-
Blockchain-Enabled Privacy-Preserving Second-Order Federated Edge Learning in Personalized Healthcare
Authors:
Anum Nawaz,
Muhammad Irfan,
Xianjia Yu,
Zhuo Zou,
Tomi Westerlund
Abstract:
Federated learning (FL) has attracted increasing attention to mitigate security and privacy challenges in traditional cloud-centric machine learning models specifically in healthcare ecosystems. FL methodologies enable the training of global models through localized policies, allowing independent operations at the edge clients' level. Conventional first-order FL approaches face several challenges…
▽ More
Federated learning (FL) has attracted increasing attention to mitigate security and privacy challenges in traditional cloud-centric machine learning models specifically in healthcare ecosystems. FL methodologies enable the training of global models through localized policies, allowing independent operations at the edge clients' level. Conventional first-order FL approaches face several challenges in personalized model training due to heterogeneous non-independent and identically distributed (non-iid) data of each edge client. Recently, second-order FL approaches maintain the stability and consistency of non-iid datasets while improving personalized model training. This study proposes and develops a verifiable and auditable optimized second-order FL framework BFEL (blockchain-enhanced federated edge learning) based on optimized FedCurv for personalized healthcare systems. FedCurv incorporates information about the importance of each parameter to each client's task (through Fisher Information Matrix) which helps to preserve client-specific knowledge and reduce model drift during aggregation. Moreover, it minimizes communication rounds required to achieve a target precision convergence for each edge client while effectively managing personalized training on non-iid and heterogeneous data. The incorporation of Ethereum-based model aggregation ensures trust, verifiability, and auditability while public key encryption enhances privacy and security. Experimental results of federated CNNs and MLPs utilizing Mnist, Cifar-10, and PathMnist demonstrate the high efficiency and scalability of the proposed framework.
△ Less
Submitted 31 May, 2025;
originally announced June 2025.
-
Improved Brain Tumor Detection in MRI: Fuzzy Sigmoid Convolution in Deep Learning
Authors:
Muhammad Irfan,
Anum Nawaz,
Riku Klen,
Abdulhamit Subasi,
Tomi Westerlund,
Wei Chen
Abstract:
Early detection and accurate diagnosis are essential to improving patient outcomes. The use of convolutional neural networks (CNNs) for tumor detection has shown promise, but existing models often suffer from overparameterization, which limits their performance gains. In this study, fuzzy sigmoid convolution (FSC) is introduced along with two additional modules: top-of-the-funnel and middle-of-the…
▽ More
Early detection and accurate diagnosis are essential to improving patient outcomes. The use of convolutional neural networks (CNNs) for tumor detection has shown promise, but existing models often suffer from overparameterization, which limits their performance gains. In this study, fuzzy sigmoid convolution (FSC) is introduced along with two additional modules: top-of-the-funnel and middle-of-the-funnel. The proposed methodology significantly reduces the number of trainable parameters without compromising classification accuracy. A novel convolutional operator is central to this approach, effectively dilating the receptive field while preserving input data integrity. This enables efficient feature map reduction and enhances the model's tumor detection capability. In the FSC-based model, fuzzy sigmoid activation functions are incorporated within convolutional layers to improve feature extraction and classification. The inclusion of fuzzy logic into the architecture improves its adaptability and robustness. Extensive experiments on three benchmark datasets demonstrate the superior performance and efficiency of the proposed model. The FSC-based architecture achieved classification accuracies of 99.17%, 99.75%, and 99.89% on three different datasets. The model employs 100 times fewer parameters than large-scale transfer learning architectures, highlighting its computational efficiency and suitability for detecting brain tumors early. This research offers lightweight, high-performance deep-learning models for medical imaging applications.
△ Less
Submitted 8 May, 2025;
originally announced May 2025.
