Bader Fahad Alkhamees’s research while affiliated with King Saud University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (19)


Figure 1: The set of data preprocessing techniques employed to extract images to improve the generalization of the proposed model
Figure 2: The layers in the architecture of Pixel Kernel Generator
Figure 3: Combined Adversarial Training Framework 2 adopted in the proposed model
Table 3 (continued)
Figure 4: Sample images extracted from FaceForensics++ dataset. Column 1 represents original images in the dataset. Columns 2 to 5 represent corresponding images in the dataset which have undergone manipulation techniques such as Face2Face, FaceSwap, DeepFakes, and Neural Textures

+10

Deepfake Detection Using Adversarial Neural Network
  • Article
  • Full-text available

May 2025

·

1 Read

·

·

Karthiga Marimuthu

·

[...]

·

With expeditious advancements in AI-driven facial manipulation techniques, particularly deepfake technology, there is growing concern over its potential misuse. Deepfakes pose a significant threat to society, particularly by infringing on individuals’ privacy. Amid significant endeavors to fabricate systems for identifying deepfake fabrications, existing methodologies often face hurdles in adjusting to innovative forgery techniques and demonstrate increased vulnerability to image and video clarity variations, thereby hindering their broad applicability to images and videos produced by unfamiliar technologies. In this manuscript, we endorse resilient training tactics to amplify generalization capabilities. In adversarial training, models are trained using deliberately crafted samples to deceive classification systems, thereby significantly enhancing their generalization ability. In response to this challenge, we propose an innovative hybrid adversarial training framework integrating Virtual Adversarial Training (VAT) with Two-Generated Blurred Adversarial Training. This combined framework bolsters the model’s resilience in detecting deepfakes made using unfamiliar deep learning technologies. Through such adversarial training, models are prompted to acquire more versatile attributes. Through experimental studies, we demonstrate that our model achieves higher accuracy than existing models.

Download

A novel decision ensemble framework: Attention-customized BiLSTM and XGBoost for speculative stock price forecasting

April 2025

·

24 Reads

·

2 Citations

Forecasting speculative stock prices is essential for effective investment risk management and requires innovative algorithms. However, the speculative nature, volatility, and complex sequential dependencies within financial markets present inherent challenges that necessitate advanced techniques. In this regard, a novel framework, ACB-XDE (Attention-Customized BiLSTM-XGB Decision Ensemble), is proposed for predicting the daily closing price of speculative stock Bitcoin-USD (BTC-USD). The proposed ACB-XDE framework integrates the learning capabilities of a customized Bi-directional Long Short-Term Memory (BiLSTM) model with a novel attention mechanism and the XGBoost algorithm. The customized BiLSTM leverages its learning capabilities to capture complex sequential dependencies and speculative market trends. Meanwhile, the new attention mechanism dynamically assigns weights to influential features based on volatility patterns, thereby enhancing interpretability and optimizing effective cost measures and volatility forecasting. Moreover, XGBoost handles nonlinear relationships and contributes to the proposed ACB-XDE framework’s robustness. Furthermore, the error reciprocal method improves predictions by iteratively adjusting model weights based on the difference between theoretical expectations and actual errors in the individual attention-customized BiLSTM and XGBoost models. Finally, the predictions from both the XGBoost and attention-customized BiLSTM models are concatenated to create a varied prediction space, which is then fed into the ensemble regression framework to improve the generalization capabilities of the proposed ACB-XDE framework. Empirical validation of the proposed ACB-XDE framework involves its application to the volatile Bitcoin market, utilizing a dataset sourced from Yahoo Finance (Bitcoin-USD, 10/01/2014 to 01/08/2023). The proposed ACB-XDE framework outperforms state-of-the-art models with a MAPE of 0.37%, MAE of 84.40, and RMSE of 106.14. This represents improvements of approximately 27.45%, 53.32%, and 38.59% in MAPE, MAE, and RMSE respectively, over the best-performing attention-BiLSTM. The proposed ACB-XDE framework presents a technique for informed decision-making in dynamic financial landscapes and demonstrates effectiveness in handling the complexities of BTC-USD data.


