Skip to main content

Showing 1–38 of 38 results for author: Elsayed, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.17793  [pdf, other

    cs.LG cs.CL cs.CY

    Deep Learning Approaches for Detecting Adversarial Cyberbullying and Hate Speech in Social Networks

    Authors: Sylvia Worlali Azumah, Nelly Elsayed, Zag ElSayed, Murat Ozer, Amanda La Guardia

    Abstract: Cyberbullying is a significant concern intricately linked to technology that can find resolution through technological means. Despite its prevalence, technology also provides solutions to mitigate cyberbullying. To address growing concerns regarding the adverse impact of cyberbullying on individuals' online experiences, various online platforms and researchers are actively adopting measures to enh… ▽ More

    Submitted 30 May, 2024; originally announced June 2024.

    Comments: 10 pages, 8 figures, 3 tables, under reviewing

  2. arXiv:2406.11867  [pdf, ps, other

    cs.CY

    Not as Simple as It Looked: Are We Concluding for Biased Arrest Practices?

    Authors: Murat Ozer, Halil Akbas, Ismail Onat, Mehmet Bastug, Arif Akgul, Nelly ElSayed, Zag ElSayed, Multu Koseli, Niyazi Ekici

    Abstract: This study examines racial disparities in violent arrest outcomes, challenging conventional methods through a nuanced analysis of Cincinnati Police Department data. Acknowledging the intricate nature of racial disparity, the study categorizes explanations into types of place, types of person, and a combination of both, emphasizing the impact of neighborhood characteristics on crime distribution an… ▽ More

    Submitted 13 April, 2024; originally announced June 2024.

  3. arXiv:2402.01649  [pdf, other

    cs.CY cs.CR

    A Comprehensive Analytical Review on Cybercrime in West Africa

    Authors: Victor Adewopo, Sylvia Worlali Azumah, Mustapha Awinsongya Yakubu, Emmanuel Kojo Gyamfi, Murat Ozer, Nelly Elsayed

    Abstract: Cybercrime is a growing concern in West Africa due to the increasing use of technology and internet penetration in the region. Legal frameworks are essential for guiding the control of cybercrime. However, the implementation proves challenging for law enforcement agencies due to the absence of a dedicated and effective regional institutional follow-up mechanism. This study conducted a systematic l… ▽ More

    Submitted 7 January, 2024; originally announced February 2024.

  4. arXiv:2401.07995  [pdf, other

    cs.CR

    The Pulse of Fileless Cryptojacking Attacks: Malicious PowerShell Scripts

    Authors: Said Varlioglu, Nelly Elsayed, Eva Ruhsar Varlioglu, Murat Ozer, Zag ElSayed

    Abstract: Fileless malware predominantly relies on PowerShell scripts, leveraging the native capabilities of Windows systems to execute stealthy attacks that leave no traces on the victim's system. The effectiveness of the fileless method lies in its ability to remain operational on victim endpoints through memory execution, even if the attacks are detected, and the original malicious scripts are removed. T… ▽ More

    Submitted 21 February, 2024; v1 submitted 15 January, 2024; originally announced January 2024.

    Comments: 10 pages, 1 figure

  5. arXiv:2401.07368  [pdf, other

    cs.CR

    A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation

    Authors: Zag ElSayed, Nelly Elsayed, Sajjad Bay

    Abstract: The integration of Internet of Things (IoT) devices in healthcare applications has revolutionized patient care, monitoring, and data management. The Global IoT in Healthcare Market value is $252.2 Billion in 2023. However, the rapid involvement of these devices brings information security concerns that pose critical threats to patient privacy and the integrity of healthcare data. This paper introd… ▽ More

    Submitted 14 January, 2024; originally announced January 2024.

