Article
Engineering, Electrical & Electronic
Xiang Sheng, Shaowei Wang
Summary: This article studies an online attacking strategy called PU emulation attacker (PEA) that transmits forged PU signals to deteriorate SUs' spectrum sensing performance. An online learning based attacking scheme is proposed for both single and multiple attacker cases, with analysis of the regret upper bound of the proposed algorithm.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Shivanshu Shrivastava, Bin Chen, Hui Wang
Summary: This paper optimizes the cooperative spectrum sensing system using Deep Q-Network (DQN) learning to suppress the damages caused by primary user emulation attacks on secondary user throughput. It proposes an intelligent primary user emulation attack strategy and models the attack's presence using Markov chains. The effectiveness of the optimization strategy is demonstrated in two cooperative spectrum sensing architectures.
Article
Chemistry, Analytical
Ernesto Cadena Munoz, Luis Fernando Pedraza, Cesar Augusto Hernandez
Summary: Mobile cognitive radio networks (MCRNs) have emerged as an alternative mobile communication method due to the scarcity of spectrum in 4G and 5G networks. MCRN utilizes the unused spectrum of a primary user (PU) to transmit signals. Spectrum sensing is crucial to detect the presence of PU and prevent interference. In this study, machine learning techniques, including SVM, random forest, and KNN, were applied to detect primary user emulation (PUE) attacks. Simulation and emulation experiments conducted on a software-defined radio (SDR) testbed showed that SVM outperformed energy detection, KNN, and random forest techniques in detecting PUE attacks, particularly in low SNR scenarios.
Article
Computer Science, Hardware & Architecture
Rana Elnaggar, Siyuan Chen, Peilin Song, Krishnendu Chakrabarty
Summary: Heterogeneous SoCs integrate FPGAs and microprocessor cores on the same fabric to accelerate applications. However, if the 3rd party IPs on the FPGA are malicious, they can launch rowhammer attacks on the SDRAM. Existing countermeasures cannot effectively detect these attacks. Therefore, this paper presents a security solution that monitors SDRAM transactions from IPs on the FPGA to detect attempts of rowhammer attacks.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS
(2022)
Article
Chemistry, Multidisciplinary
Rehna Batool, Nargis Bibi, Nazeer Muhammad, Samah Alhazmi
Summary: Cognitive Radio Network (CRN) is emerging technology to solve spectrum shortage problems. However, the spectrum sensing process in CRN is often disturbed by a security issue known as the Primary User Emulation Attack (PUEA). This study proposes a TDOA-based localization method using the DE algorithm to identify PUEA in CRNs.
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Hardware & Architecture
J. Bala Vishnu, Saswat Kumar Ram, Deepan
Summary: This paper proposes a novel Energy-Efficient Adaptive Sensing (EEAS) technique for CRSN to overcome the spectrum access problem in the presence of PUEA. The proposed EEAS enhances the sensing accuracy, reduces the sensing error probability, and improves the system model's throughput and energy efficiency.
COMPUTERS & ELECTRICAL ENGINEERING
(2023)
Article
Telecommunications
Kuldeep Yadav, Sanjay Dhar Roy, Sumit Kundu
Summary: The paper investigates the performance of an energy harvesting cognitive radio network under PUE attack, revealing a significant impact of PUE attack on energy harvesting and network performance.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Bingbing Song, Ruxin Wang, Song Gao, Yunyun Dong, Ling Liu, Wei Zhou
Summary: This article discusses the vulnerability of deep learning services to adversarial examples and proposes a solution. By enhancing adversarial examples with high frequency signals and using a multi-modal collaborative training framework, the performance and robustness of DNNs services can be improved.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2023)
Article
Computer Science, Information Systems
Thockchom Birjit Singha, Roy Paily Palathinkal, Shaik Rafi Ahamed
Summary: With the rise of the Internet of Things (IoT), hardware security has become an important concern due to the potential risks of side-channel attacks. This article discusses the development of encryption standard AES and its core component, the substitution-box (S-box), over the past 20 years. It also provides a comprehensive review of the latest S-box design techniques and analyzes their impact on various factors such as gate count, area, throughput, and power. Additionally, the article examines countermeasures designed to protect AES against power analysis attacks, considering their security metrics and design overheads.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Maliha Shabbir, Mohsin Kamal, Zahid Ullah, Maqsood Muhammad Khan
Summary: With the rapid advancement of technology, security has become a critical concern, especially for Connected and Autonomous Vehicles (CAVs) which are vulnerable to GPS location spoofing attacks. To address this issue, this research proposes a novel methodology that uses deep learning and machine learning algorithms to protect CAVs from such attacks.