Foreign object debris detection in lane images using deep learning methodology

January 2025

·

25 Reads

Background Foreign object debris (FOD) is an unwanted substance that damages vehicular systems, most commonly the wheels of vehicles. In airport runways, these foreign objects can damage the wheels or internal systems of planes, potentially leading to flight crashes. Surveys indicate that FOD-related damage costs over $4 billion annually, affecting airlines, airport tenants, and passengers. Current FOD clearance involves high-cost radars and significant manpower, and existing radar and camera-based surveillance methods are expensive to install. Methods This work proposes a video-based deep learning methodology to address the high cost of radar-based FOD detection. The proposed system consists of two modules for FOD detection: object classification and object localization. The classification module categorizes FOD into specific types of foreign objects. In the object localization module, these classified objects are pinpointed in video frames. Results The proposed system was experimentally tested with a large video dataset and compared with existing methods. The results demonstrated improved accuracy and robustness, allowing the FOD clearance team to quickly detect and remove foreign objects, thereby enhancing the safety and efficiency of airport runway operations.


Dissecting the Infodemic: An In-Depth Analysis of COVID-19 Misinformation Detection on X (Formerly Twitter) Utilizing Machine Learning and Deep Learning Techniques

September 2024

·

103 Reads

·

3 Citations

Heliyon

The alarming growth of misinformation on social media has become a global concern as it influences public opinions and compromises social, political, and public health development. The proliferation of deceptive information has resulted in widespread confusion, societal disturbances, and significant consequences for matters pertaining to health. Throughout the COVID-19 pandemic, there was a substantial surge in the dissemination of inaccurate or deceptive information via social media platforms, particularly X (formerly known as Twitter), resulting in the phenomenon commonly referred to as an “Infodemic”. This review paper examines a grand selection of 600 articles published in the past five years and focuses on conducting a thorough analysis of 87 studies that investigate the detection of fake news connected to COVID-19 on Twitter. In addition, this research explores the algorithmic techniques and methodologies used to investigate the individuals responsible for disseminating this type of fake news. A summary of common datasets, along with their fundamental qualities, for detecting fake news has been included as well. For the purpose of identifying fake news, the behavioral pattern of the misinformation spreaders, and their community analysis, we have performed an in-depth examination of the most recent literature that the researchers have worked with and recommended. Our key findings can be summarized in a few points: (a) around 80% of fake news detection-related papers have utilized Deep Neural Networks-based techniques for better performance achievement, although the proposed models suffer from overfitting, vanishing gradients, and higher prediction time problems, (b) around 60% of the disseminator related analysis papers focus on identifying dominant spreaders and their communities utilizing graph modeling although there is not much work done in this domain, and finally, (c) we conclude by pointing out a wide range of research gaps, for example, the need of a large and robust training dataset and deeper investigation of the communities, etc., and suggesting potential solution strategies. Moreover, to facilitate the utilization of a large training dataset for detecting fake news, we have created a large database by compiling the training datasets from 17 different research works. The objective of this study is to shed light on exactly how COVID-19-related tweets are beginning to diverge, along with the dissemination of misinformation. Our work uncovers notable discoveries, including the ongoing rapid growth of the disseminator population, the presence of professional spreaders within the disseminator community, and a substantial level of collaboration among the fake news spreaders.


