Search Results for author: Ala Al-Fuqaha

Found 55 papers, 5 papers with code

Meta Reinforcement Learning for Strategic IoT Deployments Coverage in Disaster-Response UAV Swarms

no code implementations20 Jan 2024 Marwan Dhuheir, Aiman Erbad, Ala Al-Fuqaha

Our simulation results prove that our introduced approach is better than the three state-of-the-art algorithms in providing coverage to strategic locations with fast convergence.

Decision Making Disaster Response +2

Empowering HWNs with Efficient Data Labeling: A Clustered Federated Semi-Supervised Learning Approach

no code implementations19 Jan 2024 Moqbel Hamood, Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha

Clustered Federated Multitask Learning (CFL) has gained considerable attention as an effective strategy for overcoming statistical challenges, particularly when dealing with non independent and identically distributed (non IID) data across multiple users.

Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally

no code implementations5 Oct 2023 Shawqi Al-Maliki, Adnan Qayyum, Hassan Ali, Mohamed Abdallah, Junaid Qadir, Dinh Thai Hoang, Dusit Niyato, Ala Al-Fuqaha

This paper encompasses a taxonomy that highlights the emergence of AdvML4G, a discussion of the differences and similarities between AdvML4G and AdvML, a taxonomy covering social good-related concepts and aspects, an exploration of the motivations behind the emergence of AdvML4G at the intersection of ML4G and AdvML, and an extensive summary of the works that utilize AdvML4G as an auxiliary tool for innovating pro-social applications.

Membership Inference Attacks on DNNs using Adversarial Perturbations

1 code implementation11 Jul 2023 Hassan Ali, Adnan Qayyum, Ala Al-Fuqaha, Junaid Qadir

Secondly, we utilize the framework to propose two novel attacks: (1) Adversarial Membership Inference Attack (AMIA) efficiently utilizes the membership and the non-membership information of the subjects while adversarially minimizing a novel loss function, achieving 6% TPR on both Fashion-MNIST and MNIST datasets; and (2) Enhanced AMIA (E-AMIA) combines EMIA and AMIA to achieve 8% and 4% TPRs on Fashion-MNIST and MNIST datasets respectively, at 1% FPR.

Inference Attack Membership Inference Attack

Motion Comfort Optimization for Autonomous Vehicles: Concepts, Methods, and Techniques

no code implementations15 Jun 2023 Mohammed Aledhari, Mohamed Rahouti, Junaid Qadir, Basheer Qolomany, Mohsen Guizani, Ala Al-Fuqaha

We also discuss the technical details related to the automatic driving comfort system, the response time of the AV driver, the comfort level of the AV, motion sickness, and related optimization technologies.

Autonomous Driving

Can We Revitalize Interventional Healthcare with AI-XR Surgical Metaverses?

no code implementations25 Mar 2023 Adnan Qayyum, Muhammad Bilal, Muhammad Hadi, Paweł Capik, Massimo Caputo, Hunaid Vohra, Ala Al-Fuqaha, Junaid Qadir

Recent advancements in technology, particularly in machine learning (ML), deep learning (DL), and the metaverse, offer great potential for revolutionizing surgical science.

Consistent Valid Physically-Realizable Adversarial Attack against Crowd-flow Prediction Models

no code implementations5 Mar 2023 Hassan Ali, Muhammad Atif Butt, Fethi Filali, Ala Al-Fuqaha, Junaid Qadir

Although many works have studied these adversarial perturbations in general, the adversarial vulnerabilities of deep crowd-flow prediction models in particular have remained largely unexplored.

Adversarial Attack Management +1

Topic Modeling Based on Two-Step Flow Theory: Application to Tweets about Bitcoin

no code implementations3 Mar 2023 Aos Mulahuwaish, Matthew Loucks, Basheer Qolomany, Ala Al-Fuqaha

We found differences in language and interest between these two groups regarding Bitcoin and that the opinion leaders of Twitter are not aligned with the majority of users.

Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach

1 code implementation28 Feb 2023 Mahmoud Nazzal, Abdallah Khreishah, Joyoung Lee, Shaahin Angizi, Ala Al-Fuqaha, Mohsen Guizani

This approach minimizes inter-cloudlet communication thereby alleviating the communication overhead of the decentralized approach while promoting scalability due to cloudlet-level decentralization.

Edge-computing

Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR) for Metaverses

no code implementations24 Oct 2022 Adnan Qayyum, Muhammad Atif Butt, Hassan Ali, Muhammad Usman, Osama Halabi, Ala Al-Fuqaha, Qammer H. Abbasi, Muhammad Ali Imran, Junaid Qadir

Metaverse is expected to emerge as a new paradigm for the next-generation Internet, providing fully immersive and personalised experiences to socialize, work, and play in self-sustaining and hyper-spatio-temporal virtual world(s).

Social Media as an Instant Source of Feedback on Water Quality

no code implementations9 Feb 2022 Khubaib Ahmad, Muhammad Asif Ayub, Kashif Ahmad, Jebran Khan, Nasir Ahmad, Ala Al-Fuqaha

We also provide an evaluation of the individual models where the highest F1-score of 0. 81 is obtained with the BERT model.

Data Augmentation

NLP Techniques for Water Quality Analysis in Social Media Content

no code implementations30 Nov 2021 Muhammad Asif Ayub, Khubaib Ahmad, Kashif Ahmad, Nasir Ahmad, Ala Al-Fuqaha

This paper presents our contributions to the MediaEval 2021 task namely "WaterMM: Water Quality in Social Multimedia".

Explainable Event Recognition

no code implementations2 Oct 2021 Imran Khan, Kashif Ahmad, Namra Gul, Talhat Khan, Nasir Ahmad, Ala Al-Fuqaha

The results of the study indicate that 78%, 84%, and 78% of the model decisions on natural disasters, sports, and social events datasets, respectively, are based onevent-related objects or regions.

Client Selection Approach in Support of Clustered Federated Learning over Wireless Edge Networks

no code implementations16 Aug 2021 Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha, Aiman Erbad

Extensive experiments show that the proposed approach lowers the training time and accelerates the convergence rate by up to 50% while imbuing each client with a specialized model that is fit for its local data distribution.

Federated Learning Scheduling

Fine-Grained Data Selection for Improved Energy Efficiency of Federated Edge Learning

no code implementations20 Jun 2021 Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha, Aiman Erbad

Specifically, we consider a problem that aims to find the optimal user's resources, including the fine-grained selection of relevant training samples, bandwidth, transmission power, beamforming weights, and processing speed with the goal of minimizing the total energy consumption given a deadline constraint on the communication rounds of FEEL.

Total Energy

Deep Reinforcement Learning for Radio Resource Allocation and Management in Next Generation Heterogeneous Wireless Networks: A Survey

no code implementations25 May 2021 Abdulmalik Alwarafy, Mohamed Abdallah, Bekir Sait Ciftler, Ala Al-Fuqaha, Mounir Hamdi

In this paper, we conduct a systematic in-depth, and comprehensive survey of the applications of DRL techniques in RRAM for next generation wireless networks.

Management

The Duo of Artificial Intelligence and Big Data for Industry 4.0: Review of Applications, Techniques, Challenges, and Future Research Directions

no code implementations6 Apr 2021 Senthil Kumar Jagatheesaperumal, Mohamed Rahouti, Kashif Ahmad, Ala Al-Fuqaha, Mohsen Guizani

In this paper, we provide a comprehensive overview of different aspects of AI and Big Data in Industry 4. 0 with a particular focus on key applications, techniques, the concepts involved, key enabling technologies, challenges, and research perspective towards deployment of Industry 5. 0.

Management

Intelligent Building Control Systems for Thermal Comfort and Energy-Efficiency: A Systematic Review of Artificial Intelligence-Assisted Techniques

no code implementations6 Apr 2021 Ghezlane Halhoul Merabet, Mohamed Essaaidi, Mohamed Ben Haddou, Basheer Qolomany, Junaid Qadir, Muhammad Anan, Ala Al-Fuqaha, Mohamed Riduan Abid, Driss Benhaddou

Building operations represent a significant percentage of the total primary energy consumed in most countries due to the proliferation of Heating, Ventilation and Air-Conditioning (HVAC) installations in response to the growing demand for improved thermal comfort.

