Zum Hauptinhalt springen

Showing 1–23 of 23 results for author: Alsheikh, A

.
  1. arXiv:2409.04972  [pdf, other

    cs.CR cs.LG

    Balancing Security and Accuracy: A Novel Federated Learning Approach for Cyberattack Detection in Blockchain Networks

    Authors: Tran Viet Khoa, Mohammad Abu Alsheikh, Yibeltal Alem, Dinh Thai Hoang

    Abstract: This paper presents a novel Collaborative Cyberattack Detection (CCD) system aimed at enhancing the security of blockchain-based data-sharing networks by addressing the complex challenges associated with noise addition in federated learning models. Leveraging the theoretical principles of differential privacy, our approach strategically integrates noise into trained sub-models before reconstructin… ▽ More

    Submitted 8 September, 2024; originally announced September 2024.

    Comments: 13 pages

  2. arXiv:2401.10901  [pdf, other

    cs.CY

    Enabling Technologies for Web 3.0: A Comprehensive Survey

    Authors: Md Arif Hassan, Mohammad Behdad Jamshidi, Bui Duc Manh, Nam H. Chu, Chi-Hieu Nguyen, Nguyen Quang Hieu, Cong T. Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Nguyen Van Huynh, Mohammad Abu Alsheikh, Eryk Dutkiewicz

    Abstract: Web 3.0 represents the next stage of Internet evolution, aiming to empower users with increased autonomy, efficiency, quality, security, and privacy. This evolution can potentially democratize content access by utilizing the latest developments in enabling technologies. In this paper, we conduct an in-depth survey of enabling technologies in the context of Web 3.0, such as blockchain, semantic web… ▽ More

    Submitted 29 December, 2023; originally announced January 2024.

  3. arXiv:2310.20228  [pdf, other

    cs.HC

    Reconstructing Human Pose from Inertial Measurements: A Generative Model-based Compressive Sensing Approach

    Authors: Nguyen Quang Hieu, Dinh Thai Hoang, Diep N. Nguyen, Mohammad Abu Alsheikh

    Abstract: The ability to sense, localize, and estimate the 3D position and orientation of the human body is critical in virtual reality (VR) and extended reality (XR) applications. This becomes more important and challenging with the deployment of VR/XR applications over the next generation of wireless systems such as 5G and beyond. In this paper, we propose a novel framework that can reconstruct the 3D hum… ▽ More

    Submitted 12 May, 2024; v1 submitted 31 October, 2023; originally announced October 2023.

  4. arXiv:2308.15804  [pdf, other

    cs.CR cs.DC

    Collaborative Learning Framework to Detect Attacks in Transactions and Smart Contracts

    Authors: Tran Viet Khoa, Do Hai Son, Chi-Hieu Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Tran Thi Thuy Quynh, Trong-Minh Hoang, Nguyen Viet Ha, Eryk Dutkiewicz, Abu Alsheikh, Nguyen Linh Trung

    Abstract: With the escalating prevalence of malicious activities exploiting vulnerabilities in blockchain systems, there is an urgent requirement for robust attack detection mechanisms. To address this challenge, this paper presents a novel collaborative learning framework designed to detect attacks in blockchain transactions and smart contracts by analyzing transaction features. Our framework exhibits the… ▽ More

    Submitted 10 August, 2024; v1 submitted 30 August, 2023; originally announced August 2023.

  5. Five Common Misconceptions About Privacy-Preserving Internet of Things

    Authors: Mohammad Abu Alsheikh

    Abstract: Billions of devices in the Internet of Things (IoT) collect sensitive data about people, creating data privacy risks and breach vulnerabilities. Accordingly, data privacy preservation is vital for sustaining the proliferation of IoT services. In particular, privacy-preserving IoT connects devices embedded with sensors and maintains the data privacy of people. However, common misconceptions exist a… ▽ More

    Submitted 2 January, 2023; originally announced January 2023.

