
Manar Abu Talib- Professor
- University of Sharjah
Manar Abu Talib
- Professor
- University of Sharjah
About
146
Publications
75,928
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,645
Citations
Introduction
Current institution
Publications
Publications (146)
This paper presents a systematic examination and experimental comparison of the prominent Federated Learning (FL) frameworks FedML, Flower, Substra, and OpenFL. The frameworks are evaluated experimentally by implementing Federated Learning over a varying number of clients, emphasizing a thorough analysis of scalability and key performance metrics....
A deepfake is a fast attack technique that has evolved rapidly over the past several years. It only takes one person to synthesize thousands of photorealistic images in a few hours or to manipulate a large number of videos. The creation of fake faces through image tampering has been identified as abusive media and could result in major ethical, leg...
Rapid growth and technological improvement in wireless communication, driven by engineers from various disciplines, have reached significant milestones. Unmanned Aerial vehicles (UAVs) and flying ad hoc networks (FANET) have undergone one of the biggest innovations. UAVs have drawn a lot of attention from research institutions. They are increasingl...
Background
During preclinical training, dental students take radiographs of acrylic (plastic) blocks containing extracted patient teeth. With the digitisation of medical records, a central archiving system was created to store and retrieve all x-ray images, regardless of whether they were images of teeth on acrylic blocks, or those from patients. I...
False Data Injection Attacks (FDIA) pose a significant threat to the stability of smart grids. Traditional Bad Data Detection (BDD) algorithms, deployed to remove low-quality data, can easily be bypassed by these attacks which require minimal knowledge about the parameters of the power bus systems. This makes it essential to develop defence approac...
Artificial intelligence integration, specifically ChatGPT, is becoming increasingly popular in educational contexts. This research paper provides a systematic literature review that examines the effects of incorporating ChatGPT into education. The study examines four primary research questions: the benefits and challenges of ChatGPT, its impact on...
With the outbreak of COVID-19 in 2020, countries worldwide faced significant concerns and challenges. Various studies have emerged utilizing Artificial Intelligence (AI) and Data Science techniques for disease detection. Although COVID-19 cases have declined, there are still cases and deaths around the world. Therefore, early detection of COVID-19...
With the outbreak of COVID-19 in 2020, countries worldwide faced significant concerns and challenges. Various studies have emerged utilizing Artificial Intelligence (AI) and Data Science techniques for disease detection. Although COVID-19 cases have declined, there are still cases and deaths around the world. Therefore, early detection of COVID-19...
Software engineering workflows use version control systems to track changes and handle merge cases from multiple contributors. This has introduced challenges to testing because it is impractical to test whole codebases to ensure each change is defect-free, and it is not enough to test changed files alone. Just-in-time software defect prediction (JI...
With the rise of the 3Ds—decarbonization, decentralization, and digitalization—the number of electric vehicles is projected to increase, necessitating the implementation of modern technologies to avoid unnecessary energy wastage. Numerous studies have been developed proposing electric vehicle (EV) charging frameworks in networks empowered by renewa...
Artificial Intelligence (AI) approaches have been increasingly used in financial markets as technology advances. In this research paper, we conduct a Systematic Literature Review (SLR) that studies financial trading approaches through AI techniques. It reviews 143 research articles that implemented AI techniques in financial trading markets. Accord...
False Data Injection Attacks (FDIA) pose a significant threat to the stability of smart grids. Traditional Bad Data Detection (BDD) algorithms, deployed to remove low-quality data, can easily be bypassed by these attacks which require minimal knowledge about the parameters of the power bus systems. This makes it essential to develop defence approac...
Background: Software Defect Prediction (SDP) is a vital step in software development. SDP aims to identify the most likely defect-prone modules before starting the testing phase, and it helps assign resources and reduces the cost of testing.
Aim: Although many machine learning algorithms have been used to classify software modules based on static c...
The Internet of Things (IoT) paradigm and the advanced wireless technologies of 5G and beyond are expected to enable diverse applications such as autonomous driving, industrial automation, and smart cities. These applications bring together a vast and diverse IoT device population that occupy radio frequency spectrum. Such a large number of wireles...
Software defect prediction (SDP) plays a significant role in detecting the most likely defective software modules and optimizing the allocation of testing resources. In practice, though, project managers must not only identify defective modules, but also rank them in a specific order to optimize the resource allocation and minimize testing costs, e...
Worldwide, electricity production exceeds its consumption which leads to wasted financial and energy resources. Machine learning models can be utilized to predict the future consumption to avoid these significant losses. This paper presents the data for the monthly electricity consumption on the community level during May 2017–December 2019 in Duba...
Despite the declining COVID-19 cases, global healthcare systems still face significant challenges due to ongoing infections, especially among fully vaccinated individuals, including adolescents and young adults (AYA). To tackle this issue, cost-effective alternatives utilizing technologies like Artificial Intelligence (AI) and wearable devices have...
