Shahab Tayeb

Shahab Tayeb
Verified
Shahab verified their affiliation via an institutional email.
Verified
Shahab verified their affiliation via an institutional email.
  • Doctor of Philosophy
  • Professor (Associate) at California State University, Fresno

About

47
Publications
7,620
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
533
Citations
Current institution
California State University, Fresno
Current position
  • Professor (Associate)

Publications

Publications (47)
Conference Paper
This paper surveys fog computing and embedded systems platforms as the building blocks of Internet of Things (IoT). Many concepts around IoT architectures, with various examples, are also discussed. This paper reviews a high-level conceptual layered architecture for IoT from a computational perspective. The architecture incorporates fog computing t...
Conference Paper
This paper aims to discuss a comprehensive list of demerits associated with the use of Diffusing Update Algorithm compared to its link-state counterpart, namely, Shortest Path First algorithm which is a variant of Dijkstra's algorithm. Such a comparison was neglected for the past two decades due to the proprietary nature of the former protocol. Thi...
Article
Full-text available
Community structures and relation patterns, and ranking them for social networks provide us with great knowledge about network. Such knowledge can be utilized for target marketing or grouping similar, yet distinct, nodes. The ever-growing variety of social networks necessitates detection of minute and scattered communities, which are important prob...
Article
High Utility Itemset Mining (HUIM) and Frequent Itemset Mining (FIM) are two important branches in the data mining area, where Frequent Itemset Mining considers itemsets that occur in large numbers in the transaction database, while High Utility Itemset Mining considers the number and unit utility value of itemsets. However, in practical applicatio...
Article
Full-text available
Blind intersections have high accident rates due to the poor visibility of oncoming traffic, high traffic speeds, and lack of infrastructure (e.g., stoplights). These intersections are more commonplace in rural areas, where traffic infrastructure is less developed. The Internet of Vehicles (IoV) aims to address such safety concerns through a networ...
Article
Full-text available
Traffic simulation is widely used for modeling, planning, and analyzing different strategies for traffic control and road development in a cost-efficient manner. In order to perform an intersection simulation, random vehicle trip data are typically applied to an intersection network, making them unrealistic. In this paper, we address this issue by...
Article
Full-text available
Top-k dominating (TKD) query is one of the methods to find the interesting objects by returning the k objects that dominate other objects in a given dataset. Incomplete datasets have missing values in uncertain dimensions, so it is difficult to obtain useful information with traditional data mining methods on complete data. BitMap Index Guided Algo...
Article
Full-text available
With the emergence of networked devices, from the Internet of Things (IoT) nodes and cellular phones to vehicles connected to the Internet, there has been an ever-growing expansion of attack surfaces in the Internet of Vehicles (IoV). In the past decade, there has been a rapid growth in the automotive industry as network-enabled and electronic devi...
Chapter
This paper details a real-time vehicle system solution for vehicular heatstroke. In the current implementation, the system uses two Raspberry Pi microcontrollers, where one microcontroller is equipped with YOLOv3-Tiny, a “You Only Look Once” (YOLO) real-time object detection model, narrowed to detect pets (dogs and cats) left unattended in a vehicl...
Chapter
Regardless of the rapid developments in the Internet of Things (IoT) world, its integration into our daily lives has been trailing slowly. We believe that the issue stems from vendor-specific products, restricting customers to their proprietary software and limiting interoperability across vendors. In our earlier research, we proposed a Mixed Reali...
Chapter
The Internet Engineering Task Force (IETF) introduced the RPL routing protocol to meet the routing requirements of the lossy networks. The inbuilt security features in the RPL design prevent external attacks but fail to mitigate internal attackers’ threats. The absence of robust security mechanisms in the RPL design has made it vulnerable to differ...
Article
Full-text available
The high average-utility itemset mining (HAUIM) was established to provide a fair measure instead of genetic high-utility itemset mining (HUIM) for revealing the satisfied and interesting patterns. In practical applications, the database is dynamically changed when insertion/deletion operations are performed on databases. Several works were designe...
Article
Full-text available
The advancement in recent IoT devices has led to catastrophic attacks on the devices resulting in breaches in user privacy and exhausting resources of various organizations, so that users and organizations expend increased time and money. One such harmful malware is Mirai, which has created worldwide recognition by impacting the digital world. Ther...
Article
Full-text available