    Comments: 7 pages, 7 figures, 4 tables, under review

  6. arXiv:2401.06970  [pdf, other

    cs.LG cs.HC eess.SP

    TemporalAugmenter: An Ensemble Recurrent Based Deep Learning Approach for Signal Classification

    Authors: Nelly Elsayed, Constantinos L. Zekios, Navid Asadizanjani, Zag ElSayed

    Abstract: Ensemble modeling has been widely used to solve complex problems as it helps to improve overall performance and generalization. In this paper, we propose a novel TemporalAugmenter approach based on ensemble modeling for augmenting the temporal information capturing for long-term and short-term dependencies in data integration of two variations of recurrent neural networks in two learning streams t… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

    Comments: 9 pages, 5 figures, 9 tables, under review process

  7. arXiv:2401.03587  [pdf, ps, other

    cs.CV cs.AI

    Big Data and Deep Learning in Smart Cities: A Comprehensive Dataset for AI-Driven Traffic Accident Detection and Computer Vision Systems

    Authors: Victor Adewopo, Nelly Elsayed, Zag Elsayed, Murat Ozer, Constantinos Zekios, Ahmed Abdelgawad, Magdy Bayoumi

    Abstract: In the dynamic urban landscape, where the interplay of vehicles and pedestrians defines the rhythm of life, integrating advanced technology for safety and efficiency is increasingly crucial. This study delves into the application of cutting-edge technological methods in smart cities, focusing on enhancing public safety through improved traffic accident detection. Action recognition plays a pivotal… ▽ More

    Submitted 7 January, 2024; originally announced January 2024.

  8. arXiv:2401.01023  [pdf, other

    cs.HC cs.LG

    CautionSuicide: A Deep Learning Based Approach for Detecting Suicidal Ideation in Real Time Chatbot Conversation

    Authors: Nelly Elsayed, Zag ElSayed, Murat Ozer

    Abstract: Suicide is recognized as one of the most serious concerns in the modern society. Suicide causes tragedy that affects countries, communities, and families. There are many factors that lead to suicidal ideations. Early detection of suicidal ideations can help to prevent suicide occurrence by providing the victim with the required professional support, especially when the victim does not recognize th… ▽ More

    Submitted 1 January, 2024; originally announced January 2024.

    Comments: 5 pages, 6 figures, 4 tables, Under review in IEEE conference

  9. arXiv:2401.00814  [pdf, other

    cs.HC cs.CY

    Agricultural 4.0 Leveraging on Technological Solutions: Study for Smart Farming Sector

    Authors: Emmanuel Kojo Gyamfi, Zag ElSayed, Jess Kropczynski, Mustapha Awinsongya Yakubu, Nelly Elsayed

    Abstract: By 2050, it is predicted that there will be 9 billion people on the planet, which will call for more production, lower costs, and the preservation of natural resources. It is anticipated that atypical occurrences and climate change will pose severe risks to agricultural output. It follows that a 70% or more significant rise in food output is anticipated. Smart farming, often known as agriculture 4… ▽ More

    Submitted 1 January, 2024; originally announced January 2024.

    Comments: 9 pages, 4 figures, under reviewing process

  10. arXiv:2310.10038  [pdf, other

    cs.CV cs.AI

    Smart City Transportation: Deep Learning Ensemble Approach for Traffic Accident Detection

    Authors: Victor Adewopo, Nelly Elsayed

    Abstract: The dynamic and unpredictable nature of road traffic necessitates effective accident detection methods for enhancing safety and streamlining traffic management in smart cities. This paper offers a comprehensive exploration study of prevailing accident detection techniques, shedding light on the nuances of other state-of-the-art methodologies while providing a detailed overview of distinct traffic… ▽ More

    Submitted 15 October, 2023; originally announced October 2023.

    Comments: 12 pages, 4 figures

  11. arXiv:2307.15225  [pdf, other

    cs.CY cs.SI

    A Secure Open-Source Intelligence Framework For Cyberbullying Investigation

    Authors: Sylvia Worlali Azumah, Victor Adewopo, Zag ElSayed, Nelly Elsayed, Murat Ozer

    Abstract: Cyberbullying has become a pervasive issue based on the rise of cell phones and internet usage affecting individuals worldwide. This paper proposes an open-source intelligence pipeline using data from Twitter to track keywords relevant to cyberbullying in social media to build dashboards for law enforcement agents. We discuss the prevalence of cyberbullying on social media, factors that compel ind… ▽ More

    Submitted 11 August, 2023; v1 submitted 27 July, 2023; originally announced July 2023.