Various kinds of artificial intelligence technologies
Artificial intelligence-driven circular economy for smart and sustainable agriculture
Significance of digital twin-driven circular economy
Sustainable development goals attained by all the companies
Circular Economy Advances with Artificial Intelligence and Digital Twin: Multiple-Case Study of Chinese Industries in Agriculture

May 2024

·

144 Reads

·

9 Citations

Journal of the Knowledge Economy

The population growth is drastically surging in demand for food and water and uplifting consumption and waste resulting in overburden of society and the environment. Urgent actions are required to address these emerging global issues. Therefore, adopting a circular economy (CE) is essential to sustain the consumption rate and accommodate the ever-increasing demand. Moreover, the CE practices accelerate the progress on sustainable development. From this perspective, digital technologies are playing driving roles in the successful implementations of CE practices and achievements of the United Nations’ (UN) sustainable development goals (SDGs). Among various emerging digital technologies, artificial intelligence (AI) and digital twin ((DT) are the promising ones. This paper aims to understand and explore how both technologies facilitate the CE transitions and attain SDGs in the agriculture domain. To this end, we provide insights into the concepts of CE, AI, and DT with preliminary and current research status. This research evaluates the contributions of global organizations for CE transitions. We elaborate on the significant contributions of AI and DT in the transition towards CE and identify some challenges that hinder the adoption of these technologies. Besides expanding knowledge, concise multiple case studies are also presented as evidence to depict how companies in China are deploying these technologies to digitize various operations and create solutions for waste management, sustainable resource consumption, renewal energy, water conservation, etc. Findings reveal that these companies successfully attain many SDGs of 1, 2, 6, 7, 9, 11, 12, 13, 14, 15, and 17. This paper enormously contributes to the emerging research domain of integrating CE, AI, DT, and agriculture.



Anonymous Quantum Safe Construction of Three Party Authentication and Key Agreement Protocol for Mobile Devices

January 2024

·

57 Reads

·

13 Citations

IEEE Access

Once the shared secret key is established, three parties can use it for secure communication using symmetric-key encryption AES (128, 192, 256) algorithms or other cryptographic primitives. Although there are few third-party post-quantum authentication and key agreement protocols exist, but the recent studies in this article show that they are not anonymous or cannot provide forward secrecy. Most of the existing protocols enable adversaries to trace the source of messages. Many of third-party AKA schemes based on conventional public-key cryptosystems are vulnerable to quantum computers. Therefore, this paper contains a forward secure three-party post-quantum authenticated key establishment protocol for mobile devices. The proposed three-party key exchange protocol establishes an authenticated shared key that can be periodically refreshed to maintain forward secrecy. This protocol enables two parties to establish a shared session key even in the presence of quantum adversaries and enables them to communicate confidentially and securely over insecure networks. The protocol is anonymous as both the parties communicate using masked dynamic identities. A contrast study consisting of performance and security assessment is presented, which illustrates the suggested design is more applicable.


Securing Smart Manufacturing by Integrating Anomaly Detection With Zero-Knowledge Proofs

January 2024

·

89 Reads

·

17 Citations

IEEE Access

In the rapidly advancing domain of smart manufacturing, securing data integrity and preventing unauthorized access are critical challenges. This study introduces a novel approach that synergizes anomaly detection techniques with Zero-Knowledge Proofs (ZKPs) to fortify the security framework of smart manufacturing systems. Our methodology employs a combination of data preprocessing, including statistical imputation and data smoothing, alongside advanced anomaly detection using classification methods and neural networks, particularly focusing on deep learning architectures. The detected anomalies undergo verification through zk-SNARKs, a specialized ZKP scheme, ensuring a robust validation process without compromising data confidentiality. Our findings reveal a notable enhancement in the accuracy of anomaly detection, achieving detection rates of approximately 95% for temperature fluctuations and 90% for pressure irregularities, with a significant reduction in false positives. This performance is markedly superior to traditional methods and aligns closely with the highest efficacy rates reported in contemporary studies. Moreover, the utilization of ZKPs for anomaly verification demonstrated a 98% success rate, ensuring the secure and private verification of anomalies. The integration of anomaly detection with ZKPs presents a significant leap forward in addressing the security vulnerabilities inherent in smart manufacturing. This study not only showcases the effectiveness of our approach in enhancing data security and integrity but also sets a benchmark for future research in creating more resilient and trustworthy industrial operations.


