-
Investigating Persuasion Techniques in Arabic: An Empirical Study Leveraging Large Language Models
Authors:
Abdurahmman Alzahrani,
Eyad Babkier,
Faisal Yanbaawi,
Firas Yanbaawi,
Hassan Alhuzali
Abstract:
In the current era of digital communication and widespread use of social media, it is crucial to develop an understanding of persuasive techniques employed in written text. This knowledge is essential for effectively discerning accurate information and making informed decisions. To address this need, this paper presents a comprehensive empirical study focused on identifying persuasive techniques i…
▽ More
In the current era of digital communication and widespread use of social media, it is crucial to develop an understanding of persuasive techniques employed in written text. This knowledge is essential for effectively discerning accurate information and making informed decisions. To address this need, this paper presents a comprehensive empirical study focused on identifying persuasive techniques in Arabic social media content. To achieve this objective, we utilize Pre-trained Language Models (PLMs) and leverage the ArAlEval dataset, which encompasses two tasks: binary classification to determine the presence or absence of persuasion techniques, and multi-label classification to identify the specific types of techniques employed in the text. Our study explores three different learning approaches by harnessing the power of PLMs: feature extraction, fine-tuning, and prompt engineering techniques. Through extensive experimentation, we find that the fine-tuning approach yields the highest results on the aforementioned dataset, achieving an f1-micro score of 0.865 and an f1-weighted score of 0.861. Furthermore, our analysis sheds light on an interesting finding. While the performance of the GPT model is relatively lower compared to the other approaches, we have observed that by employing few-shot learning techniques, we can enhance its results by up to 20\%. This offers promising directions for future research and exploration in this topic\footnote{Upon Acceptance, the source code will be released on GitHub.}.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
Ransomware in Windows and Android Platforms
Authors:
Abdulrahman Alzahrani,
Ali Alshehri,
Hani Alshahrani,
Huirong Fu
Abstract:
Malware proliferation and sophistication have drastically increased and evolved continuously. Recent indiscriminate ransomware victimizations have imposed critical needs of effective detection techniques to prevent damages. Therefore, ransomware has drawn attention among cyberspace researchers. This paper contributes a comprehensive overview of ransomware attacks and summarizes existing detection…
▽ More
Malware proliferation and sophistication have drastically increased and evolved continuously. Recent indiscriminate ransomware victimizations have imposed critical needs of effective detection techniques to prevent damages. Therefore, ransomware has drawn attention among cyberspace researchers. This paper contributes a comprehensive overview of ransomware attacks and summarizes existing detection and prevention techniques in both Windows and Android platforms. Moreover, it highlights the strengths and shortcomings of those techniques and provides a comparison between them. Furthermore, it gives recommendations to users and system administrators.
△ Less
Submitted 12 May, 2020;
originally announced May 2020.
-
AR-Therapist: Design and Simulation of an AR-Game Environment as a CBT for Patients with ADHD
Authors:
Saad Alqithami,
Musaad Alzahrani,
Abdulkareem Alzahrani,
Ahmed Mustafa
Abstract:
Attention Deficit Hyperactivity Disorder is one of the most common neurodevelopmental disorders in which patients have difficulties related to inattention, hyperactivity, and impulsivity. Those patients are in need of a psychological therapy use Cognitive Behavioral Therapy (CBT) to enhance the way they think and behave. This type of therapy is mostly common in treating patients with anxiety and d…
▽ More
Attention Deficit Hyperactivity Disorder is one of the most common neurodevelopmental disorders in which patients have difficulties related to inattention, hyperactivity, and impulsivity. Those patients are in need of a psychological therapy use Cognitive Behavioral Therapy (CBT) to enhance the way they think and behave. This type of therapy is mostly common in treating patients with anxiety and depression but also is useful in treating autism, obsessive compulsive disorder and post-traumatic stress disorder. A major limitation of traditional CBT is that therapists may face difficulty in optimizing patients' neuropsychological stimulus following a specified treatment plan. Other limitations include availability, accessibility and level-of-experience of the therapists. Hence, this paper aims to design and simulate a generic cognitive model that can be used as an appropriate alternative treatment to traditional CBT, we term as "AR-Therapist." This model takes advantage of the current developments of augmented reality to engage patients in both real and virtual game-based environments.