    Comments: 8 pages, 5 figure, under review

  12. arXiv:2307.12128  [pdf, other

    cs.CV cs.AI cs.CY cs.LG

    AI on the Road: A Comprehensive Analysis of Traffic Accidents and Accident Detection System in Smart Cities

    Authors: Victor Adewopo, Nelly Elsayed, Zag Elsayed, Murat Ozer, Victoria Wangia-Anderson, Ahmed Abdelgawad

    Abstract: Accident detection and traffic analysis is a critical component of smart city and autonomous transportation systems that can reduce accident frequency, severity and improve overall traffic management. This paper presents a comprehensive analysis of traffic accidents in different regions across the United States using data from the National Highway Traffic Safety Administration (NHTSA) Crash Report… ▽ More

    Submitted 22 July, 2023; originally announced July 2023.

    Comments: 8,8

  13. arXiv:2307.09923  [pdf, other

    cs.CL

    Large Language Models can accomplish Business Process Management Tasks

    Authors: Michael Grohs, Luka Abb, Nourhan Elsayed, Jana-Rebecca Rehse

    Abstract: Business Process Management (BPM) aims to improve organizational activities and their outcomes by managing the underlying processes. To achieve this, it is often necessary to consider information from various sources, including unstructured textual documents. Therefore, researchers have developed several BPM-specific solutions that extract information from textual documents using Natural Language… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

    Comments: Accepted at NLP4BPM workshop at BPM 2023

  14. arXiv:2305.19859  [pdf, other

    cs.SI

    Exploring the Journey to Drug Overdose: Applying the Journey to Crime Framework to Drug Sales Locations and Overdose Death Locations

    Authors: Murat Ozer, Ismail Onat, Halil Akbas, Nelly Elsayed, Zag ElSayed, Said Varlioglu

    Abstract: Drug overdose is a pressing public health concern in the United States, resulting in a significant number of fatalities each year. In this study, we employ the Journey to Crime (JTC) framework borrowed from the field of environmental criminology to examine the association between drug sales locations and overdose death locations. In this research, our objective is to elucidate the trajectory of ov… ▽ More

    Submitted 31 May, 2023; originally announced May 2023.

    Comments: Under review in The 7th International Conference on Applied Cognitive Computing 2023

  15. arXiv:2305.19347  [pdf, other

    cs.LG eess.SP

    Machine Learning Based IoT Adaptive Architecture for Epilepsy Seizure Detection: Anatomy and Analysis

    Authors: Zag ElSayed, Murat Ozer, Nelly Elsayed, Ahmed Abdelgawad

    Abstract: A seizure tracking system is crucial for monitoring and evaluating epilepsy treatments. Caretaker seizure diaries are used in epilepsy care today, but clinical seizure monitoring may miss seizures. Monitoring devices that can be worn may be better tolerated and more suitable for long-term ambulatory use. Many techniques and methods are proposed for seizure detection; However, simplicity and afford… ▽ More

    Submitted 5 September, 2023; v1 submitted 30 May, 2023; originally announced May 2023.

    Comments: Under review, 5 pages, 7 figures, 3 tables

  16. Cyberbullying in Text Content Detection: An Analytical Review

    Authors: Sylvia W Azumah, Nelly Elsayed, Zag ElSayed, Murat Ozer

    Abstract: Technological advancements have resulted in an exponential increase in the use of online social networks (OSNs) worldwide. While online social networks provide a great communication medium, they also increase the user's exposure to life-threatening situations such as suicide, eating disorder, cybercrime, compulsive behavior, anxiety, and depression. To tackle the issue of cyberbullying, most exist… ▽ More

    Submitted 18 March, 2023; originally announced March 2023.

    Comments: 8 pages. Under review

  17. arXiv:2302.02456  [pdf, other

    eess.IV cs.CV cs.LG q-bio.QM

    Deep Learning Approach for Early Stage Lung Cancer Detection

    Authors: Saleh Abunajm, Nelly Elsayed, Zag ElSayed, Murat Ozer

    Abstract: Lung cancer is the leading cause of death among different types of cancers. Every year, the lives lost due to lung cancer exceed those lost to pancreatic, breast, and prostate cancer combined. The survival rate for lung cancer patients is very low compared to other cancer patients due to late diagnostics. Thus, early lung cancer diagnostics is crucial for patients to receive early treatments, incr… ▽ More

    Submitted 15 February, 2023; v1 submitted 5 February, 2023; originally announced February 2023.

