Manar Abu Talib

Manar Abu Talib
  • Professor
  • University of Sharjah

About

146
Publications
75,928
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,645
Citations
Current institution
University of Sharjah

Publications

Publications (146)
Article
Full-text available
This paper presents a systematic examination and experimental comparison of the prominent Federated Learning (FL) frameworks FedML, Flower, Substra, and OpenFL. The frameworks are evaluated experimentally by implementing Federated Learning over a varying number of clients, emphasizing a thorough analysis of scalability and key performance metrics....
Article
Full-text available
A deepfake is a fast attack technique that has evolved rapidly over the past several years. It only takes one person to synthesize thousands of photorealistic images in a few hours or to manipulate a large number of videos. The creation of fake faces through image tampering has been identified as abusive media and could result in major ethical, leg...
Article
Full-text available
Rapid growth and technological improvement in wireless communication, driven by engineers from various disciplines, have reached significant milestones. Unmanned Aerial vehicles (UAVs) and flying ad hoc networks (FANET) have undergone one of the biggest innovations. UAVs have drawn a lot of attention from research institutions. They are increasingl...
Article
Full-text available
Background During preclinical training, dental students take radiographs of acrylic (plastic) blocks containing extracted patient teeth. With the digitisation of medical records, a central archiving system was created to store and retrieve all x-ray images, regardless of whether they were images of teeth on acrylic blocks, or those from patients. I...
Article
Full-text available
False Data Injection Attacks (FDIA) pose a significant threat to the stability of smart grids. Traditional Bad Data Detection (BDD) algorithms, deployed to remove low-quality data, can easily be bypassed by these attacks which require minimal knowledge about the parameters of the power bus systems. This makes it essential to develop defence approac...
Article
Full-text available
Artificial intelligence integration, specifically ChatGPT, is becoming increasingly popular in educational contexts. This research paper provides a systematic literature review that examines the effects of incorporating ChatGPT into education. The study examines four primary research questions: the benefits and challenges of ChatGPT, its impact on...
Article
Full-text available
With the outbreak of COVID-19 in 2020, countries worldwide faced significant concerns and challenges. Various studies have emerged utilizing Artificial Intelligence (AI) and Data Science techniques for disease detection. Although COVID-19 cases have declined, there are still cases and deaths around the world. Therefore, early detection of COVID-19...
Article
Full-text available
With the outbreak of COVID-19 in 2020, countries worldwide faced significant concerns and challenges. Various studies have emerged utilizing Artificial Intelligence (AI) and Data Science techniques for disease detection. Although COVID-19 cases have declined, there are still cases and deaths around the world. Therefore, early detection of COVID-19...
Article
Full-text available
Software engineering workflows use version control systems to track changes and handle merge cases from multiple contributors. This has introduced challenges to testing because it is impractical to test whole codebases to ensure each change is defect-free, and it is not enough to test changed files alone. Just-in-time software defect prediction (JI...
Article
Full-text available
With the rise of the 3Ds—decarbonization, decentralization, and digitalization—the number of electric vehicles is projected to increase, necessitating the implementation of modern technologies to avoid unnecessary energy wastage. Numerous studies have been developed proposing electric vehicle (EV) charging frameworks in networks empowered by renewa...
Article
Artificial Intelligence (AI) approaches have been increasingly used in financial markets as technology advances. In this research paper, we conduct a Systematic Literature Review (SLR) that studies financial trading approaches through AI techniques. It reviews 143 research articles that implemented AI techniques in financial trading markets. Accord...
Preprint
Full-text available
False Data Injection Attacks (FDIA) pose a significant threat to the stability of smart grids. Traditional Bad Data Detection (BDD) algorithms, deployed to remove low-quality data, can easily be bypassed by these attacks which require minimal knowledge about the parameters of the power bus systems. This makes it essential to develop defence approac...
Article
Background: Software Defect Prediction (SDP) is a vital step in software development. SDP aims to identify the most likely defect-prone modules before starting the testing phase, and it helps assign resources and reduces the cost of testing. Aim: Although many machine learning algorithms have been used to classify software modules based on static c...
Article
Full-text available