Enhancing the Quality and Authenticity of Synthetic Mammogram Images for Improved Breast Cancer Detection

January 2024

·

70 Reads

·

12 Citations

IEEE Access

Breast cancer is widespread worldwide and can be cured if diagnosed early. Mammography is an irreplaceable and critical technique in modern medicine, serving as a foundation for breast cancer detection. In medical imaging, the reliability of synthetic mammogram images is produced by Deep Convolutional Generative Adversarial Networks (DCGANs). The human validation for assessing the quality of synthetic images for examining and calculating the perceptual variations between synthetic images and real-world counterparts is a difficult task. Thus, this research focused on improving the quality and authenticity of synthetic mammogram images. For this, we explored and identified a new research gap because the radiologists consistently expressed much higher confidence levels in real mammogram images in their assessment process. This research highlights the key difference between synthetic and real mammograms by defining mean scores. The defined mean identifies a sizable gap, with real mammographic images receiving an average score of 0.73 and a synthetic score of 0.31. we performed a statistical analysis, which yielded a T-statistic of -6.35, a p-value less than 0.001, and a 95% confidence interval ranging from -0.50 to -0.28. These results have a wide range of ramifications. It emphasizes the urgent need for further generative model improvement, improving the legitimacy and caliber of synthetic mammogram images. Our research highlights how crucial it is to incorporate synthetic images into clinical practice with caution and thought. The Ethical considerations must encompass the potential consequences of relying on synthetic data in medical decision-making, alongside concerns related to diagnostic accuracy and patient safety. In future research, we work on improving generative models, leveraging more extensive and more diverse datasets. Comprehensive validation studies, encompassing a broader spectrum of radiologists and datasets, are pivotal to validate and generalize our findings. This study sets the stage for a deeper understanding of the validity of synthetic mammogram images.


FIGURE 1. A simple architecture for Blockchain of three blocks
FIGURE 2. An overview of the proposed communication model
FIGURE 3. Device Computation cost in nanoseconds
Variables in the Platooning Formation Procedure
DEVICE CONFIGURATION
Module Lattice Based Post Quantum Secure Blockchain Empowered Authentication Framework for Autonomous Truck Platooning

January 2024

·

70 Reads

·

5 Citations

IEEE Access

Truck platooning uses networking technology and automated driving support systems to join multiple trucks in a group. When these vehicles interact for particular journey stages, such as on highways, they autonomously maintain a predefined, tight spacing among themselves. Platooning improves transportation by making better use of highways, delivering cargo faster, and minimizing congestion in traffic. Therefore, safety and platooning are two important at tributes of an intelligent truck system. This paper discusses a quantum-safe blockchain-empowered authentication mechanism for autonomous truck platooning. The proposed idea is to use blockchain to combine multiple nodes and ensure authenticity with the help of an aggregation technique. The proposed design ensures authenticity to the system due to hard assumptions, (1) Learning With Error (LWE), and (2) Short Integer Solution (SIS) on random module generated lattice. This paper uses operations over module lattices to be more efficient than general lattices. We can perform operations on module lattices with the help of fast algorithms for polynomial arithmetic.


Citations (16)


... Good Practices for Financial Time Series AI [17] identifies best practices for implementing explainability in AI-driven financial forecasting systems, emphasizing the importance of data quality and tailored methods for specific audiences while considering data properties. CAB-XDE Framework [38] details an innovative decision ensemble framework that combines customized attention BiLSTM with XGBoost for predicting speculative stock prices, validated through empirical analysis in the volatile Bitcoin market and showing superior performance compared to existing models. ...

Reference:

Integrating Deep Learning Models for Improved AI-Based Price Forecasting Accuracy
A novel decision ensemble framework: Attention-customized BiLSTM and XGBoost for speculative stock price forecasting

... The study emphasized the need for optimized models capable of adapting to evolving misinformation narratives on social media platforms. Hussna et al. (2024), revealed that approximately 80% of studies on fake news detection related to COVID-19 on Twitter employed Deep Neural Networks [32]. While these networks enhance performance, they face challenges such as overfitting and higher prediction times. ...