    Comments: Under review in FLAIRS 2023

  18. arXiv:2302.02013  [pdf, other

    cs.CR cs.LG

    IoT Botnet Detection Using an Economic Deep Learning Model

    Authors: Nelly Elsayed, Zag ElSayed, Magdy Bayoumi

    Abstract: The rapid progress in technology innovation usage and distribution has increased in the last decade. The rapid growth of the Internet of Things (IoT) systems worldwide has increased network security challenges created by malicious third parties. Thus, reliable intrusion detection and network forensics systems that consider security concerns and IoT systems limitations are essential to protect such… ▽ More

    Submitted 28 May, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: Accepted in IEEE AIIoT 2023 conference

  19. arXiv:2302.01417  [pdf, other

    cs.LG cs.CV

    A Convolutional-based Model for Early Prediction of Alzheimer's based on the Dementia Stage in the MRI Brain Images

    Authors: Shrish Pellakur, Nelly Elsayed, Zag ElSayed, Murat Ozer

    Abstract: Alzheimer's disease is a degenerative brain disease. Being the primary cause of Dementia in adults and progressively destroys brain memory. Though Alzheimer's disease does not have a cure currently, diagnosing it at an earlier stage will help reduce the severity of the disease. Thus, early diagnosis of Alzheimer's could help to reduce or stop the disease from progressing. In this paper, we propose… ▽ More

    Submitted 15 February, 2023; v1 submitted 2 February, 2023; originally announced February 2023.

    Comments: Short paper, Under Review in FLAIRS-36

  20. arXiv:2301.04794  [pdf, other

    cs.LG

    LiteLSTM Architecture Based on Weights Sharing for Recurrent Neural Networks

    Authors: Nelly Elsayed, Zag ElSayed, Anthony S. Maida

    Abstract: Long short-term memory (LSTM) is one of the robust recurrent neural network architectures for learning sequential data. However, it requires considerable computational power to learn and implement both software and hardware aspects. This paper proposed a novel LiteLSTM architecture based on reducing the LSTM computation components via the weights sharing concept to reduce the overall architecture… ▽ More

    Submitted 11 January, 2023; originally announced January 2023.

    Comments: Under the second reviewing round in the SN Computer Science Journal. Extended version of the LiteLSTM Architecture for Deep Recurrent Neural Networks paper that have been published in the IEEE ISCAS 2022 conference. arXiv admin note: substantial text overlap with arXiv:2201.11624

  21. arXiv:2211.08840  [pdf

    cs.CV

    Semi-Supervised and Self-Supervised Collaborative Learning for Prostate 3D MR Image Segmentation

    Authors: Yousuf Babiker M. Osman, Cheng Li, Weijian Huang, Nazik Elsayed, Zhenzhen Xue, Hairong Zheng, Shanshan Wang

    Abstract: Volumetric magnetic resonance (MR) image segmentation plays an important role in many clinical applications. Deep learning (DL) has recently achieved state-of-the-art or even human-level performance on various image segmentation tasks. Nevertheless, manually annotating volumetric MR images for DL model training is labor-exhaustive and time-consuming. In this work, we aim to train a semi-supervised… ▽ More

    Submitted 16 November, 2022; originally announced November 2022.

  22. arXiv:2210.12527  [pdf, other

    cs.CV cs.AI cs.LG

    Baby Physical Safety Monitoring in Smart Home Using Action Recognition System

    Authors: Victor Adewopo, Nelly Elsayed, Kelly Anderson

    Abstract: Humans are able to intuitively deduce actions that took place between two states in observations via deductive reasoning. This is because the brain operates on a bidirectional communication model, which has radically improved the accuracy of recognition and prediction based on features connected to previous experiences. During the past decade, deep learning models for action recognition have signi… ▽ More

    Submitted 29 April, 2023; v1 submitted 22 October, 2022; originally announced October 2022.

