Skip to main content

Showing 1–42 of 42 results for author: Mustafa, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11012  [pdf, other

    cs.CL cs.AI

    Connecting the Dots: Evaluating Abstract Reasoning Capabilities of LLMs Using the New York Times Connections Word Game

    Authors: Prisha Samadarshi, Mariam Mustafa, Anushka Kulkarni, Raven Rothkopf, Tuhin Chakrabarty, Smaranda Muresan

    Abstract: The New York Times Connections game has emerged as a popular and challenging pursuit for word puzzle enthusiasts. We collect 200 Connections games to evaluate the performance of state-of-the-art large language models (LLMs) against expert and novice human players. Our results show that even the best-performing LLM, GPT-4o, which has otherwise shown impressive reasoning abilities on a wide variety… ▽ More

    Submitted 22 June, 2024; v1 submitted 16 June, 2024; originally announced June 2024.

  2. arXiv:2405.18888  [pdf, other

    eess.SY cs.LG

    Proactive Load-Sha** Strategies with Privacy-Cost Trade-offs in Residential Households based on Deep Reinforcement Learning

    Authors: Ruichang Zhang, Youcheng Sun, Mustafa A. Mustafa

    Abstract: Smart meters play a crucial role in enhancing energy management and efficiency, but they raise significant privacy concerns by potentially revealing detailed user behaviors through energy consumption patterns. Recent scholarly efforts have focused on develo** battery-aided load-sha** techniques to protect user privacy while balancing costs. This paper proposes a novel deep reinforcement learni… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: 7 pages

  3. arXiv:2404.15886  [pdf, other

    cs.CR

    Privacy-Preserving Billing for Local Energy Markets (Long Version)

    Authors: Eman Alqahtani, Mustafa A. Mustafa

    Abstract: We propose a privacy-preserving billing protocol for local energy markets (PBP-LEMs) that takes into account market participants' energy volume deviations from their bids. PBP-LEMs enables a group of market entities to jointly compute participants' bills in a decentralized and privacy-preserving manner without sacrificing correctness. It also mitigates risks on individuals' privacy arising from an… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

  4. arXiv:2402.01546  [pdf, other

    cs.LG cs.AI cs.CR cs.DC cs.MA eess.SY

    Privacy-Preserving Distributed Learning for Residential Short-Term Load Forecasting

    Authors: Yi Dong, Yingjie Wang, Mariana Gama, Mustafa A. Mustafa, Geert Deconinck, Xiaowei Huang

    Abstract: In the realm of power systems, the increasing involvement of residential users in load forecasting applications has heightened concerns about data privacy. Specifically, the load data can inadvertently reveal the daily routines of residential users, thereby posing a risk to their property security. While federated learning (FL) has been employed to safeguard user privacy by enabling model training… ▽ More

    Submitted 2 February, 2024; originally announced February 2024.

  5. arXiv:2307.09618  [pdf, other

    cs.CR cs.GT

    Privacy Preserving Billing in Local Energy Markets with Imperfect Bid-Offer Fulfillment (Long Version)

    Authors: Andrei Hutu, Mustafa A. Mustafa

    Abstract: Smart grids are being increasingly deployed worldwide, as they constitute the electricity grid of the future, providing bidirectional communication between households. One of their main potential applications is the peer-to-peer (P2P) energy trading market, which promises users better electricity prices and higher incentives to produce renewable energy. However, most P2P markets require users to s… ▽ More

    Submitted 13 July, 2023; originally announced July 2023.

