, Usman Ali, Manohar Ali, Fiaz ul Hassan, Fatima Mehmood

    Abstract: This research paper addresses the significant challenge of accurately estimating poverty levels using deep learning, particularly in developing regions where traditional methods like household surveys are often costly, infrequent, and quickly become outdated. To address these issues, we propose a state-of-the-art Convolutional Neural Network (CNN) architecture, extending the ResNet50 model by inco… ▽ More

    Submitted 29 November, 2024; originally announced November 2024.

    Comments: The paper has accepted for publication at 5th International Conference on Data Engineering and Communication Technology (ICDECT)

  8. arXiv:2407.18858  [pdf, other

    cs.CR

    HADES: Detecting Active Directory Attacks via Whole Network Provenance Analytics

    Authors: Qi Liu, Kaibin Bao, Wajih Ul Hassan, Veit Hagenmeyer

    Abstract: Due to its crucial role in identity and access management in modern enterprise networks, Active Directory (AD) is a top target of Advanced Persistence Threat (APT) actors. Conventional intrusion detection systems (IDS) excel at identifying malicious behaviors caused by malware, but often fail to detect stealthy attacks launched by APT actors. Recent advance in provenance-based IDS (PIDS) shows pro… ▽ More

    Submitted 26 July, 2024; originally announced July 2024.

    Comments: 13 pages

  9. arXiv:2407.18832  [pdf, other

    cs.CR

    Accurate and Scalable Detection and Investigation of Cyber Persistence Threats

    Authors: Qi Liu, Muhammad Shoaib, Mati Ur Rehman, Kaibin Bao, Veit Hagenmeyer, Wajih Ul Hassan

    Abstract: In Advanced Persistent Threat (APT) attacks, achieving stealthy persistence within target systems is often crucial for an attacker's success. This persistence allows adversaries to maintain prolonged access, often evading detection mechanisms. Recognizing its pivotal role in the APT lifecycle, this paper introduces Cyber Persistence Detector (CPD), a novel system dedicated to detecting cyber persi… ▽ More

    Submitted 26 July, 2024; originally announced July 2024.

    Comments: 16 pages

  10. arXiv:2403.09937  [pdf, ps, other

    cs.ET

    Blockchain-enabled Circular Economy -- Collaborative Responsibility in Solar Panel Recycling

    Authors: Mohammad Jabed Morshed Chowdhury, Naveed Ul Hassan, Wayes Tushar, Dustin Niyato, Tapan Saha, H Vincent Poor, Chau Yuen

    Abstract: The adoption of renewable energy resources, such as solar power, is on the rise. However, the excessive installation and lack of recycling facilities pose environmental risks. This paper suggests a circular economy approach to address the issue. By implementing blockchain technology, the end-of-life (EOL) of solar panels can be tracked, and responsibilities can be assigned to relevant stakeholders… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    Comments: Accepted in IEEE Industrial Electronics Magazine

  11. arXiv:2312.10647  [pdf, other

    cs.RO eess.SY

    Single-Stage Optimization of Open-loop Stable Limit Cycles with Smooth, Symbolic Derivatives

    Authors: Muhammad Saud Ul Hassan, Christian Hubicki

    Abstract: Open-loop stable limit cycles are foundational to legged robotics, providing inherent self-stabilization that minimizes the need for computationally intensive feedback-based gait correction. While previous methods have primarily targeted specific robotic models, this paper introduces a general framework for rapidly generating limit cycles across various dynamical systems, with the flexibility to i… ▽ More

    Submitted 17 September, 2024; v1 submitted 17 December, 2023; originally announced December 2023.

    Comments: 7 pages, 7 figures, submitted to ICRA-2025

  12. arXiv:2311.02324  [pdf, other

    cs.CR

    Bounded and Unbiased Composite Differential Privacy

    Authors: Kai Zhang, Yanjun Zhang, Ruoxi Sun, Pei-Wei Tsai, Muneeb Ul Hassan, Xin Yuan, Minhui Xue, Jinjun Chen

    Abstract: The objective of differential privacy (DP) is to protect privacy by producing an output distribution that is indistinguishable between any two neighboring databases. However, traditional differentially private mechanisms tend to produce unbounded outputs in order to achieve maximum disturbance range, which is not always in line with real-world applications. Existing solutions attempt to address th… ▽ More

    Submitted 4 November, 2023; originally announced November 2023.

