Skip to main content

Showing 1–8 of 8 results for author: Boukerche, A

.
  1. arXiv:2405.10347  [pdf, other

    cs.CV cs.AI cs.CY

    Networking Systems for Video Anomaly Detection: A Tutorial and Survey

    Authors: **g Liu, Yang Liu, Jieyu Lin, Jielin Li, Peng Sun, Bo Hu, Liang Song, Azzedine Boukerche, Victor C. M. Leung

    Abstract: The increasing prevalence of surveillance cameras in smart cities, coupled with the surge of online video applications, has heightened concerns regarding public security and privacy protection, which propelled automated Video Anomaly Detection (VAD) into a fundamental research task within the Artificial Intelligence (AI) community. With the advancements in deep learning and edge computing, VAD has… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: Submitted to ACM Computing Surveys, under review,for more information and supplementary material, please see https://github.com/fd**gliu/NSVAD

  2. arXiv:2302.05087  [pdf, other

    cs.CV cs.MM

    Generalized Video Anomaly Event Detection: Systematic Taxonomy and Comparison of Deep Models

    Authors: Yang Liu, Dingkang Yang, Yan Wang, **g Liu, Jun Liu, Azzedine Boukerche, Peng Sun, Liang Song

    Abstract: Video Anomaly Detection (VAD) serves as a pivotal technology in the intelligent surveillance systems, enabling the temporal or spatial identification of anomalous events within videos. While existing reviews predominantly concentrate on conventional unsupervised methods, they often overlook the emergence of weakly-supervised and fully-unsupervised approaches. To address this gap, this survey exten… ▽ More

    Submitted 1 February, 2024; v1 submitted 10 February, 2023; originally announced February 2023.

    Comments: Accepted by ACM Computing Surveys. For more information, please see our project page: https://github.com/fudanyliu/GVAED

  3. Internet of Intelligence: A Survey on the Enabling Technologies, Applications, and Challenges

    Authors: Qinqin Tang, F. Richard Yu, Renchao Xie, Azzedine Boukerche, Tao Huang, Yunjie Liu

    Abstract: The Internet of intelligence is conceived as an emerging networking paradigm, which will make intelligence as easy to obtain as information. This paper provides an overview of the Internet of intelligence, focusing on motivations, architecture, enabling technologies, applications, and existing challenges. This can provide a good foundation for those who are interested to gain insights into the con… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

    Comments: This article has been accepted for publication in a future issue of IEEE Communications Surveys & Tutorials

    Journal ref: IEEE Communications Surveys & Tutorials,2022

  4. arXiv:2203.12434  [pdf, ps, other

    cs.NE cs.CR cs.LG cs.SI

    Collaborative Self Organizing Map with DeepNNs for Fake Task Prevention in Mobile Crowdsensing

    Authors: Murat Simsek, Burak Kantarci, Azzedine Boukerche

    Abstract: Mobile Crowdsensing (MCS) is a sensing paradigm that has transformed the way that various service providers collect, process, and analyze data. MCS offers novel processes where data is sensed and shared through mobile devices of the users to support various applications and services for cutting-edge technologies. However, various threats, such as data poisoning, clogging task attacks and fake sens… ▽ More

    Submitted 16 February, 2022; originally announced March 2022.

    Comments: 6 pages, 6 figures, one figure with two subfigures, IEEE International Conference on Communications (ICC) 2022

    Journal ref: ICC 2022 - IEEE International Conference on Communications, 2022, pp. 4794-4799

  5. arXiv:2007.15286  [pdf, other

    cs.NI

    Design Guidelines for Blockchain-Assisted 5G-UAV Networks

    Authors: Moayad Aloqaily, Ouns Bouachir, Azzedine Boukerche, Ismaeel Al Ridhawi

    Abstract: Fifth Generation (5G) wireless networks are designed to meet various end-user Quality of Service (QoS) requirements through high data rates (typically of Gbps order) and low latencies. Coupled with Fog and Mobile Edge Computing (MEC), 5G can achieve high data rates, enabling complex autonomous smart city services such as the large deployment of self-driving vehicles and large-scale Artificial Inte… ▽ More

    Submitted 30 July, 2020; originally announced July 2020.

    Comments: 9 pages, 4 figures. IEEE Network, accepted for publication

  6. Blockchain and Fog Computing for Cyberphysical Systems: The Case of Smart Industry

    Authors: Ouns Bouachir, Moayad Aloqaily, Lewis Tseng, Azzedine Boukerche

    Abstract: Blockchain has revolutionized how transactions are conducted by ensuring secure and auditable peer-to-peer coordination. This is due to both the development of decentralization, and the promotion of trust among peers. Blockchain and fog computing are currently being evaluated as potential support for software and a wide spectrum of applications, ranging from banking practices and digital transacti… ▽ More

    Submitted 12 September, 2020; v1 submitted 26 May, 2020; originally announced May 2020.

    Comments: 7 pages, 3 figures, Computer, IEEE 2020

  7. A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations

    Authors: Baraq Ghaleb, Ahmed Al-Dubai, Elias Ekonomou, Ayoub Alsarhan, Youssef Nasser, Lewis Mackenzie, Azzedine Boukerche

    Abstract: Driven by the special requirements of the Lowpower and Lossy Networks (LLNs), the IPv6 Routing Protocol for LLNs (RPL) was standardized by the IETF some six years ago to tackle the routing issue in such networks. Since its introduction, however, numerous studies have pointed out that, in its current form, RPL suffers from issues that limit its efficiency and domain of applicability. Thus, several… ▽ More

    Submitted 5 February, 2019; originally announced February 2019.

    Comments: 31 pages

  8. arXiv:1611.04012  [pdf, ps, other

    cs.NI

    Trust-based Secure Routing in Software-defined Vehicular Ad Hoc Networks

    Authors: Dajun Zhang, F. Richard Yu, Zhexiong Wei, Azzedine Boukerche

    Abstract: With the rising interest of expedient, safe, and high-efficient transportation, vehicular ad hoc networks (VANETs) have turned into a critical technology in smart transportation systems. Because of the high mobility of nodes, VANETs are vulnerable to security attacks. In this paper, we propose a novel framework of software-defined VANETs with trust management. Specifically, we separate the forward… ▽ More

    Submitted 12 November, 2016; originally announced November 2016.