Threshold-Based Data Exclusion Approach for Energy-Efficient Federated Edge Learning

no code implementations30 Mar 2021 Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha, Aiman Erbad

Then, the problem is formulated as joint energy minimization and resource allocation optimization problem to obtain the optimal local computation time and the optimal transmission time that minimize the total energy consumption considering the worker's energy budget, available bandwidth, channel states, beamforming, and local CPU speed.

Total Energy

Sentiment Analysis of Users' Reviews on COVID-19 Contact Tracing Apps with a Benchmark Dataset

no code implementations1 Mar 2021 Kashif Ahmad, Firoj Alam, Junaid Qadir, Basheer Qolomany, Imran Khan, Talhat Khan, Muhammad Suleman, Naina Said, Syed Zohaib Hassan, Asma Gul, Ala Al-Fuqaha

In this work, we propose a pipeline starting from manual annotation via a crowd-sourcing study and concluding on the development and training of AI models for automatic sentiment analysis of users' reviews.

Sentiment Analysis

Collaborative Federated Learning For Healthcare: Multi-Modal COVID-19 Diagnosis at the Edge

no code implementations19 Jan 2021 Adnan Qayyum, Kashif Ahmad, Muhammad Ahtazaz Ahsan, Ala Al-Fuqaha, Junaid Qadir

Despite significant improvements over the last few years, cloud-based healthcare applications continue to suffer from poor adoption due to their limitations in meeting stringent security, privacy, and quality of service requirements (such as low latency).

COVID-19 Diagnosis Edge-computing +1

Developing Future Human-Centered Smart Cities: Critical Analysis of Smart City Security, Interpretability, and Ethical Challenges

no code implementations14 Dec 2020 Kashif Ahmad, Majdi Maabreh, Mohamed Ghaly, Khalil Khan, Junaid Qadir, Ala Al-Fuqaha

In this paper, we analyze and explore key challenges including security, robustness, interpretability, and ethical (data and algorithmic) challenges to a successful deployment of AI in human-centric applications, with a particular emphasis on the convergence of these concepts/challenges.

Misinformation

Floods Detection in Twitter Text and Images

no code implementations30 Nov 2020 Naina Said, Kashif Ahmad, Asma Gul, Nasir Ahmad, Ala Al-Fuqaha

The extracted features are then used to train multiple individual classifiers whose scores are then combined in a late fusion manner achieving an F1-score of 0. 75%.

Flood Detection via Twitter Streams using Textual and Visual Features

no code implementations30 Nov 2020 Firoj Alam, Zohaib Hassan, Kashif Ahmad, Asma Gul, Michael Reiglar, Nicola Conci, Ala Al-Fuqaha

The paper presents our proposed solutions for the MediaEval 2020 Flood-Related Multimedia Task, which aims to analyze and detect flooding events in multimedia content shared over Twitter.

Budgeted Online Selection of Candidate IoT Clients to Participate in Federated Learning

no code implementations16 Nov 2020 Ihab Mohammed, Shadha Tabatabai, Ala Al-Fuqaha, Faissal El Bouanani, Junaid Qadir, Basheer Qolomany, Mohsen Guizani

In this work, we solve the problem of optimizing accuracy in stateful FL with a budgeted number of candidate clients by selecting the best candidate clients in terms of test accuracy to participate in the training process.

Federated Learning

Particle Swarm Optimized Federated Learning For Industrial IoT and Smart City Services

no code implementations5 Sep 2020 Basheer Qolomany, Kashif Ahmad, Ala Al-Fuqaha, Junaid Qadir

Most of the research on Federated Learning (FL) has focused on analyzing global optimization, privacy, and communication, with limited attention focusing on analyzing the critical matter of performing efficient local training and inference at the edge devices.

