SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Awaysheh Feras M.) "

Sökning: WFRF:(Awaysheh Feras M.)

  • Resultat 1-10 av 13
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Aladwan, Mohammad N., et al. (författare)
  • TrustE-VC : Trustworthy Evaluation Framework for Industrial Connected Vehicles in the Cloud
  • 2020
  • Ingår i: IEEE Transactions on Industrial Informatics. - : IEEE. - 1551-3203 .- 1941-0050. ; 16:9, s. 6203-6213
  • Tidskriftsartikel (refereegranskat)abstract
    • The integration between cloud computing and vehicular ad hoc networks, namely, vehicular clouds (VCs), has become a significant research area. This integration was proposed to accelerate the adoption of intelligent transportation systems. The trustworthiness in VCs is expected to carry more computing capabilities that manage large-scale collected data. This trend requires a security evaluation framework that ensures data privacy protection, integrity of information, and availability of resources. To the best of our knowledge, this is the first study that proposes a robust trustworthiness evaluation of vehicular cloud for security criteria evaluation and selection. This article proposes three-level security features in order to develop effectiveness and trustworthiness in VCs. To assess and evaluate these security features, our evaluation framework consists of three main interconnected components: 1) an aggregation of the security evaluation values of the security criteria for each level; 2) a fuzzy multicriteria decision-making algorithm; and 3) a simple additive weight associated with the importance-performance analysis and performance rate to visualize the framework findings. The evaluation results of the security criteria based on the average performance rate and global weight suggest that data residency, data privacy, and data ownership are the most pressing challenges in assessing data protection in a VC environment. Overall, this article paves the way for a secure VC using an evaluation of effective security features and underscores directions and challenges facing the VC community. This article sheds light on the importance of security by design, emphasizing multiple layers of security when implementing industrial VCs.
  •  
2.
  • Alawadi, Sadi, 1983-, et al. (författare)
  • FedCSD : A Federated Learning Based Approach for Code-Smell Detection
  • 2024
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 12, s. 44888-44904
  • Tidskriftsartikel (refereegranskat)abstract
    • Software quality is critical, as low quality, or 'Code smell,' increases technical debt and maintenance costs. There is a timely need for a collaborative model that detects and manages code smells by learning from diverse and distributed data sources while respecting privacy and providing a scalable solution for continuously integrating new patterns and practices in code quality management. However, the current literature is still missing such capabilities. This paper addresses the previous challenges by proposing a Federated Learning Code Smell Detection (FedCSD) approach, specifically targeting 'God Class,' to enable organizations to train distributed ML models while safeguarding data privacy collaboratively. We conduct experiments using manually validated datasets to detect and analyze code smell scenarios to validate our approach. Experiment 1, a centralized training experiment, revealed varying accuracies across datasets, with dataset two achieving the lowest accuracy (92.30%) and datasets one and three achieving the highest (98.90% and 99.5%, respectively). Experiment 2, focusing on cross-evaluation, showed a significant drop in accuracy (lowest: 63.80%) when fewer smells were present in the training dataset, reflecting technical debt. Experiment 3 involved splitting the dataset across 10 companies, resulting in a global model accuracy of 98.34%, comparable to the centralized model's highest accuracy. The application of federated ML techniques demonstrates promising performance improvements in code-smell detection, benefiting both software developers and researchers. © 2013 IEEE.
  •  
3.
  • Alkhabbas, Fahed, et al. (författare)
  • ASSERT : A Blockchain-Based Architectural Approach for Engineering Secure Self-Adaptive IoT Systems
  • 2022
  • Ingår i: Sensors. - basel : MDPI. - 1424-8220. ; 22:18
  • Tidskriftsartikel (refereegranskat)abstract
    • Internet of Things (IoT) systems are complex systems that can manage mission-critical, costly operations or the collection, storage, and processing of sensitive data. Therefore, security represents a primary concern that should be considered when engineering IoT systems. Additionally, several challenges need to be addressed, including the following ones. IoT systems’ environments are dynamic and uncertain. For instance, IoT devices can be mobile or might run out of batteries, so they can become suddenly unavailable. To cope with such environments, IoT systems can be engineered as goal-driven and self-adaptive systems. A goal-driven IoT system is composed of a dynamic set of IoT devices and services that temporarily connect and cooperate to achieve a specific goal. Several approaches have been proposed to engineer goal-driven and self-adaptive IoT systems. However, none of the existing approaches enable goal-driven IoT systems to automatically detect security threats and autonomously adapt to mitigate them. Toward bridging these gaps, this paper proposes a distributed architectural Approach for engineering goal-driven IoT Systems that can autonomously SElf-adapt to secuRity Threats in their environments (ASSERT). ASSERT exploits techniques and adopts notions, such as agents, federated learning, feedback loops, and blockchain, for maintaining the systems’ security and enhancing the trustworthiness of the adaptations they perform. The results of the experiments that we conducted to validate the approach’s feasibility show that it performs and scales well when detecting security threats, performing autonomous security adaptations to mitigate the threats and enabling systems’ constituents to learn about security threats in their environments collaboratively. © 2022 by the authors.