-
Designing Cellular Manufacturing System in Presence of Alternative Process Plans
Authors:
Md. Kutub Uddin,
Md. Saiful Islam,
Md Abrar Jahin,
Md. Tanjid Hossen Irfan,
Md. Saiful Islam Seam,
M. F. Mridha
Abstract:
In the design of cellular manufacturing systems (CMS), numerous technological and managerial decisions must be made at both the design and operational stages. The first step in designing a CMS involves grouping parts and machines. In this paper, four integer programming formulations are presented for grouping parts and machines in a CMS at both the design and operational levels for a generalized g…
▽ More
In the design of cellular manufacturing systems (CMS), numerous technological and managerial decisions must be made at both the design and operational stages. The first step in designing a CMS involves grouping parts and machines. In this paper, four integer programming formulations are presented for grouping parts and machines in a CMS at both the design and operational levels for a generalized grouping problem, where each part has more than one process plan, and each operation of a process plan can be performed on more than one machine. The minimization of inter-cell and intra-cell movements is achieved by assigning the maximum possible number of consecutive operations of a part type to the same cell and to the same machine, respectively. The suitability of minimizing inter-cell and intra-cell movements as an objective, compared to other objectives such as minimizing investment costs on machines, operating costs, etc., is discussed. Numerical examples are included to illustrate the workings of the formulations.
△ Less
Submitted 4 December, 2024; v1 submitted 22 November, 2024;
originally announced November 2024.
-
On the Reliability of Radio Frequency Fingerprinting
Authors:
Muhammad Irfan,
Savio Sciancalepore,
Gabriele Oligeri
Abstract:
Radio Frequency Fingerprinting (RFF) offers a unique method for identifying devices at the physical (PHY) layer based on their RF emissions due to intrinsic hardware differences. Nevertheless, RFF techniques depend on the ability to extract information from the PHY layer of the radio spectrum by resorting to Software Defined Radios (SDR). Previous works have highlighted the so-called ``Day-After-T…
▽ More
Radio Frequency Fingerprinting (RFF) offers a unique method for identifying devices at the physical (PHY) layer based on their RF emissions due to intrinsic hardware differences. Nevertheless, RFF techniques depend on the ability to extract information from the PHY layer of the radio spectrum by resorting to Software Defined Radios (SDR). Previous works have highlighted the so-called ``Day-After-Tomorrow'' effect, i.e., an intrinsic issue of SDRs leading to a fingerprint mutation following a radio power cycle. In this work, we extend such a study by demonstrating that fingerprint mutations appear every time a new FPGA image is reloaded, i.e., when the SDR initiates a new communication. In this context, we provide an in-depth analysis of the reliability of RFF over multiple FPGA image reloading operations, highlighting its ephemeral and mutational nature. We introduce a methodology for abstracting fingerprint mutations into a graph and provide a theoretical framework for assessing fingerprint reliability. Our results show that the common assumption of considering the RF fingerprint as unique and always persistent is incorrect. By combining real-world measurements, high-performance SDRs, and state-of-the-art deep learning techniques, we experimentally demonstrate that radio devices feature multiple fingerprints that can be clustered according to shared features. Moreover, we show that the RF fingerprint is a time-independent probabilistic phenomenon, which requires the collection of multiple samples to achieve the necessary reliability.
△ Less
Submitted 17 August, 2024;
originally announced August 2024.