    Comments: Accepted at 45th IEEE Symposium on Security and Privacy (IEEE S&P)

  13. arXiv:2304.01843  [pdf, ps, other

    cs.IT eess.SP

    Reconfigurable Intelligent Surfaces: Interplay of Unit-Cell- and Surface-Level Design and Performance under Quantifiable Benchmarks

    Authors: Ammar Rafique, Naveed Ul Hassan, Muhammad Zubair, Ijaz Haider Naqvi, Muhammad Qasim Mehmood, Chau Yuen, Marco Di Renzo, Merouane Debbah

    Abstract: The ability of reconfigurable intelligent surfaces (RIS) to produce complex radiation patterns in the far-field is determined by various factors, such as the unit-cell's size, shape, spatial arrangement, tuning mechanism, the communication and control circuitry's complexity, and the illuminating source's type (point/planewave). Research on RIS has been mainly focused on two areas: first, the optim… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

  14. arXiv:2301.10395  [pdf, ps, other

    cs.CR

    Huff-DP: Huffman Coding based Differential Privacy Mechanism for Real-Time Data

    Authors: Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

    Abstract: With the advancements in connected devices, a huge amount of real-time data is being generated. Efficient storage, transmission, and analysation of this real-time big data is important, as it serves a number of purposes ranging from decision making to fault prediction, etc. Alongside this, real-time big data has rigorous utility and privacy requirements, therefore, it is also significantly importa… ▽ More

    Submitted 24 January, 2023; originally announced January 2023.

    Comments: Submitted to Venue

  15. arXiv:2211.00783  [pdf, other

    cs.LG cs.CY cs.SI

    Impact Of Missing Data Imputation On The Fairness And Accuracy Of Graph Node Classifiers

    Authors: Haris Mansoor, Sarwan Ali, Shafiq Alam, Muhammad Asad Khan, Umair ul Hassan, Imdadullah Khan

    Abstract: Analysis of the fairness of machine learning (ML) algorithms recently attracted many researchers' interest. Most ML methods show bias toward protected groups, which limits the applicability of ML models in many applications like crime rate prediction etc. Since the data may have missing values which, if not appropriately handled, are known to further harmfully affect fairness. Many imputation meth… ▽ More

    Submitted 1 November, 2022; originally announced November 2022.

    Comments: Accepted at IEEE International Conference on Big Data (IEEE Big Data)

  16. arXiv:2208.10931  [pdf, ps, other

    cs.IT eess.SP

    Reconfiguring Wireless Environment via Intelligent Surfaces for 6G: Reflection, Modulation, and Security

    Authors: Jindan Xu, Chau Yuen, Chongwen Huang, Naveed Ul Hassan, George C. Alexandropoulos, Marco Di Renzo, Merouane Debbah

    Abstract: Reconfigurable intelligent surface (RIS) has been recognized as an essential enabling technique for the sixth-generation (6G) mobile communication network. Specifically, an RIS is comprised of a large number of small and low-cost reflecting elements whose parameters are dynamically adjustable with a programmable controller. Each of these elements can effectively reflect a phase-shifted version of… ▽ More

    Submitted 23 August, 2022; originally announced August 2022.

    Comments: Submitted to Science China Information Sciences

  17. arXiv:2205.08462  [pdf, ps, other

    cs.CR

    Privacy Preserving Machine Learning for Electric Vehicles: A Survey

    Authors: Abdul Rahman Sani, Muneeb Ul Hassan, Longxiang Gao, Jinjun Chen

    Abstract: In the recent years, the interest of individual users in modern electric vehicles (EVs) has grown exponentially. An EV has two major components, which make it different from traditional vehicles, first is its environment friendly nature because of being electric, and second is the interconnection ability of these vehicles because of modern information and communication technologies (ICTs). Both of… ▽ More

    Submitted 20 December, 2024; v1 submitted 17 May, 2022; originally announced May 2022.

    Comments: Submitted to Journal

  18. arXiv:2112.06089  [pdf, ps, other

    cs.CR

    Anomaly Detection in Blockchain Networks: A Comprehensive Survey

    Authors: Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

    Abstract: Over the past decade, blockchain technology has attracted a huge attention from both industry and academia because it can be integrated with a large number of everyday applications of modern information and communication technologies (ICT). Peer-to-peer (P2P) architecture of blockchain enhances these applications by providing strong security and trust-oriented guarantees, such as immutability, ver… ▽ More

    Submitted 7 July, 2022; v1 submitted 11 December, 2021; originally announced December 2021.