△ Less
Submitted 1 May, 2020;
originally announced May 2020.
-
Permissioned Blockchain-Based Security for SDN in IoT Cloud Networks
Authors:
Safi Faizullah,
Muhammad Asad Khan,
Ali Alzahrani,
Imdadullah Khan
Abstract:
The advancement in cloud networks has enabled connectivity of both traditional networked elements and new devices from all walks of life, thereby forming the Internet of Things (IoT). In an IoT setting, improving and scaling network components as well as reducing cost is essential to sustain exponential growth. In this domain, software-defined networking (SDN) is revolutionizing the network infras…
▽ More
The advancement in cloud networks has enabled connectivity of both traditional networked elements and new devices from all walks of life, thereby forming the Internet of Things (IoT). In an IoT setting, improving and scaling network components as well as reducing cost is essential to sustain exponential growth. In this domain, software-defined networking (SDN) is revolutionizing the network infrastructure with a new paradigm. SDN splits the control/routing logic from the data transfer/forwarding. This splitting causes many issues in SDN, such as vulnerabilities of DDoS attacks. Many solutions (including blockchain based) have been proposed to overcome these problems. In this work, we offer a blockchain-based solution that is provided in redundant SDN (load-balanced) to service millions of IoT devices. Blockchain is considered as tamper-proof and impossible to corrupt due to the replication of the ledger and consensus for verification and addition to the ledger. Therefore, it is a perfect fit for SDN in IoT Networks. Blockchain technology provides everyone with a working proof of decentralized trust. The experimental results show gain and efficiency with respect to the accuracy, update process, and bandwidth utilization.
△ Less
Submitted 2 February, 2020;
originally announced February 2020.
-
Modeling an Augmented Reality Game Environment to Enhance Behavior of ADHD Patients
Authors:
Saad Alqithami,
Musaad Alzahrani,
Abdulkareem Alzahrani,
Ahmed Mostafa
Abstract:
The paper generically models an augmented reality game-based environment to project the gamification of an online cognitive behavioral therapist that performs instant measurements for patients with a predefined Attention Deficit Hyperactivity Disorder (ADHD). ADHD is one of the most common neurodevelopmental disorders in which patients have difficulties related to inattention, hyperactivity, and i…
▽ More
The paper generically models an augmented reality game-based environment to project the gamification of an online cognitive behavioral therapist that performs instant measurements for patients with a predefined Attention Deficit Hyperactivity Disorder (ADHD). ADHD is one of the most common neurodevelopmental disorders in which patients have difficulties related to inattention, hyperactivity, and impulsivity. Those patients are in need for a psychological therapy; the use of cognitive behavioral therapy as a firmly-established treatment is to help in enhancing the way they think and behave. A major limitation in traditional cognitive behavioral therapies is that therapists may face difficulty to optimize patients' neuropsychological stimulus following a specified treatment plan, i.e., therapists struggle to draw clear images when stimulating patients' mindset to a point where they should be. Other limitations recognized here include availability, accessibility and level-of-experience of the therapists. Therefore, the paper present a gamification model, we term as "AR-Therapist," in order to take advantages of augmented reality developments to engage patients in both real and virtual game-based environments. The model provides an on-time measurements of patients' progress throughout the treatment sessions which, in result, overcomes limitations observed in traditional cognitive behavioral therapies.
△ Less
Submitted 3 November, 2019;
originally announced November 2019.