-
Cryptographically Secure Pseudo-Random Number Generation (CS-PRNG) Design using Robust Chaotic Tent Map (RCTM)
Authors:
Muhammad Irfan,
Muhammad Asif Khan
Abstract:
Chaos, a nonlinear dynamical system, favors cryptography due to their inherent sensitive dependence on the initial condition, mixing, and ergodicity property. In recent years, the nonlinear behavior of chaotic maps has been utilized as a random source to generate pseudo-random number generation for cryptographic services. For chaotic maps having Robust chaos, dense, chaotic orbits exist for the ra…
▽ More
Chaos, a nonlinear dynamical system, favors cryptography due to their inherent sensitive dependence on the initial condition, mixing, and ergodicity property. In recent years, the nonlinear behavior of chaotic maps has been utilized as a random source to generate pseudo-random number generation for cryptographic services. For chaotic maps having Robust chaos, dense, chaotic orbits exist for the range of parameter space the occurrence of chaotic attractors in some neighborhoods of parameter space and the absence of periodic windows. Thus, the robust chaotic map shows assertive chaotic behavior for larger parameters space with a positive Lyapunov exponent. This paper presents a novel method to generate cryptographically secure pseudo-random numbers (CSPRNG) using a robust chaotic tent map (RCTM). We proposed a new set of equations featuring modulo and scaling operators that achieve vast parameter space by keeping chaotic orbit globally stable and robust. The dynamic behavior of the RCTM is studied first by plotting the bifurcation diagram that shows chaotic behavior for different parameters, which the positive Lyapunov exponent verifies. We iterated the RCTM to generate pseudo-random bits using a simple thresholding method. Various statistical tests are performed that ascertain the randomness of generated secure pseudo-random bits. It includes NIST 800-22 test suite, ENT statistical test suite, TestU01 test suite, key space analysis, key sensitivity analysis, correlation analysis, histogram analysis, and differential analysis. The proposed scheme has achieved larger key space as compared with existing methods. The results show that the proposed PRBG algorithm can generate CSPRNG.
△ Less
Submitted 10 August, 2024;
originally announced August 2024.
-
Preventing Radio Fingerprinting through Low-Power Jamming
Authors:
Muhammad Irfan,
Savio Sciancalepore,
Gabriele Oligeri
Abstract:
Radio Frequency fingerprinting enables a passive receiver to recognize and authenticate a transmitter without the need for cryptographic tools. Authentication is achieved by isolating specific features of the transmitted signal that are unique to the transmitter's hardware. Much research has focused on improving the effectiveness and efficiency of radio frequency fingerprinting to maximize its per…
▽ More
Radio Frequency fingerprinting enables a passive receiver to recognize and authenticate a transmitter without the need for cryptographic tools. Authentication is achieved by isolating specific features of the transmitted signal that are unique to the transmitter's hardware. Much research has focused on improving the effectiveness and efficiency of radio frequency fingerprinting to maximize its performance in various scenarios and conditions, while little research examined how to protect devices from being subject to radio fingerprinting in the wild.
In this paper, we explore a novel point of view. We examine the threat posed by radio frequency fingerprinting, which facilitates the unauthorized identification of wireless devices in the field by malicious entities. We also suggest a method to sanitize the transmitted signal of its fingerprint using a low-power jammer, deployed on purpose to improve devices' anonymity on the channel while still guaranteeing the link's quality of service. Our experimental results and subsequent analysis demonstrate that a low-power jammer can effectively block a malicious eavesdropper from identifying a device without affecting the quality of the wireless link, thereby restoring the privacy of the user when accessing the radio spectrum.
△ Less
Submitted 2 April, 2025; v1 submitted 11 July, 2024;
originally announced July 2024.
-
Object Manipulation in Marine Environments using Reinforcement Learning
Authors:
Ahmed Nader,
Muhayy Ud Din,
Mughni Irfan,
Irfan Hussain
Abstract:
Performing intervention tasks in the maritime domain is crucial for safety and operational efficiency. The unpredictable and dynamic marine environment makes the intervention tasks such as object manipulation extremely challenging. This study proposes a robust solution for object manipulation from a dock in the presence of disturbances caused by sea waves. To tackle this challenging problem, we ap…
▽ More
Performing intervention tasks in the maritime domain is crucial for safety and operational efficiency. The unpredictable and dynamic marine environment makes the intervention tasks such as object manipulation extremely challenging. This study proposes a robust solution for object manipulation from a dock in the presence of disturbances caused by sea waves. To tackle this challenging problem, we apply a deep reinforcement learning (DRL) based algorithm called Soft. Actor-Critic (SAC). SAC employs an actor-critic framework; the actors learn a policy that minimizes an objective function while the critic evaluates the learned policy and provides feedback to guide the actor-learning process. We trained the agent using the PyBullet dynamic simulator and tested it in a realistic simulation environment called MBZIRC maritime simulator. This simulator allows the simulation of different wave conditions according to the World Meteorological Organization (WMO) sea state code. Simulation results demonstrate a high success rate in retrieving the objects from the dock. The trained agent achieved an 80 percent success rate when applied in the simulation environment in the presence of waves characterized by sea state 2, according to the WMO sea state code
△ Less
Submitted 5 June, 2024;
originally announced June 2024.