  19. arXiv:2111.02011  [pdf, ps, other

    cs.CR

    Differential Privacy in Cognitive Radio Networks: A Comprehensive Survey

    Authors: Muneeb Ul Hassan, Mubashir Husain Rehmani, Maaz Rehan, Jinjun Chen

    Abstract: Background/Introduction: Integrating cognitive radio (CR) with traditional wireless networks is helping solve the problem of spectrum scarcity in an efficient manner. The opportunistic and dynamic spectrum access features of CR provide the functionality to its unlicensed users to utilize the underutilized spectrum at the time of need because CR nodes can sense vacant bands of spectrum and can also… ▽ More

    Submitted 11 December, 2021; v1 submitted 3 November, 2021; originally announced November 2021.

    Comments: Accepted in Springer Cognitive Computation

  20. arXiv:2109.08774  [pdf, other

    eess.IV cs.CV

    Locally Weighted Mean Phase Angle (LWMPA) Based Tone Mapping Quality Index (TMQI-3)

    Authors: Inaam Ul Hassan, Abdul Haseeb, Sarwan Ali

    Abstract: High Dynamic Range (HDR) images are the ones that contain a greater range of luminosity as compared to the standard images. HDR images have a higher detail and clarity of structure, objects, and color, which the standard images lack. HDR images are useful in capturing scenes that pose high brightness, darker areas, and shadows, etc. An HDR image comprises multiple narrow-range-exposure images comb… ▽ More

    Submitted 17 September, 2021; originally announced September 2021.

  21. arXiv:2108.11697  [pdf, other

    cs.NI eess.SY

    Revenue Maximization through Cell Switching and Spectrum Leasing in 5G HetNets

    Authors: Attai Ibrahim Abubakar, Cihat Ozturk, Metin Ozturk, Michael S. Mollel, Syed Muhammad Asad, Naveed Ul Hassan, Sajjad Hussain, MuhammadAli Imran

    Abstract: One of the ways of achieving improved capacity in mobile cellular networks is via network densification. Even though densification increases the capacity of the network, it also leads to increased energy consumption which can be curbed by dynamically switching off some base stations (BSs) during periods of low traffic. However, dynamic cell switching has the challenge of spectrum under-utilization… ▽ More

    Submitted 26 August, 2021; originally announced August 2021.

    Comments: 28 pages, 6 figures, Submitted to IEEE Transactions on cognitive communications and networking (TCCN)

  22. arXiv:2106.05673  [pdf, other

    cs.CR

    Blockchain and 6G: The Future of Secure and Ubiquitous Communication

    Authors: Ali Hussain Khan, Naveed UL Hassan, Chau Yuen, Jun Zhao, Dusit Niyato, Yan Zhang, H. Vincent Poor

    Abstract: The future communication will be characterized by ubiquitous connectivity and security. These features will be essential requirements for the efficient functioning of the futuristic applications. In this paper, in order to highlight the impact of blockchain and 6G on the future communication systems, we categorize these application requirements into two broad groups. In the first category, called… ▽ More

    Submitted 10 June, 2021; originally announced June 2021.

  23. arXiv:2106.04575  [pdf, other

    cs.CR

    DNS attack mitigation Using OpenStack Isolation

    Authors: Hassnain ul hassan, Rizal Mohd Nor, Md Amiruzzaman, Sharyar Wani, Md. Rajibul Islam

    Abstract: The Domain Name System (DNS) is essential for the Internet, giving a mechanism to resolve hostnames into Internet Protocol (IP) addresses. DNS is known as the world's largest distributed database that manages hostnames and Internet Protocol. By having the DNS, only simple names that can be easily memorized will be used and then the domain name system will map it into the numeric Internet Protocol… ▽ More

    Submitted 28 August, 2021; v1 submitted 8 June, 2021; originally announced June 2021.

