Zum Hauptinhalt springen

Showing 1–16 of 16 results for author: Alsmadi, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.11003  [pdf, other

    cs.CL cs.AI cs.LG

    Using Large Language Models in Public Transit Systems, San Antonio as a case study

    Authors: Ramya Jonnala, Gongbo Liang, Jeong Yang, Izzat Alsmadi

    Abstract: The integration of large language models into public transit systems represents a significant advancement in urban transportation management and passenger experience. This study examines the impact of LLMs within San Antonio's public transit system, leveraging their capabilities in natural language processing, data analysis, and real time communication. By utilizing GTFS and other public transport… ▽ More

    Submitted 25 June, 2024; originally announced July 2024.

  2. arXiv:2406.00628  [pdf, other

    cs.CL cs.CR cs.CY cs.LG

    Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models

    Authors: Garrett Crumrine, Izzat Alsmadi, Jesus Guerrero, Yuvaraj Munian

    Abstract: Large language models (LLMs) have revolutionized how we interact with machines. However, this technological advancement has been paralleled by the emergence of "Mallas," malicious services operating underground that exploit LLMs for nefarious purposes. Such services create malware, phishing attacks, and deceptive websites, escalating the cyber security threats landscape. This paper delves into the… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

    Comments: A preprint, 17 pages. 11 images

    ACM Class: B.8.0; I.2.7; I.2.8; I.2.11; J.0; K.4.2; K.4.1

  3. arXiv:2404.14449  [pdf

    cs.CL cs.LG

    Predicting Question Quality on StackOverflow with Neural Networks

    Authors: Mohammad Al-Ramahi, Izzat Alsmadi, Abdullah Wahbeh

    Abstract: The wealth of information available through the Internet and social media is unprecedented. Within computing fields, websites such as Stack Overflow are considered important sources for users seeking solutions to their computing and programming issues. However, like other social media platforms, Stack Overflow contains a mixture of relevant and irrelevant information. In this paper, we evaluated n… ▽ More

    Submitted 20 April, 2024; originally announced April 2024.

  4. arXiv:2312.14434  [pdf, other

    cs.CR

    A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption

    Authors: Brian Kishiyama, Izzat Alsmadi

    Abstract: Cloud Service Providers, such as Google Cloud Platform, Microsoft Azure, or Amazon Web Services, offer continuously evolving cloud services. It is a growing industry. Businesses, such as Netflix and PayPal, rely on the Cloud for data storage, computing power, and other services. For businesses, the cloud reduces costs, provides flexibility, and allows for growth. However, there are security and pr… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Comments: 15 pages

  5. arXiv:2302.05794  [pdf, other

    cs.CR cs.AI

    Mutation-Based Adversarial Attacks on Neural Text Detectors

    Authors: Gongbo Liang, Jesus Guerrero, Izzat Alsmadi

    Abstract: Neural text detectors aim to decide the characteristics that distinguish neural (machine-generated) from human texts. To challenge such detectors, adversarial attacks can alter the statistical characteristics of the generated text, making the detection task more and more difficult. Inspired by the advances of mutation analysis in software development and testing, in this paper, we propose characte… ▽ More

    Submitted 11 February, 2023; originally announced February 2023.

  6. arXiv:2301.04008  [pdf

    cs.CR

    Balanced Datasets for IoT IDS

    Authors: Alaa Alhowaide, Izzat Alsmadi, Jian Tang

    Abstract: As the Internet of Things (IoT) continues to grow, cyberattacks are becoming increasingly common. The security of IoT networks relies heavily on intrusion detection systems (IDSs). The development of an IDS that is accurate and efficient is a challenging task. As a result, this challenge is made more challenging by the absence of balanced datasets for training and testing the proposed IDS. In this… ▽ More

    Submitted 15 December, 2022; originally announced January 2023.

  7. arXiv:2212.11808  [pdf, ps, other

    cs.CL cs.LG

    A Mutation-based Text Generation for Adversarial Machine Learning Applications

    Authors: Jesus Guerrero, Gongbo Liang, Izzat Alsmadi

    Abstract: Many natural language related applications involve text generation, created by humans or machines. While in many of those applications machines support humans, yet in few others, (e.g. adversarial machine learning, social bots and trolls) machines try to impersonate humans. In this scope, we proposed and evaluated several mutation-based text generation approaches. Unlike machine-based generated te… ▽ More

    Submitted 20 December, 2022; originally announced December 2022.

  8. arXiv:2210.06336  [pdf, other

    cs.CL

    Synthetic Text Detection: Systemic Literature Review

    Authors: Jesus Guerrero, Izzat Alsmadi

    Abstract: Within the text analysis and processing fields, generated text attacks have been made easier to create than ever before. To combat these attacks open sourcing models and datasets have become a major trend to create automated detection algorithms in defense of authenticity. For this purpose, synthetic text detection has become an increasingly viable topic of research. This review is written for the… ▽ More

    Submitted 1 October, 2022; originally announced October 2022.

