scispace - formally typeset
Search or ask a question
Author

Mohsen Guizani

Bio: Mohsen Guizani is an academic researcher from Qatar University. The author has contributed to research in topics: Computer science & Cloud computing. The author has an hindex of 79, co-authored 1110 publications receiving 31282 citations. Previous affiliations of Mohsen Guizani include Jaypee Institute of Information Technology & University College for Women.


Papers
More filters
Proceedings ArticleDOI
01 Dec 2019
TL;DR: A blockchain based solution for stock exchange model that uses machine learning accessible smart contracts providing an intelligent solution for secure stock market and a prediction on the future of the stock market.
Abstract: Stock exchanges around the world are exploring the best possible solution that can improve trading efficiency, lower the risks and tighten secu- rity levels. The working and functioning of a stock exchange involves very hectic and cumbersome pro- cedures which are time consuming, cost inefficient and can be prone to numerous risks. Machine learning and Blockchain are most popular upcoming technologies. In this paper we present a novel secure and de- centralized intelligent stock market prediction model. We present a blockchain based solution for stock exchange model that uses machine learning accessible smart contracts. The machine learning model makes a prediction on the future of the stock market providing an intelligent solution for secure stock market.

28 citations

Journal ArticleDOI
TL;DR: A novel COVID-19 optimizer Algorithm (CVA) is proposed to cover almost all feasible regions of the optimization problems and shows that the CVA technique performs best with up to 15%, 37%, 53% and 59% increase compared with Volcano Eruption Al algorithm, Gray Wolf Optimizer, Particle Swarm Optimization and Genetic Algorithm, respectively.
Abstract: The emergence of novel COVID-19 is causing an overload on public health sector and a high fatality rate. The key priority is to contain the epidemic and reduce the infection rate. It is imperative to stress on ensuring extreme social distancing of the entire population and hence slowing down the epidemic spread. So, there is a need for an efficient optimizer algorithm that can solve NP-hard in addition to applied optimization problems. This article first proposes a novel COVID-19 optimizer Algorithm (CVA) to cover almost all feasible regions of the optimization problems. We also simulate the coronavirus distribution process in several countries around the globe. Then, we model a coronavirus distribution process as an optimization problem to minimize the number of COVID-19 infected countries and hence slow down the epidemic spread. Furthermore, we propose three scenarios to solve the optimization problem using most effective factors in the distribution process. Simulation results show one of the controlling scenarios outperforms the others. Extensive simulations using several optimization schemes show that the CVA technique performs best with up to 15%, 37%, 53% and 59% increase compared with Volcano Eruption Algorithm (VEA), Gray Wolf Optimizer (GWO), Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), respectively.

28 citations

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed a novel privacy-preserving intrusion detection pipeline for distributed incremental learning, which uses autoencoders with non-negativity constraints, which help to extract less redundant features.
Abstract: Existing techniques for incremental learning are computationally expensive and produce duplicate features leading to higher false positive and true negative rates. We propose a novel privacy-preserving intrusion detection pipeline for distributed incremental learning. Our pre-processing technique eliminates redundancies and selects unique features by following innovative extraction techniques. We use autoencoders with non-negativity constraints, which help us extract less redundant features. More importantly, the distributed intrusion detection model reduces the burden on the edge classifier and distributes the load among IoT and edge devices. Theoretical analysis and numerical experiments have shown lower space and time costs than state of the art techniques, with comparable classification accuracy. Extensive experiments with standard data sets and real-time streaming IoT traffic give encouraging results.

28 citations

Journal ArticleDOI
TL;DR: The proposed NeuroTrust approach utilizes the trust parameters to evaluate the degree of trust that include reliability, compatibility, and packet delivery and uses a lightweight encryption mechanism to further enhance the security and integrity during data dissemination, which is required for the digital revolution in delivering efficient high quality healthcare.
Abstract: Internet of Medical Things (IoMT) provides a diverse platform for healthcare to enhance the accuracy, reliability, and efficiency. In addition, it utilizes the productivity of available equipment to improve patients’ health. IoMT also provides distinct ways by which healthcare will be revolutionized as it provides numerous opportunities to handle operations with precision. However, numerous advantages have raised several security challenges, such as trust, data integrity, network constraints, and real-time processing among others. There is a requirement for a robust approach to maintain data integrity along with the behavior detection of nodes to completely maintain a secure environment. In the proposed approach, the mechanism is capable of maintaining a robust network by predicting and eliminating malicious nodes. The proposed NeuroTrust approach utilizes the trust parameters to evaluate the degree of trust that include reliability, compatibility, and packet delivery. This approach also lightens the two-way computation burden and uses a lightweight encryption mechanism to further enhance the security and integrity during data dissemination, which is required for the digital revolution in delivering efficient high quality healthcare. The performance of the proposed approach has been extensively evaluated against the absolute trust formulation, accuracy of trust computation, energy consumption, and several potential attacks. The simulation results show the effective performance to identify malicious and compromised nodes, and maintain resilience against various attacks.

28 citations

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed a method for detecting malicious mining code in the cloud platforms, which constructs a detection model by fusing the Bagging and Boosting algorithms, by randomly extracting samples and letting models vote together to decide, the variance of model detection can be reduced obviously.

28 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

01 Jan 2002

9,314 citations