    Comments: 60 pages, 18 figures, 2 tables. This is an extended version of a paper submitted to SmartGridComm 2023

  6. arXiv:2307.08778  [pdf, other

    cs.CR

    Zone-Based Privacy-Preserving Billing for Local Energy Market Based on Multiparty Computation

    Authors: Eman Alqahtani, Mustafa A. Mustafa

    Abstract: This paper proposes a zone-based privacy-preserving billing protocol for local energy markets that takes into account energy volume deviations of market participants from their bids. Our protocol incorporates participants' locations on the grid for splitting the deviations cost. The proposed billing model employs multiparty computation so that the accurate calculation of individual bills is perfor… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

  7. arXiv:2307.04501  [pdf, other

    cs.CR cs.CE

    A Privacy-Preserving and Accountable Billing Protocol for Peer-to-Peer Energy Trading Markets

    Authors: Kamil Erdayandi, Lucas C. Cordeiro, Mustafa A. Mustafa

    Abstract: This paper proposes a privacy-preserving and accountable billing (PA-Bill) protocol for trading in peer-to-peer energy markets, addressing situations where there may be discrepancies between the volume of energy committed and delivered. Such discrepancies can lead to challenges in providing both privacy and accountability while maintaining accurate billing. To overcome these challenges, a universa… ▽ More

    Submitted 11 September, 2023; v1 submitted 10 July, 2023; originally announced July 2023.

    Comments: 6-pages, 1 Figure, Accepted for International Conference on Smart Energy Systems and Technologies (SEST2023)

  8. arXiv:2306.13793  [pdf, other

    cs.LG cs.NE

    QNNRepair: Quantized Neural Network Repair

    Authors: Xidan Song, Youcheng Sun, Mustafa A. Mustafa, Lucas C. Cordeiro

    Abstract: We present QNNRepair, the first method in the literature for repairing quantized neural networks (QNNs). QNNRepair aims to improve the accuracy of a neural network model after quantization. It accepts the full-precision and weight-quantized neural networks and a repair dataset of passing and failing tests. At first, QNNRepair applies a software fault localization method to identify the neurons tha… ▽ More

    Submitted 10 September, 2023; v1 submitted 23 June, 2023; originally announced June 2023.

  9. arXiv:2305.11391  [pdf, other

    cs.AI cs.LG

    A Survey of Safety and Trustworthiness of Large Language Models through the Lens of Verification and Validation

    Authors: Xiaowei Huang, Wenjie Ruan, Wei Huang, Gaojie **, Yi Dong, Changshun Wu, Saddek Bensalem, Ronghui Mu, Yi Qi, Xingyu Zhao, Kaiwen Cai, Yanghao Zhang, Sihao Wu, Peipei Xu, Dengyu Wu, Andre Freitas, Mustafa A. Mustafa

    Abstract: Large Language Models (LLMs) have exploded a new heatwave of AI for their ability to engage end-users in human-level conversations with detailed and articulate answers across many knowledge domains. In response to their fast adoption in many industrial applications, this survey concerns their safety and trustworthiness. First, we review known vulnerabilities and limitations of the LLMs, categorisi… ▽ More

    Submitted 27 August, 2023; v1 submitted 18 May, 2023; originally announced May 2023.

  10. arXiv:2303.13158  [pdf

    cs.CV eess.IV

    Improvement of Color Image Analysis Using a New Hybrid Face Recognition Algorithm based on Discrete Wavelets and Chebyshev Polynomials

    Authors: Hassan Mohamed Muhi-Aldeen, Maha Ammar Mustafa, Asma A. Abdulrahman, Jabbar Abed Eleiwy, Fouad S. Tahir, Yurii Khlaponin

    Abstract: This work is unique in the use of discrete wavelets that were built from or derived from Chebyshev polynomials of the second and third kind, filter the Discrete Second Chebyshev Wavelets Transform (DSCWT), and derive two effective filters. The Filter Discrete Third Chebyshev Wavelets Transform (FDTCWT) is used in the process of analyzing color images and removing noise and impurities that accompan… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  11. AIREPAIR: A Repair Platform for Neural Networks

    Authors: Xidan Song, Youcheng Sun, Mustafa A. Mustafa, Lucas Cordeiro

    Abstract: We present AIREPAIR, a platform for repairing neural networks. It features the integration of existing network repair tools. Based on AIREPAIR, one can run different repair methods on the same model, thus enabling the fair comparison of different repair techniques. We evaluate AIREPAIR with three state-of-the-art repair tools on popular deep-learning datasets and models. Our evaluation confirms th… ▽ More

    Submitted 21 March, 2023; v1 submitted 24 November, 2022; originally announced November 2022.