-
A Conceptual Framework for Successful E-commerce Smartphone Applications: The Context of GCC
Authors:
Adel Bahaddad,
Rayed AlGhamdi,
Seyed M. Buhari,
Madini O. Alassafi,
Ahmad Alzahrani
Abstract:
Rapid expansion of online business has engulfed the GCC region. Such expansion causes competition among business entities, causing the need to identify the factors that the customers use to choose a suitable mobile business application. Instead of just focusing on the visitors/users of the application, a shift in focus towards transforming casual customers to loyal customers is needed. The IS Succ…
▽ More
Rapid expansion of online business has engulfed the GCC region. Such expansion causes competition among business entities, causing the need to identify the factors that the customers use to choose a suitable mobile business application. Instead of just focusing on the visitors/users of the application, a shift in focus towards transforming casual customers to loyal customers is needed. The IS Success Model, whose main constructs are Information Quality, Quality Systems, Service Quality, User Satisfaction, Intention to Use and Net Benefits, includes diversified indicators along with their measures. This research considers User Satisfaction, Intention to Use and Net Benefits constructs as it is, but modified System Quality, Information Quality and Service Quality constructs based on previous state-of-the-art literature. The developed theoretical model was further tested surveying 803 GCC participants. Responses were analyzed using exploratory and confirmatory factor analysis. Study reveals the significance of Service Quality (consisting of M-loyalty Building, Customer Chat and feedback, Help and technical support, and Credibility and Reliability Build) over Information Quality and System Quality, impacting the importance of User Satisfaction over the other constructs.
△ Less
Submitted 17 August, 2019;
originally announced August 2019.
-
Salient Object Detection: A Distinctive Feature Integration Model
Authors:
Abdullah J. Alzahrani,
Hina Afridi
Abstract:
We propose a novel method for salient object detection in different images. Our method integrates spatial features for efficient and robust representation to capture meaningful information about the salient objects. We then train a conditional random field (CRF) using the integrated features. The trained CRF model is then used to detect salient objects during the online testing stage. We perform e…
▽ More
We propose a novel method for salient object detection in different images. Our method integrates spatial features for efficient and robust representation to capture meaningful information about the salient objects. We then train a conditional random field (CRF) using the integrated features. The trained CRF model is then used to detect salient objects during the online testing stage. We perform experiments on two standard datasets and compare the performance of our method with different reference methods. Our experiments show that our method outperforms the compared methods in terms of precision, recall, and F-Measure.
△ Less
Submitted 18 April, 2019;
originally announced April 2019.
-
Clustering and Labelling Auction Fraud Data
Authors:
Ahmad Alzahrani,
Samira Sadaoui
Abstract:
Although shill bidding is a common auction fraud, it is however very tough to detect. Due to the unavailability and lack of training data, in this study, we build a high-quality labeled shill bidding dataset based on recently collected auctions from eBay. Labeling shill biding instances with multidimensional features is a critical phase for the fraud classification task. For this purpose, we intro…
▽ More
Although shill bidding is a common auction fraud, it is however very tough to detect. Due to the unavailability and lack of training data, in this study, we build a high-quality labeled shill bidding dataset based on recently collected auctions from eBay. Labeling shill biding instances with multidimensional features is a critical phase for the fraud classification task. For this purpose, we introduce a new approach to systematically label the fraud data with the help of the hierarchical clustering CURE that returns remarkable results as illustrated in the experiments.
△ Less
Submitted 22 August, 2018;
originally announced August 2018.