Federated Learning Traffic Prediction

Visual Sentiment Analysis from Disaster Images in Social Media

no code implementations4 Sep 2020 Syed Zohaib Hassan, Kashif Ahmad, Steven Hicks, Paal Halvorsen, Ala Al-Fuqaha, Nicola Conci, Michael Riegler

While sentiment analysis of text streams has been widely explored in literature, sentiment analysis from images and videos is relatively new.

Humanitarian Model Selection +1

Trust-Based Cloud Machine Learning Model Selection For Industrial IoT and Smart City Services

no code implementations11 Aug 2020 Basheer Qolomany, Ihab Mohammed, Ala Al-Fuqaha, Mohsen Guizan, Junaid Qadir

With Machine Learning (ML) services now used in a number of mission-critical human-facing domains, ensuring the integrity and trustworthiness of ML models becomes all-important.

BIG-bench Machine Learning Model Selection

Deriving Emotions and Sentiments from Visual Content: A Disaster Analysis Use Case

no code implementations3 Feb 2020 Kashif Ahmad, Syed Zohaib, Nicola Conci, Ala Al-Fuqaha

Sentiment analysis aims to extract and express a person's perception, opinions and emotions towards an entity, object, product and a service, enabling businesses to obtain feedback from the consumers.

Model Selection Sentiment Analysis

Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning

1 code implementation27 Jan 2020 Inaam Ilahi, Muhammad Usama, Junaid Qadir, Muhammad Umar Janjua, Ala Al-Fuqaha, Dinh Thai Hoang, Dusit Niyato

Deep Reinforcement Learning (DRL) has numerous applications in the real world thanks to its outstanding ability in quickly adapting to the surrounding environments.

Autonomous Vehicles reinforcement-learning +1

Secure and Robust Machine Learning for Healthcare: A Survey

no code implementations21 Jan 2020 Adnan Qayyum, Junaid Qadir, Muhammad Bilal, Ala Al-Fuqaha

Recent years have witnessed widespread adoption of machine learning (ML)/deep learning (DL) techniques due to their superior performance for a variety of healthcare applications ranging from the prediction of cardiac arrest from one-dimensional heart signals to computer-aided diagnosis (CADx) using multi-dimensional medical images.

BIG-bench Machine Learning Privacy Preserving

Exploiting Unlabeled Data in Smart Cities using Federated Learning

no code implementations10 Jan 2020 Abdullatif Albaseer, Bekir Sait Ciftler, Mohamed Abdallah, Ala Al-Fuqaha

The algorithm is divided into two phases where the first phase trains a global model based on the labeled data.

Federated Learning

Sentiment Analysis from Images of Natural Disasters

no code implementations10 Oct 2019 Syed Zohaib, Kashif Ahmad, Nicola Conci, Ala Al-Fuqaha

Social media have been widely exploited to detect and gather relevant information about opinions and events.

Sentiment Analysis

Multi-Modal Machine Learning for Flood Detection in News, Social Media and Satellite Sequences

no code implementations7 Oct 2019 Kashif Ahmad, Konstantin Pogorelov, Mohib Ullah, Michael Riegler, Nicola Conci, Johannes Langguth, Ala Al-Fuqaha

In this paper we present our methods for the MediaEval 2019 Mul-timedia Satellite Task, which is aiming to extract complementaryinformation associated with adverse events from Social Media andsatellites.

BIG-bench Machine Learning

Active Learning for Event Detection in Support of Disaster Analysis Applications

no code implementations27 Sep 2019 Naina Said, Kashif Ahmad, Nicola Conci, Ala Al-Fuqaha

Disaster analysis in social media content is one of the interesting research domains having abundance of data.

Active Learning Event Detection

Black-box Adversarial ML Attack on Modulation Classification

no code implementations1 Aug 2019 Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha

We have evaluated the robustness of two famous such modulation classifiers (based on the techniques of convolutional neural networks and long short term memory) against adversarial machine learning attacks in black-box settings.

Adversarial Attack BIG-bench Machine Learning +2

A Survey on the Use of Preferences for Virtual Machine Placement in Cloud Data Centers

no code implementations17 Jul 2019 Abdulaziz Alashaikh, Eisa Alanazi, Ala Al-Fuqaha

With the rapid development of virtualization techniques, cloud data centers allow for cost effective, flexible, and customizable deployments of applications on virtualized infrastructure.