  12. arXiv:2206.06043  [pdf, other

    cs.SE eess.SY

    Combining BMC and Fuzzing Techniques for Finding Software Vulnerabilities in Concurrent Programs

    Authors: Fatimah K. Aljaafari, Rafael Menezes, Edoardo Manino, Fedor Shmarov, Mustafa A. Mustafa, Lucas C. Cordeiro

    Abstract: Finding software vulnerabilities in concurrent programs is a challenging task due to the size of the state-space exploration, as the number of interleavings grows exponentially with the number of program threads and statements. We propose and evaluate EBF (Ensembles of Bounded Model Checking with Fuzzing) -- a technique that combines Bounded Model Checking (BMC) and Gray-Box Fuzzing (GBF) to find… ▽ More

    Submitted 20 October, 2022; v1 submitted 13 June, 2022; originally announced June 2022.

  13. arXiv:2203.04347  [pdf

    cs.CR cs.NI

    An accurate IoT Intrusion Detection Framework using Apache Spark

    Authors: Mohamed Abushwereb, Mouhammd Alkasassbeh, Mohammad Almseidin, Muhannad Mustafa

    Abstract: The internet has caused tremendous changes since its appearance in the 1980s, and now, the Internet of Things (IoT) seems to be doing the same. The potential of IoT has made it the center of attention for many people, but, where some see an opportunity to contribute, others may see IoT networks as a target to be exploited. The high number of IoT devices makes them the perfect setup for staging den… ▽ More

    Submitted 21 February, 2022; originally announced March 2022.

    Comments: 15 pages

  14. Efficient User-Centric Privacy-Friendly and Flexible Wearable Data Aggregation and Sharing

    Authors: Khlood Jastaniah, Ning Zhang, Mustafa A. Mustafa

    Abstract: Wearable devices can offer services to individuals and the public. However, wearable data collected by cloud providers may pose privacy risks. To reduce these risks while maintaining full functionality, healthcare systems require solutions for privacy-friendly data processing and sharing that can accommodate three main use cases: (i) data owners requesting processing of their own data, and multipl… ▽ More

    Submitted 3 March, 2024; v1 submitted 1 March, 2022; originally announced March 2022.

    ACM Class: E.3; J.3

  15. arXiv:2201.01810  [pdf, other

    cs.GT cs.AI cs.CR cs.MA

    Privacy-Friendly Peer-to-Peer Energy Trading: A Game Theoretical Approach

    Authors: Kamil Erdayandi, Amrit Paudel, Lucas Cordeiro, Mustafa A. Mustafa

    Abstract: In this paper, we propose a decentralized, privacy-friendly energy trading platform (PFET) based on game theoretical approach - specifically Stackelberg competition. Unlike existing trading schemes, PFET provides a competitive market in which prices and demands are determined based on competition, and computations are performed in a decentralized manner which does not rely on trusted third parties… ▽ More

    Submitted 28 May, 2022; v1 submitted 5 January, 2022; originally announced January 2022.

    Comments: To be published in IEEE Power & Energy Society General Meeting (GM), 2022

    ACM Class: E.3; I.2.11

  16. arXiv:2109.05688  [pdf

    q-bio.NC cs.DL

    Thematic analysis of multiple sclerosis research by enhanced strategic diagram

    Authors: Nazlahshaniza Shafina, Che Aishah Nazariah Ismaila, Mohd Zulkifli Mustafa, Nurhafizah Ghani, Asma Hayati Ahmad, Zahiruddin Othman, Adi Wijaya, Rahimah Zakaria

    Abstract: This bibliometric review summarised the research trends and analysed research areas in multiple sclerosis (MS) over the last decade. The documents containing the term "multiple sclerosis" in the article title were retrieved from the Scopus database. We found a total of 18003 articles published in journals in the English language between 2012 and 2021. The emerging keywords identified utilising the… ▽ More

    Submitted 12 September, 2021; originally announced September 2021.

