Skip to main content

Showing 1–24 of 24 results for author: Sarhan, M

Searching in archive cs. Search in all archives.
.
  1. SF-TMN: SlowFast Temporal Modeling Network for Surgical Phase Recognition

    Authors: Bokai Zhang, Mohammad Hasan Sarhan, Bharti Goel, Svetlana Petculescu, Amer Ghanem

    Abstract: Automatic surgical phase recognition is one of the key technologies to support Video-Based Assessment (VBA) systems for surgical education. Utilizing temporal information is crucial for surgical phase recognition, hence various recent approaches extract frame-level features to conduct full video temporal modeling. For better temporal modeling, we propose SlowFast Temporal Modeling Network (SF-TMN)… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

    Journal ref: International Journal of Computer Assisted Radiology and Surgery (IJCARS) 2024

  2. arXiv:2304.14746  [pdf, other

    cs.CR cs.AI cs.CL cs.NE cs.NI

    FlowTransformer: A Transformer Framework for Flow-based Network Intrusion Detection Systems

    Authors: Liam Daly Manocchio, Siamak Layeghy, Wai Weng Lo, Gayan K. Kulatilleke, Mohanad Sarhan, Marius Portmann

    Abstract: This paper presents the FlowTransformer framework, a novel approach for implementing transformer-based Network Intrusion Detection Systems (NIDSs). FlowTransformer leverages the strengths of transformer models in identifying the long-term behaviour and characteristics of networks, which are often overlooked by most existing NIDSs. By capturing these complex patterns in network traffic, FlowTransfo… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

  3. arXiv:2212.07558  [pdf, other

    cs.CR cs.LG cs.NI

    DOC-NAD: A Hybrid Deep One-class Classifier for Network Anomaly Detection

    Authors: Mohanad Sarhan, Gayan Kulatilleke, Wai Weng Lo, Siamak Layeghy, Marius Portmann

    Abstract: Machine Learning (ML) approaches have been used to enhance the detection capabilities of Network Intrusion Detection Systems (NIDSs). Recent work has achieved near-perfect performance by following binary- and multi-class network anomaly detection tasks. Such systems depend on the availability of both (benign and malicious) network data classes during the training phase. However, attack data sample… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

  4. arXiv:2207.09088  [pdf, other

    cs.CR cs.LG cs.NI

    XG-BoT: An Explainable Deep Graph Neural Network for Botnet Detection and Forensics

    Authors: Wai Weng Lo, Gayan K. Kulatilleke, Mohanad Sarhan, Siamak Layeghy, Marius Portmann

    Abstract: In this paper, we propose XG-BoT, an explainable deep graph neural network model for botnet node detection. The proposed model comprises a botnet detector and an explainer for automatic forensics. The XG-BoT detector can effectively detect malicious botnet nodes in large-scale networks. Specifically, it utilizes a grouped reversible residual connection with a graph isomorphism network to learn exp… ▽ More

    Submitted 11 March, 2023; v1 submitted 19 July, 2022; originally announced July 2022.

    Comments: Accepted by Internet of Things, Elsevier

  5. arXiv:2207.02247  [pdf, ps, other

    cs.CV

    Video-based Surgical Skills Assessment using Long term Tool Tracking

    Authors: Mona Fathollahi, Mohammad Hasan Sarhan, Ramon Pena, Lela DiMonte, Anshu Gupta, Aishani Ataliwala, Jocelyn Barker

    Abstract: Mastering the technical skills required to perform surgery is an extremely challenging task. Video-based assessment allows surgeons to receive feedback on their technical skills to facilitate learning and development. Currently, this feedback comes primarily from manual video review, which is time-intensive and limits the feasibility of tracking a surgeon's progress over many cases. In this work,… ▽ More

    Submitted 5 July, 2022; originally announced July 2022.