Privacy‐preserving data mining (PPDM) is a popular research topic in the data mining field. For individual information protection, it is vital to protect sensitive information during data mining procedures. Furthermore, it is also a serious offense to spill sensitive private knowledge. Recently, many PPDM data mining algorithms have been proposed t...
Chapter
Earlier, many PPDM algorithms have been proposed to conceal sensitive items in a database in order to disclose sensitive itemsets. All prior techniques, however, ignored a crucial problem in setting minimum support thresholds. Thus, a new concept of minimal support for solving this issue is proposed in this paper. In compliance with a given thresho...
Chapter
The Internet of Vehicles (IoV) aims to establish a network of autonomous vehicles that exchange messages with one another and the infrastructure such as road-side units and a central trust authority. These messages must be secure in transmission to ensure network security and utilize as little resources as possible. Currently, there is much researc...
Conference Paper
In this paper, an inexpensive and user-friendly agriculture automation system is proposed by networking a collection of sensors and actuators to sense the moisture content of the soil and control the water valves for multiple irrigation zones. Using freely available frequencies in the Industrial, Scientific, and Medical (ISM) bands, multiple sensor...
Conference Paper
The Internet of Things (IoT) world is developing rapidly, yet seamless integration into our daily lives is lacking. Vendor-specific products tend to restrict customers to their software applications, due to their inherent steep learning curve. We develop the Mixed Reality Control Panel (MRCP) system to address this gap by offering a cross-platform,...
Conference Paper
To stay ahead of novel attacks, cyber security professionals are developing new software and systems using machine learning techniques. Neural network architectures improve such systems, e.g., IDS, by implementing anomaly detection, which differentiates benign packets from malicious packets. In order for an IDS to best predict anomalies, the data t...
Article
Full-text available
The Internet of Vehicles (IoV) is an emerging research framework, with network and graph theories as two of the major fields. Researchers in these topics use a variety of tools and approaches to simulate and perform experimentation on their proposed methodologies. A comprehensive study to facilitate the selection of such simulation tools is lacking...
Technical Report
The Internet of Vehicles (IoV) aims to establish a network of autonomous and connected vehicles that communicate with one another through facilitation led by road-side units (RSUs) and a central trust authority (TA). Messages must be efficiently and securely disseminated to conserve resources and preserve network security. Currently, research in th...
Article
Full-text available
The advancement in technology has transformed Cyber Physical Systems and their interface with IoT into a more sophisticated and challenging paradigm. As a result, vulnerabilities and potential attacks manifest themselves considerably more than before, forcing researchers to rethink the conventional strategies that are currently in place to secure s...
Research
Full-text available
https://solarnexus.epscorspo.nevada.edu/taming-the-data-explosion/
Conference Paper
Full-text available
This paper presents the use of the Support Vector Regression (SVR) technique to forecast the reliability of a system. Future predicted values of system reliability are highly sensitive to the choice of SVR parameters and the type of kernel SVR function. The dataset of a turbocharged diesel engine system was used as a case study. The Normalize Root...
Conference Paper
Cloud computing provides its services via high speed networks as a service to users. In private clouds, the consumers access resources through a broker. This prevents wasting resources by owning idle systems and thus, lowering the cost. In this paper, a method is proposed to minimize the energy consumption of smart grid computation systems. To achi...
Article
Full-text available
This paper aims to discuss a comprehensive list of demerits associated with the use of Diffusing Update Algorithm compared to its link-state counterpart, namely, Shortest Path First algorithm which is a variant of Dijkstra’s algorithm. Such a comparison was neglected for the past two decades due to the proprietary nature of the former protocol. Thi...
Article
Full-text available
Wireless Sensor Networks (WSNs) consist of many sensor nodes which are vital to various applications in our daily lives. Optimizing energy usage is a key challenge for WSNs. Improving energy utilization can help with controlling traffic, saving energy and eventually, resulting in a better lifetime. In this paper, a modification of the Energy Effici...
Conference Paper
The Wireless Sensor Networks (WSNs) consist of many sensor nodes which are vital to various applications in our daily lives. Load-balancing is a key challenge for WSNs. Improving load-balancing can help with controlling traffic, saving energy and eventually, resulting in a better lifetime. In this paper, a modification of the Energy Efficient Credi...
Conference Paper
Clickjacking attacks are emerging threats to websites of different sizes and shapes. They are particularly used by threat agents to get more likes and/or followers in Online Social Networks (OSNs). This paper reviews the clickjacking attacks and the classic solutions to tackle various forms of those attacks. Different approaches of Cross-Site Scrip...

Network

Cited By