Skip to main content

Showing 1–3 of 3 results for author: Wazzeh, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.07174  [pdf, other

    cs.CV cs.DC

    CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication

    Authors: Mohamad Wazzeh, Mohamad Arafeh, Hani Sami, Hakima Ould-Slimane, Chamseddine Talhi, Azzam Mourad, Hadi Otrok

    Abstract: In the ever-changing world of technology, continuous authentication and comprehensive access management are essential during user interactions with a device. Split Learning (SL) and Federated Learning (FL) have recently emerged as promising technologies for training a decentralized Machine Learning (ML) model. With the increasing use of smartphones and Internet of Things (IoT) devices, these distr… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  2. arXiv:2304.09240  [pdf, other

    cs.CY cs.AI cs.CV cs.NI

    The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions

    Authors: Hani Sami, Ahmad Hammoud, Mouhamad Arafeh, Mohamad Wazzeh, Sarhad Arisdakessian, Mario Chahoud, Osama Wehbi, Mohamad Ajaj, Azzam Mourad, Hadi Otrok, Omar Abdel Wahab, Rabeb Mizouni, Jamal Bentahar, Chamseddine Talhi, Zbigniew Dziong, Ernesto Damiani, Mohsen Guizani

    Abstract: The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many disciplines can benefit from the advancement of the Metaverse when accurately developed, including the fields of technology, gaming, education, art, and culture. Nevertheless, developing the… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

    Comments: IEEE Communications Surveys & Tutorials 2024

  3. arXiv:2211.05662  [pdf, other

    cs.LG cs.AI cs.CR cs.DC

    Warmup and Transfer Knowledge-Based Federated Learning Approach for IoT Continuous Authentication

    Authors: Mohamad Wazzeh, Hakima Ould-Slimane, Chamseddine Talhi, Azzam Mourad, Mohsen Guizani

    Abstract: Continuous behavioural authentication methods add a unique layer of security by allowing individuals to verify their unique identity when accessing a device. Maintaining session authenticity is now feasible by monitoring users' behaviour while interacting with a mobile or Internet of Things (IoT) device, making credential theft and session hijacking ineffective. Such a technique is made possible b… ▽ More

    Submitted 10 November, 2022; originally announced November 2022.