    Comments: 6 pages, 3 figures, and 2 tables

  24. arXiv:2104.14237  [pdf, other

    cs.CV cs.AI cs.LG

    TabAug: Data Driven Augmentation for Enhanced Table Structure Recognition

    Authors: Umar Khan, Sohaib Zahid, Muhammad Asad Ali, Adnan ul Hassan, Faisal Shafait

    Abstract: Table Structure Recognition is an essential part of end-to-end tabular data extraction in document images. The recent success of deep learning model architectures in computer vision remains to be non-reflective in table structure recognition, largely because extensive datasets for this domain are still unavailable while labeling new data is expensive and time-consuming. Traditionally, in computer… ▽ More

    Submitted 15 May, 2021; v1 submitted 29 April, 2021; originally announced April 2021.

    Comments: to be published in ICDAR2021 , 15 pages , " packages and articles for this work and its extensions at http://umarky.com " , " official repository https://github.com/sohaib023/splerge-tab-aug?fbclid=IwAR37V79vDLMqLGcC5YCyqY_CsFYQRDZ1-wUMW7GJUYTzkf9oM1bZ25HPmgo "

    ACM Class: I.4.6; I.4.8; I.4.9; I.5.4

  25. arXiv:2103.17139  [pdf, other

    cs.SD

    Privacy Enhanced Speech Emotion Communication using Deep Learning Aided Edge Computing

    Authors: Hafiz Shehbaz Ali, Fakhar ul Hassan, Siddique Latif, Habib Ullah Manzoor, Junaid Qadir

    Abstract: Speech emotion sensing in communication networks has a wide range of applications in real life. In these applications, voice data are transmitted from the user to the central server for storage, processing, and decision making. However, speech data contain vulnerable information that can be used maliciously without the user's consent by an eavesdropping adversary. In this work, we present a privac… ▽ More

    Submitted 31 March, 2021; originally announced March 2021.

    Comments: accepted in ICC 2021 AffectiveSense workshop

  26. arXiv:2102.02583  [pdf, ps, other

    cs.CR

    Optimizing Blockchain Based Smart Grid Auctions: A Green Revolution

    Authors: Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

    Abstract: Traditional smart grid energy auctions cannot directly be integrated in blockchain due to its decentralized nature. Therefore, research works are being carried out to propose efficient decentralized auctions for energy trading. Since, blockchain is a novel paradigm which ensures trust, but it also comes up with a curse of high computation and communication complexity which eventually causes resour… ▽ More

    Submitted 27 June, 2021; v1 submitted 4 February, 2021; originally announced February 2021.

    Comments: Submitted to Journal

  27. arXiv:2102.01480  [pdf, ps, other

    cs.CR

    VPT: Privacy Preserving Energy Trading and Block Mining Mechanism for Blockchain based Virtual Power Plants

    Authors: Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

    Abstract: The desire to overcome reliability issues of distributed energy resources (DERs) lead researchers to development of a novel concept named as virtual power plant (VPP). VPPs are supposed to carry out intelligent, secure, and smart energy trading among prosumers, buyers, and generating stations along with providing efficient energy management. Therefore, integrating blockchain in a decentralized VPP… ▽ More

    Submitted 29 August, 2022; v1 submitted 2 February, 2021; originally announced February 2021.

    Comments: Article Submitted for Review

  28. arXiv:2102.01478  [pdf, ps, other

    cs.CR

    Differentially Private Demand Side Management for Incentivized Dynamic Pricing in Smart Grid

    Authors: Muneeb Ul Hassan, Mubashir Husain Rehmani, Jia Tina Du, Jinjun Chen

    Abstract: In order to efficiently provide demand side management (DSM) in smart grid, carrying out pricing on the basis of real-time energy usage is considered to be the most vital tool because it is directly linked with the finances associated with smart meters. Hence, every smart meter user wants to pay the minimum possible amount along with getting maximum benefits. In this context, usage based dynamic p… ▽ More

    Submitted 25 January, 2022; v1 submitted 2 February, 2021; originally announced February 2021.

    Comments: Submitted to Journal

  29. Déjà Vu: Side-Channel Analysis of Mozilla's NSS

    Authors: Sohaib ul Hassan, Iaroslav Gridin, Ignacio M. Delgado-Lozano, Cesar Pereida García, Jesús-Javier Chi-Domínguez, Alejandro Cabrera Aldaya, Billy Bob Brumley

    Abstract: Recent work on Side Channel Analysis (SCA) targets old, well-known vulnerabilities, even previously exploited, reported, and patched in high-profile cryptography libraries. Nevertheless, researchers continue to find and exploit the same vulnerabilities in old and new products, highlighting a big issue among vendors: effectively tracking and fixing security vulnerabilities when disclosure is not do… ▽ More

    Submitted 13 August, 2020; originally announced August 2020.