    Comments: 7 pages, 5 figures, accepted in IEEE Communications Magazine

  6. How Do Socio-Demographic Patterns Define Digital Privacy Divide?

    Authors: Hamoud Alhazmi, Ahmed Imran, Mohammad Abu Alsheikh

    Abstract: Digital privacy has become an essential component of information and communications technology (ICT) systems. There are many existing methods for digital privacy protection, including network security, cryptography, and access control. However, there is still a gap in the digital privacy protection levels available for users. This paper studies the digital privacy divide (DPD) problem in ICT syste… ▽ More

    Submitted 19 January, 2022; originally announced January 2022.

    Comments: 11 pages

    Journal ref: IEEE Access, 2022

  7. arXiv:2110.02669  [pdf, other

    cs.CY

    Digital Divide and Social Dilemma of Privacy Preservation

    Authors: Hamoud Alhazmi, Ahmed Imran, Mohammad Abu Alsheikh

    Abstract: While digital divide studies primarily focused on access to information and communications technology (ICT) in the past, its influence on other associated dimensions such as privacy is becoming critical with a far-reaching impact on the people and society. For example, the various levels of government legislation and compliance on information privacy worldwide have created a new era of digital div… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

  8. Optimal Pricing of Internet of Things: A Machine Learning Approach

    Authors: Mohammad Abu Alsheikh, Dinh Thai Hoang, Dusit Niyato, Derek Leong, Ping Wang, Zhu Han

    Abstract: Internet of things (IoT) produces massive data from devices embedded with sensors. The IoT data allows creating profitable services using machine learning. However, previous research does not address the problem of optimal pricing and bundling of machine learning-based IoT services. In this paper, we define the data value and service quality from a machine learning perspective. We present an IoT m… ▽ More

    Submitted 14 February, 2020; originally announced February 2020.

    Comments: 17 pages

    Journal ref: IEEE Journal on Selected Areas in Communications, 2020 dIEEE Journal on Selected Areas in Communications IEEE Journal on Selected Areas in Communications

  9. arXiv:1912.11170  [pdf, other

    eess.SP cs.NI

    "Borrowing Arrows with Thatched Boats": The Art of Defeating Reactive Jammers in IoT Networks

    Authors: Dinh Thai Hoang, Diep N. Nguyen, Mohammad Abu Alsheikh, Shimin Gong, Eryk Dutkiewicz, Dusit Niyato, Zhu Han

    Abstract: In this article, we introduce a novel deception strategy which is inspired by the "Borrowing Arrows with Thatched Boats", one of the most famous military tactics in the history, in order to defeat reactive jamming attacks for low-power IoT networks. Our proposed strategy allows resource-constrained IoT devices to be able to defeat powerful reactive jammers by leveraging their own jamming signals.… ▽ More

    Submitted 23 December, 2019; originally announced December 2019.

    Comments: 16 pages, 5 figures, magazine

  10. Why Simple Quadrature is just as good as Monte Carlo

    Authors: Kevin Vanslette, Abdullatif Al Alsheikh, Kamal Youcef-Toumi

    Abstract: We motive and calculate Newton--Cotes quadrature integration variance and compare it directly with Monte Carlo (MC) integration variance. We find an equivalence between deterministic quadrature sampling and random MC sampling by noting that MC random sampling is statistically indistinguishable from a method that uses deterministic sampling on a randomly shuffled (permuted) function. We use this st… ▽ More

    Submitted 10 February, 2020; v1 submitted 2 August, 2019; originally announced August 2019.

  11. arXiv:1704.01260  [pdf, ps, other

    cs.GT

    Profit Maximization Auction and Data Management in Big Data Markets

    Authors: Yutao Jiao, Ping Wang, Dusit Niyato, Mohammad Abu Alsheikh, Shaohan Feng

    Abstract: A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the… ▽ More

    Submitted 12 April, 2017; v1 submitted 4 April, 2017; originally announced April 2017.

    Comments: 6 pages, 9 figures. This paper was accepted by IEEE WCNC conference in Dec. 2016

  12. Privacy Management and Optimal Pricing in People-Centric Sensing

    Authors: Mohammad Abu Alsheikh, Dusit Niyato, Derek Leong, Ping Wang, Zhu Han

    Abstract: With the emerging sensing technologies such as mobile crowdsensing and Internet of Things (IoT), people-centric data can be efficiently collected and used for analytics and optimization purposes. This data is typically required to develop and render people-centric services. In this paper, we address the privacy implication, optimal pricing, and bundling of people-centric services. We first define… ▽ More

    Submitted 20 February, 2017; originally announced March 2017.