    Comments: 20 pages,6 figures

  17. arXiv:2106.12662  [pdf, other

    astro-ph.CO cs.AI

    Fast, high-fidelity Lyman $α$ forests with convolutional neural networks

    Authors: Peter Harrington, Mustafa Mustafa, Max Dornfest, Benjamin Horowitz, Zarija Lukić

    Abstract: Full-physics cosmological simulations are powerful tools for studying the formation and evolution of structure in the universe but require extreme computational resources. Here, we train a convolutional neural network to use a cheaper N-body-only simulation to reconstruct the baryon hydrodynamic variables (density, temperature, and velocity) on scales relevant to the Lyman-$α$ (Ly$α$) forest, usin… ▽ More

    Submitted 23 June, 2021; originally announced June 2021.

    Comments: 10 pages, 6 figures

  18. arXiv:2106.09338   

    cs.HC

    Investigating Misinformation Dissemination on Social Media in Pakistan

    Authors: Danyal Haroon, Hammad Arif, Ahmed Abdullah Tariq, fareeda nawaz, Dr. Ihsan Ayyub Qazi, Dr. Maryam mustafa

    Abstract: Fake news and misinformation are one of the most significant challenges brought about by advances in communication technologies. We chose to research the spread of fake news in Pakistan because of some unfortunate incidents that took place during 2020. These included the downplaying of the severity of the COVID-19 pandemic, and protests by right-wing political movements. We observed that fake news… ▽ More

    Submitted 8 August, 2021; v1 submitted 17 June, 2021; originally announced June 2021.

    Comments: i want to further work on it

  19. arXiv:2103.11363  [pdf, other

    cs.CR

    Finding Security Vulnerabilities in IoT Cryptographic Protocol and Concurrent Implementations

    Authors: Fatimah Aljaafari, Rafael Menezes, Mustafa A. Mustafa, Lucas C. Cordeiro

    Abstract: Internet of Things (IoT) consists of a large number of devices connected through a network, which exchange a high volume of data, thereby posing new security, privacy, and trust issues. One way to address these issues is ensuring data confidentiality using lightweight encryption algorithms for IoT protocols. However, the design and implementation of such protocols is an error-prone task; flaws in… ▽ More

    Submitted 27 April, 2021; v1 submitted 21 March, 2021; originally announced March 2021.

  20. arXiv:2103.09360  [pdf, other

    physics.ao-ph cs.AI cs.LG physics.comp-ph

    Towards physically consistent data-driven weather forecasting: Integrating data assimilation with equivariance-preserving deep spatial transformers

    Authors: Ashesh Chattopadhyay, Mustafa Mustafa, Pedram Hassanzadeh, Eviatar Bach, Karthik Kashinath

    Abstract: There is growing interest in data-driven weather prediction (DDWP), for example using convolutional neural networks such as U-NETs that are trained on data from models or reanalysis. Here, we propose 3 components to integrate with commonly used DDWP models in order to improve their physical consistency and forecast accuracy. These components are 1) a deep spatial transformer added to the latent sp… ▽ More

    Submitted 16 March, 2021; originally announced March 2021.

    Comments: Under review in Geoscientific Model Development

  21. arXiv:2101.04293  [pdf, other

    astro-ph.IM astro-ph.CO cs.AI

    Estimating Galactic Distances From Images Using Self-supervised Representation Learning

    Authors: Md Abul Hayat, Peter Harrington, George Stein, Zarija Lukić, Mustafa Mustafa

    Abstract: We use a contrastive self-supervised learning framework to estimate distances to galaxies from their photometric images. We incorporate data augmentations from computer vision as well as an application-specific augmentation accounting for galactic dust. We find that the resulting visual representations of galaxy images are semantically useful and allow for fast similarity searches, and can be succ… ▽ More

    Submitted 11 January, 2021; originally announced January 2021.

