4.5 Article

Towards ontology-based multilingual URL filtering: a big data problem

Journal

JOURNAL OF SUPERCOMPUTING
Volume 74, Issue 10, Pages 5003-5021

Publisher

SPRINGER
DOI: 10.1007/s11227-018-2338-1

Keywords

Filtering; Information processing; Classification; Ontology engineering; Big data

Ask authors/readers for more resources

Web content filtering is one among many techniques to limit the exposure of selective content on the Internet. It has gotten trivial with time, yet filtering of multilingual web content is still a difficult task, especially while considering big data landscape. The enormity of data increases the challenge of developing an effective content filtering system that can work in real time. There are several systems which can filter the URLs based on artificial intelligence techniques to identify the site with objectionable content. Most of these systems classify the URLs only in the English language. These systems either fail to respond when multilingual URLs are processed, or over-blocking is experienced. This paper introduces a filtering system that can classify multilingual URLs based on predefined criteria for URL, title, and metadata of a web page. Ontological approaches along with local multilingual dictionaries are used as the knowledge base to facilitate the challenging task of blocking URLs not meeting the filtering criteria. The proposed work shows high accuracy in classifying multilingual URLs into two categories, white and black. Evaluation results conducted on a large dataset show that the proposed system achieves promising accuracy, which is on a par with those achieved in state-of-the-art literature on semantic-based URL filtering.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

Leveraging Deep Learning for Designing Healthcare Analytics Heuristic for Diagnostics

Sarah Shafqat, Maryyam Fayyaz, Hasan Ali Khattak, Muhammad Bilal, Shahid Khan, Osama Ishtiaq, Almas Abbasi, Farzana Shafqat, Waleed S. Alnumay, Pushpita Chatterjee

Summary: Healthcare Informatics is a phenomenon that has been discussed since the early 21st century. With the development of new computing technologies, a large amount of healthcare data is being produced, necessitating the management and extraction of knowledge for decision making. Researchers are exploring big data analytics, deep learning, predictive analytics, and other algorithms to bring innovation to healthcare. This research proposes a hybrid deep learning technique for medical diagnostics and tests and validates it using real-time datasets.

NEURAL PROCESSING LETTERS (2023)

Article Chemistry, Multidisciplinary

Multi-Factor Rear-End Collision Avoidance in Connected Autonomous Vehicles

Sheeba Razzaq, Amil Roohani Dar, Munam Ali Shah, Hasan Ali Khattak, Ejaz Ahmed, Ahmed M. El-Sherbeeny, Seongkwan Mark Lee, Khaled Alkhaledi, Hafiz Tayyab Rauf

Summary: According to the World Health Organization, rear-ending collision is the leading cause of fatalities and injuries. This paper proposes a driver assistance system that analyzes accident contributing factors to improve vehicles' ability to avoid collisions.

APPLIED SCIENCES-BASEL (2022)

Article Computer Science, Information Systems

Deep reinforcement learning approach towards a smart parking architecture

Kamran Sattar Awaisi, Assad Abbas, Hasan Ali Khattak, Arsalan Ahmad, Mazhar Ali, Abbas Khalid

Summary: This paper proposes a Deep Reinforcement Learning-based framework for an IIoT-enabled smart parking system. By using smart cameras, fog nodes, and a cloud server, the system intelligently classifies vehicles and allocates parking slots. Experimental results show that the proposed method outperforms other techniques in terms of accuracy and processing time.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

EdgeTrust: A Lightweight Data-Centric Trust Management Approach for IoT-Based Healthcare 4.0

Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, Hasan Ali Khattak, Joel J. P. C. Rodrigues

Summary: The Internet of Things (IoT) is revolutionizing the world by making surrounding devices smart and capable of performing daily-life activities with precision. IoT and healthcare collaborate to provide notable facilities in patient monitoring. However, the identification of malicious and compromised nodes remains a critical challenge. This article proposes a machine learning-based trust management approach for edge nodes to detect nodes with malicious behavior. The approach utilizes knowledge and experience components of trust and collects recommendations from edge clouds to evaluate indirect and aggregated trust.

ELECTRONICS (2023)

Article Computer Science, Information Systems

Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger

Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Joen

Summary: With the growth of VANET technology, data generated by communication among vehicular devices and edge nodes becomes massive. Privacy preservation is a major challenge due to the personal and sensitive information contained in the data. Most existing distributed privacy preserving solutions rely on third-party anonymization, but Local Differential Privacy (LDP) allows for local and individual data anonymization without a third party. In this work, a privacy preservation solution using LDP is proposed to address security and privacy threats. Additionally, a model incorporating IOTA ledger further enhances privacy and security in a complex and distributed network of vehicles.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Article Engineering, Electrical & Electronic

Robust Certificateless Authentication Protocol for the SAE J1939 Commercial Vehicles Bus

Basker Palaniswamy, Keyvan Ansari, Alavalapati Goutham Reddy, Ashok Kumar Das, Sachin Shetty

Summary: This article discusses the challenges of authentication in controller area network (CAN) buses within an intra-vehicular network involving electronic control units (ECUs). The existing comprehensive protocol suite is formally analyzed, and two new authentication protocols are proposed to mitigate common attacks.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

Multi-branch sustainable convolutional neural network for disease classification

Maria Naz, Munam Ali Shah, Hasan Ali Khattak, Abdul Wahid, Muhammad Nabeel Asghar, Hafiz Tayyab Rauf, Muhammad Attique Khan, Zoobia Ameer

Summary: Pandemics and natural disasters are increasing, causing more pressure on life care services and users. There is a lack of knowledge on how to prevent these disasters and pandemics. In this study, a model with 12 branches of CNN was proposed to detect different diseases and their subtypes using CT scan images, achieving accurate classification.

INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY (2023)

Article Chemistry, Multidisciplinary

A Privacy-Enabled, Blockchain-Based Smart Marketplace

Bello Musa Yakubu, Majid Iqbal Khan, Abid Khan, Adeel Anjum, Madiha Haider Syed, Semeen Rehman

Summary: Advancements in sensor-enabled devices led to the emergence of resource trading models for smart communities, such as the smart marketplace (SMP). Most of the proposed SMP architectures are based on blockchain technology, which has a public ledger to achieve transparency. However, safeguarding the participant's anonymity, untraceability, and transactional data privacy during trading becomes a challenging task.

APPLIED SCIENCES-BASEL (2023)

Article Medicine, General & Internal

Intracranial Hemorrhage Detection Using Parallel Deep Convolutional Models and Boosting Mechanism

Muhammad Asif, Munam Ali Shah, Hasan Ali Khattak, Shafaq Mussadiq, Ejaz Ahmed, Emad Abouel Nasr, Hafiz Tayyab Rauf

Summary: Intracranial hemorrhage (ICH) requires immediate action from radiologists as it can cause death or disability. Existing artificial intelligence methods for ICH detection and subtype classification lack accuracy. In this paper, a new methodology called ResNet101-V2, Inception-V4, and LGBM (Res-Inc-LGBM) is proposed, which achieves high accuracy, sensitivity, and F1 score for ICH detection and subtype classification using brain CT scans. The proposed solution outperforms standard benchmarks and shows the significance of its real-time application.

DIAGNOSTICS (2023)

Article Computer Science, Hardware & Architecture

Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs

Waseeq Ul Islam Zafar, Muhammad Atif Ur Rehman, Farhana Jabeen, Rehmat Ullah, Ghulam Abbas, Abid Khan

Summary: This paper discusses the importance of inter-vehicle communication in VANETs and the use of NDN as the underlying protocol. It proposes a decentralized receiver-based link stability-aware forwarding (DRLSF) protocol to address the challenges faced. The DRLSF protocol is suitable for pull-based applications.

COMPUTER NETWORKS (2023)

Review Chemistry, Analytical

Data Provenance in Healthcare: Approaches, Challenges, and Future Directions

Mansoor Ahmed, Amil Rohani Dar, Markus Helfert, Abid Khan, Jungsuk Kim

Summary: Data provenance is a method of recording data origins and the history of data generation and processing. In healthcare, it is important to implement data provenance to track the sources and reasons behind any issues with user data. This systematic review explores the impacts of data provenance in healthcare and GDPR-compliance-based data provenance, discussing the technologies and methodologies used to achieve it. The study identifies research gaps and suggests future directions.

SENSORS (2023)

Article Chemistry, Analytical

Enhancing Data Protection in Dynamic Consent Management Systems: Formalizing Privacy and Security Definitions with Differential Privacy, Decentralization, and Zero-Knowledge Proofs

Muhammad Irfan Khalid, Mansoor Ahmed, Jungsuk Kim

Summary: Dynamic consent management systems allow individuals to dynamically control access to their data. Security and privacy guarantees are crucial for the adoption of such systems, with specific data protection requirements needed for compliance with regulations like the GDPR. This paper explores data protection issues in dynamic consent management systems, identifying key security and privacy properties and discussing limitations in existing systems. It proposes using tools and technologies like differential privacy, blockchain, zero-knowledge proofs, and cryptogrpahic procedures to build secure and private dynamic consent management systems.

SENSORS (2023)

Article Computer Science, Theory & Methods

Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning

Hira S. Sikandar, Saif ur Rehman Malik, Adeel Anjum, Abid Khan, Gwanggil Jeon

Summary: Federated Learning (FL) is a decentralized machine learning strategy where clients locally train on a shared global model provided by the server. However, the widespread adoption of FL in distributed settings has led to security attacks, including label-flipping attacks. This research proposes a defense mechanism based on Type-based Cohorts (TC) with Kernel Principal Component Analysis (KPCA) to detect and defend against such attacks. Additionally, Multi-path Service Routing (MSR) is deployed to improve network performance.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Green & Sustainable Science & Technology

An efficient and privacy-preserving blockchain-based secure data aggregation in smart grids

Azhar Mahmood, Abid Khan, Adeel Anjum, Carsten Maple, Gwanggil Jeon

Summary: Smart Grids have several advantages over traditional grids, but they also introduce security and privacy issues. Data aggregation plays a crucial role in protecting user consumption data, but existing schemes have limitations. This paper proposes a decentralized secure data aggregation scheme using blockchain to preserve the privacy, integrity, and authentication of individual consumption data.

SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS (2023)

No Data Available