Skip to main content

Showing 1–50 of 93 results for author: Jurdak, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.03918  [pdf, other

    cs.LG cs.CR

    Unlearning Backdoor Attacks through Gradient-Based Model Pruning

    Authors: Kealan Dunnett, Reza Arablouei, Dimity Miller, Volkan Dedeoglu, Raja Jurdak

    Abstract: In the era of increasing concerns over cybersecurity threats, defending against backdoor attacks is paramount in ensuring the integrity and reliability of machine learning models. However, many existing approaches require substantial amounts of data for effective mitigation, posing significant challenges in practical deployment. To address this, we propose a novel approach to counter backdoor atta… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  2. arXiv:2401.17538  [pdf, other

    cs.CR

    Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization

    Authors: Tao Liu, Gowri Ramachandran, Raja Jurdak

    Abstract: Due to recent development in quantum computing, the invention of a large quantum computer is no longer a distant future. Quantum computing severely threatens modern cryptography, as the hard mathematical problems beneath classic public-key cryptosystems can be solved easily by a sufficiently large quantum computer. As such, researchers have proposed PQC based on problems that even quantum computer… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

    Comments: 13 pages, 3 figures and 7 tables. Formatted version submitted to ACM Computer Surveys

  3. arXiv:2305.11413  [pdf, other

    cs.SD eess.AS

    A Preliminary Study on Augmenting Speech Emotion Recognition using a Diffusion Model

    Authors: Ibrahim Malik, Siddique Latif, Raja Jurdak, Björn Schuller

    Abstract: In this paper, we propose to utilise diffusion models for data augmentation in speech emotion recognition (SER). In particular, we present an effective approach to utilise improved denoising diffusion probabilistic models (IDDPM) to generate synthetic emotional data. We condition the IDDPM with the textual embedding from bidirectional encoder representations from transformers (BERT) to generate hi… ▽ More

    Submitted 18 May, 2023; originally announced May 2023.

    Comments: Accepted Interspeech 2023

  4. arXiv:2305.00725  [pdf, other

    cs.SD eess.AS

    Emotions Beyond Words: Non-Speech Audio Emotion Recognition With Edge Computing

    Authors: Ibrahim Malik, Siddique Latif, Sanaullah Manzoor, Muhammad Usama, Junaid Qadir, Raja Jurdak

    Abstract: Non-speech emotion recognition has a wide range of applications including healthcare, crime control and rescue, and entertainment, to name a few. Providing these applications using edge computing has great potential, however, recent studies are focused on speech-emotion recognition using complex architectures. In this paper, a non-speech-based emotion recognition system is proposed, which can rely… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: Under review

  5. arXiv:2212.09064  [pdf, other

    cs.CR cs.DC

    PlexiChain: A Secure Blockchain-based Flexibility Aggregator Framework

    Authors: Samuel Karumba, Salil S. Kanhere, Raja Jurdak, Subbu Sethuvenkatraman

    Abstract: Flexible resources in built environments are seen as a low-cost opportunity for delivering grid management services. Consequently, the centralised aggregator model, where the aggregator is used to bundle demand flexibility from flexible resources and deliver it to flexibility customers such as Distributed/Transmission System Operator (DSO/TSO) in flexibility markets, has been adopted. However, the… ▽ More

    Submitted 18 December, 2022; originally announced December 2022.

    Comments: 10 pages, 8 figure

  6. arXiv:2212.04658  [pdf, other

    cs.CR cs.NI

    Trust and Reputation Management for Blockchain-enabled IoT

    Authors: Guntur Dharma Putra, Sidra Malik, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak

    Abstract: In recent years, there has been an increasing interest in incorporating blockchain for the Internet of Things (IoT) to address the inherent issues of IoT, such as single point of failure and data silos. However, blockchain alone cannot ascertain the authenticity and veracity of the data coming from IoT devices. The append-only nature of blockchain exacerbates this issue, as it would not be possibl… ▽ More

    Submitted 8 December, 2022; originally announced December 2022.