  23. arXiv:2210.09403  [pdf, other

    eess.IV cs.CV cs.LG

    A Transfer Learning Based Approach for Classification of COVID-19 and Pneumonia in CT Scan Imaging

    Authors: Gargi Desai, Nelly Elsayed, Zag Elsayed, Murat Ozer

    Abstract: The world is still overwhelmed by the spread of the COVID-19 virus. With over 250 Million infected cases as of November 2021 and affecting 219 countries and territories, the world remains in the pandemic period. Detecting COVID-19 using the deep learning method on CT scan images can play a vital role in assisting medical professionals and decision authorities in controlling the spread of the disea… ▽ More

    Submitted 26 October, 2022; v1 submitted 17 October, 2022; originally announced October 2022.

    Comments: 8 pages, 8 figures, under reviewing process

  24. arXiv:2209.04427  [pdf, other

    cs.AR cs.ET cs.LG eess.SP

    Zydeco-Style Spike Sorting Low Power VLSI Architecture for IoT BCI Implants

    Authors: Zag ElSayed, Murat Ozer, Nelly Elsayed, Magdy Bayoumi

    Abstract: Brain Computer Interface (BCI) has great potential for solving many brain signal analysis limitations, mental disorder resolutions, and restoring missing limb functionality via neural-controlled implants. However, there is no single available, and safe implant for daily life usage exists yet. Most of the proposed implants have several implementation issues, such as infection hazards and heat dissi… ▽ More

    Submitted 29 October, 2022; v1 submitted 31 August, 2022; originally announced September 2022.

    Comments: 6 pages, 7 Figures

  25. arXiv:2208.12812  [pdf, other

    eess.AS cs.HC cs.LG cs.SD

    Speech Emotion Recognition using Supervised Deep Recurrent System for Mental Health Monitoring

    Authors: Nelly Elsayed, Zag ElSayed, Navid Asadizanjani, Murat Ozer, Ahmed Abdelgawad, Magdy Bayoumi

    Abstract: Understanding human behavior and monitoring mental health are essential to maintaining the community and society's safety. As there has been an increase in mental health problems during the COVID-19 pandemic due to uncontrolled mental health, early detection of mental issues is crucial. Nowadays, the usage of Intelligent Virtual Personal Assistants (IVA) has increased worldwide. Individuals use th… ▽ More

    Submitted 26 October, 2022; v1 submitted 25 August, 2022; originally announced August 2022.

    Comments: 6 pages, 5 figures, 3 tables, accepted in the IEEE WFIoT2022

  26. arXiv:2208.09588  [pdf, other

    cs.CV cs.AI cs.CY

    Review on Action Recognition for Accident Detection in Smart City Transportation Systems

    Authors: Victor Adewopo, Nelly Elsayed, Zag ElSayed, Murat Ozer, Ahmed Abdelgawad, Magdy Bayoumi

    Abstract: Action detection and public traffic safety are crucial aspects of a safe community and a better society. Monitoring traffic flows in a smart city using different surveillance cameras can play a significant role in recognizing accidents and alerting first responders. The utilization of action recognition (AR) in computer vision tasks has contributed towards high-precision applications in video surv… ▽ More

    Submitted 19 August, 2022; originally announced August 2022.

    Comments: 16 pages

  27. Vision-Based American Sign Language Classification Approach via Deep Learning

    Authors: Nelly Elsayed, Zag ElSayed, Anthony S. Maida

    Abstract: Hearing-impaired is the disability of partial or total hearing loss that causes a significant problem for communication with other people in society. American Sign Language (ASL) is one of the sign languages that most commonly used language used by Hearing impaired communities to communicate with each other. In this paper, we proposed a simple deep learning model that aims to classify the American… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

    Comments: 4 pages, Accepted in the The Florida AI Research Society (FLAIRS-35) 2022

  28. arXiv:2203.03175  [pdf, other

    cs.CR

    The Dangerous Combo: Fileless Malware and Cryptojacking

    Authors: Said Varlioglu, Nelly Elsayed, Zag ElSayed, Murat Ozer

    Abstract: Fileless malware and cryptojacking attacks have appeared independently as the new alarming threats in 2017. After 2020, fileless attacks have been devastating for victim organizations with low-observable characteristics. Also, the amount of unauthorized cryptocurrency mining has increased after 2019. Adversaries have started to merge these two different cyberattacks to gain more invisibility and p… ▽ More

    Submitted 9 March, 2022; v1 submitted 7 March, 2022; originally announced March 2022.