    Comments: To appear at ACM CCS 2020

  30. arXiv:2007.15377  [pdf, other

    eess.SP cs.IT

    Dense Small Satellite Networks for Modern Terrestrial Communication Systems: Benefits, Infrastructure, and Technologies

    Authors: Naveed UL Hassan, Chongwen Huang, Chau Yuen, Ayaz Ahmad, Yan Zhang

    Abstract: Dense small satellite networks (DSSN) in low earth orbits (LEO) can benefit several mobile terrestrial communication systems (MTCS). However, the potential benefits can only be achieved through careful consideration of DSSN infrastructure and identification of suitable DSSN technologies. In this paper, we discuss several components of DSSN infrastructure including satellite formations, orbital pat… ▽ More

    Submitted 30 July, 2020; originally announced July 2020.

    Comments: Accepted by Wireless Communication Magazine

  31. arXiv:2007.09802  [pdf, ps, other

    cs.CR cs.NI

    Performance Evaluation of Differential Privacy Mechanisms in Blockchain based Smart Metering

    Authors: Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

    Abstract: The concept of differential privacy emerged as a strong notion to protect database privacy in an untrusted environment. Later on, researchers proposed several variants of differential privacy in order to preserve privacy in certain other scenarios, such as real-time cyber physical systems. Since then, differential privacy has rigorously been applied to certain other domains which has the need of p… ▽ More

    Submitted 19 July, 2020; originally announced July 2020.

    Comments: Submitted

  32. arXiv:1912.12064  [pdf, other

    cs.LG stat.ML

    Efficient Data Analytics on Augmented Similarity Triplets

    Authors: Sarwan Ali, Muhammad Ahmad, Umair ul Hassan, Muhammad Asad Khan, Shafiq Alam, Imdadullah Khan

    Abstract: Data analysis require a pairwise proximity measure over objects. Recent work has extended this to situations where the distance information between objects is given as comparison results of distances between three objects (triplets). Humans find the comparison tasks much easier than the exact distance computation and such data can be easily obtained in big quantity via crowd-sourcing. In this work… ▽ More

    Submitted 18 February, 2023; v1 submitted 27 December, 2019; originally announced December 2019.

    Comments: Accepted at IEEE International Conference on Big Data (IEEE Big Data) 2022

  33. arXiv:1910.04316  [pdf, ps, other

    cs.CR cs.NI

    Differential Privacy in Blockchain Technology: A Futuristic Approach

    Authors: Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

    Abstract: Blockchain has received a widespread attention because of its decentralized, tamper-proof, and transparent nature. Blockchain works over the principle of distributed, secured, and shared ledger, which is used to record, and track data within a decentralized network. This technology has successfully replaced certain systems of economic transactions in organizations and has the potential to overtake… ▽ More

    Submitted 18 April, 2020; v1 submitted 9 October, 2019; originally announced October 2019.

    Comments: Submitted to Journal

  34. arXiv:1909.02914  [pdf, ps, other

    cs.CY cs.CR

    Blockchain Technologies for Smart Energy Systems: Fundamentals, Challenges and Solutions

    Authors: Naveed UL Hassan, Chau Yuen, Dusit Niyato

    Abstract: In this paper, we discuss the integration of blockchain in smart energy systems. We present various blockchain technology solutions, review important blockchain platforms, and several blockchain based smart energy projects in different smart energy domains. The majority of blockchain platforms with embedded combination of blockchain technology solutions are computing- and resource- intensive, and… ▽ More

    Submitted 6 September, 2019; originally announced September 2019.

    Comments: Submitted to IEEE Industrial Electronics Magazine

  35. arXiv:1909.01785  [pdf, other

    cs.CR

    Certified Side Channels

    Authors: Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, Billy Bob Brumley

    Abstract: We demonstrate that the format in which private keys are persisted impacts Side Channel Analysis (SCA) security. Surveying several widely deployed software libraries, we investigate the formats they support, how they parse these keys, and what runtime decisions they make. We uncover a combination of weaknesses and vulnerabilities, in extreme cases inducing completely disjoint multi-precision arith… ▽ More

    Submitted 1 April, 2020; v1 submitted 4 September, 2019; originally announced September 2019.