    Comments: COMSNETS 2023 Invited Paper

  7. arXiv:2208.12031  [pdf, other

    cs.CR cs.DC

    A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain

    Authors: Kealan Dunnett, Shantanu Pal, Guntur Dharma Putra, Zahra Jadidi, Raja Jurdak

    Abstract: Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical threats that help mitigate potential cyber attacks. The rapid evolution of the current threat landscape has seen many organisations share CTI to strengthen their security posture for mutual benefit. However, in many cases, CTI data contains attributes (e.g., software versions) that have the potential to leak sensitive informati… ▽ More

    Submitted 25 August, 2022; originally announced August 2022.

  8. arXiv:2208.07562  [pdf, other

    cs.NI

    Towards Blockchain-based Trust and Reputation Management for Trustworthy 6G Networks

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak

    Abstract: 6G is envisioned to enable futuristic technologies, which exhibit more complexities than the previous generations, as it aims to bring connectivity to a large number of devices, many of which may not be trustworthy. Proper authentication can protect the network from unauthorized adversaries. However, it cannot guarantee in situ reliability and trustworthiness of authorized network nodes, as they c… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

    Comments: Accepted for publication in the IEEE Network Magazine

  9. arXiv:2207.05298  [pdf, other

    cs.SD eess.AS

    Multitask Learning from Augmented Auxiliary Data for Improving Speech Emotion Recognition

    Authors: Siddique Latif, Rajib Rana, Sara Khalifa, Raja Jurdak, Björn W. Schuller

    Abstract: Despite the recent progress in speech emotion recognition (SER), state-of-the-art systems lack generalisation across different conditions. A key underlying reason for poor generalisation is the scarcity of emotion datasets, which is a significant roadblock to designing robust machine learning (ML) models. Recent works in SER focus on utilising multitask learning (MTL) methods to improve generalisa… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

    Comments: Under review IEEE Transactions on Affective Computing

  10. arXiv:2204.08625  [pdf, other

    cs.SD eess.AS

    Self Supervised Adversarial Domain Adaptation for Cross-Corpus and Cross-Language Speech Emotion Recognition

    Authors: Siddique Latif, Rajib Rana, Sara Khalifa, Raja Jurdak, Björn Schuller

    Abstract: Despite the recent advancement in speech emotion recognition (SER) within a single corpus setting, the performance of these SER systems degrades significantly for cross-corpus and cross-language scenarios. The key reason is the lack of generalisation in SER systems towards unseen conditions, which causes them to perform poorly in cross-corpus and cross-language settings. Recent studies focus on ut… ▽ More

    Submitted 18 April, 2022; originally announced April 2022.

    Comments: Accepted in IEEE Transactions on Affective Computing

  11. arXiv:2203.07662  [pdf, other

    cs.CV cs.AI cs.LG cs.RO

    What's in the Black Box? The False Negative Mechanisms Inside Object Detectors

    Authors: Dimity Miller, Peyman Moghadam, Mark Cox, Matt Wildie, Raja Jurdak

    Abstract: In object detection, false negatives arise when a detector fails to detect a target object. To understand why object detectors produce false negatives, we identify five 'false negative mechanisms', where each mechanism describes how a specific component inside the detector architecture failed. Focusing on two-stage and one-stage anchor-box object detector architectures, we introduce a framework fo… ▽ More

    Submitted 31 July, 2022; v1 submitted 15 March, 2022; originally announced March 2022.

    Comments: 8 pages, 5 figures. Contact emails: [email protected], [email protected], [email protected], [email protected], [email protected]

    Journal ref: IEEE Robotics and Automation Letters (July 2022), Volume 7, Issue 3, pages 8510-8517

  12. Security Attacks and Solutions for Digital Twins

    Authors: Sabah Suhail, Raja Jurdak, Rasheed Hussain

    Abstract: Digital twins, being the virtual replicas of their physical counterparts, share valuable knowledge of the underlying system. Therefore, they might become a potential source of data breaches and a playground for attackers to launch covert attacks. It is imperative to investigate necessary countermeasures to mitigate such attacks.

    Submitted 11 May, 2023; v1 submitted 25 February, 2022; originally announced February 2022.

    Comments: 7 pages, 1 figure

    Journal ref: Computers in Industry, Volume 151, July 2023

  13. arXiv:2202.09603  [pdf, other

    cs.CR cs.DC

    Device Identification in Blockchain-Based Internet of Things

    Authors: Ali Dorri, Clemence Roulin, Shantanu Pal, Sarah Baalbaki, Raja Jurdak, Salil Kanhere

    Abstract: In recent years blockchain technology has received tremendous attention. Blockchain users are known by a changeable Public Key (PK) that introduces a level of anonymity, however, studies have shown that anonymized transactions can be linked to deanonymize the users. Most of the existing studies on user de-anonymization focus on monetary applications, however, blockchain has received extensive atte… ▽ More

    Submitted 19 February, 2022; originally announced February 2022.