    Comments: 9 Pages - Accepted to be published in SoutheastCon 2022 IEEE Region 3 Technical, Professional, and Student Conference. Mobile, Alabama, USA. Mar 31st to Apr 03rd 2022. https://ieeesoutheastcon.org/

  29. arXiv:2202.11216  [pdf, other

    cs.LG

    Early Stage Diabetes Prediction via Extreme Learning Machine

    Authors: Nelly Elsayed, Zag ElSayed, Murat Ozer

    Abstract: Diabetes is one of the chronic diseases that has been discovered for decades. However, several cases are diagnosed in their late stages. Every one in eleven of the world's adult population has diabetes. Forty-six percent of people with diabetes have not been diagnosed. Diabetes can develop several other severe diseases that can lead to patient death. Develo** and rural areas suffer the most due… ▽ More

    Submitted 22 February, 2022; originally announced February 2022.

    Comments: Accepted in IEEE Southeast Con. 2022

  30. arXiv:2202.01448  [pdf, other

    cs.CR cs.CY cs.LG

    Deep Learning Algorithm for Threat Detection in Hackers Forum (Deep Web)

    Authors: Victor Adewopo, Bilal Gonen, Nelly Elsayed, Murat Ozer, Zaghloul Saad Elsayed

    Abstract: In our current society, the inter-connectivity of devices provides easy access for netizens to utilize cyberspace technology for illegal activities. The deep web platform is a consummative ecosystem shielded by boundaries of trust, information sharing, trade-off, and review systems. Domain knowledge is shared among experts in hacker's forums which contain indicators of compromise that can be explo… ▽ More

    Submitted 3 February, 2022; originally announced February 2022.

    Comments: 9 pages, 5 figures. Preprint

  31. arXiv:2201.11624  [pdf, other

    cs.LG cs.AI

    LiteLSTM Architecture for Deep Recurrent Neural Networks

    Authors: Nelly Elsayed, Zag ElSayed, Anthony S. Maida

    Abstract: Long short-term memory (LSTM) is a robust recurrent neural network architecture for learning spatiotemporal sequential data. However, it requires significant computational power for learning and implementing from both software and hardware aspects. This paper proposes a novel LiteLSTM architecture based on reducing the computation components of the LSTM using the weights sharing concept to reduce… ▽ More

    Submitted 24 October, 2022; v1 submitted 27 January, 2022; originally announced January 2022.

    Comments: Accepted in the IEEE International Symposium on Circuits and Systems (ISCAS) 2022

  32. arXiv:2111.00582  [pdf, other

    cs.CR

    Data Breaches in Healthcare Security Systems

    Authors: Jahnavi Reddy, Nelly Elsayed, Zag ElSayed, Murat Ozer

    Abstract: Providing security to Health Information is considered to be the topmost priority when compared to any other field. After the digitalization of the patient's records in the medical field, the healthcare/medical field has become a victim of several internal and external cyberattacks. Data breaches in the healthcare industry have been increasing rapidly. Despite having security standards such as HIP… ▽ More

    Submitted 30 August, 2022; v1 submitted 31 October, 2021; originally announced November 2021.

    Comments: 7 pages, 4 figures, under reviewing process

  33. arXiv:2106.00834  [pdf, other

    cs.NI cs.CR

    Autonomous Low Power IoT System Architecture for Cybersecurity Monitoring

    Authors: Zag ElSayed, Nelly Elsayed, Chengcheng Li, Magdy Bayoumi

    Abstract: Network security morning (NSM) is essential for any cybersecurity system, where the average cost of a cyber attack is 1.1 million. No matter how secure a system, it will eventually fail without proper and continuous monitoring. No wonder that the cybersecurity market is expected to grow up to $170.4 billion in 2022. However, the majority of legacy industries do not invest in NSM implementation unt… ▽ More

    Submitted 29 October, 2022; v1 submitted 1 June, 2021; originally announced June 2021.