  22. arXiv:2101.01950  [pdf, other

    cs.CR

    HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System

    Authors: Iraklis Symeonidis, Dragos Rotaru, Mustafa A. Mustafa, Bart Mennink, Bart Preneel, Panos Papadimitratos

    Abstract: We propose HERMES, a scalable, secure, and privacy-enhancing system for users to share and access vehicles. HERMES securely outsources operations of vehicle access token generation to a set of untrusted servers. It builds on an earlier proposal, namely SePCAR [1], and extends the system design for improved efficiency and scalability. To cater to system and user needs for secure and private computa… ▽ More

    Submitted 19 March, 2021; v1 submitted 6 January, 2021; originally announced January 2021.

  23. arXiv:2012.13083  [pdf, other

    astro-ph.IM cs.AI

    Self-Supervised Representation Learning for Astronomical Images

    Authors: Md Abul Hayat, George Stein, Peter Harrington, Zarija Lukić, Mustafa Mustafa

    Abstract: Sky surveys are the largest data generators in astronomy, making automated tools for extracting meaningful scientific information an absolute necessity. We show that, without the need for labels, self-supervised learning recovers representations of sky survey images that are semantically useful for a variety of scientific tasks. These representations can be directly used as features, or fine-tuned… ▽ More

    Submitted 8 April, 2021; v1 submitted 23 December, 2020; originally announced December 2020.

    Comments: The codes, trained models, and data can be found at https://portal.nersc.gov/project/dasrepo/self-supervised-learning-sdss

    Journal ref: The Astrophysical Journal Letters, Volume 911 (2021), Number 2, Letter 33

  24. arXiv:2010.00072  [pdf, ps, other

    physics.comp-ph cs.LG physics.geo-ph

    Using Machine Learning to Augment Coarse-Grid Computational Fluid Dynamics Simulations

    Authors: Jaideep Pathak, Mustafa Mustafa, Karthik Kashinath, Emmanuel Motheau, Thorsten Kurth, Marcus Day

    Abstract: Simulation of turbulent flows at high Reynolds number is a computationally challenging task relevant to a large number of engineering and scientific applications in diverse fields such as climate science, aerodynamics, and combustion. Turbulent flows are typically modeled by the Navier-Stokes equations. Direct Numerical Simulation (DNS) of the Navier-Stokes equations with sufficient numerical reso… ▽ More

    Submitted 3 October, 2020; v1 submitted 30 September, 2020; originally announced October 2020.

    Comments: Corrected typographical errors in the previous version related to the incorrectly formatted accented character "é" appearing in various places in the manuscript

  25. arXiv:2006.11847  [pdf, other

    cs.CR math.NT math.RA

    An image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes

    Authors: Temadher Alassiry Al-Maadeed, Iqtadar Hussain, Amir Anees, M. T. Mustafa

    Abstract: Nowadays, the chaotic cryptosystems are gaining more attention due to their efficiency, the assurance of robustness and high sensitivity corresponding to initial conditions. In literature, on one hand there are many encryption algorithms that only guarantee security while on the other hand there are schemes based on chaotic systems that only promise the uncertainty. Due to these limitations, each… ▽ More

    Submitted 21 June, 2020; originally announced June 2020.

  26. arXiv:2006.00719  [pdf, other

    cs.LG math.NA stat.ML

    ADAHESSIAN: An Adaptive Second Order Optimizer for Machine Learning

    Authors: Zhewei Yao, Amir Gholami, Sheng Shen, Mustafa Mustafa, Kurt Keutzer, Michael W. Mahoney

    Abstract: We introduce ADAHESSIAN, a second order stochastic optimization algorithm which dynamically incorporates the curvature of the loss function via ADAptive estimates of the HESSIAN. Second order algorithms are among the most powerful optimization algorithms with superior convergence properties as compared to first order methods such as SGD and Adam. The main disadvantage of traditional second order m… ▽ More

    Submitted 28 April, 2021; v1 submitted 1 June, 2020; originally announced June 2020.