    Comments: arXiv admin note: text overlap with arXiv:1812.08970

  14. Towards Situational Aware Cyber-Physical Systems: A Security-Enhancing Use Case of Blockchain-based Digital Twins

    Authors: Sabah Suhail, Saif Ur Rehman Malik, Raja Jurdak, Rasheed Hussain, Raimundas Matulevičius, Davor Svetinovic

    Abstract: The complexity of cyberattacks in Cyber-Physical Systems (CPSs) calls for a mechanism that can evaluate critical infrastructures' operational behaviour and security without affecting the operation of live systems. In this regard, Digital Twins (DTs) provide actionable insights through monitoring, simulating, predicting, and optimizing the state of CPSs. Through the use cases, including system test… ▽ More

    Submitted 3 May, 2022; v1 submitted 19 January, 2022; originally announced January 2022.

    Comments: 39 pages, 10 figures

    Journal ref: Computers in Industry, Volume 141, October 2022, 103699

  15. arXiv:2112.13956  [pdf, other

    cs.CR

    A Blockchain-based Data Governance Framework with Privacy Protection and Provenance for e-Prescription

    Authors: Rodrigo Dutra Garcia, Gowri Sankar Ramachandran, Raja Jurdak, Jo Ueyama

    Abstract: Real-world applications in healthcare and supply chain domains produce, exchange, and share data in a multi-stakeholder environment. Data owners want to control their data and privacy in such settings. On the other hand, data consumers demand methods to understand when, how, and who produced the data. These requirements necessitate data governance frameworks that guarantee data provenance, privacy… ▽ More

    Submitted 27 December, 2021; originally announced December 2021.

  16. arXiv:2112.00262  [pdf, other

    cs.CR cs.DC

    A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS

    Authors: Kathy Nguyen, Shantanu Pal, Zahra Jadidi, Ali Dorri, Raja Jurdak

    Abstract: In recent years Industrial Control Systems (ICS) have been targeted increasingly by sophisticated cyberattacks. Improving ICS security has drawn significant attention in the literature that emphasises the importance of Cyber Threat Intelligence (CTI) sharing in accelerating detection, mitigation, and prevention of cyberattacks. However, organisations are reluctant to exchange CTI due to fear of ex… ▽ More

    Submitted 30 November, 2021; originally announced December 2021.

  17. Decentralised Trustworthy Collaborative Intrusion Detection System for IoT

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Abhinav Pathak, Salil S. Kanhere, Raja Jurdak

    Abstract: Intrusion Detection Systems (IDS) have been the industry standard for securing IoT networks against known attacks. To increase the capability of an IDS, researchers proposed the concept of blockchain-based Collaborative-IDS (CIDS), wherein blockchain acts as a decentralised platform allowing collaboration between CIDS nodes to share intrusion related information, such as intrusion alarms and detec… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

    Comments: 8 pages, 7 figures, accepted to IEEE Blockchain 2021

  18. Exploring Deep Neural Networks on Edge TPU

    Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Brano Kusy, Raja Jurdak, Marius Portmann

    Abstract: This paper explores the performance of Google's Edge TPU on feed forward neural networks. We consider Edge TPU as a hardware platform and explore different architectures of deep neural network classifiers, which traditionally has been a challenge to run on resource constrained edge devices. Based on the use of a joint-time-frequency data representation, also known as spectrogram, we explore the tr… ▽ More

    Submitted 20 October, 2021; v1 submitted 17 October, 2021; originally announced October 2021.

    Comments: 12 pages, 16 figures

    Journal ref: Internet of Things, Volume 22, July 2023, 100749

  19. arXiv:2109.07721  [pdf, other

    cs.CR cs.DC

    Blockchain for Trust and Reputation Management in Cyber-physical Systems

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak

    Abstract: The salient features of blockchain, such as decentralisation and transparency, have allowed the development of Decentralised Trust and Reputation Management Systems (DTRMS), which mainly aim to quantitatively assess the trustworthiness of the network participants and help to protect the network from adversaries. In the literature, proposals of DTRMS have been applied to various Cyber-physical Syst… ▽ More

    Submitted 16 September, 2021; originally announced September 2021.