-
False Data Injection Attacks in Smart Grids: State of the Art and Way Forward
Authors:
Muhammad Irfan,
Alireza Sadighian,
Adeen Tanveer,
Shaikha J. Al-Naimi,
Gabriele Oligeri
Abstract:
In the recent years cyberattacks to smart grids are becoming more frequent Among the many malicious activities that can be launched against smart grids False Data Injection FDI attacks have raised significant concerns from both academia and industry FDI attacks can affect the internal state estimation processcritical for smart grid monitoring and controlthus being able to bypass conventional Bad D…
▽ More
In the recent years cyberattacks to smart grids are becoming more frequent Among the many malicious activities that can be launched against smart grids False Data Injection FDI attacks have raised significant concerns from both academia and industry FDI attacks can affect the internal state estimation processcritical for smart grid monitoring and controlthus being able to bypass conventional Bad Data Detection BDD methods Hence prompt detection and precise localization of FDI attacks is becomming of paramount importance to ensure smart grids security and safety Several papers recently started to study and analyze this topic from different perspectives and address existing challenges Datadriven techniques and mathematical modelings are the major ingredients of the proposed approaches The primary objective of this work is to provide a systematic review and insights into FDI attacks joint detection and localization approaches considering that other surveys mainly concentrated on the detection aspects without detailed coverage of localization aspects For this purpose we select and inspect more than forty major research contributions while conducting a detailed analysis of their methodology and objectives in relation to the FDI attacks detection and localization We provide our key findings of the identified papers according to different criteria such as employed FDI attacks localization techniques utilized evaluation scenarios investigated FDI attack types application scenarios adopted methodologies and the use of additional data Finally we discuss open issues and future research directions
△ Less
Submitted 20 August, 2023;
originally announced August 2023.
-
Towards Transportation Digital Twin Systems for Traffic Safety and Mobility Applications: A Review
Authors:
Muhammad Sami Irfan,
Sagar Dasgupta,
Mizanur Rahman
Abstract:
Digital twin (DT) systems aim to create virtual replicas of physical objects that are updated in real time with their physical counterparts and evolve alongside the physical assets throughout its lifecycle. Transportation systems are poised to significantly benefit from this new paradigm. In particular, DT technology can augment the capabilities of intelligent transportation systems. However, the…
▽ More
Digital twin (DT) systems aim to create virtual replicas of physical objects that are updated in real time with their physical counterparts and evolve alongside the physical assets throughout its lifecycle. Transportation systems are poised to significantly benefit from this new paradigm. In particular, DT technology can augment the capabilities of intelligent transportation systems. However, the development and deployment of networkwide transportation DT systems need to take into consideration the scale and dynamic nature of future connected and automated transportation systems. Motivated by the need of understanding the requirements and challenges involved in developing and implementing such systems, this paper proposes a hierarchical concept for a Transportation DT (TDT) system starting from individual transportation assets and building up to the entire networkwide TDT. A reference architecture is proposed for TDT systems that could be used as a guide in developing TDT systems at any scale within the presented hierarchical concept. In addition, several use cases are presented based upon the reference architecture which illustrate the utility of a TDT system from transportation safety, mobility and environmental applications perspective. This is followed by a review of current studies in the domain of TDT systems. Finally, the critical challenges and promising future research directions in TDT are discussed to overcome existing barriers to realize a safe and operationally efficient connected and automated transportation systems.
△ Less
Submitted 25 December, 2022; v1 submitted 23 December, 2022;
originally announced December 2022.