Article
Robotics
Guangyao Shi, Lifeng Zhou, Pratap Tokekar
Summary: The multiple-path orienteering problem aims to find paths for a team of robots that maximize reward while fitting within path length constraints. This article focuses on making the robot team resilient to failures in adversarial environments. Two versions of the problem, offline and online, are considered. The article provides approximation schemes and game-theoretic solutions to address these versions.
IEEE TRANSACTIONS ON ROBOTICS
(2023)
Article
Engineering, Electrical & Electronic
Nitul Dutta, Hiren Kumar Deva Sarma
Summary: This research demonstrates a routing protocol called primary user supported routing (PSR) for cognitive radio ad hoc networks (CRAHNs). Unlike existing protocols, PSR allows some primary users (PUs) to support cognitive users (CUs) by forwarding their packets voluntarily during their idle time. The proposed PSR outperforms the cognitive ad hoc on-demand distance vector (CAODV) protocol in terms of routing overhead, packet loss rate, and end-to-end packet delay, with improvements of 26.25%, 34.12%, and 27.01% respectively.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
(2023)
Article
Engineering, Electrical & Electronic
J. Bala Vishnu, M. A. Bhagyaveni
Summary: The proposed Opportunistic Transmission using Hybrid Sensing method in the CRSN effectively improves throughput and energy efficiency while reducing error probability, providing resilience against PUEA attacks.
INTERNATIONAL JOURNAL OF ELECTRONICS
(2021)
Article
Computer Science, Theory & Methods
Yanchu Li, Lingguang Lei, Yuewu Wang, Jiwu Jing, Quan Zhou
Summary: The proposed TrustSAMP terminal-side audio DRM solution aims to protect copyrighted audio data from both software attacks and physical memory disclosure attacks. By processing audio data plaintext only in certain on-SoC components secured by ARM TrustZone, it achieves an efficient design that minimizes Trusted Computing Base and provides high protection.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2022)
Article
Engineering, Electrical & Electronic
Zhiying Wu, Yan Wang, Aibo Zhang, Junlin Xiong, Min Xie
Summary: This paper introduces an event-triggered control method in unmanned aerial vehicle (UAV) systems based on cognitive radio networks, taking into consideration the deception attacks. By proposing a Quality of Service (QoS)-dependent event-triggered scheme (ETS), the system parameters are adjusted to ensure stability and performance.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Computer Science, Software Engineering
Zhaoquan Gu, Yan Zhu, Yuexuan Wang, Xiaojiang Du, Mohsen Guizani, Zhihong Tian
Summary: This article focuses on the application of the artificial bee colony (ABC) algorithm to address the multidepot vehicle routing problem (MDVRP). By introducing depot clustering and a coevolution strategy, a promising solution is proposed and extensive experiments are conducted to show the good performance of the ABC algorithm.
SOFTWARE-PRACTICE & EXPERIENCE
(2022)
Article
Computer Science, Artificial Intelligence
Amit Kumar Jaiswal, Prayag Tiwari, M. Shamim Hossain
NEURAL COMPUTING & APPLICATIONS
(2023)
Article
Computer Science, Artificial Intelligence
Heena Rathore, Amr Mohamed, Mohsen Guizani, Shailendra Rathore
Summary: This paper introduces a machine learning approach called NueroFATH for the physical assessment of athletes. It uses neural networks and fuzzy c-means techniques to predict the potential of athletes winning medals. The study also identifies important physical characteristics related to the assessment results.
NEURAL COMPUTING & APPLICATIONS
(2023)
Article
Computer Science, Theory & Methods
Honnesh Rohmetra, Navaneeth Raghunath, Pratik Narang, Vinay Chamola, Mohsen Guizani, Naga Rajiv Lakkaniga
Summary: The COVID-19 pandemic has overwhelmed healthcare systems and posed risks to healthcare professionals. Remote monitoring of patient symptoms using machine learning and deep learning techniques offers a promising solution, utilizing common devices like smartphones.
Article
Computer Science, Artificial Intelligence
Yuwen Chen, Bin Song, Yuan Zeng, Xiaojiang Du, Mohsen Guizani
Summary: This study proposes a fault diagnosis method for the current-carrying ring based on an improved CenterNet model in the Industrial Internet of Things. By using attention modules and weighted loss, the accuracy of fault diagnosis for the current-carrying rings is improved.
NEURAL COMPUTING & APPLICATIONS
(2023)
Article
Computer Science, Artificial Intelligence
Mangena Venu Madhavan, Aditya Khamparia, Deepak Gupta, Sagar Pande, Prayag Tiwari, M. Shamim Hossain
Summary: Major countries are facing difficulties due to the COVID-19 pandemic. Existing medical practices, such as PCR and RT-PCR, may result in false positives and false negatives when identifying COVID-19 symptoms. CT imaging or X-rays of the lungs can provide more accurate identification of patients with COVID-19 symptoms. Automating the identification of COVID-19 using feasible technology can improve facilities. The Res-CovNet framework is a hybrid methodology that integrates different platforms into a single platform to identify and classify pneumonia and COVID-19 cases.