    Comments: 17 pages, 4 figures

  20. arXiv:2108.12032  [pdf, other

    cs.CR

    Blockchain in Supply Chain: Opportunities and Design Considerations

    Authors: Gowri Sankar Ramachandran, Sidra Malik, Shantanu Pal, Ali Dorri, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak

    Abstract: Supply chain applications operate in a multi-stakeholder setting, demanding trust, provenance, and transparency. Blockchain technology provides mechanisms to establish a decentralized infrastructure involving multiple stakeholders. Such mechanisms make the blockchain technology ideal for multi-stakeholder supply chain applications. This chapter introduces the characteristics and requirements of th… ▽ More

    Submitted 26 August, 2021; originally announced August 2021.

  21. arXiv:2106.04808  [pdf, other

    cs.DC cs.CR

    Blockchain for IoT Access Control: Recent Trends and Future Research Directions

    Authors: Shantanu Pal, Ali Dorri, Raja Jurdak

    Abstract: With the rapid development of wireless sensor networks, smart devices, and traditional information and communication technologies, there is tremendous growth in the use of Internet of Things (IoT) applications and services in our everyday life. IoT systems deal with high volumes of data. This data can be particularly sensitive, as it may include health, financial, location, and other highly person… ▽ More

    Submitted 9 June, 2021; originally announced June 2021.

  22. arXiv:2105.12279  [pdf, other

    cs.CR

    Vericom: A Verification and Communication Architecture for IoT-based Blockchain

    Authors: Ali Dorri, Shailesh Mishra, Raja Jurdak

    Abstract: Blockchain has received tremendous attention as a secure, distributed, and anonymous framework for the Internet of Things (IoT). As a distributed system, blockchain trades off scalability for distribution, which limits the technologys adaptation for large scale networks such as IoT. All transactions and blocks must be broadcast and verified by all participants which limits scalability and incurs c… ▽ More

    Submitted 25 May, 2021; originally announced May 2021.

  23. arXiv:2105.11217  [pdf, other

    cs.CR

    TradeChain: Decoupling Traceability and Identity inBlockchain enabled Supply Chains

    Authors: Sidra Malik, Naman Gupta, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak

    Abstract: In this work, we propose a privacy-preservation framework, TradeChain, which decouples the trade events of participants using decentralised identities. TradeChain adopts the Self-Sovereign Identity (SSI) principles and makes the following novel contributions: a) it incorporates two separate ledgers: a public permissioned blockchain for maintaining identities and the permissioned blockchain for rec… ▽ More

    Submitted 24 May, 2021; originally announced May 2021.

  24. arXiv:2105.08886  [pdf, other

    cs.CR

    Towards Trusted and Intelligent Cyber-Physical Systems: A Security-by-Design Approach

    Authors: Sabah Suhail, Raja Jurdak

    Abstract: The complexity of cyberattacks in Cyber-Physical Systems (CPSs) calls for a mechanism that can evaluate the operational behaviour and security without negatively affecting the operation of live systems. In this regard, Digital Twins (DTs) are revolutionizing the CPSs. DTs strengthen the security of CPSs throughout the product lifecycle, while assuming that the DT data is trusted, providing agility… ▽ More

    Submitted 2 May, 2022; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: 9 pages, 4 figures

  25. arXiv:2104.13964  [pdf, other

    cs.CR

    PrivChain: Provenance and Privacy Preservation in Blockchain enabled Supply Chains

    Authors: Sidra Malik, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak

    Abstract: Blockchain offers traceability and transparency to supply chain event data and hence can help overcome many challenges in supply chain management such as: data integrity, provenance and traceability. However, data privacy concerns such as the protection of trade secrets have hindered adoption of blockchain technology. Although consortium blockchains only allow authorised supply chain entities to r… ▽ More

    Submitted 27 April, 2021; originally announced April 2021.