    Comments: Accepted at MICCAI 2022

  6. arXiv:2206.01550  [pdf, other

    cs.CL cs.IR

    TCE at Qur'an QA 2022: Arabic Language Question Answering Over Holy Qur'an Using a Post-Processed Ensemble of BERT-based Models

    Authors: Mohammed ElKomy, Amany M. Sarhan

    Abstract: In recent years, we witnessed great progress in different tasks of natural language understanding using machine learning. Question answering is one of these tasks which is used by search engines and social media platforms for improved user experience. Arabic is the language of the Holy Qur'an; the sacred text for 1.8 billion people across the world. Arabic is a challenging language for Natural Lan… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

    Comments: OSACT5 workshop, Qur'an QA 2022 Shared Task participation by TCE

  7. CholecTriplet2021: A benchmark challenge for surgical action triplet recognition

    Authors: Chinedu Innocent Nwoye, Deepak Alapatt, Tong Yu, Armine Vardazaryan, Fangfang Xia, Zixuan Zhao, Tong Xia, Fucang Jia, Yuxuan Yang, Hao Wang, Derong Yu, Guoyan Zheng, Xiaotian Duan, Neil Getty, Ricardo Sanchez-Matilla, Maria Robu, Li Zhang, Huabin Chen, Jiacheng Wang, Liansheng Wang, Bokai Zhang, Beerend Gerats, Sista Raviteja, Rachana Sathish, Rong Tao , et al. (37 additional authors not shown)

    Abstract: Context-aware decision support in the operating room can foster surgical safety and efficiency by leveraging real-time feedback from surgical workflow analysis. Most existing works recognize surgical activities at a coarse-grained level, such as phases, steps or events, leaving out fine-grained interaction details about the surgical activity; yet those are needed for more helpful AI assistance in… ▽ More

    Submitted 29 December, 2022; v1 submitted 10 April, 2022; originally announced April 2022.

    Comments: CholecTriplet2021 challenge report. Paper accepted at Elsevier journal of Medical Image Analysis. 22 pages, 8 figures, 11 tables. Challenge website: https://cholectriplet2021.grand-challenge.org

    Journal ref: Medical Image Analysis 86 (2023) 102803

  8. arXiv:2204.04254  [pdf, other

    cs.CR cs.LG cs.NI

    HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection

    Authors: Mohanad Sarhan, Wai Weng Lo, Siamak Layeghy, Marius Portmann

    Abstract: The continuous strengthening of the security posture of IoT ecosystems is vital due to the increasing number of interconnected devices and the volume of sensitive data shared. The utilisation of Machine Learning (ML) capabilities in the defence against IoT cyber attacks has many potential benefits. However, the currently proposed frameworks do not consider data privacy, secure architectures, and/o… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

  9. arXiv:2203.10465  [pdf, other

    cs.CR cs.LG q-fin.ST

    Inspection-L: Self-Supervised GNN Node Embeddings for Money Laundering Detection in Bitcoin

    Authors: Wai Weng Lo, Gayan K. Kulatilleke, Mohanad Sarhan, Siamak Layeghy, Marius Portmann

    Abstract: Criminals have become increasingly experienced in using cryptocurrencies, such as Bitcoin, for money laundering. The use of cryptocurrencies can hide criminal identities and transfer hundreds of millions of dollars of dirty funds through their criminal digital wallets. However, this is considered a paradox because cryptocurrencies are goldmines for open-source intelligence, giving law enforcement… ▽ More

    Submitted 9 October, 2022; v1 submitted 20 March, 2022; originally announced March 2022.

  10. arXiv:2201.07537  [pdf, other

    cs.CR cs.LG

    Graph Neural Network-based Android Malware Classification with Jum** Knowledge

    Authors: Wai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, Marius Portmann

    Abstract: This paper presents a new Android malware detection method based on Graph Neural Networks (GNNs) with Jum**-Knowledge (JK). Android function call graphs (FCGs) consist of a set of program functions and their inter-procedural calls. Thus, this paper proposes a GNN-based method for Android malware detection by capturing meaningful intra-procedural call path patterns. In addition, a Jum**-Knowled… ▽ More

    Submitted 13 June, 2022; v1 submitted 19 January, 2022; originally announced January 2022.

    Comments: will be appeared in IEEE Conference on Dependable and Secure Computing 2022

  11. arXiv:2111.02791  [pdf, other

    cs.LG cs.AI cs.CR cs.NI

    A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection

    Authors: Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann

    Abstract: The uses of Machine Learning (ML) in detection of network attacks have been effective when designed and evaluated in a single organisation. However, it has been very challenging to design an ML-based detection system by utilising heterogeneous network data samples originating from several sources. This is mainly due to privacy concerns and the lack of a universal format of datasets. In this paper,… ▽ More

    Submitted 4 November, 2021; originally announced November 2021.

