-
Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations
Authors:
Attia Qammar,
Hongmei Wang,
Jianguo Ding,
Abdenacer Naouri,
Mahmoud Daneshmand,
Huansheng Ning
Abstract:
Chatbots shifted from rule-based to artificial intelligence techniques and gained traction in medicine, shop**, customer services, food delivery, education, and research. OpenAI developed ChatGPT blizzard on the Internet as it crossed one million users within five days of its launch. However, with the enhanced popularity, chatbots experienced cybersecurity threats and vulnerabilities. This paper…
▽ More
Chatbots shifted from rule-based to artificial intelligence techniques and gained traction in medicine, shop**, customer services, food delivery, education, and research. OpenAI developed ChatGPT blizzard on the Internet as it crossed one million users within five days of its launch. However, with the enhanced popularity, chatbots experienced cybersecurity threats and vulnerabilities. This paper discussed the relevant literature, reports, and explanatory incident attacks generated against chatbots. Our initial point is to explore the timeline of chatbots from ELIZA (an early natural language processing computer program) to GPT-4 and provide the working mechanism of ChatGPT. Subsequently, we explored the cybersecurity attacks and vulnerabilities in chatbots. Besides, we investigated the ChatGPT, specifically in the context of creating the malware code, phishing emails, undetectable zero-day attacks, and generation of macros and LOLBINs. Furthermore, the history of cyberattacks and vulnerabilities exploited by cybercriminals are discussed, particularly considering the risk and vulnerabilities in ChatGPT. Addressing these threats and vulnerabilities requires specific strategies and measures to reduce the harmful consequences. Therefore, the future directions to address the challenges were presented.
△ Less
Submitted 29 May, 2023;
originally announced June 2023.
-
A new technology perspective of the Metaverse: its essence, framework and challenges
Authors:
Feifei Shi,
Huansheng Ning,
Xiaohong Zhang,
Rongyang Li,
Qiaohui Tian,
Shiming Zhang,
Yuanyuan Zheng,
Yudong Guo,
Mahmoud Daneshmand
Abstract:
The Metaverse depicts a parallel digitalized world where virtuality and reality are fused. It has economic and social systems like those in the real world and provides intelligent services and applications. In this paper, we introduce the Metaverse from a new technology perspective, including its essence, corresponding technical framework, and potential technical challenges. Specifically, we analy…
▽ More
The Metaverse depicts a parallel digitalized world where virtuality and reality are fused. It has economic and social systems like those in the real world and provides intelligent services and applications. In this paper, we introduce the Metaverse from a new technology perspective, including its essence, corresponding technical framework, and potential technical challenges. Specifically, we analyze the essence of the Metaverse from its etymology and point out breakthroughs promising to be made in time, space, and contents of the Metaverse by citing Maslow's Hierarchy of Needs. Subsequently, we conclude four pillars of the Metaverse, named ubiquitous connections, space convergence, virtuality and reality interaction, and human-centered communication, and establish a corresponding technical framework. Additionally, we envision open issues and challenges of the Metaverse in the technical aspect. The work proposes a new technology perspective of the Metaverse and will provide further guidance for its technology development in the future.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
A Survey on Metaverse: the State-of-the-art, Technologies, Applications, and Challenges
Authors:
Huansheng Ning,
Hang Wang,
Yujia Lin,
Wenxi Wang,
Sahraoui Dhelim,
Fadi Farha,
Jianguo Ding,
Mahmoud Daneshmand
Abstract:
Metaverse is a new type of Internet application and social form that integrates a variety of new technologies. It has the characteristics of multi-technology, sociality, and hyper spatiotemporality. This paper introduces the development status of Metaverse, from the five perspectives of network infrastructure, management technology, basic common technology, virtual reality object connection, and v…
▽ More
Metaverse is a new type of Internet application and social form that integrates a variety of new technologies. It has the characteristics of multi-technology, sociality, and hyper spatiotemporality. This paper introduces the development status of Metaverse, from the five perspectives of network infrastructure, management technology, basic common technology, virtual reality object connection, and virtual reality convergence, it introduces the technical framework of Metaverse. This paper also introduces the nature of Metaverse's social and hyper spatiotemporality, and discusses the first application areas of Metaverse and some of the problems and challenges it may face.
△ Less
Submitted 18 November, 2021;
originally announced November 2021.
-
Industry 4.0 and Prospects of Circular Economy: A Survey of Robotic Assembly and Disassembly
Authors:
Morteza Daneshmand,
Fatemeh Noroozi,
Ciprian Corneanu,
Fereshteh Mafakheri,
Paolo Fiorini
Abstract:
Despite their contributions to the financial efficiency and environmental sustainability of industrial processes, robotic assembly and disassembly have been understudied in the existing literature. This is in contradiction to their importance in realizing the Fourth Industrial Revolution. More specifically, although most of the literature has extensively discussed how to optimally assemble or disa…
▽ More
Despite their contributions to the financial efficiency and environmental sustainability of industrial processes, robotic assembly and disassembly have been understudied in the existing literature. This is in contradiction to their importance in realizing the Fourth Industrial Revolution. More specifically, although most of the literature has extensively discussed how to optimally assemble or disassemble given products, the role of other factors has been overlooked. For example, the types of robots involved in implementing the sequence plans, which should ideally be taken into account throughout the whole chain consisting of design, assembly, disassembly and reassembly. Isolating the foregoing operations from the rest of the components of the relevant ecosystems may lead to erroneous inferences toward both the necessity and efficiency of the underlying procedures. In this paper we try to alleviate these shortcomings by comprehensively investigating the state-of-the-art in robotic assembly and disassembly. We consider and review various aspects of manufacturing and remanufacturing frameworks while particularly focusing on their desirability for supporting a circular economy.