The Adversarial Machine Learning Conundrum: Can The Insecurity of ML Become The Achilles' Heel of Cognitive Networks?

no code implementations3 Jun 2019 Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha, Mounir Hamdi

We also provide some guidelines to design secure ML models for cognitive networks that are robust to adversarial attacks on the ML pipeline of cognitive networks.

Intrusion Detection Traffic Classification

Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and The Way Forward

no code implementations29 May 2019 Adnan Qayyum, Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha

Connected and autonomous vehicles (CAVs) will form the backbone of future next-generation intelligent transportation systems (ITS) providing travel comfort, road safety, along with a number of value-added services.

Autonomous Vehicles BIG-bench Machine Learning

Leveraging Machine Learning and Big Data for Smart Buildings: A Comprehensive Survey

no code implementations1 Apr 2019 Basheer Qolomany, Ala Al-Fuqaha, Ajay Gupta, Driss Benhaddou, Safaa Alwajidi, Junaid Qadir, Alvis C. Fong

In this paper, we survey the area of smart building with a special focus on the role of techniques from machine learning and big data analytics.

BIG-bench Machine Learning Decision Making

Semi-supervised Deep Reinforcement Learning in Support of IoT and Smart City Services

1 code implementation9 Oct 2018 Mehdi Mohammadi, Ala Al-Fuqaha, Mohsen Guizani, Jun-Seok Oh

In this paper, we propose a semi-supervised deep reinforcement learning model that fits smart city applications as it consumes both labeled and unlabeled data to improve the performance and accuracy of the learning agent.

Indoor Localization reinforcement-learning +1

SDN Flow Entry Management Using Reinforcement Learning

no code implementations24 Sep 2018 Ting-Yu Mu, Ala Al-Fuqaha, Khaled Shuaib, Farag M. Sallabi, Junaid Qadir

Modern information technology services largely depend on cloud infrastructures to provide their services.

Management reinforcement-learning +1

Path Planning in Support of Smart Mobility Applications using Generative Adversarial Networks

no code implementations23 Apr 2018 Mehdi Mohammadi, Ala Al-Fuqaha, Jun-Seok Oh

This paper describes and evaluates the use of Generative Adversarial Networks (GANs) for path planning in support of smart mobility applications such as indoor and outdoor navigation applications, individualized wayfinding for people with disabilities (e. g., vision impairments, physical disabilities, etc.

Autonomous Vehicles Navigate

Deep Learning for IoT Big Data and Streaming Analytics: A Survey

1 code implementation9 Dec 2017 Mehdi Mohammadi, Ala Al-Fuqaha, Sameh Sorour, Mohsen Guizani

The potential of using emerging DL techniques for IoT data analytics are then discussed, and its promises and challenges are introduced.

Role of Deep LSTM Neural Networks And WiFi Networks in Support of Occupancy Prediction in Smart Buildings

no code implementations28 Nov 2017 Basheer Qolomany, Ala Al-Fuqaha, Driss Benhaddou, Ajay Gupta

In this paper we propose to replace sensor technology with time series models that can predict the number of occupants at a given location and time.

Time Series Time Series Analysis

Parameters Optimization of Deep Learning Models using Particle Swarm Optimization

no code implementations28 Nov 2017 Basheer Qolomany, Majdi Maabreh, Ala Al-Fuqaha, Ajay Gupta, Driss Benhaddou

The number of hidden layers and the number of neurons in each layer of a deep machine learning network are two key parameters, which have main influence on the performance of the algorithm.

Machine Translation

Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges

no code implementations19 Sep 2017 Muhammad Usama, Junaid Qadir, Aunn Raza, Hunain Arif, Kok-Lim Alvin Yau, Yehia Elkhatib, Amir Hussain, Ala Al-Fuqaha

We provide a comprehensive survey highlighting the recent advancements in unsupervised learning techniques and describe their applications for various learning tasks in the context of networking.

Anomaly Detection BIG-bench Machine Learning +5

Cannot find the paper you are looking for? You can Submit a new open access paper.