Skip to main content

Showing 1–9 of 9 results for author: Ouni, B

.
  1. arXiv:2405.00394  [pdf, other

    cs.GT cs.LG

    Enhancing Mutual Trustworthiness in Federated Learning for Data-Rich Smart Cities

    Authors: Osama Wehbi, Sarhad Arisdakessian, Mohsen Guizani, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Hoda Al khzaimi, Bassem Ouni

    Abstract: Federated learning is a promising collaborative and privacy-preserving machine learning approach in data-rich smart cities. Nevertheless, the inherent heterogeneity of these urban environments presents a significant challenge in selecting trustworthy clients for collaborative model training. The usage of traditional approaches, such as the random client selection technique, poses several threats t… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  2. arXiv:2403.11515  [pdf, other

    cs.CV cs.RO

    SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Bassem Ouni, Muhammad Shafique

    Abstract: Monocular depth estimation (MDE) has advanced significantly, primarily through the integration of convolutional neural networks (CNNs) and more recently, Transformers. However, concerns about their susceptibility to adversarial attacks have emerged, especially in safety-critical domains like autonomous driving and robotic navigation. Existing approaches for assessing CNN-based depth prediction met… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  3. arXiv:2312.00034  [pdf, other

    cs.CR cs.AI cs.NI

    Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning

    Authors: Mounia Hamidouche, Eugeny Popko, Bassem Ouni

    Abstract: This work provides a comparative analysis illustrating how Deep Learning (DL) surpasses Machine Learning (ML) in addressing tasks within Internet of Things (IoT), such as attack classification and device-type identification. Our approach involves training and evaluating a DL model using a range of diverse IoT-related datasets, allowing us to gain valuable insights into how adaptable and practical… ▽ More

    Submitted 20 November, 2023; originally announced December 2023.

  4. arXiv:2311.12211  [pdf, other

    cs.CR

    DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction

    Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique

    Abstract: Adversarial patch-based attacks have shown to be a major deterrent towards the reliable use of machine learning models. These attacks involve the strategic modification of localized patches or specific image areas to deceive trained machine learning models. In this paper, we propose \textit{DefensiveDR}, a practical mechanism using a dimensionality reduction technique to thwart such patch-based at… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  5. arXiv:2311.12084  [pdf, other

    cs.CR cs.CV

    ODDR: Outlier Detection & Dimension Reduction Based Defense Against Adversarial Patches

    Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique

    Abstract: Adversarial attacks are a major deterrent towards the reliable use of machine learning models. A powerful type of adversarial attacks is the patch-based attack, wherein the adversarial perturbations modify localized patches or specific areas within the images to deceive the trained machine learning model. In this paper, we introduce Outlier Detection and Dimension Reduction (ODDR), a holistic defe… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  6. arXiv:2308.06173  [pdf, other

    cs.CR cs.AI cs.CV cs.LG cs.RO

    Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammed Shafique

    Abstract: In this paper, we present a comprehensive survey of the current trends focusing specifically on physical adversarial attacks. We aim to provide a thorough understanding of the concept of physical adversarial attacks, analyzing their key characteristics and distinguishing features. Furthermore, we explore the specific requirements and challenges associated with executing attacks in the physical wor… ▽ More

    Submitted 11 August, 2023; originally announced August 2023.

  7. arXiv:2308.03108  [pdf, other

    cs.CV cs.CR

    SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique

    Abstract: In this paper, we investigate the vulnerability of MDE to adversarial patches. We propose a novel \underline{S}tealthy \underline{A}dversarial \underline{A}ttacks on \underline{M}DE (SAAM) that compromises MDE by either corrupting the estimated distance or causing an object to seamlessly blend into its surroundings. Our experiments, demonstrate that the designed stealthy patch successfully causes… ▽ More

    Submitted 20 December, 2023; v1 submitted 6 August, 2023; originally announced August 2023.

  8. arXiv:2303.01245  [pdf, other

    cs.CR cs.LG

    An Incremental Gray-box Physical Adversarial Attack on Neural Network Training

    Authors: Rabiah Al-qudah, Moayad Aloqaily, Bassem Ouni, Mohsen Guizani, Thierry Lestable

    Abstract: Neural networks have demonstrated remarkable success in learning and solving complex tasks in a variety of fields. Nevertheless, the rise of those networks in modern computing has been accompanied by concerns regarding their vulnerability to adversarial attacks. In this work, we propose a novel gradient-free, gray box, incremental attack that targets the training process of neural networks. The pr… ▽ More

    Submitted 20 February, 2023; originally announced March 2023.

    Comments: Accepted in IEEE ICC 2023

  9. arXiv:2302.12205  [pdf, other

    cs.LG cs.CR eess.SP

    Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments

    Authors: Neveen Hijazi, Moayad Aloqaily, Bassem Ouni, Fakhri Karray, Merouane Debbah

    Abstract: The development of the Internet of Things (IoT) has dramatically expanded our daily lives, playing a pivotal role in the enablement of smart cities, healthcare, and buildings. Emerging technologies, such as IoT, seek to improve the quality of service in cognitive cities. Although IoT applications are helpful in smart building applications, they present a real risk as the large number of interconne… ▽ More

    Submitted 20 February, 2023; originally announced February 2023.

    Comments: Accepted in IEEE ICC 2023