△ Less
Submitted 14 June, 2021;
originally announced June 2021.
-
IoT-Enabled Social Relationships Meet Artificial Social Intelligence
Authors:
Sahraoui Dhelim,
Huansheng Ning,
Fadi Farha,
Liming Chen,
Luigi Atzori,
Mahmoud Daneshmand
Abstract:
With the recent advances of the Internet of Things, and the increasing accessibility of ubiquitous computing resources and mobile devices, the prevalence of rich media contents, and the ensuing social, economic, and cultural changes, computing technology and applications have evolved quickly over the past decade. They now go beyond personal computing, facilitating collaboration and social interact…
▽ More
With the recent advances of the Internet of Things, and the increasing accessibility of ubiquitous computing resources and mobile devices, the prevalence of rich media contents, and the ensuing social, economic, and cultural changes, computing technology and applications have evolved quickly over the past decade. They now go beyond personal computing, facilitating collaboration and social interactions in general, causing a quick proliferation of social relationships among IoT entities. The increasing number of these relationships and their heterogeneous social features have led to computing and communication bottlenecks that prevent the IoT network from taking advantage of these relationships to improve the offered services and customize the delivered content, known as relationship explosion. On the other hand, the quick advances in artificial intelligence applications in social computing have led to the emerging of a promising research field known as Artificial Social Intelligence (ASI) that has the potential to tackle the social relationship explosion problem. This paper discusses the role of IoT in social relationships detection and management, the problem of social relationships explosion in IoT and reviews the proposed solutions using ASI, including social-oriented machine-learning and deep-learning techniques.
△ Less
Submitted 25 May, 2021; v1 submitted 21 February, 2021;
originally announced March 2021.
-
Persian Handwritten Digit, Character and Word Recognition Using Deep Learning
Authors:
Mehdi Bonyani,
Simindokht Jahangard,
Morteza Daneshmand
Abstract:
Digit, letter and word recognition for a particular script has various applications in todays commercial contexts. Nevertheless, only a limited number of relevant studies have dealt with Persian scripts. In this paper, deep neural networks are utilized through various DensNet architectures, as well as the Xception, are adopted, modified and further boosted through data augmentation and test time a…
▽ More
Digit, letter and word recognition for a particular script has various applications in todays commercial contexts. Nevertheless, only a limited number of relevant studies have dealt with Persian scripts. In this paper, deep neural networks are utilized through various DensNet architectures, as well as the Xception, are adopted, modified and further boosted through data augmentation and test time augmentation, in order to come up with an optical character recognition accounting for the particularities of the Persian language and the corresponding handwritings. Taking advantage of dividing the databases to training, validation and test sets, as well as k-fold cross validation, the comparison of the proposed method with various state-of-the-art alternatives is performed on the basis of the HODA and Sadri databases, which offer the most comprehensive collection of samples in terms of the various handwriting styles possessed by different human beings, as well as different forms each letter may take, which depend on its position within a word. On the HODA database, we achieve recognition rates of 99.72% and 89.99% for digits and characters, being 99.72%, 98.32% and 98.82% for digits, characters and words from the Sadri database, respectively.
△ Less
Submitted 14 November, 2020; v1 submitted 24 October, 2020;
originally announced October 2020.
-
Residual Energy Based Cluster-head Selection in WSNs for IoT Application
Authors:
Trupti Mayee Behera,
Sushanta Kumar Mohapatra,
Umesh Chandra Samal,
Mohammad. S. Khan,
Mahmoud Daneshmand,
Amir H. Gandomi
Abstract:
Wireless sensor networks (WSN) groups specialized transducers that provide sensing services to Internet of Things (IoT) devices with limited energy and storage resources. Since replacement or recharging of batteries in sensor nodes is almost impossible, power consumption becomes one of the crucial design issues in WSN. Clustering algorithm plays an important role in power conservation for the ener…
▽ More
Wireless sensor networks (WSN) groups specialized transducers that provide sensing services to Internet of Things (IoT) devices with limited energy and storage resources. Since replacement or recharging of batteries in sensor nodes is almost impossible, power consumption becomes one of the crucial design issues in WSN. Clustering algorithm plays an important role in power conservation for the energy constrained network. Choosing a cluster head can appropriately balance the load in the network thereby reducing energy consumption and enhancing lifetime. The paper focuses on an efficient cluster head election scheme that rotates the cluster head position among the nodes with higher energy level as compared to other. The algorithm considers initial energy, residual energy and an optimum value of cluster heads to elect the next group of cluster heads for the network that suits for IoT applications such as environmental monitoring, smart cities, and systems. Simulation analysis shows the modified version performs better than the LEACH protocol by enhancing the throughput by 60%, lifetime by 66%, and residual energy by 64%.