Dissecting the Infodemic: An In-Depth Analysis of COVID-19 Misinformation Detection on X (Formerly Twitter) Utilizing Machine Learning and Deep Learning Techniques

Heliyon

... Their design is based on ring learning with errors to secure the key exchange. Chaudhary et al. [78] and Yadav et al. [79] use post-quantum secure blockchains to secure authentication and communication in V2V environments. Their concept utilizes permissioned blockchains where only authorized participants can join the network. ...

Module Lattice Based Post Quantum Secure Blockchain Empowered Authentication Framework for Autonomous Truck Platooning

IEEE Access

... Chaudhary et al. [193] introduced a secure three-party post-quantum key setup mechanism for mobile devices. The proposed three-party key exchange protocol uses an authenticated shared key that can be renewed periodically to ensure forward secrecy. ...

Anonymous Quantum Safe Construction of Three Party Authentication and Key Agreement Protocol for Mobile Devices

IEEE Access

... In 2013, the Ellen MacArthur Foundation promoted the CE model as an economic model accountable for environmental impact, CE offers "restorative and regenerative design and intention in the industrial economy". Later, other dimensions of remanufacturing, re-design, recovery, refurbishment, reverse logistics, and cradle-to-cradle were added (Ali et al., 2024). All these approaches are aimed at less resource consumption by making the most of these resources, enhanced production by extending the efficiency, durability, and lifespan of products, and waste reductions by recycling and repairing the products at the end of their lives. ...

Circular Economy Advances with Artificial Intelligence and Digital Twin: Multiple-Case Study of Chinese Industries in Agriculture

Journal of the Knowledge Economy

... Dolhopolov et al. presented a blockchain-based approach with a focus on metadata management [21]. Only Borovits et al. [19] and Katamoura et al. [22] presented frameworks that have a similar focus on privacy and data protection in a data mesh but do not make explicit use of contract-testing or the compositional characteristics of data mesh. ...

Privacy and Security in Artificial Intelligence and Machine Learning Systems for Renewable Energy Big Data
  • Citing Conference Paper
  • January 2024

... Fine-tuning BERT model on sensitive data raises concerns about privacy and data security. Techniques such as federated learning and differential privacy [31,32] may mitigate this risk at the cost of reduced accuracy. The balance between model security and predictive power needs to be carefully managed. ...

Securing Smart Manufacturing by Integrating Anomaly Detection With Zero-Knowledge Proofs

IEEE Access

... Recently, deep learning (DL) has shown significant advancements in breast cancer detection using mammograms [8][9][10][11] . With the increasing demand of resource-aware settings, researchers have integrated artificial intelligence-based techniques 12 , including DL with ultrasound systems, and shown promising results 5,13-15 . ...

Enhancing the Quality and Authenticity of Synthetic Mammogram Images for Improved Breast Cancer Detection

IEEE Access

... Early and accurate diagnosis is a key strategy to increase the effectiveness of treatment and reduce mortality. In this context, various artificial intelligence approaches have been used to build decision support systems that can automatically classify cancer diagnosis results [6]- [11]. ...

Breast Cancer Detection and Prevention Using Machine Learning

... These datasets are detailed in Table 1. Words (25) 200 videos -Arabic [19] Word (40) 80 00 videos -Arabic [19] Words (30) 1500 videos -Argentinian [19] Words (12) 12 videos ASLGPC12 Australian [18], [27] Words (455) -SIGNUM German [2] Letters (30) and 1400 videos -German [19] numbers (1)(2)(3)(4)(5) Complete sentences and Words (1081) 11000 videos RWTH-PHOENIX German [5], [7], [8], [14], [18], [27] Words (10) 1080 videos -Indian [19] Words (10) 500 videos -Thai [19] ...

Deep Learning in Sign Language Recognition: A Hybrid Approach for the Recognition of Static and Dynamic Signs