scispace - formally typeset
Search or ask a question
Author

Mohsen Guizani

Bio: Mohsen Guizani is an academic researcher from Qatar University. The author has contributed to research in topics: Computer science & Cloud computing. The author has an hindex of 79, co-authored 1110 publications receiving 31282 citations. Previous affiliations of Mohsen Guizani include Jaypee Institute of Information Technology & University College for Women.


Papers
More filters
Journal ArticleDOI
TL;DR: Simulation results demonstrate that the proposed enhanced spatial group-based RA scheme offers an outstanding detection performance improvement, and can accommodate a significantly larger number of M2M devices while having a notably reduced collision probability and access delay, in comparison with the conventional one.
Abstract: Satellite communication is expected to play a pivotal role in supporting the ubiquitous machine-to-machine (M2M) connection. Due to its wide beam coverage, however, one of the major challenges is to accommodate massive and concurrent M2M random access (RA) requests with the guarantee of human-to-human communications. To tackle this challenge, an enhanced spatial group-based RA scheme is presented from the viewpoint of preamble design. By leveraging a large-capacity RA preamble set configured with only a single root Zadoff–Chu sequence and strictly constrained cyclic shift offset set, it can effectively eliminate non-orthogonal interference and achieve the robustness to location estimation error in preamble detection procedure. Simulation results demonstrate that the proposed scheme offers an outstanding detection performance improvement, and can accommodate a significantly larger number of M2M devices while having a notably reduced collision probability and access delay, in comparison with the conventional one.

16 citations

Journal ArticleDOI
TL;DR: This article focuses specifically on RM research, which includes spectrum assignment, resource and channel allocation, power control, and interference management based on user-centric cell schemes, and presents a cloud-baseduser-centric network architecture with emphasis on the networks formation, RM, and interfered signal joint-processing via cluster technology to provide higher throughput.

16 citations

Journal ArticleDOI
TL;DR: This paper forms this problem as a mathematical optimization problem by using integer linear programming (ILP) and proposes an efficient heuristic algorithm called reliable VDC embedding (RVDCE) algorithm to solve this NP-hard problem of QoS-aware VDC provisioning across multiple data centers.
Abstract: Cloud computing has been a cost-efficient paradigm for deploying various applications in datacenters in recent years. Therefore, efficient provisioning for virtual data center (VDC) requests from different service providers (SPs) over physical data centers plays a vital role in improving the quality of service (QoS) and reducing the operational cost of SPs. Therefore, a significant attention has been paid for the VDC provisioning problem. However, few approaches have been proposed for the problem of reliable VDC embedding across multiple data centers, as most of them only consider the problem of VDC mapping within a single data center. In this paper, we study the problem of QoS-aware VDC provisioning across multiple data centers, such that the total bandwidth consumption in the inter-data center backbone network is minimized while satisfying the reliability requirement of each VDC request. We formulate this problem as a mathematical optimization problem by using integer linear programming (ILP) and propose an efficient heuristic algorithm called reliable VDC embedding (RVDCE) algorithm to solve this NP-hard problem. The simulation results show that the proposed algorithm performs better in terms of blocking ratio, CPU resource consumption, and bandwidth consumption of backbone network than the existing solution. In addition, this paper has also incorporated integrated security to minimize security vulnerabilities seen in other similar approaches. Apart from demonstrating how to resolve security challenges in our VDC proposal, cost calculations have been implemented to demonstrate the robustness, resiliency, validity, and effectiveness of the VDC provisioning solution for cloud computing.

16 citations

Proceedings ArticleDOI
07 Jun 2021
TL;DR: In this article, the authors evaluated the performance of Hierarchical Federated Learning (HFL) and federated learning (FL) with respect to detection accuracy and speed of convergence, through simulating an Intrusion Detection System for Internet-of-Things applications.
Abstract: As the Internet-of-Things devices are being very widely adopted in all fields, such as smart houses, healthcare, and transportation, extremely huge amounts of data are being gathered, shared, and processed. This fact raises many challenges on how to make the best use of this amount of data to improve the IoT systems' security using artificial intelligence, with taking into consideration the resource limitations in IoT devices and issues regarding data privacy. Different techniques have been studied and developed throughout the years. For example, Federated Learning (FL), which is an emerging learning technique that is very well known for preserving and respecting the privacy of the collaborating clients' data during model training. Therefore, in this paper, the concepts of FL and Hierarchical Federated Learning (HFL) are evaluated and compared with respect of detection accuracy and speed of convergence, through simulating an Intrusion Detection System for Internet-of-Things applications. The imbalanced NSL-KDD dataset was used in this work. Despite its infrastructure overhead, HFL proved its superiority over FL in terms of training loss, testing accuracy, and speed of convergence in three study cases. HFL also showed its efficiency over FL in reducing the effect of the non-identically and independently (non-iid) distributed data on the collaborative learning process.

16 citations

Journal ArticleDOI
TL;DR: In this paper, the authors provide a comprehensive survey for the common cyber-physical attacks and common detection mechanisms for water distribution systems (WDS) and compare the attacks and detection methods with emphasis on ideas, methods, evaluation results, advantages, limitations, etc.
Abstract: Modern technologies empower water distribution systems (WDS) for better services in the processes of water supply, storage, distribution, and recycling. They improve real-time monitoring, automating, and managing. However, the limitations of these technologies introduce cyber-physical attacks to the WDS. The main goals of cyber-physical attacks include disrupting normal operations and tampering the critical data, which have negative impacts on the WDS. Therefore, it is vital to develop and implement solutions to increase the security of the WDS by detecting and mitigating cyber-physical attacks. Since security for WDS is relatively new, there are no surveys on this topic despite its vital importance. Therefore, in this paper, we provide a comprehensive survey for the common cyber-physical attacks and common detection mechanisms for the WDS. We compare the attacks and detection methods with emphasis on ideas, methods, evaluation results, advantages, limitations, etc. We further provide a future research direction. We realize that there are still not many research attempts in this area and we hope that this work can trigger more research activities related to the WDS.

16 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

01 Jan 2002

9,314 citations