scispace - formally typeset
Search or ask a question
Author

Mohsen Guizani

Bio: Mohsen Guizani is an academic researcher from Qatar University. The author has contributed to research in topics: Computer science & Cloud computing. The author has an hindex of 79, co-authored 1110 publications receiving 31282 citations. Previous affiliations of Mohsen Guizani include Jaypee Institute of Information Technology & University College for Women.


Papers
More filters
Journal ArticleDOI
TL;DR: Instead of quantifying SUs' spectrum demand by a deterministic function of price, this model takes the randomness of secondary users' demand or demand uncertainty into consideration, which is the first solution to agent-based spectrum trading considering demand uncertainty.
Abstract: In this paper, we propose an agent-based spectrum trading model, where an agent can play a third-party role in the spectrum trading process. Providing service to Secondary Users (SUs) with spectrum bought from Primary Users (PUs), the agent can make profits during the process by providing service to secondary users. During each trading period, the agent has to decide how much spectrum it should lease from PUs and what price it should charge SUs. Therefore, the most significant challenge to implement this spectrum trading model is finding the most profitable strategy for agent(s). We address this challenge under two scenarios in which: 1) a single agent and 2) multiple agents. Instead of quantifying SUs' spectrum demand by a deterministic function of price, we take the randomness of secondary users' demand or demand uncertainty into consideration. To the best of our knowledge, this is the first solution to agent-based spectrum trading considering demand uncertainty.

45 citations

Journal ArticleDOI
TL;DR: This paper proposes two refined algorithms to be used in an anomaly detection framework which can handle voluminous data, and reports some experimental results to demonstrate their performance.
Abstract: Traffic anomaly detection has been a principal direction in the network security field, which aims to identify attacks based on significant deviations from the established normal usage profiles. Recently, a new networking paradigm, software defined networking (SDN), has emerged to facilitate effective network control and management. In this paper, we present the advantages of leveraging SDN to detect traffic anomaly, and review recent progresses in this direction. Despite their effectiveness for traditional traffic, SDN-based traffic anomaly detection methods have to face the challenge of continuously increasing network traffic. To this end, we propose two refined algorithms to be used in an anomaly detection framework which can handle voluminous data, and report some experimental results to demonstrate their performance.

45 citations

Journal ArticleDOI
TL;DR: Recent advances in the domain of D2D communication from the perspective of social-aware resource allocation and optimization are discussed and a taxonomy based on channel-centric attributes, objectives, solving approaches, networking technologies, characteristics, and communication types is devised.
Abstract: The undiminished growth of research activities to converge social awareness with D2D communication has paved the way for facilitating and providing significant benefits to users. Realizing these benefits depends on efficiently addressing several main technical challenges associated with the convergence. Although there are many research studies related to social networks and D2D communication, convergence of these two areas leads to further research efforts to implement social-aware D2D communication. In this article, we discuss recent advances in the domain of D2D communication from the perspective of social-aware resource allocation and optimization. We also categorize and classify the literature by devising a taxonomy based on channel-centric attributes, objectives, solving approaches, networking technologies, characteristics, and communication types. Moreover, we also outline the key requirements with the aim of providing guidelines for the domain researchers and designers to enable the social-aware resource allocation for D2D communication. Several open research challenges are presented as future research directions.

45 citations

Journal ArticleDOI
TL;DR: A new cloud-based WMSN is proposed to efficiently deal with multimedia sharing and distribution and motivates the use of cloud computing and social contexts in sharing live streaming and formulate the bandwidth allocation problem in a gametheoretical framework that is further implemented in a distributed manner.
Abstract: With the rapid penetration of mobile devices, more users prefer to watch multime- dia live-streaming via their mobile terminals. Quality of service provision is normal- ly a critical challenge in such multimedia sharing environments. In this article, we propose a new cloud-based WMSN to efficiently deal with multimedia sharing and distribution. We first motivate the use of cloud computing and social contexts in sharing live streaming. Then our WMSN architecture is presented with the descrip- tion of the different components of the network. After that, we focus on distributed resource management and formulate the bandwidth allocation problem in a game- theoretical framework that is further implemented in a distributed manner. In addi- tion, we note the potential selfish behavior of mobile users for resource competition and propose a cheat-proof mechanism to motivate mobile users to share band- width. Illustrative results demonstrate the best responses of different users in the game equilibrium as well as the effectiveness of the proposed cheating avoidance scheme.

45 citations

Journal ArticleDOI
TL;DR: Two models for intrusion detection and classification scheme Trust-based Intrusion Detection and Classification System- Accelerated and TIDCS-A are proposed and shown that both models can detect malicious behaviors providing higher accuracy, detection rates, and lower false alarm than state-of-art techniques.
Abstract: Machine learning techniques are becoming mainstream in intrusion detection systems as they allow real-time response and have the ability to learn and adapt. By using a comprehensive dataset with multiple attack types, a well-trained model can be created to improve the anomaly detection performance. However, high dimensional data present a significant challenge for machine learning techniques. Processing similar features that provide redundant information increases the computational time, which is a critical problem especially for users with constrained resources (battery, energy). In this paper, we propose two models for intrusion detection and classification scheme Trust-based Intrusion Detection and Classification System (TIDCS) and Trust-based Intrusion Detection and Classification System- Accelerated (TIDCS-A) for secure network. TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. Initially, the features are grouped randomly to increase the probability of making them participating in the generation of different groups, and sorted based on their accuracy scores. Only the high ranked features are then selected to obtain a classification for any received packet from the nodes in the network, which is saved as part of the node’s past performance. TIDCS proposes a periodic system cleansing where trust relationships between participant nodes are evaluated and renewed periodically. TIDCS-A proposes a dynamic algorithm to compute the exact time for nodes cleansing states and restricts the exposure window of the nodes. The final classification decision for both models is estimated by incorporating the node’s past behavior with the machine learning algorithm. Any detected attack reduces the trustworthiness of the nodes involved, leading to a dynamic system cleansing. An evaluation of TIDCS and TIDCS-A using the NSL-KDD and UNSW datasets shows that both models can detect malicious behaviors providing higher accuracy, detection rates, and lower false alarm than state-of-art techniques. For instance, for UNSW dataset, the accuracy detection is 91% for TICDS, 83.47%by using online AODE, 88% for CADF, 90% for EDM, 90% for TANN and 69.6% for NB. Consequently, TICDS has better performance than the state of art techniques in terms of accuracy detection, while providing good detection and false alarm rates.

44 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

01 Jan 2002

9,314 citations