The Internet of Things (IoT) paradigm and the advanced wireless technologies of 5G and beyond are expected to enable diverse applications such as autonomous driving, industrial automation, and smart cities. These applications bring together a vast and diverse IoT device population that occupy radio frequency spectrum. Such a large number of wireles...
Article
Full-text available
Software defect prediction (SDP) plays a significant role in detecting the most likely defective software modules and optimizing the allocation of testing resources. In practice, though, project managers must not only identify defective modules, but also rank them in a specific order to optimize the resource allocation and minimize testing costs, e...
Article
Worldwide, electricity production exceeds its consumption which leads to wasted financial and energy resources. Machine learning models can be utilized to predict the future consumption to avoid these significant losses. This paper presents the data for the monthly electricity consumption on the community level during May 2017–December 2019 in Duba...
Article
Full-text available
Despite the declining COVID-19 cases, global healthcare systems still face significant challenges due to ongoing infections, especially among fully vaccinated individuals, including adolescents and young adults (AYA). To tackle this issue, cost-effective alternatives utilizing technologies like Artificial Intelligence (AI) and wearable devices have...
Chapter
Financial markets are extremely complex due to their non-linear, non- stationary, and time-variant nature. Researchers are increasingly investigating the automation of financial trading as AI capabilities advance particularly in complicated markets such as Foreign Exchange. (FOREX). Traders typically use three types of trading analysis: technical a...
Article
Full-text available
Blockchain technology in the healthcare industry has potential to enable enhanced privacy, increased security, and an interoperable data record. Blockchain technology is being implemented in dental care systems to store and share medical information, improve insurance claims, and provide innovative dental data ledgers. Because the healthcare sector...
Conference Paper
Dental x-rays have been a standard piece of dental equipment for many years and are an indispensable diagnostic tool for dentists to detect tooth damage or disease. Recent research has focused on employing computer vision algorithms to automate analysis of dental x-rays. Our study aims to review the work done using transfer learning in dental image...
Article
Water scarcity has urged the need for adequate water demand forecasting to facilitate efficient planning of municipal infrastructure. However, the development of water consumption models is challenged by the rapid environmental and socio-economic changes, particularly during unforeseen events like the COVID-19 pandemic. This study investigated the...
Article
The security of a community is its topmost priority; hence, governments must take proper actions to reduce the crime rate. Consequently, the application of artificial intelligence (AI) in crime prediction is a significant and well-researched area. This study investigates AI strategies in crime prediction. We conduct a systematic literature review (...
Chapter
Researchers have focused on wearable devices as viable Internet of Things (IoT) solutions in the recent decade. After the epidemic of COVID-19, they are receiving increasing attention. Wearable Internet of Things (IoT) systems must have high information quality (IQ) to be useful. In earlier publications, we developed a comprehensive framework for s...
Article
Full-text available
Advanced Persistent Threat (APT) is a type of threat that has grabbed the attention of researchers, particularly in the industrial security field. APTs are cyber intrusions carried out by skilled and well-resourced adversaries who target specific information in high-profile organizations and governments, frequently as part of a multi-phase long-ter...
Article
Dubai is an emerging metropolis with unique features, such as an extremely high expatriate ratio and turnover rate. These features, along with the extreme climatic conditions and dependency on energy-intensive water desalination, cause the electricity load to be high per capita and highly variable. Therefore, producing accurate electricity consumpt...
Article
Full-text available
Creating deepfake multimedia, and especially deepfake videos, has become much easier these days due to the availability of deepfake tools and the virtually unlimited numbers of face images found online. Research and industry communities have dedicated time and resources to develop detection methods to expose these fake videos. Although these detect...
Preprint
Full-text available
Cancer is one of the most dangerous diseases to humans, and yet no permanent cure has been developed for it. Breast cancer is one of the most common cancer types. According to the National Breast Cancer foundation, in 2020 alone, more than 276,000 new cases of invasive breast cancer and more than 48,000 non-invasive cases were diagnosed in the US....
Article
Full-text available