  26. arXiv:2104.12878  [pdf

    cs.CR cs.NI

    Security, Privacy and Trust: Cognitive Internet of Vehicles

    Authors: Khondokar Fida Hasan, Anthony Overall, Keyvan Ansari, Gowri Ramachandran, Raja Jurdak

    Abstract: The recent advancement of cloud technology offers unparallel strength to support intelligent computations and advanced services to assist with automated decisions to improve road transportation safety and comfort. Besides, the rise of machine intelligence propels the technological evolution of transportation systems one step further and leads to a new framework known as Cognitive Internet of Vehic… ▽ More

    Submitted 26 April, 2021; originally announced April 2021.

    Comments: 19 pages, book chapter

  27. arXiv:2104.00832  [pdf, other

    cs.CR

    Trust-based Blockchain Authorization for IoT

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak, Aleksandar Ignjatovic

    Abstract: Authorization or access control limits the actions a user may perform on a computer system, based on predetermined access control policies, thus preventing access by illegitimate actors. Access control for the Internet of Things (IoT) should be tailored to take inherent IoT network scale and device resource constraints into consideration. However, common authorization systems in IoT employ convent… ▽ More

    Submitted 1 April, 2021; originally announced April 2021.

    Comments: 12 pages, 10 figures, submitted to IEEE Transactions on Network and Service Management

  28. arXiv:2103.16295  [pdf, other

    cs.NI cs.AI cs.CR cs.LG

    Exploring Edge TPU for Network Intrusion Detection in IoT

    Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann

    Abstract: This paper explores Google's Edge TPU for implementing a practical network intrusion detection system (NIDS) at the edge of IoT, based on a deep learning approach. While there are a significant number of related works that explore machine learning based NIDS for the IoT edge, they generally do not consider the issue of the required computational and energy resources. The focus of this paper is the… ▽ More

    Submitted 30 March, 2021; originally announced March 2021.

    Comments: 22 pages, 11 figures

  29. Blockchain-based Digital Twins: Research Trends, Issues, and Future Challenges

    Authors: Sabah Suhail, Rasheed Hussain, Raja Jurdak, Alma Oracevic, Khaled Salah, Raimundas Matulevičius, Choong Seon Hong

    Abstract: Industrial processes rely on sensory data for decision-making processes, risk assessment, and performance evaluation. Extracting actionable insights from the collected data calls for an infrastructure that can ensure the dissemination of trustworthy data. For the physical data to be trustworthy, it needs to be cross-validated through multiple sensor sources with overlap** fields of view. Cross-v… ▽ More

    Submitted 6 September, 2021; v1 submitted 22 March, 2021; originally announced March 2021.

    Comments: 30 pages, 10 figures, 3 tables

    Journal ref: ACM Computing Surveys, Volume 54, 2022

  30. arXiv:2103.01957  [pdf

    cs.SI physics.soc-ph

    COVID-19 vaccination strategies on dynamic networks

    Authors: Quoc Huy Nguyen, Jessica Liebig, Md Shahzamal, Bernard Mans, Raja Jurdak

    Abstract: Coronavirus disease (COVID-19), which was caused by SARS-CoV-2, has become a global public health concern. A great proportion of the world needs to be vaccinated in order to stop the rapid spread of the disease. In addition to prioritising vulnerable sections of the population to receive the vaccine, an ideal degree-based vaccination strategy uses fine-grained contact networks to prioritise vaccin… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

    Comments: 8 pages, 3 Figures

  31. Deep Learning-based Cattle Activity Classification Using Joint Time-frequency Data Representation

    Authors: Seyedeh Faezeh Hosseini Noorbin, Siamak Layeghy, Brano Kusy, Raja Jurdak, Greg Bishop-hurley, Marius Portmann

    Abstract: Automated cattle activity classification allows herders to continuously monitor the health and well-being of livestock, resulting in increased quality and quantity of beef and dairy products. In this paper, a sequential deep neural network is used to develop a behavioural model and to classify cattle behaviour and activities. The key focus of this paper is the exploration of a joint time-frequency… ▽ More

    Submitted 6 November, 2020; originally announced November 2020.

    Comments: 22 pages, 17 figures

  32. Trustworthy Digital Twins in the Industrial Internet of Things with Blockchain

    Authors: Sabah Suhail, Rasheed Hussain, Raja Jurdak, Choong Seon Hong

    Abstract: Industrial processes rely on sensory data for critical decision-making processes. Extracting actionable insights from the collected data calls for an infrastructure that can ensure the trustworthiness of data. To this end, we envision a blockchain-based framework for the Industrial Internet of Things (IIoT) to address the issues of data management and security. Once the data collected from trustwo… ▽ More

    Submitted 23 October, 2020; originally announced October 2020.