    Journal ref: AAAI 2021

  27. arXiv:2005.01463  [pdf, other

    cs.LG eess.IV physics.flu-dyn stat.ML

    MeshfreeFlowNet: A Physics-Constrained Deep Continuous Space-Time Super-Resolution Framework

    Authors: Chiyu Max Jiang, Soheil Esmaeilzadeh, Kamyar Azizzadenesheli, Karthik Kashinath, Mustafa Mustafa, Hamdi A. Tchelepi, Philip Marcus, Prabhat, Anima Anandkumar

    Abstract: We propose MeshfreeFlowNet, a novel deep learning-based super-resolution framework to generate continuous (grid-free) spatio-temporal solutions from the low-resolution inputs. While being computationally efficient, MeshfreeFlowNet accurately recovers the fine-scale quantities of interest. MeshfreeFlowNet allows for: (i) the output to be sampled at all spatio-temporal resolutions, (ii) a set of Par… ▽ More

    Submitted 21 August, 2020; v1 submitted 1 May, 2020; originally announced May 2020.

    Comments: Supplementary Video: https://youtu.be/mjqwPch9gDo. Accepted to SC20

  28. arXiv:2004.12264  [pdf, other

    cs.CR

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group

    Authors: Iqtadar Hussain, Amir Anees, Temadher Alassiry Al-Maadeed, M. T. Mustafa

    Abstract: With the tremendous benefits of internet and advanced communications, there is a serious threat from the data security perspective. There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. Also, in block symmetric encryption algorithms, substitution boxes are the most vital part. In this paper, we investigate semifield s… ▽ More

    Submitted 25 April, 2020; originally announced April 2020.

    Comments: 23 pages

    MSC Class: 94A60; 12K10

  29. arXiv:2001.09837  [pdf, other

    cs.CR cs.SE

    Verifying Software Vulnerabilities in IoT Cryptographic Protocols

    Authors: Fatimah Aljaafari, Lucas C. Cordeiro, Mustafa A. Mustafa

    Abstract: Internet of Things (IoT) is a system that consists of a large number of smart devices connected through a network. The number of these devices is increasing rapidly, which creates a massive and complex network with a vast amount of data communicated over that network. One way to protect this data in transit, i.e., to achieve data confidentiality, is to use lightweight encryption algorithms for IoT… ▽ More

    Submitted 27 January, 2020; originally announced January 2020.

  30. arXiv:2001.05707  [pdf

    cs.NI cs.CR

    Attack based DoS attack detection using multiple classifier

    Authors: Mohamed Abushwereb, Muhannad Mustafa, Mouhammd Al-kasassbeh, Malik Qasaimeh

    Abstract: One of the most common internet attacks causing significant economic losses in recent years is the Denial of Service (DoS) flooding attack. As a countermeasure, intrusion detection systems equipped with machine learning classification algorithms were developed to detect anomalies in network traffic. These classification algorithms had varying degrees of success, depending on the type of DoS attack… ▽ More

    Submitted 16 January, 2020; originally announced January 2020.

  31. arXiv:1911.08655  [pdf, other

    physics.comp-ph cs.LG stat.ML

    Towards Physics-informed Deep Learning for Turbulent Flow Prediction

    Authors: Rui Wang, Karthik Kashinath, Mustafa Mustafa, Adrian Albert, Rose Yu

    Abstract: While deep learning has shown tremendous success in a wide range of domains, it remains a grand challenge to incorporate physical principles in a systematic manner to the design, training, and inference of such models. In this paper, we aim to predict turbulent flow by learning its highly nonlinear dynamics from spatiotemporal velocity fields of large-scale fluid flow simulations of relevance to t… ▽ More

    Submitted 13 June, 2020; v1 submitted 19 November, 2019; originally announced November 2019.