-
Scra** and Preprocessing Commercial Auction Data for Fraud Classification
Authors:
Ahmad Alzahrani,
Samira Sadaoui
Abstract:
In the last three decades, we have seen a significant increase in trading goods and services through online auctions. However, this business created an attractive environment for malicious moneymakers who can commit different types of fraud activities, such as Shill Bidding (SB). The latter is predominant across many auctions but this type of fraud is difficult to detect due to its similarity to n…
▽ More
In the last three decades, we have seen a significant increase in trading goods and services through online auctions. However, this business created an attractive environment for malicious moneymakers who can commit different types of fraud activities, such as Shill Bidding (SB). The latter is predominant across many auctions but this type of fraud is difficult to detect due to its similarity to normal bidding behaviour. The unavailability of SB datasets makes the development of SB detection and classification models burdensome. Furthermore, to implement efficient SB detection models, we should produce SB data from actual auctions of commercial sites. In this study, we first scraped a large number of eBay auctions of a popular product. After preprocessing the raw auction data, we build a high-quality SB dataset based on the most reliable SB strategies. The aim of our research is to share the preprocessed auction dataset as well as the SB training (unlabelled) dataset, thereby researchers can apply various machine learning techniques by using authentic data of auctions and fraud.
△ Less
Submitted 17 June, 2018; v1 submitted 2 June, 2018;
originally announced June 2018.
-
Energy-Aware Virtual Network Embedding Approach for Distributed Cloud
Authors:
Amal S. Alzahrani,
Ashraf A. Shahin
Abstract:
Network virtualization has caught the attention of many researchers in recent years. It facilitates the process of creating several virtual networks over a single physical network. Despite this advantage, however, network virtualization suffers from the problem of map** virtual links and nodes to physical network in most efficient way. This problem is called virtual network embedding ("VNE"). Ma…
▽ More
Network virtualization has caught the attention of many researchers in recent years. It facilitates the process of creating several virtual networks over a single physical network. Despite this advantage, however, network virtualization suffers from the problem of map** virtual links and nodes to physical network in most efficient way. This problem is called virtual network embedding ("VNE"). Many researches have been proposed in an attempt to solve this problem, which have many optimization aspects, such as improving embedding strategies in a way that preserves energy, reducing embedding cost and increasing embedding revenue. Moreover, some researchers have extended their algorithms to be more compatible with the distributed clouds instead of a single infrastructure provider ("ISP"). This paper proposes energy aware particle swarm optimization algorithm for distributed clouds. This algorithm aims to partition each virtual network request ("VNR") to subgraphs, using the Heavy Clique Matching technique ("HCM") to generate a coarsened graph. Each coarsened node in the coarsened graph is assigned to a suitable data center ("DC"). Inside each DC, a modified particle swarm optimization algorithm is initiated to find the near optimal solution for the VNE problem. The proposed algorithm was tested and evaluated against existing algorithms using extensive simulations, which shows that the proposed algorithm outperforms other algorithms.
△ Less
Submitted 31 October, 2017;
originally announced October 2017.
-
Resistance against brute-force attacks on stateless forwarding in information centric networking
Authors:
Bander A. Alzahrani,
Martin J. Reed,
Vassilios G. Vassilakis
Abstract:
Line Speed Publish/Subscribe Inter-networking (LIPSIN) is one of the proposed forwarding mechanisms in Information Centric Networking (ICN). It is a stateless source-routing approach based on Bloom filters. However, it has been shown that LIPSIN is vulnerable to brute-force attacks which may lead to distributed denial-of-service (DDoS) attacks and unsolicited messages. In this work, we propose a n…
▽ More
Line Speed Publish/Subscribe Inter-networking (LIPSIN) is one of the proposed forwarding mechanisms in Information Centric Networking (ICN). It is a stateless source-routing approach based on Bloom filters. However, it has been shown that LIPSIN is vulnerable to brute-force attacks which may lead to distributed denial-of-service (DDoS) attacks and unsolicited messages. In this work, we propose a new forwarding approach that maintains the advantages of Bloom filter based forwarding while allowing forwarding nodes to statelessly verify if packets have been previously authorized, thus preventing attacks on the forwarding mechanism. Analysis of the probability of attack, derived analytically, demonstrates that the technique is highly-resistant to brute-force attacks.
△ Less
Submitted 15 July, 2015;
originally announced July 2015.