  •  
4.
  • Awaysheh, Feras M., et al. (författare)
  • FLIoDT : A Federated Learning Architecture from Privacy by Design to Privacy by Default over IoT
  • 2022
  • Ingår i: 2022 Seventh International Conference on Fog and Mobile Edge Computing (FMEC). - Piscataway, N.J. : IEEE. - 9798350334524 ; , s. 1-6
  • Konferensbidrag (refereegranskat)abstract
    • The Internet of Things (IoT) realized exponential growth of smart devices with decent capabilities, promising an era of Edge Intelligence. This paradigm creates a timely need to shift many computations closer to the data source at the network's edge. Data privacy is paramount, as security breaches can severely impact such an environment with its vast attack surface. The advent of Federated learning (FL), a privacy-by-design with decentralized machine learning (ML), enables participants to collaboratively train a model without sharing their sensitive data. Nevertheless, privacy implications are a glaring concern and perrier for widening the utilization of FL approaches and their mass adoption over IoT applications. This paper introduces the notion of FL over the Internet of Disconnected Things (FLIoDT), a functionality separation of concerns following the air-gapped networks. FLIoDT provides a practical methodology to mitigate Data threats/attacks in the FL domain. FLIoDT proves a practical architectural approach to mitigate several attacks in an Edge environment. Data dredging and adversarial attacks, like data poisoning, to name some. This study investigates human activity recognition of health monitoring patient data over edge computing to validate FLIoDT. © 2022 IEEE.
  •  
5.
  • Fakhouri, Hussam N., et al. (författare)
  • A cognitive deep learning approach for medical image processing
  • 2024
  • Ingår i: Scientific Reports. - : Springer Nature. - 2045-2322. ; 14:1
  • Tidskriftsartikel (refereegranskat)abstract
    • In ophthalmic diagnostics, achieving precise segmentation of retinal blood vessels is a critical yet challenging task, primarily due to the complex nature of retinal images. The intricacies of these images often hinder the accuracy and efficiency of segmentation processes. To overcome these challenges, we introduce the cognitive DL retinal blood vessel segmentation (CoDLRBVS), a novel hybrid model that synergistically combines the deep learning capabilities of the U-Net architecture with a suite of advanced image processing techniques. This model uniquely integrates a preprocessing phase using a matched filter (MF) for feature enhancement and a post-processing phase employing morphological techniques (MT) for refining the segmentation output. Also, the model incorporates multi-scale line detection and scale space methods to enhance its segmentation capabilities. Hence, CoDLRBVS leverages the strengths of these combined approaches within the cognitive computing framework, endowing the system with human-like adaptability and reasoning. This strategic integration enables the model to emphasize blood vessels, accurately segment effectively, and proficiently detect vessels of varying sizes. CoDLRBVS achieves a notable mean accuracy of 96.7%, precision of 96.9%, sensitivity of 99.3%, and specificity of 80.4% across all of the studied datasets, including DRIVE, STARE, HRF, retinal blood vessel and Chase-DB1. CoDLRBVS has been compared with different models, and the resulting metrics surpass the compared models and establish a new benchmark in retinal vessel segmentation. The success of CoDLRBVS underscores its significant potential in advancing medical image processing, particularly in the realm of retinal blood vessel segmentation. © 2024. The Author(s).
  •  
6.