    Journal ref: IEEE Internet Computing, 26, 2022, 58-67

  33. arXiv:2010.07493  [pdf, other

    cs.CR

    Securing Manufacturing Using Blockchain

    Authors: Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin Fidge

    Abstract: Due to the rise of Industrial Control Systems (ICSs) cyber-attacks in the recent decade, various security frameworks have been designed for anomaly detection. While advanced ICS attacks use sequential phases to launch their final attacks, existing anomaly detection methods can only monitor a single source of data. Therefore, analysis of multiple security data can provide comprehensive and system-w… ▽ More

    Submitted 14 October, 2020; originally announced October 2020.

  34. A Model for Reliable Uplink Transmissions in LoRaWAN

    Authors: Furqan Hameed Khan, Raja Jurdak, Marius Portmann

    Abstract: Long range wide area networks (LoRaWAN) technology provides a simple solution to enable low-cost services for low power internet-of-things (IoT) networks in various applications. The current evaluation of LoRaWAN networks relies on simulations or early testing, which are typically time consuming and prevent effective exploration of the design space. This paper proposes an analytical model to calcu… ▽ More

    Submitted 20 September, 2020; originally announced September 2020.

    Comments: 11 pages, 8 figures

    Journal ref: Marius (2019) 147-156

  35. arXiv:2007.10528  [pdf, other

    cs.CR cs.DC

    B-FERL: Blockchain based Framework for Securing Smart Vehicles

    Authors: Chuka Oham, Regio Michelin, Salil S. Kanhere, Raja Jurdak, Sanjay Jha

    Abstract: The ubiquity of connecting technologies in smart vehicles and the incremental automation of its functionalities promise significant benefits, including a significant decline in congestion and road fatalities. However, increasing automation and connectedness broadens the attack surface and heightens the likelihood of a malicious entity successfully executing an attack. In this paper, we propose a B… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

    Comments: 11 Pages, 8 Figures

  36. arXiv:2005.14520  [pdf, other

    cs.CR

    Lightweight Blockchain Framework for Location-aware Peer-to-Peer Energy Trading

    Authors: Mohsen Khorasany, Ali Dorri, Reza Razzaghi, Raja Jurdak

    Abstract: Peer-to-Peer (P2P) energy trading can facilitate integration of a large number of small-scale producers and consumers into energy markets. Decentralized management of these new market participants is challenging in terms of market settlement, participant reputation and consideration of grid constraints. This paper proposes a blockchain-enabled framework for P2P energy trading among producer and co… ▽ More

    Submitted 21 May, 2020; originally announced May 2020.

  37. arXiv:2005.09443  [pdf, other

    cs.CR

    Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications

    Authors: Ali Dorri, Raja Jurdak

    Abstract: Blockchain has received tremendous attention in non-monetary applications including the Internet of Things (IoT) due to its salient features including decentralization, security, auditability, and anonymity. Most conventional blockchains rely on computationally expensive consensus algorithms, have limited throughput, and high transaction delays. In this paper, we propose tree-chain a scalable fast… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

  38. arXiv:2005.08453  [pdf, other

    cs.SD eess.AS

    Deep Architecture Enhancing Robustness to Noise, Adversarial Attacks, and Cross-corpus Setting for Speech Emotion Recognition

    Authors: Siddique Latif, Rajib Rana, Sara Khalifa, Raja Jurdak, Björn W. Schuller

    Abstract: Speech emotion recognition systems (SER) can achieve high accuracy when the training and test data are identically distributed, but this assumption is frequently violated in practice and the performance of SER systems plummet against unforeseen data shifts. The design of robust models for accurate SER is challenging, which limits its use in practical applications. In this paper we propose a deeper… ▽ More

    Submitted 25 July, 2020; v1 submitted 18 May, 2020; originally announced May 2020.