Cancer is one of the most dangerous diseases to humans, and yet no permanent cure has been developed for it. Breast cancer is one of the most common cancer types. According to the National Breast Cancer Foundation, in 2020 alone, more than 276,000 new cases of invasive breast cancer and more than 48,000 non-invasive cases were diagnosed in the US....
Article
Full-text available
Physiological measures, such as heart rate variability (HRV) and beats per minute (BPM), can be powerful health indicators of respiratory infections. HRV and BPM can be acquired through widely available wrist-worn biometric wearables and smartphones. Successive abnormal changes in these indicators could potentially be an early sign of respiratory i...
Article
Full-text available
Internet of Vehicles (IoV) has emerged as an advancement over the traditional Vehicular Ad-hoc Networks (VANETs) towards achieving a more efficient intelligent transportation system that is capable of providing various intelligent services and supporting different applications for the drivers and passengers on roads. In order for the IoV and VANETs...
Article
Full-text available
Security is one of the primary concerns when designing wireless networks. Along detecting user identity, it is also important to detect the devices at the hardware level. The identity create-and-discard process at higher layers of the protocol stack alone is not sufficient to effectively counter security threats, such as masquerading and Sybil atta...
Preprint
Full-text available
Creating deepfake multimedia, and especially deepfake videos, has become much easier these days due to the availability of deepfake tools and the virtually unlimited numbers of face images found online. Research and industry communities have dedicated time and resources to develop detection methods to expose these fake videos. Although these detect...
Chapter
Ever since unmanned aerial vehicles (UAV), also known as drones, became available for civilian use, their risks increased. Along with that, the need to control and monitor them increased rapidly. In the literature, many researchers explored different techniques and developed genuine and hybrid systems to counter UAVs. These systems are not only fou...
Article
Full-text available
Anomaly detection has been used for decades to identify and extract anomalous components from data. Many techniques have been used to detect anomalies. One of the increasingly significant techniques is Machine Learning (ML), which plays an important role in this area. In this research paper, we conduct a Systematic Literature Review (SLR) which ana...
Chapter
An increasing reliance on smart and connected devices in our homes, workplaces, and in everyday life has led to the rapid growth of the Internet-of-Things (IoT) technology. While some IoT devices communicate without the involvement of their users, their functionalities must be protected against various attacks. The firmware update process is a fund...
Chapter
Blockchain technology is evolving rapidly; it has proved to be capable of solving many of the issues encountered by industries such as banking, supply chain management, and healthcare. However, several challenges must be overcome for it to reach its full potential and be adopted on a large scale. In a blockchain context, interoperability is the abi...
Chapter
Blockchain is a revolutionary technology that allows data transactions to be made in a decentralized structure without having trusted central authorities. Governments have taken steps to unleash the potential of blockchain technology to explore the use of blockchain as critical infrastructure, create new business models, and transform government se...
Article
Full-text available
With the advent of COVID-19 arose the need for social distancing measures, including the imposition of far-reaching lockdowns in many countries. The lockdown has wreaked havoc on many aspects of daily life, but education has been particularly hard hit by this unprecedented situation. The closure of educational institutions brought along many change...
Article
Full-text available
Artificial intelligence (AI) and machine learning (ML) tools play a significant role in the recent evolution of smart systems. AI solutions are pushing towards a significant shift in many fields such as healthcare, autonomous airplanes and vehicles, security, marketing customer profiling and other diverse areas. One of the main challenges hindering...
Article
Full-text available
The popularity and usage of Cloud computing is increasing rapidly. Several companies are investing in this field either for their own use or to provide it as a service for others. One of the results of Cloud development is the emergence of various security problems for both industry and consumer. One of the ways to secure Cloud is by using Machine...
Chapter
Open source software (OSS) has recently become very important due to the rapid expansion of the software industry. In order to determine whether the quality of the software can achieve the intended purposes, the components of OSS need to be assessed as they are in closed source (conventional) software. Several quality in-use models have been introd...
Chapter