  • Fakhouri, Hussam N., et al. (författare)
  • A Comprehensive Study on the Role of Machine Learning in 5G Security : Challenges, Technologies, and Solutions
  • 2023
  • Ingår i: Electronics. - Basel : MDPI. - 2079-9292. ; 12:22, s. 1-44
  • Tidskriftsartikel (refereegranskat)abstract
    • Fifth-generation (5G) mobile networks have already marked their presence globally, revolutionizing entertainment, business, healthcare, and other domains. While this leap forward brings numerous advantages in speed and connectivity, it also poses new challenges for security protocols. Machine learning (ML) and deep learning (DL) have been employed to augment traditional security measures, promising to mitigate risks and vulnerabilities. This paper conducts an exhaustive study to assess ML and DL algorithms' role and effectiveness within the 5G security landscape. Also, it offers a profound dissection of the 5G network's security paradigm, particularly emphasizing the transformative role of ML and DL as enabling security tools. This study starts by examining the unique architecture of 5G and its inherent vulnerabilities, contrasting them with emerging threat vectors. Next, we conduct a detailed analysis of the network's underlying segments, such as network slicing, Massive Machine-Type Communications (mMTC), and edge computing, revealing their associated security challenges. By scrutinizing current security protocols and international regulatory impositions, this paper delineates the existing 5G security landscape. Finally, we outline the capabilities of ML and DL in redefining 5G security. We detail their application in enhancing anomaly detection, fortifying predictive security measures, and strengthening intrusion prevention strategies. This research sheds light on the present-day 5G security challenges and offers a visionary perspective, highlighting the intersection of advanced computational methods and future 5G security. © 2023 by the authors.
  •  
7.
  • Fakhouri, Hussam N., et al. (författare)
  • An Overview of using of Artificial Intelligence in Enhancing Security and Privacy in Mobile Social Networks
  • 2023
  • Ingår i: 8th International Conference on Fog and Mobile Edge Computing, FMEC 2023. - : Institute of Electrical and Electronics Engineers (IEEE). - 9798350316971 ; , s. 42-51
  • Konferensbidrag (refereegranskat)abstract
    • Mobile Social Networks (MSNs) have emerged as pivotal platforms for communication, information dissemination, and social connection in contemporary society. As their prevalence escalates, so too do concerns regarding security and privacy. This paper presents a furnishes a detailed analysis of these pressing issues and elucidates how Artificial Intelligence (AI) can be instrumental in addressing them. The study thoroughly explores a spectrum of security and privacy challenges endemic to MSNs, such as data leakage, unauthorized access, cyberstalking, location privacy, and more. Additionally, the investigation expands to encompass problems like impersonation, phishing attacks, malware threats, information overload, user profiling, inadequate privacy policies, third-party application vulnerabilities, and privacy issues related to photos, videos, end-to-end encryption, Wi-Fi connections, and data retention. Each of these issues is dissected in depth, highlighting the potential risks and implications for users. Furthermore, the paper underlines how AI can provide in mitigating these problems, establishing its fundamental role in fortifying the security and privacy of MSNs. This thorough analysis offers valuable insights and feasible solutions using AI to bolster security and privacy in the ever-evolving landscape of Mobile Social Networks. © 2023 IEEE.
  •  
8.
  • Fakhouri, Hussam N., et al. (författare)
  • Four vector intelligent metaheuristic for data optimization
  • 2024
  • Ingår i: Computing. - : Springer. - 0010-485X .- 1436-5057.
  • Tidskriftsartikel (refereegranskat)abstract
    • Swarm intelligence (SI) algorithms represent a class of Artificial Intelligence (AI) optimization metaheuristics used for solving complex optimization problems. However, a key challenge in solving complex problems is maintaining the balance between exploration and exploitation to find the optimal global solution and avoid local minima. This paper proposes an innovative Swarm Intelligence (SI) algorithm called the Four Vector Intelligent Metaheuristic (FVIM) to address the aforementioned problem. FVIM’s search strategy is guided by four top-performing leaders within a swarm, ensuring a balanced exploration-exploitation trade-off in the search space, avoiding local minima, and mitigating low convergence issues. The efficacy of FVIM is evaluated through extensive experiments conducted over two datasets, incorporating both qualitative and quantitative statistical measurements. One dataset contains twenty-three well-known single-objective optimization functions, such as fixed-dimensional and multi-modal functions, while the other dataset comprises the CEC2017 functions. Additionally, the Wilcoxon test was computed to validate the result’s significance. The results illustrate FVIM’s effectiveness in addressing diverse optimization challenges. Moreover, FVIM has been successfully applied to tackle engineering design problems, such as weld beam and truss engineering design. © The Author(s), under exclusive licence to Springer-Verlag GmbH Austria, part of Springer Nature 2024.
