scispace - formally typeset
Search or ask a question
Author

Mohsen Guizani

Bio: Mohsen Guizani is an academic researcher from Qatar University. The author has contributed to research in topics: Computer science & Cloud computing. The author has an hindex of 79, co-authored 1110 publications receiving 31282 citations. Previous affiliations of Mohsen Guizani include Jaypee Institute of Information Technology & University College for Women.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper leverage the dense heterogeneous network (HetNet) architecture over 5 G network to enhance network capacity and provide seamless connectivity for smart health systems, and formulate an optimization model that integrates the network selection problem with adaptive compression, at the network edge, to minimize the transmission energy consumption and latency.
Abstract: Smart health systems improve our quality of life by integrating information and technology into health and medical practices. Such technologies can significantly improve the existing health services. However, reliability, latency, and limited network resources are among the many challenges hindering the realization of smart health systems. Thus, in this paper, we leverage the dense heterogeneous network (HetNet) architecture over 5G network to enhance network capacity and provide seamless connectivity for smart health systems. However, network selection in HetNets is still a challenging problem that needs to be addressed. Inspired by the success of Deep Reinforcement Learning (DRL) in solving complicated control problems, we present a novel DRL model for solving the network selection problem with the aim of improving medical data delivery over heterogeneous health systems. Specifically, we integrate the network selection problem with adaptive compression at the edge to formulate an optimization model that aims at minimizing the transmission energy consumption while meeting diverse applications' Quality of service (QoS) requirements. Our experimental results show that the proposed DRL model could minimize the energy consumption and cost compared to the greedy techniques while meeting different users' demands in high dynamics environments.

18 citations

Journal ArticleDOI
TL;DR: In this paper , the authors conduct an in-depth survey on the existing intrusion detection solutions proposed for the IoT ecosystem which includes the IoT devices as well as the communications between the IoT, fog computing, and cloud computing layers.
Abstract: In the past several years, the world has witnessed an acute surge in the production and usage of smart devices which are referred to as the Internet of Things (IoT). These devices interact with each other as well as with their surrounding environments to sense, gather and process data of various kinds. Such devices are now part of our everyday’s life and are being actively used in several verticals, such as transportation, healthcare, and smart homes. IoT devices, which usually are resource-constrained, often need to communicate with other devices, such as fog nodes and/or cloud computing servers to accomplish certain tasks that demand large resource requirements. These communications entail unprecedented security vulnerabilities, where malicious parties find in this heterogeneous and multiparty architecture a compelling platform to launch their attacks. In this work, we conduct an in-depth survey on the existing intrusion detection solutions proposed for the IoT ecosystem which includes the IoT devices as well as the communications between the IoT, fog computing, and cloud computing layers. Although some survey articles already exist, the originality of this work stems from the three following points: 1) discuss the security issues of the IoT ecosystem not only from the perspective of IoT devices but also taking into account the communications between the IoT, fog, and cloud computing layers; 2) propose a novel two-level classification scheme that first categorizes the literature based on the approach used to detect attacks and then classify each approach into a set of subtechniques; and 3) propose a comprehensive cybersecurity framework that combines the concepts of explainable artificial intelligence (XAI), federated learning, game theory, and social psychology to offer future IoT systems a strong protection against cyberattacks.

17 citations

Proceedings ArticleDOI
01 Dec 2016
TL;DR: A femtocaching framework of QoE-oriented resource efficiency optimization for high performance of cooperative VASs over 5G two-tier cellular networks, where the collaboration between macro base stations (BSs) and femtocells are exploited to efficiently deliver videos to mobile users (MUs).
Abstract: Video streaming applications and services (VASs) consume an enormous amount of scarce resources in mobile devices and cellular wireless networks due to the demand for high data rates of video streaming. The limited resource of wireless media and unreliable nature of wireless channels in cellular networks make VASs challenging to deliver videos at high quality of experience (QoE). Therefore, in this paper, we propose a femtocaching framework of QoE-oriented resource efficiency optimization for high performance of cooperative VASs over 5G two-tier cellular networks, where the collaboration between macro base stations (BSs) and femtocells are exploited to efficiently deliver videos to mobile users (MUs). Our proposed framework aims at solving two problems. The first problem is how to cache the videos in femtocells to minimize the bandwidth resource consumed at the BSs and wasted at femtocells while guaranteeing high hit rate and utilizing the available storage resource of femtocells. The second one is how to encode the videos into descriptions and assign them to each femtocell for transmission, so as to minimize the reconstructed distortion of received videos for high playback quality at the MUs. The simulation results are further provided to demonstrate the benefits of the proposed framework.

17 citations

Journal ArticleDOI
TL;DR: A novel computation offloading mechanism is proposed in the environments combining of the Internet of Vehicles and Multi-Access Edge Computing that can be offloaded to appropriate nearby vehicles while meeting the requirements of application completion time, energy consumption, and resource utilization.
Abstract: Recently, research intergrading medicine and Artificial Intelligence has attracted extensive attention. Mobile health has emerged as a promising paradigm for improving people's work and life in the future. However, high mobility of mobile devices and limited resources pose challenges for users to deal with the applications in mobile health that require large amount of computational resources. In this paper, a novel computation offloading mechanism is proposed in the environments combining of the Internet of Vehicles and Multi-Access Edge Computing. Through the proposed mechanism, mobile health applications are divided into several parts and can be offloaded to appropriate nearby vehicles while meeting the requirements of application completion time, energy consumption, and resource utilization. A particle swarm optimization based approach is proposed to optimize the the aforementioned computation offloading problem in a specific medical application. Evaluations of the proposed algorithms against local computing method serves as baseline method are conducted via extensive simulations. The average task completion time saved by our proposed task allocation scheme increases continually compared with the local solution. Specially, the global resource utilization rate increased from 71.8% to 94.5% compared with the local execution time.

17 citations

Journal ArticleDOI
TL;DR: The authors establish a novel and secure communication framework for V2G networks to achieve a balance among security, privacy preservation, efficiency and accountability without relying on any trusted third party.
Abstract: The vehicle-to-grid (V2G) technology enables electric vehicles to deliver electricity into power systems, providing them supplementary capacity. On the other hand, a new set of security threats are brought to smart grid participants by V2G networks. However, security and privacy in V2G networks have so far received little attention, despite a rich literature on the design of conceptual structures or the impact of V2G networks on the current grid. In this study, the authors explore the features of V2G communication networks and identify their security challenges for communication functions. The authors then establish a novel and secure communication framework for V2G networks to achieve a balance among security, privacy preservation, efficiency and accountability without relying on any trusted third party. The feasibility of the framework is demonstrated by experimental results.

17 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

01 Jan 2002

9,314 citations