scispace - formally typeset
Search or ask a question
Author

Mohsen Guizani

Bio: Mohsen Guizani is an academic researcher from Qatar University. The author has contributed to research in topics: Computer science & Cloud computing. The author has an hindex of 79, co-authored 1110 publications receiving 31282 citations. Previous affiliations of Mohsen Guizani include Jaypee Institute of Information Technology & University College for Women.


Papers
More filters
Journal ArticleDOI
TL;DR: A game model for an incentive mechanism design with incomplete information about social network effects in socially aware crowdsensing is proposed and shown to improve the benefits of the crowdsensing service provider as well as those of the users.
Abstract: Traditional crowdsensing platforms rely on sensory information collected from a group of independent users or sensors. Recently, socially aware crowdsensing services have been introduced as the integration of social networks and crowdsensing platforms. For example, in health-related crowdsensing applications, a user benefits from information regarding food, exercise, medicine, and medical treatment collected and shared by his/her socially connected friends and family members. In this article, we first introduce basic concepts of socially aware crowdsensing services and highlight the importance of "social network effects" in the services. Typically adopted in social networks, network effects are used to quantify the influence of an action or preference of one user on other users with social ties. With this focus, we then discuss important aspects of socially aware crowdsensing services with network effects and some technical challenges. We find that game theory is a suitable analytical tool to investigate such crowdsensing services, for which important related work is surveyed. To address existing research gaps, we propose a game model for an incentive mechanism design with incomplete information about social network effects in socially aware crowdsensing. The proposed model is shown to improve the benefits of the crowdsensing service provider as well as those of the users.

32 citations

Journal ArticleDOI
TL;DR: Comprehensive theoretical analysis and simulation results are presented to show that the proposed coalition double auction for efficient spectrum allocation in CRNs can satisfy the crucial economic robustness properties of double auction, and outperform existing mechanisms.
Abstract: Recently, many dynamic spectrum allocation schemes based on economics are proposed to improve spectrum utilization in cognitive radio networks (CRNs). However, existing mechanisms do not take into account the economic efficiency and the spatial reusability simultaneously, which leaves room to further enhance the spectrum efficiency. In this paper, we introduce the coalition double auction for efficient spectrum allocation in CRNs, where secondary users (SUs) are partitioned into several coalitions and the spectrum reusability can be executed within each coalition. The partition formation process is not only related to the interference condition between SUs, but also the expected economic goals. Therefore, we propose a fully-economic spatial spectrum allocation mechanism by incorporating the coalition formation approach with auction theory. With the proposed scheme, the primary operator acts as an auctioneer, who performs multiple virtual auctions to form a stable partition of SUs and conducts a final auction to decide the winning SUs. Moreover, we propose a possible operation rules for the primary operator to iteratively change the partition, and prove that the virtual auctions could converge in finite time. Comprehensive theoretical analysis and simulation results are presented to show that our scheme can satisfy the crucial economic robustness properties of double auction, and outperform existing mechanisms.

32 citations

Journal ArticleDOI
TL;DR: A downlink non-orthogonal multiple access (NOMA) based coordinated direct and relay system with one cell-center user and multiple cell- edge users, where a decode-and-forward (DF) relay bridges the connection between the base station and the cell-edge users.
Abstract: In this article, we propose a downlink non-orthogonal multiple access (NOMA) based coordinated direct and relay system with one cell-center user and multiple cell-edge users, where a decode-and-forward (DF) relay bridges the connection between the base station and the cell-edge users. Both full-duplex (FD) and half-duplex (HD) protocols are considered for the relay. We assume that the performance of the cell-edge users is subjected to the relay, and the cancellation of the mutual interference between the relay and cell-center user is imperfect. Both the exact analytical expression of outage probability and an approximate expression of the ergodic sum rate at high signal-to-noise ratio (SNR) are derived. Numerical results demonstrate that: 1) the FD relaying NOMA system outperforms the HD relaying NOMA system at low SNR, but the situation is exactly the opposite at high SNR; 2) the mutual interference can cause a larger performance gap than the self-interference at the relay; 3) the power allocation coefficients for the cell-center user and relay can affect the performance more significantly than those for cell-edge users. 1 1 This article was presented in part at the IEEE International Workshop on Signal Processing Advances in Wireless Communications 2019 [1] .

32 citations

Journal ArticleDOI
TL;DR: It is proved that the ODPCA can meet the differential privacy requirements and has better performance by comparing with other popular algorithms.
Abstract: Software-defined network (SDN) is widely used in smart grid for monitoring and managing the communication network. Big data analytics for SDN-based smart grid has got increasing attention. It is a promising approach to use machine learning technologies to analyze a large amount of data generated in SDN-based smart grid. However, the disclosure of personal privacy information must receive considerable attention. For instance, data clustering in user electricity behavior analysis may lead to the disclosure of personal privacy information. In this paper, an optimizing and differentially private clustering algorithm named ODPCA is proposed. In the ODPCA, the differentially private K-means algorithm and K-modes algorithm are combined to cluster mixed data in a privacy-preserving manner. The allocation of privacy budgets is optimized to improve the accuracy of clustering results. Specifically, the loss function that considers both the numerical and categorical attributes between true centroids and noisy centroids is analyzed to optimize the allocation the privacy budget; the number of iterations of clustering is set to a fixed value based on the total privacy budget and the minimal privacy budget allocated to each iteration. It is proved that the ODPCA can meet the differential privacy requirements and has better performance by comparing with other popular algorithms.

32 citations

Posted Content
TL;DR: Wang et al. as discussed by the authors proposed a privacy-preserving authentication protocol to recognize communities among mobile nodes, and a new metric, community energy, was introduced to indicate vehicular social proximity.
Abstract: Recent advances in Socially Aware Networks (SANs) have allowed its use in many domains, out of which social Internet of vehicles (SIOV) is of prime importance. SANs can provide a promising routing and forwarding paradigm for SIOV by using interest-based communication. Though able to improve the forwarding performance, existing interest-based schemes fail to consider the important issue of protecting users' interest information. In this paper, we propose a PRivacy-preserving Interest-based Forwarding scheme (PRIF) for SIOV, which not only protects the interest information, but also improves the forwarding performance. We propose a privacy-preserving authentication protocol to recognize communities among mobile nodes. During data routing and forwarding, a node can know others' interests only if they are affiliated with the same community. Moreover, to improve forwarding performance, a new metric {\em community energy} is introduced to indicate vehicular social proximity. Community energy is generated when two nodes encounter one another and information is shared among them. PRIF considers this energy metric to select forwarders towards the destination node or the destination community. Security analysis indicates PRIF can protect nodes' interest information. In addition, extensive simulations have been conducted to demonstrate that PRIF outperforms the existing algorithms including the BEEINFO, Epidemic, and PRoPHET.

32 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

01 Jan 2002

9,314 citations