Now showing items 1371-1390 of 2262

    • Machine unlearning: Its need and implementation strategies 

      Tahiliani, Aman; Hassija, Vikas; Chamola, Vinay; Guizani, Mohsen ( Association for Computing Machinery , 2021 , Conference Paper)
      Generally when users share information about themselves on some online platforms, they knowingly or unknowingly allow this data to be used by the companies behind these companies for various purposes including selling this ...
    • Machine-Learning-Aided Optical Fiber Communication System 

      Pan, X.; Wang, Xishuo; Tian, Bo; Wang, Chuxuan; Zhang, Hongxin; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      The fiber optical network offers high speed, large bandwidth, and a high degree of reliability. However, the development of optical communication technology has hit a bottleneck due to several challenges such as energy ...
    • Machine-Learning-Based Efficient and Secure RSU Placement Mechanism for Software-Defined-IoV 

      Anbalagan, Sudha; Bashir, Ali Kashif; Raja, Gunasekaran; Dhanasekaran, Priyanka; Vijayaraghavan, Geetha; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      The massive increase in computing and network capabilities has resulted in a paradigm shift from vehicular networks to the Internet of Vehicles (IoV). Owing to the dynamic and heterogeneous nature of IoV, it requires ...
    • Machine-to-Machine (M2M) communications: A survey 

      Verma, Pawan Kumar; Verma, Rajesh; Prakash, Arun; Agrawal, Ashish; Naik, Kshirasagar; ... more authors ( Academic Press , 2016 , Article Review)
      Machine-to-Machine (M2M) communication is a promising technology for next generation communication systems. This communication paradigm facilitates ubiquitous communications with full mechanical automation, where a large ...
    • Maintaining database anonymity in the presence of queries 

      Riley, Ryan; Clifton, Chris; Malluhi, Qutaibah ( Springer , 2013 , Conference Paper)
      With the advent of cloud computing there is an increased interest in outsourcing an organization's data to a remote provider in order to reduce the costs associated with self-hosting. If that database contains information ...
    • Making federated learning robust to adversarial attacks by learning data and model association 

      Qayyum, Adnan; Janjua, Muhammad Umar; Qadir, Junaid ( Elsevier , 2022 , Article)
      One of the key challenges in federated learning (FL) is the detection of malicious parameter updates. In a typical FL setup, the presence of malicious client(s) can potentially demolish the overall training of the shared ...
    • Malicious mining code detection based on ensemble learning in cloud computing environment 

      Li, Shudong; Li, Yuan; Han, Weihong; Du, Xiaojiang; Guizani, Mohsen; ... more authors ( Elsevier B.V. , 2021 , Article)
      Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users ...
    • A Malicious Mining Code Detection Method Based on Multi-Features Fusion 

      Li, Shudong; Jiang, Laiyuan; Zhang, Qianqing; Wang, Zhen; Tian, Zhihong; ... more authors ( IEEE Computer Society , 2022 , Article)
      With the continuous increase in the economic value of new digital currencies represented by Bitcoin, more and more cybercriminals use malicious code to occupy victims system resources and network resources for mining without ...
    • Malicious uav detection using integrated audio and visual features for public safety applications 

      Jamil, Sonain; Fawad; Rahman, MuhibUr; Ullah, Amin; Badnava, Salman; ... more authors ( MDPI AG , 2020 , Article)
      Unmanned aerial vehicles (UAVs) have become popular in surveillance, security, and remote monitoring. However, they also pose serious security threats to public privacy. The timely detection of a malicious drone is currently ...
    • Malicious-proof and fair credit-based resource allocation techniques for DSA systems 

      Alshammari, Tamara; Hamdaoui, Bechir; Guizani, Mohsen; Rayes, Ammar ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)
      We propose a credit-based resource allocation technique for dynamic spectrum access that is robust against malicious and selfish behaviors and ensures good overall system fairness performance while also allowing spectrum ...
    • Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security 

      Qiao, Yanchen; Zhang, Weizhe; Du, Xiaojiang; Guizani, Mohsen ( Association for Computing Machinery , 2022 , Article)
      With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the ...
    • Malware detection based on graph attention networks for intelligent transportation systems 

      Catal, Cagatay; Gunduz, Hakan; Ozcan, Alper ( MDPI , 2021 , Article)
      Intelligent Transportation Systems (ITS) aim to make transportation smarter, safer, reliable, and environmentally friendly without detrimentally affecting the service quality. ITS can face security issues due to their ...
    • Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation 

      Niu, Weina; Xiao, Jian'An; Zhang, Xiyue; Zhang, Xiaosong; Du, Xiaojiang; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Advanced persistent threat (APT), with intense penetration, long duration, and high customization, has become one of the most grievous threats to cybersecurity. Furthermore, the design and development of Internet-of-Things ...
    • Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service 

      Khan, Khaled M.; Jiang, Zhuhan ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      Maintainability and easy-to-customisation are some quality properties that most application software in software-as-a-service (SaaS) should posses. These quality attributes are the pre requisite for most application software ...
    • Managing criticalities of e-health IoT systems 

      Kotronis C.; Minou G.; Dimitrakopoulos G.; Nikolaidou M.; Anagnostopoulos D.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Lately, Internet-based solutions, brought by the Internet of Things (IoT) and cloud computation and storage technologies, have been driving revolutionary approaches in innumerable domains, including the sensitive domain ...
    • Managing optimality in multi-sensor data fusion consistency using intersection and largest ellipsoid algorithms 

      Rebaiaia, Mohamed-Larbi; Al-Ja'am, Jihad Mohamad; El-Seoud, Samir ( Nova Science Publishers, Inc. , 2009 , Book chapter)
      The purpose of this chapter is to provide a theoretical and practical framework to tackle the target tracking problem known as the track-to-track correlation problem. When static (e.g. radars) or dynamic (e.g. AWACs) sensors ...
    • Managing Security Control Assumptions Using Causal Traceability 

      Nhlabatsi, Armstrong; Yu, Yijun; Zisman,; rea; Tun, Thein; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...
    • The many benefits of annotator rationales for relevance judgments 

      McDonnell, Tyler; Kutlu, Mucahid; Elsayed, Tamer; Lease, Matthew ( International Joint Conferences on Artificial Intelligence , 2017 , Conference Paper)
      When collecting subjective human ratings of items, it can be difficult to measure and enforce data quality due to task subjectivity and lack of insight into how judges arrive at each rating decision. To address this, we ...
    • Market-Based Model in CR-IoT: A QProbabilistic Multi-agent Reinforcement Learning Approach 

      Wang, Dan; Zhang, Wei; Song, Bin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      The ever-increasing urban population and the corresponding material demands have brought unprecedented burdens to cities. To guarantee better QoS for citizens, smart cities leverage emerging technologies such as the Cognitive ...
    • MARL: Multimodal Attentional Representation Learning for Disease Prediction 

      Hamdi, Ali; Aboeleneen, Amr; Shaban, Khaled ( Springer Science and Business Media Deutschland GmbH , 2021 , Conference Paper)
      Existing learning models often utilise CT-scan images to predict lung diseases. These models are posed by high uncertainties that affect lung segmentation and visual feature learning. We introduce MARL, a novel Multimodal ...