  12. From Zero-Shot Machine Learning to Zero-Day Attack Detection

    Authors: Mohanad Sarhan, Siamak Layeghy, Marcus Gallagher, Marius Portmann

    Abstract: The standard ML methodology assumes that the test samples are derived from a set of pre-observed classes used in the training phase. Where the model extracts and learns useful patterns to detect new data samples belonging to the same data classes. However, in certain applications such as Network Intrusion Detection Systems, it is challenging to obtain data samples for all attack classes that the m… ▽ More

    Submitted 30 September, 2021; originally announced September 2021.

  13. arXiv:2108.12732  [pdf, other

    cs.CR cs.LG cs.NI

    Feature Analysis for Machine Learning-based IoT Intrusion Detection

    Authors: Mohanad Sarhan, Siamak Layeghy, Marius Portmann

    Abstract: Internet of Things (IoT) networks have become an increasingly attractive target of cyberattacks. Powerful Machine Learning (ML) models have recently been adopted to implement network intrusion detection systems to protect IoT networks. For the successful training of such ML models, selecting the right data features is crucial, maximising the detection accuracy and computational efficiency. This pa… ▽ More

    Submitted 23 November, 2022; v1 submitted 28 August, 2021; originally announced August 2021.

    Comments: 22 pages, 6 figures. arXiv admin note: substantial text overlap with arXiv:2108.12722

  14. Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks

    Authors: Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marcus Gallagher, Marius Portmann

    Abstract: A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems (NIDSs). Consequently, network interruptions and loss of sensitive data have occurred, which led to an active research area for improving NIDS technologies. In an analysis of related works, it was observed that most researchers aim to obtain better classifi… ▽ More

    Submitted 5 December, 2022; v1 submitted 28 August, 2021; originally announced August 2021.

  15. Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-based Network Intrusion Detection

    Authors: Mohanad Sarhan, Siamak Layeghy, Marius Portmann

    Abstract: Machine Learning (ML)-based network intrusion detection systems bring many benefits for enhancing the cybersecurity posture of an organisation. Many systems have been designed and developed in the research community, often achieving a close to perfect detection rate when evaluated using synthetic datasets. However, the high number of academic research has not often translated into practical deploy… ▽ More

    Submitted 28 August, 2021; v1 submitted 14 April, 2021; originally announced April 2021.

    Comments: 11 pages, 7 figures

  16. arXiv:2103.16329  [pdf, other

    cs.NI cs.AI cs.CR cs.LG

    E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT

    Authors: Wai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, Marius Portmann

    Abstract: This paper presents a new Network Intrusion Detection System (NIDS) based on Graph Neural Networks (GNNs). GNNs are a relatively new sub-field of deep neural networks, which can leverage the inherent structure of graph-based data. Training and evaluation data for NIDSs are typically represented as flow records, which can naturally be represented in a graph format. In this paper, we propose E-Graph… ▽ More

    Submitted 10 January, 2022; v1 submitted 30 March, 2021; originally announced March 2021.

    Comments: will appear in IEEE/IFIP Network Operations and Management Symposium 2022

  17. arXiv:2103.16295  [pdf, other

    cs.NI cs.AI cs.CR cs.LG

    Exploring Edge TPU for Network Intrusion Detection in IoT

    Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann

    Abstract: This paper explores Google's Edge TPU for implementing a practical network intrusion detection system (NIDS) at the edge of IoT, based on a deep learning approach. While there are a significant number of related works that explore machine learning based NIDS for the IoT edge, they generally do not consider the issue of the required computational and energy resources. The focus of this paper is the… ▽ More

    Submitted 30 March, 2021; originally announced March 2021.

    Comments: 22 pages, 11 figures

  18. Towards a Standard Feature Set for Network Intrusion Detection System Datasets

    Authors: Mohanad Sarhan, Siamak Layeghy, Marius Portmann

    Abstract: Network Intrusion Detection Systems (NIDSs) are important tools for the protection of computer networks against increasingly frequent and sophisticated cyber attacks. Recently, a lot of research effort has been dedicated to the development of Machine Learning (ML) based NIDSs. As in any ML-based application, the availability of high-quality datasets is critical for the training and evaluation of M… ▽ More

    Submitted 14 May, 2021; v1 submitted 27 January, 2021; originally announced January 2021.