    Comments: Accepted in INTERSPEECH 2020

  39. arXiv:2005.08447  [pdf, other

    cs.SD eess.AS

    Augmenting Generative Adversarial Networks for Speech Emotion Recognition

    Authors: Siddique Latif, Muhammad Asim, Rajib Rana, Sara Khalifa, Raja Jurdak, Björn W. Schuller

    Abstract: Generative adversarial networks (GANs) have shown potential in learning emotional attributes and generating new data samples. However, their performance is usually hindered by the unavailability of larger speech emotion recognition (SER) data. In this work, we propose a framework that utilises the mixup data augmentation scheme to augment the GAN in feature learning and generation. To show the eff… ▽ More

    Submitted 25 July, 2020; v1 submitted 18 May, 2020; originally announced May 2020.

    Comments: Accepted in INTERSPEECH 2020

  40. arXiv:2004.05725  [pdf, other

    cs.SI physics.soc-ph q-bio.PE

    Vaccination strategies on dynamic networks with indirect transmission links and limited contact information

    Authors: Md Shahzamal, Raja Jurdak, Bernard Mans, Frank de Hoog, Dean Paini

    Abstract: Infectious diseases are still a major global burden for modern society causing 13 million deaths annually. One way to reduce the morbidity and mortality rates from infectious diseases is through preventative or targeted vaccinations. Current vaccination strategies, however, rely on the highly specific individual contact information that is difficult and costly to obtain, in order to identify influ… ▽ More

    Submitted 12 April, 2020; originally announced April 2020.

  41. arXiv:2004.01581  [pdf, other

    cs.SI physics.soc-ph q-bio.PE

    Identifying highly influential travellers for spreading disease on a public transport system

    Authors: Ahmad El Shoghri, Jessica Liebig, Raja Jurdak, Lauren Gardner, Salil S. Kanhere

    Abstract: The recent outbreak of a novel coronavirus and its rapid spread underlines the importance of understanding human mobility. Enclosed spaces, such as public transport vehicles (e.g. buses and trains), offer a suitable environment for infections to spread widely and quickly. Investigating the movement patterns and the physical encounters of individuals on public transit systems is thus critical to un… ▽ More

    Submitted 3 April, 2020; originally announced April 2020.

    Comments: 10 pages, 10 figures and 1 table. To be published in the 2020 21st IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (IEEE WOWMOM 2020) conference program and the proceedings

  42. arXiv:2004.01466  [pdf, other

    cs.SI physics.soc-ph q-bio.PE

    How mobility patterns drive disease spread: A case study using public transit passenger card travel data

    Authors: Ahmad El Shoghri, Jessica Liebig, Lauren Gardner, Raja Jurdak, Salil Kanhere

    Abstract: Outbreaks of infectious diseases present a global threat to human health and are considered a major health-care challenge. One major driver for the rapid spatial spread of diseases is human mobility. In particular, the travel patterns of individuals determine their spreading potential to a great extent. These travel behaviors can be captured and modelled using novel location-based data sources, e.… ▽ More

    Submitted 3 April, 2020; originally announced April 2020.

    Comments: 6 Pages, 8 figures and 2 tables. Published in: 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)

    Journal ref: 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), Washington, DC, USA, 2019, pp. 1-6

  43. A Trusted and Privacy-preserving Internet of Mobile Energy

    Authors: Raja Jurdak, Ali Dorri, Mahinda Vilathgamuwa

    Abstract: The rapid growth in distributed energy sources on power grids leads to increasingly decentralised energy management systems for the prediction of power supply and demand and the dynamic setting of an energy price signal. Within this emerging smart grid paradigm, electric vehicles can serve as consumers, transporters, and providers of energy through two-way charging stations, which highlights a cri… ▽ More

    Submitted 26 January, 2021; v1 submitted 23 March, 2020; originally announced March 2020.

    Comments: 7 pages, 5 figures

  44. arXiv:2002.07512  [pdf, other

    cs.CR cs.DC

    Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak

    Abstract: An Intrusion Detection System (IDS) aims to alert users of incoming attacks by deploying a detector that monitors network traffic continuously. As an effort to increase detection capabilities, a set of independent IDS detectors typically work collaboratively to build intelligence of holistic network representation, which is referred to as Collaborative Intrusion Detection System (CIDS). However, d… ▽ More

    Submitted 18 February, 2020; originally announced February 2020.

