Skip to main content

Showing 1–11 of 11 results for author: Alzahrani, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.12884  [pdf, other

    cs.CL cs.AI

    Investigating Persuasion Techniques in Arabic: An Empirical Study Leveraging Large Language Models

    Authors: Abdurahmman Alzahrani, Eyad Babkier, Faisal Yanbaawi, Firas Yanbaawi, Hassan Alhuzali

    Abstract: In the current era of digital communication and widespread use of social media, it is crucial to develop an understanding of persuasive techniques employed in written text. This knowledge is essential for effectively discerning accurate information and making informed decisions. To address this need, this paper presents a comprehensive empirical study focused on identifying persuasive techniques i… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

  2. arXiv:2005.05571  [pdf

    cs.CY cs.CR

    Ransomware in Windows and Android Platforms

    Authors: Abdulrahman Alzahrani, Ali Alshehri, Hani Alshahrani, Huirong Fu

    Abstract: Malware proliferation and sophistication have drastically increased and evolved continuously. Recent indiscriminate ransomware victimizations have imposed critical needs of effective detection techniques to prevent damages. Therefore, ransomware has drawn attention among cyberspace researchers. This paper contributes a comprehensive overview of ransomware attacks and summarizes existing detection… ▽ More

    Submitted 12 May, 2020; originally announced May 2020.

    Comments: 21 pages, 7 figures, 5 tables

  3. AR-Therapist: Design and Simulation of an AR-Game Environment as a CBT for Patients with ADHD

    Authors: Saad Alqithami, Musaad Alzahrani, Abdulkareem Alzahrani, Ahmed Mustafa

    Abstract: Attention Deficit Hyperactivity Disorder is one of the most common neurodevelopmental disorders in which patients have difficulties related to inattention, hyperactivity, and impulsivity. Those patients are in need of a psychological therapy use Cognitive Behavioral Therapy (CBT) to enhance the way they think and behave. This type of therapy is mostly common in treating patients with anxiety and d… ▽ More

    Submitted 1 May, 2020; originally announced May 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1911.01003

    ACM Class: J.4; I.2.1; J.3

    Journal ref: Healthcare 2019, 7, 146

  4. arXiv:2002.00456  [pdf, other

    cs.CR

    Permissioned Blockchain-Based Security for SDN in IoT Cloud Networks

    Authors: Safi Faizullah, Muhammad Asad Khan, Ali Alzahrani, Imdadullah Khan

    Abstract: The advancement in cloud networks has enabled connectivity of both traditional networked elements and new devices from all walks of life, thereby forming the Internet of Things (IoT). In an IoT setting, improving and scaling network components as well as reducing cost is essential to sustain exponential growth. In this domain, software-defined networking (SDN) is revolutionizing the network infras… ▽ More

    Submitted 2 February, 2020; originally announced February 2020.

    Comments: Accepted to International Conference on Advances in the Emerging Computing Technologies (AECT) 2020

  5. arXiv:1911.01003  [pdf, ps, other

    cs.HC cs.CY cs.MA

    Modeling an Augmented Reality Game Environment to Enhance Behavior of ADHD Patients

    Authors: Saad Alqithami, Musaad Alzahrani, Abdulkareem Alzahrani, Ahmed Mostafa

    Abstract: The paper generically models an augmented reality game-based environment to project the gamification of an online cognitive behavioral therapist that performs instant measurements for patients with a predefined Attention Deficit Hyperactivity Disorder (ADHD). ADHD is one of the most common neurodevelopmental disorders in which patients have difficulties related to inattention, hyperactivity, and i… ▽ More

    Submitted 3 November, 2019; originally announced November 2019.

    Comments: The 12th International Conference on Brain Informatics (BI 2019) --- Brain Science meets Artificial Intelligence

    ACM Class: I.6.5; I.6.3; J.3; F.1.2; F.4.1

  6. arXiv:1908.06350  [pdf

    cs.CY cs.IT

    A Conceptual Framework for Successful E-commerce Smartphone Applications: The Context of GCC

    Authors: Adel Bahaddad, Rayed AlGhamdi, Seyed M. Buhari, Madini O. Alassafi, Ahmad Alzahrani

    Abstract: Rapid expansion of online business has engulfed the GCC region. Such expansion causes competition among business entities, causing the need to identify the factors that the customers use to choose a suitable mobile business application. Instead of just focusing on the visitors/users of the application, a shift in focus towards transforming casual customers to loyal customers is needed. The IS Succ… ▽ More

    Submitted 17 August, 2019; originally announced August 2019.

    Comments: 15 pages, 3 figures, 8 tables

    Journal ref: International Journal of Information Technology and Electrical Engineering, 2019

  7. arXiv:1904.08868  [pdf

    cs.CV

    Salient Object Detection: A Distinctive Feature Integration Model

    Authors: Abdullah J. Alzahrani, Hina Afridi

    Abstract: We propose a novel method for salient object detection in different images. Our method integrates spatial features for efficient and robust representation to capture meaningful information about the salient objects. We then train a conditional random field (CRF) using the integrated features. The trained CRF model is then used to detect salient objects during the online testing stage. We perform e… ▽ More

    Submitted 18 April, 2019; originally announced April 2019.

  8. Clustering and Labelling Auction Fraud Data

    Authors: Ahmad Alzahrani, Samira Sadaoui

    Abstract: Although shill bidding is a common auction fraud, it is however very tough to detect. Due to the unavailability and lack of training data, in this study, we build a high-quality labeled shill bidding dataset based on recently collected auctions from eBay. Labeling shill biding instances with multidimensional features is a critical phase for the fraud classification task. For this purpose, we intro… ▽ More

    Submitted 22 August, 2018; originally announced August 2018.

  9. Scra** and Preprocessing Commercial Auction Data for Fraud Classification

    Authors: Ahmad Alzahrani, Samira Sadaoui

    Abstract: In the last three decades, we have seen a significant increase in trading goods and services through online auctions. However, this business created an attractive environment for malicious moneymakers who can commit different types of fraud activities, such as Shill Bidding (SB). The latter is predominant across many auctions but this type of fraud is difficult to detect due to its similarity to n… ▽ More

    Submitted 17 June, 2018; v1 submitted 2 June, 2018; originally announced June 2018.

  10. Energy-Aware Virtual Network Embedding Approach for Distributed Cloud

    Authors: Amal S. Alzahrani, Ashraf A. Shahin

    Abstract: Network virtualization has caught the attention of many researchers in recent years. It facilitates the process of creating several virtual networks over a single physical network. Despite this advantage, however, network virtualization suffers from the problem of map** virtual links and nodes to physical network in most efficient way. This problem is called virtual network embedding ("VNE"). Ma… ▽ More

    Submitted 31 October, 2017; originally announced October 2017.

    Comments: International Journal of Advanced Computer Science and Applications(IJACSA)

    Journal ref: International Journal of Advanced Computer Science and Applications(IJACSA), 8(10), 2017

  11. Resistance against brute-force attacks on stateless forwarding in information centric networking

    Authors: Bander A. Alzahrani, Martin J. Reed, Vassilios G. Vassilakis

    Abstract: Line Speed Publish/Subscribe Inter-networking (LIPSIN) is one of the proposed forwarding mechanisms in Information Centric Networking (ICN). It is a stateless source-routing approach based on Bloom filters. However, it has been shown that LIPSIN is vulnerable to brute-force attacks which may lead to distributed denial-of-service (DDoS) attacks and unsolicited messages. In this work, we propose a n… ▽ More

    Submitted 15 July, 2015; originally announced July 2015.

    Comments: ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2015