Skip to main content

Showing 1–6 of 6 results for author: Mulahuwaish, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.04311  [pdf

    cs.CR cs.AI cs.CY cs.LG cs.SI

    A Survey of Social Cybersecurity: Techniques for Attack Detection, Evaluations, Challenges, and Future Prospects

    Authors: Aos Mulahuwaish, Basheer Qolomany, Kevin Gyorick, Jacques Bou Abdo, Mohammed Aledhari, Junaid Qadir, Kathleen Carley, Ala Al-Fuqaha

    Abstract: In today's digital era, the Internet, especially social media platforms, plays a significant role in shaping public opinions, attitudes, and beliefs. Unfortunately, the credibility of scientific information sources is often undermined by the spread of misinformation through various means, including technology-driven tools like bots, cyborgs, trolls, sock-puppets, and deep fakes. This manipulation… ▽ More

    Submitted 5 April, 2025; originally announced April 2025.

  2. arXiv:2310.18479  [pdf, other

    cs.LG cs.AI cs.DC

    Weighted Sampled Split Learning (WSSL): Balancing Privacy, Robustness, and Fairness in Distributed Learning Environments

    Authors: Manish Osti, Aashray Thakuri, Basheer Qolomany, Aos Mulahuwaish

    Abstract: This study presents Weighted Sampled Split Learning (WSSL), an innovative framework tailored to bolster privacy, robustness, and fairness in distributed machine learning systems. Unlike traditional approaches, WSSL disperses the learning process among multiple clients, thereby safeguarding data confidentiality. Central to WSSL's efficacy is its utilization of weighted sampling. This approach ensur… ▽ More

    Submitted 27 October, 2023; originally announced October 2023.

  3. arXiv:2307.10258  [pdf

    cs.CR

    CCTFv1: Computational Modeling of Cyber Team Formation Strategies

    Authors: Tristan J. Calay, Basheer Qolomany, Aos Mulahuwaish, Liaquat Hossain, Jacques Bou Abdo

    Abstract: Rooted in collaborative efforts, cybersecurity spans the scope of cyber competitions and warfare. Despite extensive research into team strategy in sports and project management, empirical study in cyber-security is minimal. This gap motivates this paper, which presents the Collaborative Cyber Team Formation (CCTF) Simulation Framework. Using Agent-Based Modeling, we delve into the dynamics of team… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

  4. arXiv:2303.02032  [pdf, other

    cs.SI cs.AI cs.CY

    Topic Modeling Based on Two-Step Flow Theory: Application to Tweets about Bitcoin

    Authors: Aos Mulahuwaish, Matthew Loucks, Basheer Qolomany, Ala Al-Fuqaha

    Abstract: Digital cryptocurrencies such as Bitcoin have exploded in recent years in both popularity and value. By their novelty, cryptocurrencies tend to be both volatile and highly speculative. The capricious nature of these coins is helped facilitated by social media networks such as Twitter. However, not everyone's opinion matters equally, with most posts garnering little to no attention. Additionally, t… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  5. arXiv:2209.05667  [pdf

    cs.LG cs.CL cs.HC cs.SI

    CovidMis20: COVID-19 Misinformation Detection System on Twitter Tweets using Deep Learning Models

    Authors: Aos Mulahuwaish, Manish Osti, Kevin Gyorick, Majdi Maabreh, Ajay Gupta, Basheer Qolomany

    Abstract: Online news and information sources are convenient and accessible ways to learn about current issues. For instance, more than 300 million people engage with posts on Twitter globally, which provides the possibility to disseminate misleading information. There are numerous cases where violent crimes have been committed due to fake news. This research presents the CovidMis20 dataset (COVID-19 Misinf… ▽ More

    Submitted 12 September, 2022; originally announced September 2022.

  6. arXiv:2208.14411  [pdf

    cs.DC

    Improving Datacenter Utilization through Containerized Service-Based Architecture

    Authors: Aos Mulahuwaish, Shane Korbel, Basheer Qolomany

    Abstract: The modern datacenter's computing capabilities have far outstripped the applications running within and have become a hidden cost of doing business due to how software is architected and deployed. Resources are over-allocated to monolithic applications that sit idle for large parts of the day. If applications were architected and deployed differently, shared services could be used for multiple app… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.