    Comments: 13 pages, 4 figures, 13 tables. arXiv admin note: substantial text overlap with arXiv:2011.09144

  19. NetFlow Datasets for Machine Learning-based Network Intrusion Detection Systems

    Authors: Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann

    Abstract: Machine Learning (ML)-based Network Intrusion Detection Systems (NIDSs) have proven to become a reliable intelligence tool to protect networks against cyberattacks. Network data features has a great impact on the performances of ML-based NIDSs. However, evaluating ML models often are not reliable, as each ML-enabled NIDS is trained and validated using different data features that may do not contai… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

    Journal ref: BDTA 2020

  20. arXiv:2003.05707  [pdf, other

    cs.CV cs.LG

    Fairness by Learning Orthogonal Disentangled Representations

    Authors: Mhd Hasan Sarhan, Nassir Navab, Abouzar Eslami, Shadi Albarqouni

    Abstract: Learning discriminative powerful representations is a crucial step for machine learning systems. Introducing invariance against arbitrary nuisance or sensitive attributes while performing well on specific tasks is an important problem in representation learning. This is mostly approached by purging the sensitive information from learned representations. In this paper, we propose a novel disentangl… ▽ More

    Submitted 4 July, 2020; v1 submitted 12 March, 2020; originally announced March 2020.

  21. arXiv:1912.04618  [pdf, other

    cs.CV

    Deep Attention Based Semi-Supervised 2D-Pose Estimation for Surgical Instruments

    Authors: Mert Kayhan, Okan Köpüklü, Mhd Hasan Sarhan, Mehmet Yigitsoy, Abouzar Eslami, Gerhard Rigoll

    Abstract: For many practical problems and applications, it is not feasible to create a vast and accurately labeled dataset, which restricts the application of deep learning in many areas. Semi-supervised learning algorithms intend to improve performance by also leveraging unlabeled data. This is very valuable for 2D-pose estimation task where data labeling requires substantial time and is subject to noise.… ▽ More

    Submitted 11 January, 2021; v1 submitted 10 December, 2019; originally announced December 2019.

  22. arXiv:1904.12732  [pdf, other

    eess.IV cs.CV physics.med-ph

    Multi-scale Microaneurysms Segmentation Using Embedding Triplet Loss

    Authors: Mhd Hasan Sarhan, Shadi Albarqouni, Mehmet Yigitsoy, Nassir Navab, Abouzar Eslami

    Abstract: Deep learning techniques are recently being used in fundus image analysis and diabetic retinopathy detection. Microaneurysms are an important indicator of diabetic retinopathy progression. We introduce a two-stage deep learning approach for microaneurysms segmentation using multiple scales of the input with selective sampling and embedding triplet loss. The model first segments on two scales and t… ▽ More

    Submitted 14 August, 2019; v1 submitted 18 April, 2019; originally announced April 2019.

  23. arXiv:1904.08491  [pdf, other

    cs.LG stat.ML

    Learning Interpretable Disentangled Representations using Adversarial VAEs

    Authors: Mhd Hasan Sarhan, Abouzar Eslami, Nassir Navab, Shadi Albarqouni

    Abstract: Learning Interpretable representation in medical applications is becoming essential for adopting data-driven models into clinical practice. It has been recently shown that learning a disentangled feature representation is important for a more compact and explainable representation of the data. In this paper, we introduce a novel adversarial variational autoencoder with a total correlation constrai… ▽ More

    Submitted 17 April, 2019; originally announced April 2019.

  24. arXiv:1403.5734  [pdf

    cs.MA cs.CY

    Software Agents Interaction Algorithms in Virtual Learning Environment

    Authors: Zahi A. M. Abu Sarhan

    Abstract: This paper highlights the multi-agent learning virtual environment and agents communication algorithms. The researcher proposed three algorithms required software agents interaction in virtual learning information system environment. The first proposed algorithm is agents interaction localization algorithm, the second one is the dynamic agents distribution algorithm (load distribution algorithm),… ▽ More

    Submitted 7 December, 2015; v1 submitted 23 March, 2014; originally announced March 2014.

    Journal ref: The World of Computer Science and Information Technology Journal (WSCIT). 2014, Volume 4, Issue 2. pp. 18.25