Skip to main content

Showing 1–5 of 5 results for author: Alqahtani, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.01109  [pdf, other

    cs.CR cs.AI

    An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks

    Authors: Abdullah H Alqahtani

    Abstract: Network attacks have became increasingly more sophisticated and stealthy due to the advances in technologies and the growing sophistication of attackers. Advanced Persistent Threats (APTs) are a type of attack that implement a wide range of strategies to evade detection and be under the defence radar. Software Defined Network (SDN) is a network paradigm that implements dynamic configuration by sep… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  2. arXiv:2001.00645  [pdf, other

    cs.CV eess.IV

    PI-GAN: Learning Pose Independent representations for multiple profile face synthesis

    Authors: Hamed Alqahtani

    Abstract: Generating a pose-invariant representation capable of synthesizing multiple face pose views from a single pose is still a difficult problem. The solution is demanded in various areas like multimedia security, computer vision, robotics, etc. Generative adversarial networks (GANs) have encoder-decoder structures possessing the capability to learn pose-independent representation incorporated with dis… ▽ More

    Submitted 25 December, 2019; originally announced January 2020.

    Comments: 8 pages, 2 figures

  3. arXiv:1911.02726  [pdf

    cs.HC

    An Agent-Based Intelligent HCI Information System in Mixed Reality

    Authors: Hamed Alqahtani, Charles Z. Liu, Manolya Kavakli-Thorne, Yuzhi Kang

    Abstract: This paper presents a design of agent-based intelligent HCI (iHCI) system using collaborative information for MR to improve user experience and information security based on context-aware computing. In order to implement target awareness system, we propose the use of non-parameter stochastic adaptive learning and a kernel learning strategy for improving the adaptivity of the recognition. The propo… ▽ More

    Submitted 6 November, 2019; originally announced November 2019.

  4. arXiv:1904.05992  [pdf

    cs.CV

    An Introduction to Person Re-identification with Generative Adversarial Networks

    Authors: Hamed Alqahtani, Manolya Kavakli-Thorne, Charles Z. Liu

    Abstract: Person re-identification is a basic subject in the field of computer vision. The traditional methods have several limitations in solving the problems of person illumination like occlusion, pose variation and feature variation under complex background. Fortunately, deep learning paradigm opens new ways of the person re-identification research and becomes a hot spot in this field. Generative Adversa… ▽ More

    Submitted 17 April, 2019; v1 submitted 11 April, 2019; originally announced April 2019.

  5. arXiv:1811.04582  [pdf

    cs.CR

    A Lightweight Signature-Based IDS for IoT Environment

    Authors: Nazim Uddin Sheikh, Hasina Rahman, Shashwat Vikram, Hamed AlQahtani

    Abstract: With the advent of large-scale heterogeneous networks comes the problem of unified network control resulting in security lapses that could have otherwise avoided. A mechanism is needed to detect and deflect intruders to safeguard resource constraint edge devices and networks as well. In this paper we demonstrate the use of an optimized pattern recognition algorithm to detect such attacks. Furtherm… ▽ More

    Submitted 12 November, 2018; originally announced November 2018.

    Comments: 4 pages, 1 figure, 1 table