    Comments: Accepted to USENIX Security Symposium 2020

  36. arXiv:1904.00733  [pdf, other

    cs.CR

    Blockchain And The Future of the Internet: A Comprehensive Review

    Authors: Fakhar ul Hassan, Anwaar Ali, Mohamed Rahouti, Siddique Latif, Salil Kanhere, Jatinder Singh, AlaAl-Fuqaha, Umar Janjua, Adnan Noor Mian, Junaid Qadir, Jon Crowcroft

    Abstract: Blockchain is challenging the status quo of the central trust infrastructure currently prevalent in the Internet towards a design principle that is underscored by decentralization, transparency, and trusted auditability. In ideal terms, blockchain advocates a decentralized, transparent, and more democratic version of the Internet. Essentially being a trusted and decentralized database, blockchain… ▽ More

    Submitted 13 November, 2020; v1 submitted 23 February, 2019; originally announced April 2019.

    Comments: Under Review in IEEE COMST

  37. A Bibliometric Analysis of Publications in Computer Networking Research

    Authors: Waleed Iqbal, Junaid Qadir, Gareth Tyson, Adnan Noor Mian, Saeed Ul Hassan, Jon Crowcroft

    Abstract: This study uses the article content and metadata of four important computer networking periodicals-IEEE Communications Surveys and Tutorials (COMST), IEEE/ACM Transactions on Networking (TON), ACM Special Interest Group on Data Communications (SIGCOMM), and IEEE International Conference on Computer Communications (INFOCOM)-obtained using ACM, IEEE Xplore, Scopus and CrossRef, for an 18-year period… ▽ More

    Submitted 4 March, 2019; originally announced March 2019.

    Comments: 36 Pages, Currently submitted to Springer Scientometrics Journal 2019

    MSC Class: 62-07

    Journal ref: Scientometrics 2019

  38. arXiv:1812.02282  [pdf, ps, other

    cs.CR

    Differential Privacy Techniques for Cyber Physical Systems: A Survey

    Authors: Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

    Abstract: Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT).With the provision of CPSs, the security and privacy threats associated to these systems are also increasing. Passive attacks are being used by intruders to get access to private information of CPSs. In order to make CPSs data more secure, certain… ▽ More

    Submitted 27 September, 2019; v1 submitted 5 December, 2018; originally announced December 2018.

    Comments: 46 pages, 12 figures

    Journal ref: IEEE Communications Surveys and Tutorials, Sep 2019

  39. ISLAND: In-Silico Prediction of Proteins Binding Affinity Using Sequence Descriptors

    Authors: Wajid Arshad Abbasi, Fahad Ul Hassan, Adiba Yaseen, Fayyaz Ul Amir Afsar Minhas

    Abstract: Determination of binding affinity of proteins in the formation of protein complexes requires sophisticated, expensive and time-consuming experimentation which can be replaced with computational methods. Most computational prediction techniques require protein structures which limit their applicability to protein complexes with known structures. In this work, we explore sequence based protein bindi… ▽ More

    Submitted 22 March, 2018; v1 submitted 22 November, 2017; originally announced November 2017.

    Comments: Keywords: Protein sequence analysis, Protein-protein interaction, Support vector machines, Web services, Binding affinity

    Journal ref: BioData Mining, 2020 13:20

  40. arXiv:1704.03361  [pdf

    cs.CY

    Societal impacts of big data: challenges and opportunities in Europe

    Authors: Martí Cuquet, Guillermo Vega-Gorgojo, Hans Lammerant, Rachel Finn, Umair ul Hassan

    Abstract: This paper presents the risks and opportunities of big data and the potential social benefits it can bring. The research is based on an analysis of the societal impacts observed in a set of six case studies across different European sectors. These impacts are divided into economic, social and ethical, legal and political impacts, and affect areas such as improved efficiency, innovation and decisio… ▽ More

    Submitted 11 April, 2017; originally announced April 2017.

    Comments: 17 pages, 2 figures, 1 table

  41. arXiv:1704.02341  [pdf, other

    cs.DC

    HiFrames: High Performance Data Frames in a Scripting Language

    Authors: Ehsan Totoni, Wajih Ul Hassan, Todd A. Anderson, Tatiana Shpeisman

    Abstract: Data frames in scripting languages are essential abstractions for processing structured data. However, existing data frame solutions are either not distributed (e.g., Pandas in Python) and therefore have limited scalability, or they are not tightly integrated with array computations (e.g., Spark SQL). This paper proposes a novel compiler-based approach where we integrate data frames into the High… ▽ More

    Submitted 7 April, 2017; originally announced April 2017.