△ Less
Submitted 4 February, 2019;
originally announced February 2019.
-
3D Scanning: A Comprehensive Survey
Authors:
Morteza Daneshmand,
Ahmed Helmi,
Egils Avots,
Fatemeh Noroozi,
Fatih Alisinanoglu,
Hasan Sait Arslan,
Jelena Gorbova,
Rain Eric Haamer,
Cagri Ozcinar,
Gholamreza Anbarjafari
Abstract:
This paper provides an overview of 3D scanning methodologies and technologies proposed in the existing scientific and industrial literature. Throughout the paper, various types of the related techniques are reviewed, which consist, mainly, of close-range, aerial, structure-from-motion and terrestrial photogrammetry, and mobile, terrestrial and airborne laser scanning, as well as time-of-flight, st…
▽ More
This paper provides an overview of 3D scanning methodologies and technologies proposed in the existing scientific and industrial literature. Throughout the paper, various types of the related techniques are reviewed, which consist, mainly, of close-range, aerial, structure-from-motion and terrestrial photogrammetry, and mobile, terrestrial and airborne laser scanning, as well as time-of-flight, structured-light and phase-comparison methods, along with comparative and combinational studies, the latter being intended to help make a clearer distinction on the relevance and reliability of the possible choices. Moreover, outlier detection and surface fitting procedures are discussed concisely, which are necessary post-processing stages.
△ Less
Submitted 23 January, 2018;
originally announced January 2018.
-
Network Slicing in Fog Radio Access Networks: Issues and Challenges
Authors:
Hongyu Xiang,
Wenan Zhou,
Mahmoud Daneshmand,
Mugen Peng
Abstract:
Network slicing has been advocated by both academia and industry as a cost-efficient way to enable operators to provide networks on an as-a-service basis and meet the wide range of use cases that the fifth generation wireless network will serve. The existing works on network slicing are mainly targeted at the partition of the core network, and the prospect of network slicing in radio access networ…
▽ More
Network slicing has been advocated by both academia and industry as a cost-efficient way to enable operators to provide networks on an as-a-service basis and meet the wide range of use cases that the fifth generation wireless network will serve. The existing works on network slicing are mainly targeted at the partition of the core network, and the prospect of network slicing in radio access networks should be jointly exploited. To solve this challenge, an enhanced network slicing in fog radio access networks (F-RANs), termed as access slicing, is proposed. This article comprehensively presents a novel architecture and related key techniques for access slicing in F-RANs. The proposed hierarchical architecture of access slicing consists of centralized orchestration layer and slice instance layer, which makes the access slicing adaptively implement in an convenient way. Meanwhile, key techniques and their corresponding solutions, including the radio and cache resource management, as well as the social-aware slicing, are presented. Open issues in terms of standardization developments and field trials are identified.
△ Less
Submitted 14 September, 2017;
originally announced September 2017.
-
Strongly Enhanced Sensitivity in Planar Microwave Sensors Based on Metamaterial coupling
Authors:
Mohammad Abdolrazzaghi,
Mojgan Daneshmand,
Ashwin K. Iyer
Abstract:
Limited sensitivity and sensing range are arguably the greatest challenges in microwave sensor design. Recent attempts to improve these properties have relied on metamaterial- (MTM-) inspired open-loop resonators (OLRs) coupled to transmission lines (TLs). Although the strongly resonant properties of the OLR sensitively reflect small changes in the environment through a shift in its resonance freq…
▽ More
Limited sensitivity and sensing range are arguably the greatest challenges in microwave sensor design. Recent attempts to improve these properties have relied on metamaterial- (MTM-) inspired open-loop resonators (OLRs) coupled to transmission lines (TLs). Although the strongly resonant properties of the OLR sensitively reflect small changes in the environment through a shift in its resonance frequency, the resulting sensitivities remain ultimately limited by the level of coupling between the OLR and the TL. This work introduces a novel solution to this problem that employs negative-refractiveindex TL (NRI-TL) MTMs to substantially improve this coupling so as to fully exploit its resonant properties. A MTM-infused planar microwave sensor is designed for operation at 2.5 GHz, and is shown to exhibit a significant improvement in sensitivity and linearity. A rigorous signal-flow analysis (SFA) of the sensor is proposed and shown to provide a fully analytical description of all salient features of both the conventional and MTM-infused sensors. Full-wave simulations confirm the analytical predictions, and all data demonstrate excellent agreement with measurements of a fabricated prototype. The proposed device is shown to be especially useful in the characterization of commonly-available high-permittivity liquids as well as in sensitively distinguishing concentrations of ethanol/methanol in water.
△ Less
Submitted 7 September, 2017;
originally announced September 2017.