    Comments: Accepted to ACM/IEEE IoTDI 2020

  45. Energy-aware Demand Selection and Allocation for Real-time IoT Data Trading

    Authors: Pooja Gupta, Volkan Dedeoglu, Kamran Najeebullah, Salil S. Kanhere, Raja Jurdak

    Abstract: Personal IoT data is a new economic asset that individuals can trade to generate revenue on the emerging data marketplaces. Typically, marketplaces are centralized systems that raise concerns of privacy, single point of failure, little transparency and involve trusted intermediaries to be fair. Furthermore, the battery-operated IoT devices limit the amount of IoT data to be traded in real-time tha… ▽ More

    Submitted 10 July, 2020; v1 submitted 5 February, 2020; originally announced February 2020.

    Comments: Accepted in SmartComp 2020

  46. arXiv:2001.00378  [pdf, other

    cs.SD cs.LG eess.AS

    Deep Representation Learning in Speech Processing: Challenges, Recent Advances, and Future Trends

    Authors: Siddique Latif, Rajib Rana, Sara Khalifa, Raja Jurdak, Junaid Qadir, Björn W. Schuller

    Abstract: Research on speech processing has traditionally considered the task of designing hand-engineered acoustic features (feature engineering) as a separate distinct problem from the task of designing efficient machine learning (ML) models to make prediction and classification decisions. There are two main drawbacks to this approach: firstly, the feature engineering being manual is cumbersome and requir… ▽ More

    Submitted 24 September, 2021; v1 submitted 2 January, 2020; originally announced January 2020.

    Comments: Part of this work is accepted in IEEE Transactions on Affective Computing 2021. https://ieeexplore.ieee.org/document/9543566

  47. arXiv:1912.10247  [pdf, other

    cs.CR cs.NI

    Trust Management in Decentralized IoT Access Control System

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak

    Abstract: Heterogeneous and dynamic IoT environments require a lightweight, scalable, and trustworthy access control system for protection from unauthorized access and for automated detection of compromised nodes. Recent proposals in IoT access control systems have incorporated blockchain to overcome inherent issues in conventional access control schemes. However, the dynamic interaction of IoT networks rem… ▽ More

    Submitted 9 March, 2020; v1 submitted 21 December, 2019; originally announced December 2019.

    Comments: Accepted to IEEE ICBC 2020

  48. arXiv:1912.01606  [pdf, other

    cs.CR

    A journey in applying blockchain for cyberphysical systems

    Authors: Volkan Dedeoglu, Ali Dorri, Raja Jurdak, Regio A. Michelin, Roben C. Lunardi, Salil S. Kanhere, Avelino F. Zorzo

    Abstract: Cyberphysical Systems (CPS) are transforming the way we interact with the physical world around us. However, centralised approaches for CPS systems are not capable of addressing the unique challenges of CPS due to the complexity, constraints, and dynamic nature of the interactions. To realize the true potential of CPS, a decentralized approach that takes into account these unique features is requi… ▽ More

    Submitted 3 December, 2019; originally announced December 2019.

    Comments: COMSNET 2020

  49. arXiv:1911.03811  [pdf, other

    cs.SI physics.soc-ph

    Generating dynamic contact graphs with indirect links

    Authors: Md Shahzamal, Raja Jurdak, Bernard Mans, Frank De Hoog, Dean Paini

    Abstract: Graph models are widely used to study diffusion processes in contact networks. Recent data-driven research has highlighted the significance of indirect links, where interactions are possible when two nodes visit the same place at different times (SPDT), in determining network structure and diffusion dynamics. However, how to generate dynamic graphs with indirect links for modeling diffusion remain… ▽ More

    Submitted 9 November, 2019; originally announced November 2019.

    Comments: 32 Pages Under review

    MSC Class: 90B15

  50. arXiv:1907.06078  [pdf, other

    cs.SD eess.AS

    Multi-Task Semi-Supervised Adversarial Autoencoding for Speech Emotion Recognition

    Authors: Siddique Latif, Rajib Rana, Sara Khalifa, Raja Jurdak, Julien Epps, Björn W. Schuller

    Abstract: Inspite the emerging importance of Speech Emotion Recognition (SER), the state-of-the-art accuracy is quite low and needs improvement to make commercial applications of SER viable. A key underlying reason for the low accuracy is the scarcity of emotion datasets, which is a challenge for develo** any robust machine learning model in general. In this paper, we propose a solution to this problem: a… ▽ More

    Submitted 22 March, 2020; v1 submitted 13 July, 2019; originally announced July 2019.

    Comments: Accepted in IEEE Transactions on Affective Computing