Skip to main content

Showing 1–9 of 9 results for author: Zobaed, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.16447  [pdf, other

    cs.DC cs.CR

    Confidential Computing across Edge-to-Cloud for Machine Learning: A Survey Study

    Authors: SM Zobaed, Mohsen Amini Salehi

    Abstract: Confidential computing has gained prominence due to the escalating volume of data-driven applications (e.g., machine learning and big data) and the acute desire for secure processing of sensitive data, particularly, across distributed environments, such as edge-to-cloud continuum. Provided that the works accomplished in this emerging area are scattered across various research fields, this paper ai… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

  2. arXiv:2301.00928  [pdf, other

    cs.DC cs.CR

    AI-Driven Confidential Computing across Edge-to-Cloud Continuum

    Authors: SM Zobaed

    Abstract: With the meteoric growth of technology, individuals and organizations are widely adopting cloud services to mitigate the burdens of maintenance. Despite its scalability and ease of use, many users who own sensitive data refrain from fully utilizing cloud services due to confidentiality concerns. Maintaining data confidentiality for data at rest and in transit has been widely explored but data rema… ▽ More

    Submitted 2 January, 2023; originally announced January 2023.

    Comments: PhD Dissertation advised by Dr. Mohsen Amini Salehi

  3. arXiv:2211.07130  [pdf, other

    cs.DC cs.AI cs.LG

    Edge-MultiAI: Multi-Tenancy of Latency-Sensitive Deep Learning Applications on Edge

    Authors: SM Zobaed, Ali Mokhtari, Jaya Prakash Champati, Mathieu Kourouma, Mohsen Amini Salehi

    Abstract: Smart IoT-based systems often desire continuous execution of multiple latency-sensitive Deep Learning (DL) applications. The edge servers serve as the cornerstone of such IoT-based systems, however, their resource limitations hamper the continuous execution of multiple (multi-tenant) DL applications. The challenge is that, DL applications function based on bulky "neural network (NN) models" that c… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

    Comments: Accepted in Utility Cloud Computing Conference 2022

  4. arXiv:2109.02874  [pdf, other

    cs.CV cs.IR

    DeepFakes: Detecting Forged and Synthetic Media Content Using Machine Learning

    Authors: Sm Zobaed, Md Fazle Rabby, Md Istiaq Hossain, Ekram Hossain, Sazib Hasan, Asif Karim, Khan Md. Hasib

    Abstract: The rapid advancement in deep learning makes the differentiation of authentic and manipulated facial images and video clips unprecedentedly harder. The underlying technology of manipulating facial appearances through deep generative approaches, enunciated as DeepFake that have emerged recently by promoting a vast number of malicious face manipulation applications. Subsequently, the need of other s… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: A preprint version

  5. arXiv:2102.13367  [pdf, other

    cs.IR cs.DC

    SAED: Edge-Based Intelligence for Privacy-Preserving Enterprise Search on the Cloud

    Authors: Sakib M Zobaed, Mohsen Amini Salehi, Rajkumar Buyya

    Abstract: Cloud-based enterprise search services (e.g., AWS Kendra) have been entrancing big data owners by offering convenient and real-time search solutions to them. However, the problem is that individuals and organizations possessing confidential big data are hesitant to embrace such services due to valid data privacy concerns. In addition, to offer an intelligent search, these services access the user… ▽ More

    Submitted 11 March, 2021; v1 submitted 26 February, 2021; originally announced February 2021.

  6. arXiv:2102.05260  [pdf, other

    cs.CL cs.IR

    SensPick: Sense Picking for Word Sense Disambiguation

    Authors: Sm Zobaed, Md Enamul Haque, Md Fazle Rabby, Mohsen Amini Salehi

    Abstract: Word sense disambiguation (WSD) methods identify the most suitable meaning of a word with respect to the usage of that word in a specific context. Neural network-based WSD approaches rely on a sense-annotated corpus since they do not utilize lexical resources. In this study, we utilize both context and related gloss information of a target word to model the semantic relationship between the word a… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

    Journal ref: 16th IEEE International Conference on Semantic Computing, ICSC'2021

  7. arXiv:2005.11317  [pdf, other

    cs.DC cs.CR cs.DB cs.IR

    Privacy-Preserving Clustering of Unstructured Big Data for Cloud-Based Enterprise Search Solutions

    Authors: SM Zobaed, Mohsen Amini Salehi

    Abstract: Cloud-based enterprise search services (e.g., Amazon Kendra) are enchanting to big data owners by providing them with convenient search solutions over their enterprise big datasets. However, individuals and businesses that deal with confidential big data (eg, credential documents) are reluctant to fully embrace such services, due to valid concerns about data privacy. Solutions based on client-side… ▽ More

    Submitted 8 June, 2022; v1 submitted 22 May, 2020; originally announced May 2020.

    Comments: arXiv admin note: text overlap with arXiv:1908.04960

  8. arXiv:1908.04960  [pdf, other

    cs.CR cs.DC

    ClustCrypt: Privacy-Preserving Clustering of Unstructured Big Data in the Cloud

    Authors: SM Zobaed, Sahan Ahmad, Raju Gottumukkala, Mohsen Amini Salehi

    Abstract: Security and confidentiality of big data stored in the cloud are important concerns for many organizations to adopt cloud services. One common approach to address the concerns is client-side encryption where data is encrypted on the client machine before being stored in the cloud. Having encrypted data in the cloud, however, limits the ability of data clustering, which is a crucial part of many da… ▽ More

    Submitted 14 August, 2019; originally announced August 2019.

    Comments: High Performance Computing and Communications (HPCC '19)

  9. arXiv:1908.03668  [pdf, other

    cs.CR cs.DC

    Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data

    Authors: Sahan Ahmad, SM Zobaed, Raju Gottumukkala, Mohsen Amini Salehi

    Abstract: Cloud service providers offer a low-cost and convenient solution to host unstructured data. However, cloud services act as third-party solutions and do not provide control of the data to users. This has raised security and privacy concerns for many organizations (users) with sensitive data to utilize cloud-based solutions. User-side encryption can potentially address these concerns by establishing… ▽ More

    Submitted 9 August, 2019; originally announced August 2019.

    Comments: High Performance Computing and Communications (HPCC '19)