    Comments: Cybersecurity, IoT, NSM, packet capture, sensor, green systems, oil and gas, Network Security Monitoring. Accepted in IEEE WF-IoT 2022

  34. A Review of Network Evolution Towards a Smart Connected World

    Authors: Olivia Haring, Sylvia Worlali Azumah, Nelly Elsayed

    Abstract: With the rapid innovations in technology, wireless internet-connected devices are more ubiquitous than ever and can be found in virtually every aspect of both our personal and professional lives. In this paper, we propose a comprehensive literature review that focuses on various network components that create connectivity among different devices, specifically Wireless Sensor Networks (WSNs), Radio… ▽ More

    Submitted 28 May, 2021; originally announced May 2021.

    Comments: This material is based upon work supported by the National Science Foundation under Grant No. (CNS-1801593). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation

    Journal ref: Volume 183- Number 5, 2021

  35. arXiv:2105.12096  [pdf, other

    cs.LG cs.NI

    Intrusion Detection System in Smart Home Network Using Bidirectional LSTM and Convolutional Neural Networks Hybrid Model

    Authors: Nelly Elsayed, Zaghloul Saad Zaghloul, Sylvia Worlali Azumah, Chengcheng Li

    Abstract: Internet of Things (IoT) allowed smart homes to improve the quality and the comfort of our daily lives. However, these conveniences introduced several security concerns that increase rapidly. IoT devices, smart home hubs, and gateway raise various security risks. The smart home gateways act as a centralized point of communication between the IoT devices, which can create a backdoor into network da… ▽ More

    Submitted 26 May, 2021; v1 submitted 25 May, 2021; originally announced May 2021.

    Comments: 4 pages, 6 figures, Accepted in the MWSCAS 2021. This material is based upon work supported by the National Science Foundation under Grant No. (CNS-1801593). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation

  36. A Rule-Based Model for Victim Prediction

    Authors: Murat Ozer, Nelly Elsayed, Said Varlioglu, Chengcheng Li, Niyazi Ekici

    Abstract: In this paper, we proposed a novel automated model, called Vulnerability Index for Population at Risk (VIPAR) scores, to identify rare populations for their future shooting victimizations. Likewise, the focused deterrence approach identifies vulnerable individuals and offers certain types of treatments (e.g., outreach services) to prevent violence in communities. The proposed rule-based engine mod… ▽ More

    Submitted 7 March, 2022; v1 submitted 5 January, 2020; originally announced January 2020.

  37. Deep Gated Recurrent and Convolutional Network Hybrid Model for Univariate Time Series Classification

    Authors: Nelly Elsayed, Anthony S. Maida, Magdy Bayoumi

    Abstract: Hybrid LSTM-fully convolutional networks (LSTM-FCN) for time series classification have produced state-of-the-art classification results on univariate time series. We show that replacing the LSTM with a gated recurrent unit (GRU) to create a GRU-fully convolutional network hybrid model (GRU-FCN) can offer even better performance on many time series datasets. The proposed GRU-FCN model outperforms… ▽ More

    Submitted 19 February, 2019; v1 submitted 18 December, 2018; originally announced December 2018.

    Comments: The paper modified and has several new results

    Journal ref: International Journal of Advanced Computer Science and Applications (IJACSA), 10(5), 2019

  38. arXiv:1810.07251  [pdf, other

    cs.LG cs.CV stat.ML

    Reduced-Gate Convolutional LSTM Using Predictive Coding for Spatiotemporal Prediction

    Authors: Nelly Elsayed, Anthony S. Maida, Magdy Bayoumi

    Abstract: Spatiotemporal sequence prediction is an important problem in deep learning. We study next-frame(s) video prediction using a deep-learning-based predictive coding framework that uses convolutional, long short-term memory (convLSTM) modules. We introduce a novel reduced-gate convolutional LSTM(rgcLSTM) architecture that requires a significantly lower parameter budget than a comparable convLSTM. By… ▽ More

    Submitted 22 December, 2019; v1 submitted 16 October, 2018; originally announced October 2018.

    Comments: A novel rgcLSTM model for spatiotemporal prediction. This version contains the full description and detailed empirical study of the rgcLSTM architecture. 28 pages, 12 figures, 20 tables

    Report number: COIN12277