  9. arXiv:2202.12831  [pdf, other

    cs.LG

    Benchmark Assessment for DeepSpeed Optimization Library

    Authors: Gongbo Liang, Izzat Alsmadi

    Abstract: Deep Learning (DL) models are widely used in machine learning due to their performance and ability to deal with large datasets while producing high accuracy and performance metrics. The size of such datasets and the complexity of DL models cause such models to be complex, consuming large amount of resources and time to train. Many recent libraries and applications are introduced to deal with DL co… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

  10. arXiv:2111.05274  [pdf, other

    cs.SI

    Event Detection in Twitter: A Content and Time-Based Analysis

    Authors: Izzat Alsmadi, Michael O'Brien

    Abstract: The detection of events from online social networks is a recent, evolving field that attracts researchers from across a spectrum of disciplines and domains. Here we report a time-series analysis for predicting events. In particular, we evaluated the frequency distribution of top n-grams of terms over time, focusing on two indicators: high-frequency n-grams over both short and long periods of time.… ▽ More

    Submitted 18 October, 2021; originally announced November 2021.

  11. arXiv:2110.13980  [pdf, other

    cs.CL

    Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions

    Authors: Izzat Alsmadi, Kashif Ahmad, Mahmoud Nazzal, Firoj Alam, Ala Al-Fuqaha, Abdallah Khreishah, Abdulelah Algosaibi

    Abstract: The growing use of social media has led to the development of several Machine Learning (ML) and Natural Language Processing(NLP) tools to process the unprecedented amount of social media content to make actionable decisions. However, these MLand NLP algorithms have been widely shown to be vulnerable to adversarial attacks. These vulnerabilities allow adversaries to launch a diversified set of adve… ▽ More

    Submitted 26 October, 2021; originally announced October 2021.

    Comments: 21 pages, 6 figures, 10 tables

  12. arXiv:2102.11362  [pdf, other

    cs.SI

    An ontological analysis of misinformation in online social networks

    Authors: Izzat Alsmadi, Iyad Alazzam, Mohammad A. AlRamahi

    Abstract: The internet, Online Social Networks (OSNs) and smart phones enable users to create tremendous amount of information. Users who search for general or specific knowledge may not have these days problems of information scarce but misinformation. Misinformation nowadays can refer to a continuous spectrum between what can be seen as "facts" or "truth", if humans agree on the existence of such, to fals… ▽ More

    Submitted 22 February, 2021; originally announced February 2021.

  13. arXiv:2101.08675  [pdf, other

    cs.LG cs.CR

    Adversarial Machine Learning in Text Analysis and Generation

    Authors: Izzat Alsmadi

    Abstract: The research field of adversarial machine learning witnessed a significant interest in the last few years. A machine learner or model is secure if it can deliver main objectives with acceptable accuracy, efficiency, etc. while at the same time, it can resist different types and/or attempts of adversarial attacks. This paper focuses on studying aspects and research trends in adversarial machine lea… ▽ More

    Submitted 13 January, 2021; originally announced January 2021.

  14. arXiv:2010.11096  [pdf, other

    cs.CR

    RBAC for Healthcare-Infrastructure and data storage

    Authors: Ramesh Narasimman, Izzat Alsmadi

    Abstract: Role based Access control (RBAC) is the cornerstone of security for any modern organization. In this report, we defined a health-care access control structure based on RBAC. We used Alloy formal logic modeling tool to model and validate system functions. We modeled system static and dynamic or temporal behaviours. We focused on evaluating properties such as integrity, conformance and progress.

    Submitted 18 October, 2020; originally announced October 2020.

  15. arXiv:1211.1780  [pdf

    cs.IR cs.DL

    Annotations, Collaborative Tagging, and Searching Mathematics in E-Learning

    Authors: Iyad Abu Doush, Faisal Alkhateeb, Eslam Al Maghayreh, Izzat Alsmadi, Samer Samarah

    Abstract: This paper presents a new framework for adding semantics into e-learning system. The proposed approach relies on two principles. The first principle is the automatic addition of semantic information when creating the mathematical contents. The second principle is the collaborative tagging and annotation of the e-learning contents and the use of an ontology to categorize the e-learning contents. Th… ▽ More

    Submitted 8 November, 2012; originally announced November 2012.

  16. arXiv:1205.1602  [pdf

    cs.IR

    Indexing of Arabic documents automatically based on lexical analysis

    Authors: Abdulrahman Al Molijy, Ismail Hmeidi, Izzat Alsmadi

    Abstract: The continuous information explosion through the Internet and all information sources makes it necessary to perform all information processing activities automatically in quick and reliable manners. In this paper, we proposed and implemented a method to automatically create and Index for books written in Arabic language. The process depends largely on text summarization and abstraction processes t… ▽ More

    Submitted 8 May, 2012; originally announced May 2012.