Nadra Guizani's research while affiliated with University of Texas at Arlington and other places

Publications (108)

Article
Unmanned Aerial Vehicles (UAVs) as aerial base stations to provide communication services for ground users is a flexible and cost-effective paradigm in B5G. Besides, dynamic resource allocation and multi-connectivity can be adopted to further harness the potentials of UAVs in improving communication capacity, in such situations such that the interf...
Article
B5G aims to meet the demands of today's growing mobile traffic and expand the communication space. Considering that the intelligent application to B5G wireless communications will involve the security issues of user data and operational data, in this paper, the maximum capacity problem of the multi-watermarking method in multimedia signal hiding is...
Article
Full-text available
The revolutionary advances in machine learning and data mining techniques have contributed greatly to the rapid developments of maritime Internet of Things (IoT). In maritime IoT, the spatio-temporal vessel trajectories, collected from the hybrid satellite-terrestrial AIS (automatic identification system) base stations, are of considerable importan...
Article
In recent years, the number of vehicles in the city is increasing. However, the increase in the number of cars caused a series of traffic problems, such as road congestion, traffic accidents, environmental pollution, and so on. To handle the problems, Internet of Vehicles (IoV) is emerging. As we know, deep learning has acquired significant success...
Article
Wireless sensor networks have been widely adopted in various areas. However, large-scale sensor networks face four critical problems. Information transmissions through the network would cause the energy hole problem; deploying sensors in a distributed manner might cause the isolated problem; simultaneous transmissions lead to the communication coll...
Article
Future advances in deep learning and its impact on the development of artificial intelligence (AI) in all fields depend heavily on data size and computational power. Sacrificing massive computing resources in exchange for better precision rates of the network model is recognized by many researchers. This leads to huge computing consumption, while s...
Article
With the outbreak of the coronavirus COVID-19 pandemic, the whole world has been facing the greatest challenge of a global health crisis. This crisis puts a heavy burden on the network community with regards to unprecedented challenges such as massive network data traffic and resource optimization. The next-generation networking (NGN) technologies...
Article
With the evolution of wireless technologies, 5G and Beyond (5GB) communication is paving a way for efficient, ultra-reliable, low-latent, and high converging services for the Internet of Things (IoT). Along with efficient communication, the security of messages is one of the concerns which must be maintained throughout the operations. Backhaul form...
Article
The rapid development of the Industrial Internet of Things (IIoT) has led to the explosive growth of industrial control data. Cloud computing-based industrial control models cause vast energy consumption. Most existing solutions try to reduce the overall energy consumption by optimizing task scheduling and disregard how to reduce the load of comput...
Article
In recent years, unmanned aerial vehicle (UAV) technology has developed rapidly and has been widely used in military operations, medical rescue, environmental monitoring, and so on. UAV networks are an important foundation for large-scale UAV collaborative work. Traditional mobile self-or-ganizing network technology is too complicated to be quickly...
Article
With the increasing demand to deploy convolutional neural networks (CNNs) on 5G mobile platforms, architecture designs with efficient sparse kernels (SKs) were proposed, which can save more parameters than the standard convolution while maintaining the high accuracy. Despite the great potential, neural network designs with SKs still require a lot o...
Article
Various emerging applications and services such as smartphones, wearable devices, and Inter-net of Things (IoT) have brought great convenience to people's daily life, while producing huge amounts of data. Mass data have become a valuable asset, which creates a new business pattern called data trading. However, fairness becomes a challenge when cond...
Article
In recent years, security incidents of integrated electronic systems occur frequently. The security analysis of integrated electronic systems has attracted wide attention. The majority of existing works are aimed at detecting specific security risks. However, there is a lack of underlying framework for the security analysis and the protection metho...
Article
Full-text available
We all have been using classical computers for a long time. Quantum computing uses the phenomena of quantum mechanics like superposition and entanglement. Quantum computations can help achieve for the breakthroughs we have been looking for in science, machine learning, financial planning, medicine, etc where classical computers’ computing power is...
Article
In this article, we analyze password characteristics from the perspective of user groups in different countries and web-based services. We collect a dataset from the Chinese railway website www.12306.cn, which contains data from four provinces, Hubei, Zhejiang, Inner Mongolia and Xinjiang. Additionally, we select datasets from two English based Int...
Article
IoT devices are becoming increasingly ubiquitous because they have greatly simplified many aspects of our daily life and our work. However, most firmware in these embedded devices carry various security vulnerabilities, such as hard-coded passwords, cryptographic keys, insecure configurations and backdoors. Recent large-scale attacks have demonstra...