-
Reinforcement Learning based Cyberattack Model for Adaptive Traffic Signal Controller in Connected Transportation Systems
Authors:
Muhammad Sami Irfan,
Mizanur Rahman,
Travis Atkison,
Sagar Dasgupta,
Alexander Hainen
Abstract:
In a connected transportation system, adaptive traffic signal controllers (ATSC) utilize real-time vehicle trajectory data received from vehicles through wireless connectivity (i.e., connected vehicles) to regulate green time. However, this wirelessly connected ATSC increases cyber-attack surfaces and increases their vulnerability to various cyber-attack modes, which can be leveraged to induce sig…
▽ More
In a connected transportation system, adaptive traffic signal controllers (ATSC) utilize real-time vehicle trajectory data received from vehicles through wireless connectivity (i.e., connected vehicles) to regulate green time. However, this wirelessly connected ATSC increases cyber-attack surfaces and increases their vulnerability to various cyber-attack modes, which can be leveraged to induce significant congestion in a roadway network. An attacker may receive financial benefits to create such a congestion for a specific roadway. One such mode is a 'sybil' attack in which an attacker creates fake vehicles in the network by generating fake Basic Safety Messages (BSMs) imitating actual connected vehicles following roadway traffic rules. The ultimate goal of an attacker will be to block a route(s) by generating fake or 'sybil' vehicles at a rate such that the signal timing and phasing changes occur without flagging any abrupt change in number of vehicles. Because of the highly non-linear and unpredictable nature of vehicle arrival rates and the ATSC algorithm, it is difficult to find an optimal rate of sybil vehicles, which will be injected from different approaches of an intersection. Thus, it is necessary to develop an intelligent cyber-attack model to prove the existence of such attacks. In this study, a reinforcement learning based cyber-attack model is developed for a waiting time-based ATSC. Specifically, an RL agent is trained to learn an optimal rate of sybil vehicle injection to create congestion for an approach(s). Our analyses revealed that the RL agent can learn an optimal policy for creating an intelligent attack.
△ Less
Submitted 31 October, 2022;
originally announced November 2022.
-
Assessing Mobile Learning System Performance in Indonesia: Reports of the Model Development and Its Instrument Testing
Authors:
Aang Subiyakto,
Noni Erlina,
Yuni Sugiarti,
Nashrul Hakiem,
Moh. Irfan,
Abd. Rahman Ahlan
Abstract:
It is undeniable that people life patterns and technological developments are interrelated within a supply and demand cycle. In the education world, the emergence of the internet and mobile technologies has opened the learning boundaries through the use of mobile learning (m-learning). In Indonesia, the learning service industry has been begun to enliven the outside school education sector for alm…
▽ More
It is undeniable that people life patterns and technological developments are interrelated within a supply and demand cycle. In the education world, the emergence of the internet and mobile technologies has opened the learning boundaries through the use of mobile learning (m-learning). In Indonesia, the learning service industry has been begun to enliven the outside school education sector for almost five years ago. Even though the learning has been discussed around a decade ago, however, it is still rare studies that discuss the performance of the m-learning system based on the end-user perceptions in particular. Therefore, the study may still indispensable, especially from the perspectives of a developing nation. This paper elucidates the preliminary stage results of the above-mentioned study, including the results of the model development and its instrument testing. The DeLone and Mclean information system (IS) success model was adopted, combined with the individual motivation and organizational culture theories, and then adapted into the processional and causal logic of the success model. Around 50 respondent data were collected online and processed and analyzed based on the outer model assessments of the PLS-SEM method using SmartPLS 3.0 to know the reliability and validity of each indicator. The result shows that two of 31 are rejected indicators. The rejections may be the revision considerations for the next study stages. Although this may be trivial for experts, the clarity of its methodological explanations may guide the novice researchers, how to develop a research model and its instrument testing.
△ Less
Submitted 17 February, 2021;
originally announced February 2021.