  •  
9.
  • Fakhouri, Hussam N., et al. (författare)
  • Novel hybrid success history intelligent optimizer with Gaussian transformation : application in CNN hyperparameter tuning
  • 2024
  • Ingår i: Cluster Computing. - : Springer. - 1386-7857 .- 1573-7543. ; 27:3, s. 3717-3739
  • Tidskriftsartikel (refereegranskat)abstract
    • This research proposes a novel Hybrid Success History Intelligent Optimizer with Gaussian Transformation (SHIOGT) for solving different complexity level optimization problems and for Convolutional Neural Network (CNNs) hyperparameter tuning. SHIOGT algorithm is designed to balance exploration and exploitation phases through the addition of Gaussian Transformation to the original Success History Intelligent Optimizer. The inclusion of Gaussian Transformation enhances solution diversity enables SHIO to avoid local optima. SHIOGT also demonstrates robustness and adaptability by dynamically adjusting its search strategy based on problem characteristics. Furthermore, the combination of Gaussian and SHIO facilitates faster convergence, accelerating the discovery of optimal or near-optimal solutions. Moreover, the hybridization of these two techniques brings a synergistic effect, enabling SHIOGT to overcome individual limitations and achieve superior performance in hyperparameter optimization tasks. SHIOGT was thoroughly assessed against an array of benchmark functions of varying complexities, demonstrating its ability to efficiently locate optimal or near-optimal solutions across different problem categories. Its robustness in tackling multimodal and deceptive landscapes and high-dimensional search spaces was particularly notable. SHIOGT has been benchmarked over 43 challenging optimization problems and have been compared with state-of-the art algorithm. Further, SHIOGT algorithm is applied to the domain of deep learning, with a case study focusing on hyperparameter tuning of CNNs. With the intelligent exploration–exploitation balance of SHIOGT, we hypothesized it could effectively optimize the CNN's hyperparameters. We evaluated the performance of SHIOGT across a variety of datasets, including MNIST, Fashion-MNIST, CIFAR-10, and CIFAR-100, with the aim of optimizing CNN model hyperparameters. The results show an impressive accuracy rate of 98% on the MNIST dataset. Similarly, the algorithm achieved a 92% accuracy rate on Fashion-MNIST, 76% on CIFAR-10, and 70% on CIFAR-100, underscoring its effectiveness across diverse datasets. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
  •  
10.
  • Kaminaga, Hiroki, et al. (författare)
  • MPCFL : Towards Multi-party Computation for Secure Federated Learning Aggregation
  • 2023
  • Ingår i: 16th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2023. - : Association for Computing Machinery (ACM). - 9798400702341
  • Konferensbidrag (refereegranskat)abstract
    • In the rapidly evolving machine learning (ML) and distributed systems realm, the escalating concern for data privacy naturally comes to the forefront of discussions. Federated learning (FL) emerges as a pivotal technology capable of addressing the inherent issues of centralized data privacy. However, FL architectures with centralized orchestration are still vulnerable, especially in the aggregation phase. A malicious server can exploit the aggregation process to learn about participants' data. This study proposes MPCFL, a secure FL algorithm based on secure multi-party computation (MPC) and secret sharing. The proposed algorithm leverages the Sharemind MPC framework to aggregate local model updates for securely formulating a global model. MPCFL provides practical mitigation of trending FL concerns, e.g., inference attack, gradient leakage attack, model poisoning, and model inversion. The algorithm is evaluated on several benchmark datasets and shows promising results. Our results demonstrate that the proposed algorithm is viable for developing secure and privacy-preserving FL applications, significantly improving all performance metrics while maintaining security and reliability. This investigation is a precursor to deeper explorations to craft robust FL aggregation algorithms. © 2023 Copyright is held by the owner/author(s). Publication rights licensed to ACM.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 13

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy