Skip to main content

Showing 1–15 of 15 results for author: Rahouti, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.11786  [pdf, other

    cs.LG

    Cryptocurrency Price Forecasting Using XGBoost Regressor and Technical Indicators

    Authors: Abdelatif Hafid, Maad Ebrahim, Ali Alfatemi, Mohamed Rahouti, Diogo Oliveira

    Abstract: The rapid growth of the stock market has attracted many investors due to its potential for significant profits. However, predicting stock prices accurately is difficult because financial markets are complex and constantly changing. This is especially true for the cryptocurrency market, which is known for its extreme volatility, making it challenging for traders and investors to make wise and profi… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

    Comments: 9 pages, 3 figures, 4 tables, submitted to the 43rd IEEE International Performance Computing and Communications Conference (IPCCC 2024)

  2. arXiv:2406.02883  [pdf, other

    cs.LG cs.CR

    Nonlinear Transformations Against Unlearnable Datasets

    Authors: Thushari Hapuarachchi, Jing Lin, Kaiqi Xiong, Mohamed Rahouti, Gitte Ost

    Abstract: Automated scraping stands out as a common method for collecting data in deep learning models without the authorization of data owners. Recent studies have begun to tackle the privacy concerns associated with this data collection method. Notable approaches include Deepconfuse, error-minimizing, error-maximizing (also known as adversarial poisoning), Neural Tangent Generalization Attack, synthetic,… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  3. arXiv:2406.02632  [pdf, other

    cs.CR cs.LG cs.NI

    Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach

    Authors: Fernando Martinez, Mariyam Mapkar, Ali Alfatemi, Mohamed Rahouti, Yufeng Xin, Kaiqi Xiong, Nasir Ghani

    Abstract: Distributed Denial of Service (DDoS) attacks pose an increasingly substantial cybersecurity threat to organizations across the globe. In this paper, we introduce a new deep learning-based technique for detecting DDoS attacks, a paramount cybersecurity challenge with evolving complexity and scale. Specifically, we propose a new dual-space prototypical network that leverages a unique dual-space loss… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: 9 pages, The 33rd International Conference on Computer Communications and Networks (ICCCN 2024)

  4. arXiv:2405.16707  [pdf, other

    cs.CR

    Visualizing the Shadows: Unveiling Data Poisoning Behaviors in Federated Learning

    Authors: Xueqing Zhang, Junkai Zhang, Ka-Ho Chow, Juntao Chen, Ying Mao, Mohamed Rahouti, Xiang Li, Yuchen Liu, Wenqi Wei

    Abstract: This demo paper examines the susceptibility of Federated Learning (FL) systems to targeted data poisoning attacks, presenting a novel system for visualizing and mitigating such threats. We simulate targeted data poisoning attacks via label flipping and analyze the impact on model performance, employing a five-component system that includes Simulation and Data Generation, Data Collection and Upload… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

  5. arXiv:2401.03116  [pdf, other

    cs.CR cs.LG

    Advancing DDoS Attack Detection: A Synergistic Approach Using Deep Residual Neural Networks and Synthetic Oversampling

    Authors: Ali Alfatemi, Mohamed Rahouti, Ruhul Amin, Sarah ALJamal, Kaiqi Xiong, Yufeng Xin

    Abstract: Distributed Denial of Service (DDoS) attacks pose a significant threat to the stability and reliability of online systems. Effective and early detection of such attacks is pivotal for safeguarding the integrity of networks. In this work, we introduce an enhanced approach for DDoS attack detection by leveraging the capabilities of Deep Residual Neural Networks (ResNets) coupled with synthetic overs… ▽ More

    Submitted 5 January, 2024; originally announced January 2024.

    Comments: 8 pages, 3 figures

  6. arXiv:2312.06928  [pdf, other

    cs.CR cs.RO

    Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach

    Authors: Senthil Kumar Jagatheesaperumal, Mohamed Rahouti, Kaiqi Xiong, Abdellah Chehri, Nasir Ghani, Jan Bieniek

    Abstract: Unmanned Aerial Vehicles (UAVs), previously favored by enthusiasts, have evolved into indispensable tools for effectively managing disasters and responding to emergencies. For example, one of their most critical applications is to provide seamless wireless communication services in remote rural areas. Thus, it is substantial to identify and consider the different security challenges in the researc… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Comments: 25 pages, 6 figures, 3 tables

  7. arXiv:2312.00006  [pdf, other

    cs.CR cs.AI

    Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis

    Authors: Evans Owusu, Mohamed Rahouti, D. Frank Hsu, Kaiqi Xiong, Yufeng Xin

    Abstract: Mitigating Denial-of-Service (DoS) attacks is vital for online service security and availability. While machine learning (ML) models are used for DoS attack detection, new strategies are needed to enhance their performance. We suggest an innovative method, combinatorial fusion, which combines multiple ML models using advanced algorithms. This includes score and rank combinations, weighted techniqu… ▽ More

    Submitted 1 October, 2023; originally announced December 2023.

    Comments: 6 pages, 3 figures, IEEE CNS

  8. arXiv:2311.07760  [pdf, other

    cs.CR

    Ransomware Detection Using Federated Learning with Imbalanced Datasets

    Authors: Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, G. Javidi, S. Uluagac, M. Rahouti, E. Bou-Harb, M. Safaei Pour

    Abstract: Ransomware is a type of malware which encrypts user data and extorts payments in return for the decryption keys. This cyberthreat is one of the most serious challenges facing organizations today and has already caused immense financial damage. As a result, many researchers have been developing techniques to counter ransomware. Recently, the federated learning (FL) approach has also been applied fo… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

    Comments: 6 pages, 4 figures, 3 tables

  9. arXiv:2310.00906  [pdf, other

    cs.RO cs.CV cs.GR

    A Decentralized Cooperative Navigation Approach for Visual Homing Networks

    Authors: Mohamed Rahouti, Damian Lyons, Senthil Kumar Jagatheesaperumal, Kaiqi Xiong

    Abstract: Visual homing is a lightweight approach to visual navigation. Given the stored information of an initial 'home' location, the navigation task back to this location is achieved from any other location by comparing the stored home information to the current image and extracting a motion vector. A challenge that constrains the applicability of visual homing is that the home location must be within th… ▽ More

    Submitted 2 October, 2023; originally announced October 2023.

    Comments: 8 pages, 5 figures

    MSC Class: 93Cxx ACM Class: H.1.2; I.6.5; I.6.7

  10. arXiv:2309.12177  [pdf, other

    cs.AI

    Explainable Artificial Intelligence for Drug Discovery and Development -- A Comprehensive Survey

    Authors: Roohallah Alizadehsani, Solomon Sunday Oyelere, Sadiq Hussain, Rene Ripardo Calixto, Victor Hugo C. de Albuquerque, Mohamad Roshanzamir, Mohamed Rahouti, Senthil Kumar Jagatheesaperumal

    Abstract: The field of drug discovery has experienced a remarkable transformation with the advent of artificial intelligence (AI) and machine learning (ML) technologies. However, as these AI and ML models are becoming more complex, there is a growing need for transparency and interpretability of the models. Explainable Artificial Intelligence (XAI) is a novel approach that addresses this issue and provides… ▽ More

    Submitted 2 November, 2023; v1 submitted 21 September, 2023; originally announced September 2023.

    Comments: 13 pages, 3 figures

    ACM Class: I.2.0

  11. arXiv:2306.09462  [pdf, other

    cs.RO cs.AI cs.CV cs.LG

    Motion Comfort Optimization for Autonomous Vehicles: Concepts, Methods, and Techniques

    Authors: Mohammed Aledhari, Mohamed Rahouti, Junaid Qadir, Basheer Qolomany, Mohsen Guizani, Ala Al-Fuqaha

    Abstract: This article outlines the architecture of autonomous driving and related complementary frameworks from the perspective of human comfort. The technical elements for measuring Autonomous Vehicle (AV) user comfort and psychoanalysis are listed here. At the same time, this article introduces the technology related to the structure of automatic driving and the reaction time of automatic driving. We als… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

    Comments: None

  12. arXiv:2206.11223  [pdf, other

    cs.RO

    VRChain: A Blockchain-Enabled Framework for Visual Homing and Navigation Robots

    Authors: Mohamed Rahouti, Damian Lyons, Lesther Santana

    Abstract: Visual homing is a lightweight approach to robot visual navigation. Based upon stored visual information of a home location, the navigation back to this location can be accomplished from any other location in which this location is visible by comparing home to the current image. However, a key challenge of visual homing is that the target home location must be within the robot's field of view (FOV… ▽ More

    Submitted 8 June, 2022; originally announced June 2022.

    Comments: 6 pages, 7 figures

  13. arXiv:2112.02797  [pdf

    cs.LG cs.CR

    ML Attack Models: Adversarial Attacks and Data Poisoning Attacks

    Authors: Jing Lin, Long Dang, Mohamed Rahouti, Kaiqi Xiong

    Abstract: Many state-of-the-art ML models have outperformed humans in various tasks such as image classification. With such outstanding performance, ML models are widely used today. However, the existence of adversarial attacks and data poisoning attacks really questions the robustness of ML models. For instance, Engstrom et al. demonstrated that state-of-the-art image classifiers could be easily fooled by… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

  14. arXiv:2104.02425  [pdf, other

    cs.AI

    The Duo of Artificial Intelligence and Big Data for Industry 4.0: Review of Applications, Techniques, Challenges, and Future Research Directions

    Authors: Senthil Kumar Jagatheesaperumal, Mohamed Rahouti, Kashif Ahmad, Ala Al-Fuqaha, Mohsen Guizani

    Abstract: The increasing need for economic, safe, and sustainable smart manufacturing combined with novel technological enablers, has paved the way for Artificial Intelligence (AI) and Big Data in support of smart manufacturing. This implies a substantial integration of AI, Industrial Internet of Things (IIoT), Robotics, Big data, Blockchain, 5G communications, in support of smart manufacturing and the dyna… ▽ More

    Submitted 7 April, 2021; v1 submitted 6 April, 2021; originally announced April 2021.

    Comments: 33 pages, 10 figures, 7 tables

  15. arXiv:1904.00733  [pdf, other

    cs.CR

    Blockchain And The Future of the Internet: A Comprehensive Review

    Authors: Fakhar ul Hassan, Anwaar Ali, Mohamed Rahouti, Siddique Latif, Salil Kanhere, Jatinder Singh, AlaAl-Fuqaha, Umar Janjua, Adnan Noor Mian, Junaid Qadir, Jon Crowcroft

    Abstract: Blockchain is challenging the status quo of the central trust infrastructure currently prevalent in the Internet towards a design principle that is underscored by decentralization, transparency, and trusted auditability. In ideal terms, blockchain advocates a decentralized, transparent, and more democratic version of the Internet. Essentially being a trusted and decentralized database, blockchain… ▽ More

    Submitted 13 November, 2020; v1 submitted 23 February, 2019; originally announced April 2019.

    Comments: Under Review in IEEE COMST