    Comments: 16 pages

  13. arXiv:1702.04565  [pdf, other

    cs.NI

    The Accuracy-Privacy Tradeoff of Mobile Crowdsensing

    Authors: Mohammad Abu Alsheikh, Yutao Jiao, Dusit Niyato, Ping Wang, Derek Leong, Zhu Han

    Abstract: Mobile crowdsensing has emerged as an efficient sensing paradigm which combines the crowd intelligence and the sensing power of mobile devices, e.g.,~mobile phones and Internet of Things (IoT) gadgets. This article addresses the contradicting incentives of privacy preservation by crowdsensing users and accuracy maximization and collection of true data by service providers. We firstly define the in… ▽ More

    Submitted 15 February, 2017; originally announced February 2017.

    Comments: 8 pages, 5 figures

  14. arXiv:1611.03202  [pdf, other

    cs.HC cs.IT

    Fast Adaptation of Activity Sensing Policies in Mobile Devices

    Authors: Mohammad Abu Alsheikh, Dusit Niyato, Shaowei Lin, Hwee-Pink Tan, Dong In Kim

    Abstract: With the proliferation of sensors, such as accelerometers, in mobile devices, activity and motion tracking has become a viable technology to understand and create an engaging user experience. This paper proposes a fast adaptation and learning scheme of activity tracking policies when user statistics are unknown a priori, varying with time, and inconsistent for different users. In our stochastic op… ▽ More

    Submitted 10 November, 2016; originally announced November 2016.

    Comments: 14 pages, 10 figure

  15. Rate-distortion Balanced Data Compression for Wireless Sensor Networks

    Authors: Mohammad Abu Alsheikh, Shaowei Lin, Dusit Niyato, Hwee-Pink Tan

    Abstract: This paper presents a data compression algorithm with error bound guarantee for wireless sensor networks (WSNs) using compressing neural networks. The proposed algorithm minimizes data congestion and reduces energy consumption by exploring spatio-temporal correlations among data samples. The adaptive rate-distortion feature balances the compressed data size (data rate) with the required error boun… ▽ More

    Submitted 4 April, 2016; originally announced April 2016.

    Comments: arXiv admin note: text overlap with arXiv:1408.2948

    Journal ref: IEEE Sensors Journal, vol. 16, no. 12, pp. 5072-5083, June15, 2016

  16. Mobile Big Data Analytics Using Deep Learning and Apache Spark

    Authors: Mohammad Abu Alsheikh, Dusit Niyato, Shaowei Lin, Hwee-Pink Tan, Zhu Han

    Abstract: The proliferation of mobile devices, such as smartphones and Internet of Things (IoT) gadgets, results in the recent mobile big data (MBD) era. Collecting MBD is unprofitable unless suitable analytics and learning methods are utilized for extracting meaningful information and hidden patterns from data. This article presents an overview and brief tutorial of deep learning in MBD analytics and discu… ▽ More

    Submitted 22 February, 2016; originally announced February 2016.

    Journal ref: IEEE Network, vol. 30, no. 3, pp. 22-29, June 2016

  17. Market Model and Optimal Pricing Scheme of Big Data and Internet of Things (IoT)

    Authors: Dusit Niyato, Mohammad Abu Alsheikh, Ping Wang, Dong In Kim, Zhu Han

    Abstract: Big data has been emerging as a new approach in utilizing large datasets to optimize complex system operations. Big data is fueled with Internet-of-Things (IoT) services that generate immense sensory data from numerous sensors and devices. While most current research focus of big data is on machine learning and resource management design, the economic modeling and analysis have been largely overlo… ▽ More

    Submitted 6 February, 2016; originally announced February 2016.