  32. arXiv:1908.09168  [pdf, other

    cs.CR math.GR

    A Novel Method to Generate Key-Dependent S-Boxes with Identical Algebraic Properties

    Authors: Ahmad Y. Al-Dweik, Iqtadar Hussain, Moutaz S. Saleh, M. T. Mustafa

    Abstract: The s-box plays the vital role of creating confusion between the ciphertext and secret key in any cryptosystem, and is the only nonlinear component in many block ciphers. Dynamic s-boxes, as compared to static, improve entropy of the system, hence leading to better resistance against linear and differential attacks. It was shown in [2] that while incorporating dynamic s-boxes in cryptosystems is s… ▽ More

    Submitted 3 May, 2021; v1 submitted 24 August, 2019; originally announced August 2019.

  33. arXiv:1906.11488  [pdf, other

    cs.CR cs.LO

    Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification

    Authors: Omar M. Alhawi, Mustafa A. Mustafa, Lucas C. Cordeiro

    Abstract: The proliferation of Unmanned Aerial Vehicles (UAVs) embedded with vulnerable monolithic software has recently raised serious concerns about their security due to concurrency aspects and fragile communication links. However, verifying security in UAV software based on traditional testing remains an open challenge mainly due to scalability and deployment issues. Here we investigate software verific… ▽ More

    Submitted 11 October, 2019; v1 submitted 27 June, 2019; originally announced June 2019.

    Comments: 16 pages, 7 figures, conference

  34. arXiv:1802.07233  [pdf, other

    cs.CR

    Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities

    Authors: Tim Van hamme, Vera Rimmer, Davy Preuveneers, Wouter Joosen, Mustafa A. Mustafa, Aysajan Abidin, Enrique Argones Rúa

    Abstract: Authentication and authorization are critical security layers to protect a wide range of online systems, services and content. However, the increased prevalence of wearable and mobile devices, the expectations of a frictionless experience and the diverse user environments will challenge the way users are authenticated. Consumers demand secure and privacy-aware access from any device, whenever and… ▽ More

    Submitted 20 February, 2018; originally announced February 2018.

    Comments: published at the 11th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017)

  35. arXiv:1802.07231  [pdf, other

    cs.CR

    Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions

    Authors: Mustafa A. Mustafa, Aysajan Abidin, Enrique Argones Rúa

    Abstract: This paper proposes a frictionless authentication system, provides a comprehensive security analysis of and proposes potential solutions for this system. It first presents a system that allows users to authenticate to services in a frictionless manner, i.e., without the need to perform any particular authentication-related actions. Based on this system model, the paper analyses security problems a… ▽ More

    Submitted 20 February, 2018; originally announced February 2018.

    Comments: published at the 11th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017)

  36. arXiv:1801.08354  [pdf, other

    cs.CR

    Secure and Privacy-Friendly Local Electricity Trading and Billing in Smart Grid

    Authors: Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa

    Abstract: This paper proposes two decentralised, secure and privacy-friendly protocols for local electricity trading and billing, respectively. The trading protocol employs a bidding algorithm based upon secure multiparty computations and allows users to trade their excess electricity among themselves. The bid selection and calculation of the trading price are performed in a decentralised and oblivious mann… ▽ More

    Submitted 25 January, 2018; originally announced January 2018.

  37. arXiv:1801.08353  [pdf, other

    cs.CR

    A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection

    Authors: Mustafa A. Mustafa, Sara Cleemput, Abelrahaman Aly, Aysajan Abidin

    Abstract: In this paper we propose a novel protocol that allows suppliers and grid operators to collect users' aggregate metering data in a secure and privacy-preserving manner. We use secure multiparty computation to ensure privacy protection. In addition, we propose three different data aggregation algorithms that offer different balances between privacy-protection and performance. Our protocol is designe… ▽ More

    Submitted 14 March, 2019; v1 submitted 25 January, 2018; originally announced January 2018.