NEURAL COMPUTING & APPLICATIONS
(2023)
Article
Computer Science, Hardware & Architecture
Sherief Hashima, Zubair Md Fadlullah, Mostafa M. Fouda, Ehab Mahmoud Mohamed, Kohei Hatano, Basem M. ElHalawany, Mohsen Guizani
Summary: This article introduces the concept of intelligent softwareization in 6G networks to address the impact of dynamically changing environments on reliability. Through evaluation in multiple scenarios and the use of optimal strategies to meet various demands, the results show promising performance.
Article
Computer Science, Information Systems
Praveen Gorla, Mohammad Saif, Vinay Chamola, Biplab Sikdar, Mohsen Guizani
Summary: This article presents a novel machine learning-based framework for intelligent resource provisioning mechanisms for micro-grid connected green small cell base stations. By using prediction and energy flow control mechanisms, the article proposes an algorithmic implementation for redistribution of renewable resources, improving the resource management and traffic provisioning capability of small cell base stations.
IEEE SYSTEMS JOURNAL
(2023)
Article
Engineering, Civil
Moayad Aloqaily, Haya Elayan, Mohsen Guizani
Summary: The advancement of wireless connectivity in smart cities enhances connections between key elements, and the federated intelligent health monitoring systems in autonomous vehicles contribute to improving quality of life. This study proposes C-HealthIER, a cooperative health intelligent emergency response system that monitors passengers' health and conducts cooperative behavior to reduce emergency treatment time and distance by sharing information between vehicles and infrastructure.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Computer Science, Information Systems
Yanqi Zhao, Xiaoyi Yang, Yong Yu, Baodong Qin, Xiaojiang Du, Mohsen Guizani
Summary: The Internet of Things connects physical devices to capture useful data for accurate decision-making, but balancing data utility and user privacy is important. A blockchain-based auditable privacy-preserving data classification scheme is proposed to address privacy concerns while ensuring data accuracy.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Engineering, Multidisciplinary
Zhaoquan Gu, Le Wang, Xiaolong Chen, Yunyi Tang, Xingang Wang, Xiaojiang Du, Mohsen Guizani, Zhihong Tian
Summary: This paper proposes a novel epidemic risk assessment method based on granular data collected by communication stations, which can accurately and efficiently assess people's epidemic risk.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2022)
Article
Computer Science, Interdisciplinary Applications
Santosh Kumar, Mithilesh Kumar Chaube, Saeed Hamood Alsamhi, Sachin Kumar Gupta, Mohsen Guizani, Raffaele Gravina, Giancarlo Fortino
Summary: This study aims to develop a framework for early diagnosis of COVID-19 symptoms using multimodal Deep Learning techniques, achieving high accuracy through fusion methods with chest X-ray and cough sample data. Existing ML architectures are effective for diagnosis, and fusion learning paradigm could be crucial for future unknown illnesses.
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE
(2022)
Article
Computer Science, Information Systems
Sherif Abdelfattah, Mohamed Baza, Mohamed M. E. A. Mahmoud, Mostafa M. Fouda, Khalid A. Abualsaud, Mohsen Guizani
Summary: The study proposes an efficient ABE approach to protect the privacy of medical data. Patients use this method to encrypt the key of the document, so that only authorized doctors can decrypt it. Existing schemes have limitations such as inefficient access control and single data-owner setting.
IEEE SYSTEMS JOURNAL
(2022)
Article
Computer Science, Information Systems
Ikram Ud Din, Aniqa Bano, Kamran Ahmad Awan, Ahmad Almogren, Ayman Altameem, Mohsen Guizani
Summary: The increasing usage of the Internet has improved the quality of trust in the Internet of Things (IoT). Trust plays a crucial role in providing a secure environment for users to share private information and enable easy and trustworthy data exchange among IoT devices. Trust management is essential for secure data transmission in a large-scale IoT network, and a lightweight approach called LightTrust is proposed to address security issues in Industrial IoT nodes. LightTrust utilizes a centralized trust agent to generate and manage trust certificates, and direct observations and recommendations are used to develop trust between nodes. Comparative simulations demonstrate the effectiveness and resilience of the proposed approach.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Hardware & Architecture
Mhd Saria Allahham, Amr Mohamed, Aiman Erbad, Mohsen Guizani
Summary: Mobile edge learning (MEL) is a learning paradigm that enables distributed training of machine learning models over heterogeneous edge devices. This study proposes an incentive mechanism to motivate the participation of edge devices in the training process and evaluates its performance through numerical experiments.
IEEE CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING
(2023)