Financial markets are extremely complex due to their non-linear, non- stationary, and time-variant nature. Researchers are increasingly investigating the automation of financial trading as AI capabilities advance particularly in complicated markets such as Foreign Exchange. (FOREX). Traders typically use three types of trading analysis: technical a...
Blockchain technology in the healthcare industry has potential to enable enhanced privacy, increased security, and an interoperable data record. Blockchain technology is being implemented in dental care systems to store and share medical information, improve insurance claims, and provide innovative dental data ledgers. Because the healthcare sector...
Dental x-rays have been a standard piece of dental equipment for many years and are an indispensable diagnostic tool for dentists to detect tooth damage or disease. Recent research has focused on employing computer vision algorithms to automate analysis of dental x-rays. Our study aims to review the work done using transfer learning in dental image...
Water scarcity has urged the need for adequate water demand forecasting to facilitate efficient planning of municipal infrastructure. However, the development of water consumption models is challenged by the rapid environmental and socio-economic changes, particularly during unforeseen events like the COVID-19 pandemic. This study investigated the...
The security of a community is its topmost priority; hence, governments must take proper actions to reduce the crime rate. Consequently, the application of artificial intelligence (AI) in crime prediction is a significant and well-researched area. This study investigates AI strategies in crime prediction. We conduct a systematic literature review (...
Researchers have focused on wearable devices as viable Internet of Things (IoT) solutions in the recent decade. After the epidemic of COVID-19, they are receiving increasing attention. Wearable Internet of Things (IoT) systems must have high information quality (IQ) to be useful. In earlier publications, we developed a comprehensive framework for s...
Advanced Persistent Threat (APT) is a type of threat that has grabbed the attention of researchers, particularly in the industrial security field. APTs are cyber intrusions carried out by skilled and well-resourced adversaries who target specific information in high-profile organizations and governments, frequently as part of a multi-phase long-ter...
Dubai is an emerging metropolis with unique features, such as an extremely high expatriate ratio and turnover rate. These features, along with the extreme climatic conditions and dependency on energy-intensive water desalination, cause the electricity load to be high per capita and highly variable. Therefore, producing accurate electricity consumpt...
Creating deepfake multimedia, and especially deepfake videos, has become much easier these days due to the availability of deepfake tools and the virtually unlimited numbers of face images found online. Research and industry communities have dedicated time and resources to develop detection methods to expose these fake videos. Although these detect...
Cancer is one of the most dangerous diseases to humans, and yet no permanent cure has been developed for it. Breast cancer is one of the most common cancer types. According to the National Breast Cancer foundation, in 2020 alone, more than 276,000 new cases of invasive breast cancer and more than 48,000 non-invasive cases were diagnosed in the US....
Cancer is one of the most dangerous diseases to humans, and yet no permanent cure has been developed for it. Breast cancer is one of the most common cancer types. According to the National Breast Cancer Foundation, in 2020 alone, more than 276,000 new cases of invasive breast cancer and more than 48,000 non-invasive cases were diagnosed in the US....
Physiological measures, such as heart rate variability (HRV) and beats per minute (BPM), can be powerful health indicators of respiratory infections. HRV and BPM can be acquired through widely available wrist-worn biometric wearables and smartphones. Successive abnormal changes in these indicators could potentially be an early sign of respiratory i...
Internet of Vehicles (IoV) has emerged as an advancement over the traditional Vehicular Ad-hoc Networks (VANETs) towards achieving a more efficient intelligent transportation system that is capable of providing various intelligent services and supporting different applications for the drivers and passengers on roads. In order for the IoV and VANETs...
Security is one of the primary concerns when designing wireless networks. Along detecting user identity, it is also important to detect the devices at the hardware level. The identity create-and-discard process at higher layers of the protocol stack alone is not sufficient to effectively counter security threats, such as masquerading and Sybil atta...
Creating deepfake multimedia, and especially deepfake videos, has become much easier these days due to the availability of deepfake tools and the virtually unlimited numbers of face images found online. Research and industry communities have dedicated time and resources to develop detection methods to expose these fake videos. Although these detect...
Ever since unmanned aerial vehicles (UAV), also known as drones, became available for civilian use, their risks increased. Along with that, the need to control and monitor them increased rapidly. In the literature, many researchers explored different techniques and developed genuine and hybrid systems to counter UAVs. These systems are not only fou...
Anomaly detection has been used for decades to identify and extract anomalous components from data. Many techniques have been used to detect anomalies. One of the increasingly significant techniques is Machine Learning (ML), which plays an important role in this area. In this research paper, we conduct a Systematic Literature Review (SLR) which ana...
An increasing reliance on smart and connected devices in our homes, workplaces, and in everyday life has led to the rapid growth of the Internet-of-Things (IoT) technology. While some IoT devices communicate without the involvement of their users, their functionalities must be protected against various attacks. The firmware update process is a fund...
Blockchain technology is evolving rapidly; it has proved to be capable of solving many of the issues encountered by industries such as banking, supply chain management, and healthcare. However, several challenges must be overcome for it to reach its full potential and be adopted on a large scale. In a blockchain context, interoperability is the abi...