  18. arXiv:1511.04664  [pdf, other

    cs.LG cs.HC cs.NE

    Deep Activity Recognition Models with Triaxial Accelerometers

    Authors: Mohammad Abu Alsheikh, Ahmed Selim, Dusit Niyato, Linda Doyle, Shaowei Lin, Hwee-Pink Tan

    Abstract: Despite the widespread installation of accelerometers in almost all mobile phones and wearable devices, activity recognition using accelerometers is still immature due to the poor recognition accuracy of existing recognition methods and the scarcity of labeled training data. We consider the problem of human activity recognition using triaxial accelerometers and deep learning paradigms. This paper… ▽ More

    Submitted 25 October, 2016; v1 submitted 15 November, 2015; originally announced November 2015.

  19. arXiv:1508.00230  [pdf, other

    cs.NI cs.LG cs.NE

    Toward a Robust Sparse Data Representation for Wireless Sensor Networks

    Authors: Mohammad Abu Alsheikh, Shaowei Lin, Hwee-Pink Tan, Dusit Niyato

    Abstract: Compressive sensing has been successfully used for optimized operations in wireless sensor networks. However, raw data collected by sensors may be neither originally sparse nor easily transformed into a sparse data representation. This paper addresses the problem of transforming source data collected by sensor nodes into a sparse representation with a few nonzero elements. Our contributions that a… ▽ More

    Submitted 2 August, 2015; originally announced August 2015.

    Comments: 8 pages

    Journal ref: IEEE 40th Conference on Local Computer Networks (LCN), Clearwater Beach, FL, 2015, pp. 117-124

  20. Markov Decision Processes with Applications in Wireless Sensor Networks: A Survey

    Authors: Mohammad Abu Alsheikh, Dinh Thai Hoang, Dusit Niyato, Hwee-Pink Tan, Shaowei Lin

    Abstract: Wireless sensor networks (WSNs) consist of autonomous and resource-limited devices. The devices cooperate to monitor one or more physical phenomena within an area of interest. WSNs operate as stochastic systems because of randomness in the monitored environments. For long service time and low maintenance cost, WSNs require adaptive and robust methods to address data exchange, topology formulation,… ▽ More

    Submitted 4 January, 2015; originally announced January 2015.

    Journal ref: IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1239-1267, thirdquarter 2015

  21. Efficient Data Compression with Error Bound Guarantee in Wireless Sensor Networks

    Authors: Mohammad Abu Alsheikh, Puay Kai Poh, Shaowei Lin, Hwee-Pink Tan, Dusit Niyato

    Abstract: We present a data compression and dimensionality reduction scheme for data fusion and aggregation applications to prevent data congestion and reduce energy consumption at network connecting points such as cluster heads and gateways. Our in-network approach can be easily tuned to analyze the data temporal or spatial correlation using an unsupervised neural network scheme, namely the autoencoders. I… ▽ More

    Submitted 13 August, 2014; originally announced August 2014.

    Comments: ACM MSWiM 2014

    ACM Class: C.2.1; E.4

  22. Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications

    Authors: Mohammad Abu Alsheikh, Shaowei Lin, Dusit Niyato, Hwee-Pink Tan

    Abstract: Wireless sensor networks monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. To adapt to such conditions, sensor networks often adopt machine learning techniques to eliminate the need for unnecessary redesign. Machine learning also inspires many practical solutions that maximize reso… ▽ More

    Submitted 19 March, 2015; v1 submitted 18 May, 2014; originally announced May 2014.

    Comments: Accepted for publication in IEEE Communications Surveys and Tutorials

    Journal ref: IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1996-2018, Fourthquarter 2014

  23. Area Coverage Under Low Sensor Density

    Authors: Mohammad Abu Alsheikh, Shaowei Lin, Hwee-Pink Tan, Dusit Niyato

    Abstract: This paper presents a solution to the problem of monitoring a region of interest (RoI) using a set of nodes that is not sufficient to achieve the required degree of monitoring coverage. In particular, sensing coverage of wireless sensor networks (WSNs) is a crucial issue in projects due to failure of sensors. The lack of sensor equipment resources hinders the traditional method of using mobile rob… ▽ More

    Submitted 2 March, 2016; v1 submitted 17 May, 2014; originally announced May 2014.