scispace - formally typeset
Search or ask a question
Author

Mohsen Guizani

Bio: Mohsen Guizani is an academic researcher from Qatar University. The author has contributed to research in topics: Computer science & Cloud computing. The author has an hindex of 79, co-authored 1110 publications receiving 31282 citations. Previous affiliations of Mohsen Guizani include Jaypee Institute of Information Technology & University College for Women.


Papers
More filters
Journal ArticleDOI
TL;DR: A new scheme for trust authority (TA) security queries in fog computing to obtain outsourced encrypted map lists (MPLs) of the participants to achieve online traceability and identity retrieval for malicious participants is proposed in this study, which can reduce the storage burden of TA.

55 citations

Posted Content
Rong Yu, Yan Zhang1, Yi Liu, Stein Gjessing1, Mohsen Guizani2 
TL;DR: A comprehensive introduction to PUE attacks, from the attacking rationale and its impact on CR networks, to detection and defense approaches, and an admission control based defense approach is proposed to mitigate the performance degradation of a CR network under a PUE attack.
Abstract: Cognitive Radio (CR) is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security is a very important but not well addressed issue in CR networks. In this paper we focus on security problems arising from Primary User Emulation (PUE) attacks in CR networks. We present a comprehensive introduction to PUE attacks, from the attacking rationale and its impact on CR networks, to detection and defense approaches. In order to secure CR networks against PUE attacks, a two-level database-assisted detection approach is proposed to detect such attacks. Energy detection and location verification are combined for fast and reliable detection. An admission control based defense approach is proposed to mitigate the performance degradation of a CR network under a PUE attack. Illustrative results are presented to demonstrate the effectiveness of the proposed detection and defense approaches.

55 citations

Journal ArticleDOI
TL;DR: This work proposes an AIS data-driven trajectory prediction framework, whose main component is a long short term memory (LSTM) network, embedded into the LSTM network to guarantee high-accuracy vessel trajectory prediction.
Abstract: The maritime Internet of Things (IoT) has recently emerged as a revolutionary communication paradigm where a large number of moving vessels are closely interconnected in intelligent maritime networks. However, the tremendous growth of vessel trajectories, collected from the combined satellite-terrestrial AIS (automatic identification system) base stations, could lead to unsatisfactory maritime safety and efficacy. To promote smart traffic services in maritime IoT, it is necessary to accurately and robustly predict the spatiotemporal vessel trajectories. It is beneficial for collision avoidance, maritime surveillance, and abnormal behavior detection, etc. Motivated by the strong learning capacity of deep neural networks, this work proposes an AIS data-driven trajectory prediction framework, whose main component is a long short term memory (LSTM) network. In particular, the vessel traffic conflict situation modeling, generated using the dynamic AIS data and social force concept, is embedded into the LSTM network to guarantee high-accuracy vessel trajectory prediction. In addition, a mixed loss function is reconstructed to make our prediction results more reliable and robust in different navigation environments. Several quantitative and qualitative experiments have been implemented on realistic AIS-based vessel trajectories. Our results have demonstrated that the proposed method could achieve satisfactory prediction performance in terms of accuracy and robustness.

54 citations

Journal ArticleDOI
TL;DR: A novel protocol named HashHand is proposed that not only inherits the merits of Pair- Hand and efficiently eliminates its security vulnerabilities, but also provides a session key update mechanism.
Abstract: A handover authentication module in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. However, designing an appropriate handover authentication protocol is a difficult task because wireless networks are susceptible to attacks, and mobile nodes have limited power and processing capability. In this article, we identify the security and efficiency requirements of a good handover authentication protocol and analyze the existing related protocols, and show that many such protocols are either insecure or inefficient. Then we review a recently proposed protocol named PairHand, which has been shown to outperform all other protocols on security and efficiency. Furthermore, we propose a novel protocol named HashHand that not only inherits the merits of Pair- Hand and efficiently eliminates its security vulnerabilities, but also provides a session key update mechanism. Experiments using our implementation on resource-limited laptop PCs show that HashHand is feasible for practical mobile networks.

54 citations

Journal ArticleDOI
TL;DR: A literature review of state-of-the-art machine learning algorithms for disaster and pandemic management and how these algorithms can be combined with other technologies to address disaster andPandemic management is provided.
Abstract: This article provides a literature review of state-of-the-art machine learning (ML) algorithms for disaster and pandemic management. Most nations are concerned about disasters and pandemics, which, in general, are highly unlikely events. To date, various technologies, such as IoT, object sensing, UAV, 5G, and cellular networks, smartphone-based system, and satellite-based systems have been used for disaster and pandemic management. ML algorithms can handle multidimensional, large volumes of data that occur naturally in environments related to disaster and pandemic management and are particularly well suited for important related tasks, such as recognition and classification. ML algorithms are useful for predicting disasters and assisting in disaster management tasks, such as determining crowd evacuation routes, analyzing social media posts, and handling the post-disaster situation. ML algorithms also find great application in pandemic management scenarios, such as predicting pandemics, monitoring pandemic spread, disease diagnosis, etc. This article first presents a tutorial on ML algorithms. It then presents a detailed review of several ML algorithms and how we can combine these algorithms with other technologies to address disaster and pandemic management. It also discusses various challenges, open issues and, directions for future research.

54 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

01 Jan 2002

9,314 citations