Blockchain is a revolutionary technology that allows data transactions to be made in a decentralized structure without having trusted central authorities. Governments have taken steps to unleash the potential of blockchain technology to explore the use of blockchain as critical infrastructure, create new business models, and transform government se...
With the advent of COVID-19 arose the need for social distancing measures, including the imposition of far-reaching lockdowns in many countries. The lockdown has wreaked havoc on many aspects of daily life, but education has been particularly hard hit by this unprecedented situation. The closure of educational institutions brought along many change...
Artificial intelligence (AI) and machine learning (ML) tools play a significant role in the recent evolution of smart systems. AI solutions are pushing towards a significant shift in many fields such as healthcare, autonomous airplanes and vehicles, security, marketing customer profiling and other diverse areas. One of the main challenges hindering...
The popularity and usage of Cloud computing is increasing rapidly. Several companies are investing in this field either for their own use or to provide it as a service for others. One of the results of Cloud development is the emergence of various security problems for both industry and consumer. One of the ways to secure Cloud is by using Machine...
Open source software (OSS) has recently become very important due to the rapid expansion of the software industry. In order to determine whether the quality of the software can achieve the intended purposes, the components of OSS need to be assessed as they are in closed source (conventional) software. Several quality in-use models have been introd...
Blockchain technology is growing rapidly, and a large number of blockchain platforms and decentralized applications have come to play a vital role in many fields. However, the majority of blockchain networks operate in environments that are isolated and disconnected from each other. This has raised issues such as connectivity and scalability in the...
This paper is a Systematic literature review on the topic of machine learning in object detection security, where the work done covers a number of 73 research papers related to this topic, and answers three different research questions, while providing charts, tables, and statistics to summarize the data and give the reader and easy to read summari...
Security is one of the major challenges that devices connected to the Internet of Things (IoT) face today. Remote attestation is used to measure these devices’ trustworthiness on the network by measuring the device platform’s integrity. Several software-based attestation mechanisms have been proposed, but none of them can detect runtime attacks. Al...
The Internet of Things (IoT) system deals with a large amount of data generated by numerous sensors distributed over a vast geographical area. The goal of gathering such a massive amount of data is to create information. The optimum Information Quality (IQ) is critical for leveraging value from the IoT system. Although several studies have made var...
The waste management processes typically involve numerous technical, climatic, environmental, demographic, socio-economic, and legislative parameters. Such complex nonlinear processes are challenging to model, predict and optimize using conventional methods. Recently, artificial intelligence (AI) techniques have gained momentum in offering alternat...
Blockchain, a Distributed Ledger Technology, is a disruptive and revolutionary technology that enables transacting data in a decentralized structure without the need for trusted central authorities. Many industries have taken steps to unleash the potential of blockchain technology, including the government sector, and early adopters are exploring t...
A literature survey study was conducted to explore the state-of-the-art of Open Source Software and the opportunities and challenges faced by this segment of the software industry in seven Arab countries — Tunisia, Egypt, Jordan, KSA, Qatar, Oman and UAE. A framework and road map for OSS is presented derived from interviews conducted in the UAE wit...
Open source digital forensics tools are playing an important role for
forensics investigations. So, there is a need to assess these tools to ensure they meet users’ needs. The existing literature does not satisfy the requirements of assessing their quality-in-use. This paper assesses three most used digital forensics tools, namely autopsy, DFF, and...
Open source software (OSS) has recently become very important due to the rapid expansion of the software industry. In order to determine whether the quality of the software can achieve the intended purposes, the components of OSS need to be assessed as they are in closed source (conventional) software. Several quality in-use models have been introd...
It is our great pleasure to welcome you to the first International Workshop on Cloud, IoT and Fog Security - CIFS 2019 collocated with the 12th IEEE/ACM International Conference on Utility and Cloud Computing - UCC 2019. Welcome to Auckland!
The processing of sensitive information is a cross-cutting topic unimpressed by imaginary system boundaries....
The emergence of technology associated with the Internet of Things (IoT) is reshaping our lives, while simultaneously raising many issues due to their low level of security, which attackers can exploit for malicious purposes. This research paper conducts a comprehensive analysis of previous studies on IoT device security with a focus on the various...
This paper addresses the problem related to the reliability of path after transmitting the given amount of data with the service level agreement (SLA) cooperation in the computer communication network (CCN). The links have associated with service performance factor (SPF) parameter during the data transmission and each node is associated with the re...
Recent developments in communication technologies, hardware and software are facilitating the implementation of different types of intelligent networks in various environments. One such network is the Internet-connected vehicles network. Internet of Vehicles (IoV) has recently become an active area of standardization, development and research, beca...
Blockchain technology is growing massively where the number of blockchain platforms and decentralized applications are increasing rapidly in the last years. However, most of the existing blockchain networks are operating in a standalone environment isolated from each other, which increases scalability and connectivity issues in the current blockcha...