  42. arXiv:1702.04323  [pdf, other

    cs.DC

    Don't cry over spilled records: Memory elasticity of data-parallel applications and its application to cluster scheduling

    Authors: Calin Iorgulescu, Florin Dinu, Aunn Raza, Wajih Ul Hassan, Willy Zwaenepoel

    Abstract: Understanding the performance of data-parallel workloads when resource-constrained has significant practical importance but unfortunately has received only limited attention. This paper identifies, quantifies and demonstrates memory elasticity, an intrinsic property of data-parallel tasks. Memory elasticity allows tasks to run with significantly less memory that they would ideally want while only… ▽ More

    Submitted 14 February, 2017; originally announced February 2017.

    Comments: 13 pages (11 without references)

    ACM Class: C.2.4; H.3.4

  43. arXiv:1702.03204  [pdf, other

    cs.NI

    Exploiting QoS Flexibility for Smart Grid and IoT Applications Using TV White Spaces: Extended Version

    Authors: Naveed UL Hassan, Chau Yuen, Muhammad Bershgal Atique

    Abstract: In this paper, we consider the utilization of TV White Spaces (TVWS) by small Cognitive Radio (CR) wireless network operators (SCWNO) to support the communication needs of various smart grid and internet of things (IoT) applications. Spectrum leasing could be essential for SCWNO to support a wide range of applications. In our paper, we assume that in order to ensure Quality of service (QoS) requir… ▽ More

    Submitted 10 February, 2017; originally announced February 2017.

  44. arXiv:1701.03416  [pdf, ps, other

    cs.NI

    Guaranteeing QoS using Unlicensed TV White Spaces for Smart Grid Applications

    Authors: Naveed Ul Hassan, Wayes Tushar, Chau Yuen, See Gim Kerk, Ser Wah Oh

    Abstract: In this paper, we consider the utilization of TV White Spaces (TVWS) by small Cognitive Radio (CR) network operators to support the communication needs of various smart grid applications. We first propose a multi-tier communication network architecture for smart metering applications in dense urban environments. Our measurement campaign, without any competition from other CR operators, reveals tha… ▽ More

    Submitted 6 December, 2016; originally announced January 2017.

    Comments: Journal paper

  45. arXiv:1504.03916  [pdf, other

    cs.IT

    Challenges and some new directions in channel coding

    Authors: Erdal Arikan, Najeeb ul Hassan, Michael Lentmaier, Guido Montorsi, Jossy Sayir

    Abstract: Three areas of ongoing research in channel coding are surveyed, and recent developments are presented in each area: spatially coupled Low-Density Parity-Check (LDPC) codes, non-binary LDPC codes, and polar coding.

    Submitted 15 April, 2015; originally announced April 2015.

    Comments: Accepted for publication in the Journal of Communications and Networks, JCN copyright applies

  46. Power Control for Sum Rate Maximization on Interference Channels Under Sum Power Constraint

    Authors: Naveed Ul Hassan, Chau Yuen, Shayan Saeed, Zhaoyang Zhang

    Abstract: In this paper, we consider the problem of power control for sum rate maximization on multiple interfering links (TX-RX pairs)under sum power constraint. We consider a single frequency network, where all pairs are operating in same frequency band,thereby creating interference for each other. We study the power allocation problem for sum rate maximization with and without QoS requirements on individ… ▽ More

    Submitted 15 July, 2014; originally announced July 2014.

    Comments: 17 pages, 8 figures, IEEE Transactions on Vehicular Technology

  47. arXiv:1405.6360  [pdf

    cs.NI

    Design of A Scalable Hybrid MAC Protocol for Heterogeneous M2M Networks

    Authors: Yi Liu, Chau Yuen, Xianghui Cao, Naveed Ul Hassan, Jiming Chen

    Abstract: A robust and resilient Medium Access Control (MAC) protocol is crucial for numerous machine-type devices to concurrently access the channel in a Machine-to-Machine (M2M) network. Simplex (reservation or contention based) MAC protocols are studied in most literatures which may not be able to provide a scalable solution for M2M networks with large number of heterogeneous devices. In this paper, a sc… ▽ More

    Submitted 25 May, 2014; originally announced May 2014.