Blockchain technology is growing rapidly, and a large number of blockchain platforms and decentralized applications have come to play a vital role in many fields. However, the majority of blockchain networks operate in environments that are isolated and disconnected from each other. This has raised issues such as connectivity and scalability in the...
Conference Paper
Full-text available
This paper is a Systematic literature review on the topic of machine learning in object detection security, where the work done covers a number of 73 research papers related to this topic, and answers three different research questions, while providing charts, tables, and statistics to summarize the data and give the reader and easy to read summari...
Article
Full-text available
Security is one of the major challenges that devices connected to the Internet of Things (IoT) face today. Remote attestation is used to measure these devices’ trustworthiness on the network by measuring the device platform’s integrity. Several software-based attestation mechanisms have been proposed, but none of them can detect runtime attacks. Al...
Article
The Internet of Things (IoT) system deals with a large amount of data generated by numerous sensors distributed over a vast geographical area. The goal of gathering such a massive amount of data is to create information. The optimum Information Quality (IQ) is critical for leveraging value from the IoT system. Although several studies have made var...
Article
The waste management processes typically involve numerous technical, climatic, environmental, demographic, socio-economic, and legislative parameters. Such complex nonlinear processes are challenging to model, predict and optimize using conventional methods. Recently, artificial intelligence (AI) techniques have gained momentum in offering alternat...
Article
Blockchain, a Distributed Ledger Technology, is a disruptive and revolutionary technology that enables transacting data in a decentralized structure without the need for trusted central authorities. Many industries have taken steps to unleash the potential of blockchain technology, including the government sector, and early adopters are exploring t...
Chapter
A literature survey study was conducted to explore the state-of-the-art of Open Source Software and the opportunities and challenges faced by this segment of the software industry in seven Arab countries — Tunisia, Egypt, Jordan, KSA, Qatar, Oman and UAE. A framework and road map for OSS is presented derived from interviews conducted in the UAE wit...
Article
Full-text available
Open source digital forensics tools are playing an important role for forensics investigations. So, there is a need to assess these tools to ensure they meet users’ needs. The existing literature does not satisfy the requirements of assessing their quality-in-use. This paper assesses three most used digital forensics tools, namely autopsy, DFF, and...
Article
Full-text available
Open source software (OSS) has recently become very important due to the rapid expansion of the software industry. In order to determine whether the quality of the software can achieve the intended purposes, the components of OSS need to be assessed as they are in closed source (conventional) software. Several quality in-use models have been introd...
Conference Paper
It is our great pleasure to welcome you to the first International Workshop on Cloud, IoT and Fog Security - CIFS 2019 collocated with the 12th IEEE/ACM International Conference on Utility and Cloud Computing - UCC 2019. Welcome to Auckland! The processing of sensitive information is a cross-cutting topic unimpressed by imaginary system boundaries....
Article
The emergence of technology associated with the Internet of Things (IoT) is reshaping our lives, while simultaneously raising many issues due to their low level of security, which attackers can exploit for malicious purposes. This research paper conducts a comprehensive analysis of previous studies on IoT device security with a focus on the various...
Article
Full-text available
This paper addresses the problem related to the reliability of path after transmitting the given amount of data with the service level agreement (SLA) cooperation in the computer communication network (CCN). The links have associated with service performance factor (SPF) parameter during the data transmission and each node is associated with the re...
Article
Full-text available
Recent developments in communication technologies, hardware and software are facilitating the implementation of different types of intelligent networks in various environments. One such network is the Internet-connected vehicles network. Internet of Vehicles (IoV) has recently become an active area of standardization, development and research, beca...
Conference Paper
Blockchain technology is growing massively where the number of blockchain platforms and decentralized applications are increasing rapidly in the last years. However, most of the existing blockchain networks are operating in a standalone environment isolated from each other, which increases scalability and connectivity issues in the current blockcha...

Network

Cited By