-
FPTAS for Mixed-Strategy Nash Equilibria in Tree Graphical Games and Their Generalizations
Authors:
Luis E. Ortiz,
Mohammad T. Irfan
Abstract:
We provide the first fully polynomial time approximation scheme (FPTAS) for computing an approximate mixed-strategy Nash equilibrium in tree-structured graphical multi-hypermatrix games (GMhGs). GMhGs are generalizations of normal-form games, graphical games, graphical polymatrix games, and hypergraphical games. Computing an exact mixed-strategy Nash equilibria in graphical polymatrix games is PPA…
▽ More
We provide the first fully polynomial time approximation scheme (FPTAS) for computing an approximate mixed-strategy Nash equilibrium in tree-structured graphical multi-hypermatrix games (GMhGs). GMhGs are generalizations of normal-form games, graphical games, graphical polymatrix games, and hypergraphical games. Computing an exact mixed-strategy Nash equilibria in graphical polymatrix games is PPAD-complete and thus generally believed to be intractable. In contrast, to the best of our knowledge, we are the first to establish an FPTAS for tree polymatrix games as well as tree graphical games when the number of actions is bounded by a constant. As a corollary, we give a quasi-polynomial time approximation scheme (quasi-PTAS) when the number of actions is bounded by the logarithm of the number of players.
△ Less
Submitted 6 February, 2017; v1 submitted 16 February, 2016;
originally announced February 2016.
-
On Influence, Stable Behavior, and the Most Influential Individuals in Networks: A Game-Theoretic Approach
Authors:
Mohammad T. Irfan,
Luis E. Ortiz
Abstract:
We introduce a new approach to the study of influence in strategic settings where the action of an individual depends on that of others in a network-structured way. We propose \emph{influence games} as a \emph{game-theoretic} model of the behavior of a large but finite networked population. Influence games allow \emph{both} positive and negative \emph{influence factors}, permitting reversals in be…
▽ More
We introduce a new approach to the study of influence in strategic settings where the action of an individual depends on that of others in a network-structured way. We propose \emph{influence games} as a \emph{game-theoretic} model of the behavior of a large but finite networked population. Influence games allow \emph{both} positive and negative \emph{influence factors}, permitting reversals in behavioral choices. We embrace \emph{pure-strategy Nash equilibrium (PSNE)}, an important solution concept in non-cooperative game theory, to formally define the \emph{stable outcomes} of an influence game and to predict potential outcomes without explicitly considering intricate dynamics. We address an important problem in network influence, the identification of the \emph{most influential individuals}, and approach it algorithmically using PSNE computation. \emph{Computationally}, we provide (a) complexity characterizations of various problems on influence games; (b) efficient algorithms for several special cases and heuristics for hard cases; and (c) approximation algorithms, with provable guarantees, for the problem of identifying the most influential individuals. \emph{Experimentally}, we evaluate our approach using both synthetic influence games as well as several real-world settings of general interest, each corresponding to a separate branch of the U.S. Government. \emph{Mathematically,} we connect influence games to important game-theoretic models: \emph{potential and polymatrix games}.
△ Less
Submitted 25 October, 2013; v1 submitted 8 March, 2013;
originally announced March 2013.
-
Management of Location Based Advertisement Services using Spatial Triggers in Cellular Networks
Authors:
M. Irfan,
M. M. Tahir N. Baig,
Furqan H. Khan,
Raheel M. Hashmi,
Khurram Shehzad,
Assad Ali
Abstract:
This paper discusses the advent of new technologies which have emerged under the area of Location Based Services (LBS). An innovative implementation and approach has been presented for design of applications which are inventive and attractive towards the user. Spatial Trigger is one of the most promising additions to the LBS technologies. This paper describes ways in which mobile advertisement s…
▽ More
This paper discusses the advent of new technologies which have emerged under the area of Location Based Services (LBS). An innovative implementation and approach has been presented for design of applications which are inventive and attractive towards the user. Spatial Trigger is one of the most promising additions to the LBS technologies. This paper describes ways in which mobile advertisement services can be introduced effectively in the cellular market by bringing innovation in them through effective usage of Spatial Triggers. Hence, opening new horizons to make the consumer cellular networks, commercially, more effective and informative.
△ Less
Submitted 4 November, 2009;
originally announced November 2009.