scispace - formally typeset
Search or ask a question
Author

Mohamed Elhoseny

Bio: Mohamed Elhoseny is an academic researcher from Mansoura University. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 49, co-authored 240 publications receiving 7044 citations. Previous affiliations of Mohamed Elhoseny include Maharaja Agrasen Institute of Technology & Cairo University.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: This work designs an equivalent mechanism to enforce differential privacy and analyzes its privacy and utility and demonstrates that the proposed equivalent mechanism consistently outperforms several state-of-the-art mechanisms in data utility at the same privacy level.

21 citations

Book ChapterDOI
01 Jan 2019
TL;DR: This is the first attempt, a framework that can examine and connect the occasions of Spam and Phishing activities from Email and URL sources at scale to give cyber threat situational awareness and the created framework is exceptionally versatile and fit for distinguishing the malicious activities in close constant.
Abstract: Spamming and Phishing attacks are the most common security challenges we face in today’s cyber world. The existing methods for the Spam and Phishing detection are based on blacklisting and heuristics technique. These methods require human intervention to update if any new Spam and Phishing activity occurs. Moreover, these are completely inefficient in detecting new Spam and Phishing activities. These techniques can detect malicious activity only after the attack has occurred. Machine learning has the capability to detect new Spam and Phishing activities. This requires extensive domain knowledge for feature learning and feature representation. Deep learning is a method of machine learning which has the capability to extract optimal feature representation from various samples of benign, Spam and Phishing activities by itself. To leverage, this work uses various deep learning architectures for both Spam and Phishing detection with electronic mail (Email) and uniform resource locator (URL) data sources. Because in recent years both Email and URL resources are the most commonly used by the attackers to spread malware. Various datasets are used for conducting experiments with deep learning architectures. For comparative study, classical machine learning algorithms are used. These datasets are collected using public and private data sources. All experiments are run till 1,000 epochs with varied learning rate 0.01–0.5. For comparative study various classical machine learning classifiers are used with domain level feature extraction. For deep learning architectures and classical machine learning algorithms to convert text data into numeric representation various natural language processing text representation methods are used. As far as anyone is concerned, this is the first attempt, a framework that can examine and connect the occasions of Spam and Phishing activities from Email and URL sources at scale to give cyber threat situational awareness. The created framework is exceptionally versatile and fit for distinguishing the malicious activities in close constant. In addition, the framework can be effectively reached out to deal with vast volume of other cyber security events by including extra resources. These qualities have made the proposed framework emerge from some other arrangement of comparative kind.

20 citations

Proceedings ArticleDOI
01 Dec 2016
TL;DR: This paper presents a hybrid approach to an Automated Essay Grading System (AEGS) that provides automated grading and evaluation of student essays that has two complementary components: Writing Features Analysis tools and neural network grading engine.
Abstract: This paper presents a hybrid approach to an Automated Essay Grading System (AEGS) that provides automated grading and evaluation of student essays. The proposed system has two complementary components: Writing Features Analysis tools, which rely on natural language processing (NLP) techniques and neural network grading engine, which rely on a set of pre-graded essays to judge the student answer and assign a grade. By this way, students essays could be evaluated with a feedback that would improve their writing skills. The proposed system is evaluated using datasets from computer and information sciences college students' essays in Mansoura University. These datasets was written as part of mid-term exams in introduction to information systems course and Systems analysis and design course. The obtained results shows an agreement with teachers' grades in between 70% and nearly 90% with teachers' grades. This indicates that the proposed might be useful as a tool for automatic assessment of students' essays, thus leading to a considerable reduction in essay grading costs.

20 citations

Journal ArticleDOI
TL;DR: This article presents a SIARS using deep learning (DL) and multiple share creation schemes, which involves Adagrad based convolutional neural network (AG-CNN) based feature extractor to extract the useful set of features from the input images.
Abstract: Due to the advanced growth in multimedia data and Cloud Computing (CC), Secure Image Archival and Retrieval System (SIARS) on cloud has gained more interest in recent times. Content based image retrieval (CBIR) systems generally retrieve the images relevant to the query image (QI) from massive databases. However, the secure image retrieval process is needed to ensure data confidentiality and secure data transmission between cloud storage and users. Existing secure image retrieval models faces difficulties like minimum retrieval performance, which fails to adapt with the large-scale IR in cloud platform. To resolve this issue, this article presents a SIARS using deep learning (DL) and multiple share creation schemes. The proposed SIARS model involves Adagrad based convolutional neural network (AG-CNN) based feature extractor to extract the useful set of features from the input images. At the same time, secure multiple share creation (SMSC) schemes are executed to generate multiple shares of the input images. The resultant shares and the feature vectors are stored in the cloud database with the respective image identification number. Upon retrieval, the user provides a query image and reconstructs the received shared image to attain the related images from the database. An elaborate experimentation analysis is carried out on benchmark Corel10K dataset and the results are examined in terms of retrieval efficiency and image quality. The attained results ensured the superior performance of the SIARS model on all the applied test images.

20 citations


Cited by
More filters
01 Jan 2004
TL;DR: Comprehensive and up-to-date, this book includes essential topics that either reflect practical significance or are of theoretical importance and describes numerous important application areas such as image based rendering and digital libraries.
Abstract: From the Publisher: The accessible presentation of this book gives both a general view of the entire computer vision enterprise and also offers sufficient detail to be able to build useful applications. Users learn techniques that have proven to be useful by first-hand experience and a wide range of mathematical methods. A CD-ROM with every copy of the text contains source code for programming practice, color images, and illustrative movies. Comprehensive and up-to-date, this book includes essential topics that either reflect practical significance or are of theoretical importance. Topics are discussed in substantial and increasing depth. Application surveys describe numerous important application areas such as image based rendering and digital libraries. Many important algorithms broken down and illustrated in pseudo code. Appropriate for use by engineers as a comprehensive reference to the computer vision enterprise.

3,627 citations

01 Jun 2005

3,154 citations

01 Sep 2008
TL;DR: The Methodology used to Prepare the Guideline Epidemiology Incidence Etiology and Recommendations for Assessing Response to Therapy Suggested Performance Indicators is summarized.
Abstract: Executive Summary Introduction Methodology Used to Prepare the Guideline Epidemiology Incidence Etiology Major Epidemiologic Points Pathogenesis Major Points for Pathogenesis Modifiable Risk Factors Intubation and Mechanical Ventilation Aspiration, Body Position, and Enteral Feeding Modulation of Colonization: Oral Antiseptics and Antibiotics Stress Bleeding Prophylaxis, Transfusion, and Glucose Control Major Points and Recommendations for Modifiable Risk Factors Diagnostic Testing Major Points and Recommendations for Diagnosis Diagnostic Strategies and Approaches Clinical Strategy Bacteriologic Strategy Recommended Diagnostic Strategy Major Points and Recommendations for Comparing Diagnostic Strategies Antibiotic Treatment of Hospital-acquired Pneumonia General Approach Initial Empiric Antibiotic Therapy Appropriate Antibiotic Selection and Adequate Dosing Local Instillation and Aerosolized Antibiotics Combination versus Monotherapy Duration of Therapy Major Points and Recommendations for Optimal Antibiotic Therapy Specific Antibiotic Regimens Antibiotic Heterogeneity and Antibiotic Cycling Response to Therapy Modification of Empiric Antibiotic Regimens Defining the Normal Pattern of Resolution Reasons for Deterioration or Nonresolution Evaluation of the Nonresponding Patient Major Points and Recommendations for Assessing Response to Therapy Suggested Performance Indicators

2,961 citations