    Comments: Accepted for publication at IEEE Transactions on Smart Grid

  38. arXiv:1712.09388  [pdf, other

    cs.DC

    Scaling GRPC Tensorflow on 512 nodes of Cori Supercomputer

    Authors: Amrita Mathuriya, Thorsten Kurth, Vivek Rane, Mustafa Mustafa, Lei Shao, Debbie Bard, Prabhat, Victor W Lee

    Abstract: We explore scaling of the standard distributed Tensorflow with GRPC primitives on up to 512 Intel Xeon Phi (KNL) nodes of Cori supercomputer with synchronous stochastic gradient descent (SGD), and identify causes of scaling inefficiency at higher node counts. To our knowledge, this is the first exploration of distributed GRPC Tensorflow scalability on a HPC supercomputer at such large scale with s… ▽ More

    Submitted 26 December, 2017; originally announced December 2017.

    Comments: Published as a poster in NIPS 2017 Workshop: Deep Learning At Supercomputer Scale

  39. CosmoGAN: creating high-fidelity weak lensing convergence maps using Generative Adversarial Networks

    Authors: Mustafa Mustafa, Deborah Bard, Wahid Bhimji, Zarija Lukić, Rami Al-Rfou, Jan M. Kratochvil

    Abstract: Inferring model parameters from experimental data is a grand challenge in many sciences, including cosmology. This often relies critically on high fidelity numerical simulations, which are prohibitively computationally expensive. The application of deep learning techniques to generative modeling is renewing interest in using high dimensional density estimators as computationally inexpensive emulat… ▽ More

    Submitted 22 May, 2019; v1 submitted 7 June, 2017; originally announced June 2017.

    Comments: 11 pages, 8 figures

    Journal ref: Computational Astrophysics and CosmologySimulations, Data Analysis and Algorithms 2019 6:1

  40. Velocity Selection for High-Speed UGVs in Rough Unknown Terrains using Force Prediction

    Authors: Graeme N. Wilson, Alejandro Ramirez-Serrano, Mahmoud Mustafa, Krispin A. Davies

    Abstract: Enabling high speed navigation of Unmanned Ground Vehicles (UGVs) in unknown rough terrain where limited or no information is available in advance requires the assessment of terrain in front of the UGV. Attempts have been made to predict the forces the terrain exerts on the UGV for the purpose of determining the maximum allowable velocity for a given terrain. However, current methods produce overl… ▽ More

    Submitted 30 June, 2014; originally announced July 2014.

    Comments: 10 pages, 6 figures, Proceedings of 5th International Conference on Intelligent Robotics and Applications, Concordia University, October 3-5, 2012, Montreal, Canada

    Journal ref: 5th International Conference, ICIRA 2012, Montreal, Canada, October 3-5, 2012, Proceedings, Part II. 7507: 387-396

  41. Analytical Survey of Wearable Sensors

    Authors: A. Rehman, M. Mustafa, N. Javaid, U. Qasim, Z. A. Khan

    Abstract: Wearable sensors inWireless Body Area Networks (WBANs) provide health and physical activity monitoring. Modern communication systems have extended this monitoring remotely. In this survey, various types of wearable sensors discussed, their medical applications like ECG, EEG, blood pressure, detection of blood glucose level, pulse rate, respiration rate and non medical applications like daily exerc… ▽ More

    Submitted 11 August, 2012; originally announced August 2012.

    Comments: BioSPAN with 7th IEEE International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2012), Victoria, Canada, 2012

  42. arXiv:1002.4831  [pdf

    cs.NE

    On Analysis and Evaluation of Multi-Sensory Cognitive Learning of a Mathematical Topic Using Artificial Neural Networks

    Authors: F. A. Al-Zahrani, H. M. Mustafa, A. Al-Hamadi

    Abstract: This piece of research belongs to the field of educational assessment issue based upon the cognitive multimedia theory. Considering that theory; visual and auditory material should be presented simultaneously to reinforce the retention of a mathematical learned topic, a carefully computer-assisted learning (CAL) module is designed for development of a multimedia tutorial for our suggested mathem… ▽ More

    Submitted 25 February, 2010; originally announced February 2010.

    Comments: Journal of Telecommunications,Volume 1, Issue 1, pp99-104, February 2010