Article
Cellular vehicular networks constitute an important part of future vehicular communication systems. However, they pose challenges to fulfill vehicles with demands for the transmission rates of various network services while achieving satisfactory costs and energy consumption. The cloud radio access network architecture is considered as a green wire...
Article
Full-text available
The rapid improvement in the global connectivity standards has escalated the level of trade taking place among different parties. Advanced communication standards are allowing the trade of all types of commodities and services. Furthermore, the goods and services developed in a particular region are transcending boundaries to enter into foreign mar...
Article
Smart city, as a new mode, is introduced to improve the level of city management for modern cities. In smart cities, a kernel field is health management for urban residents. Hospital management, as one of the most important components in health management, is concerned. To provide high-quality medical service for sick residents, accurate patient he...
Article
Trustworthy transmission is a beneficial step toward the success of the new era of telecommunication technologies and online social networks (OSNs). Many sensitive applications can benefit from OSNs, e.g., eHealth and medical services. However, OSNs have always been prey to Sybil attacks where numerous fake nodes are being generated and propagated...
Preprint
Full-text available
Unmanned aerial vehicles (UAVs) have the potential to overcome the deployment constraint of Internet of Things (IoT) in remote or rural area. Wirelessly powered communications (WPC) can address the battery limitation of IoT devices through transferring wireless power to IoT devices. The integration of UAVs and WPC, namely UAV-enabled Wireless Power...
Article
The public key infrastructure (PKI) has been widely adopted to create, manage, distribute, store and revoke digital certificates, which plays an important role in bootstrapping secure communications. A PKI system authenticates entities with the corresponding public keys and it lays the security foundation for public-key cryptosystems in public-key...
Article
Low-cost, long-endurance navigation is a crucial universal supporting technology for long-range underwater vehicles while entering, exploring, and developing the deep sea. To overcome the limitations of existing navigation systems (e.g., high cost and unsuitability for long-endurance operation), this study proposes a cooperative navigation system b...
Article
Among all ongoing attacks on mobile, those targeting blockchain-wallet applications raise pressing concerns due to the risks of potential monetary loss. These attacks mainly focus on the theft and forwarding of keys in executable files. The challenge is that these malicious code behaviors are not detectable with the usual detection methods. We prop...
Article
UAV (Unmanned Aerial Vehicle) swarms are being utilized to launch military attacks due to its technological development. At present, there is a lack of countermeasures against such attacks. In this article, we propose to use GPS spoofing to deceive the UAV swarm's location sensing system as a countermeasure. Based on two open-source tools, ROS and...
Article
Ethereum started the blockchain-based smart contract technology that due to its scalability more and more decentralized applications are now based on. On the downside this has led to the exposure of more and more security issues and challenges, which has gained widespread attention in terms of research in the field of Ethereum smart contract vulner...
Article
As digital currency wallets are gaining popularity, security incidents related to them are also increasing. They lead to the disclosure of users' private information and security threats of users' assets. This article analyzes the security risks of digital wallets in Android, which is the most popular mobile operating system. It first establishes t...
Preprint
Future advances in deep learning and its impact on the development of artificial intelligence (AI) in all fields depends heavily on data size and computational power. Sacrificing massive computing resources in exchange for better precision rates of the network model is recognized by many researchers. This leads to huge computing consumption and sat...
Article
Information-Centric Networking (ICN) is a promising candidate architecture for the future Internet that leverages the content name instead of the source of the content (host address). ICN decouples the content from its original location and owner, and enables in-network caching at the network layer. Similarly, the inception of IoT has enabled futur...
Article
Full-text available
Tactile edge technology that focuses on 5G or beyond 5G reveals an exciting approach to control infectious diseases such as COVID-19 internationally. The control of epidemics such as COVID-19 can be managed effectively by exploiting edge computation through the 5G wireless connectivity network. The implementation of a hierarchical edge computing sy...
Article
B5G-based tactile edge learning shows promise as a solution to handle infectious diseases such as COVID-19 at a global level. By leveraging edge computing with the 5G RAN, management of epidemic diseases such as COVID-19 can be conducted efficiently. Deploying a hierarchical edge computing architecture offers several benefits such as scalability, l...
Article
Traffic classification is a technology for classifying and identifying sensitive information from cluttered traffic. With the increasing use of encryption and other evasion technologies, traditional content- based network traffic classification becomes impossible, and traffic classification is increasingly related to security and privacy. Many stud...
Article
A reputation management scheme plays a critical role for secure communications in vehicular networks. However, due to the limited wireless communication in the past few years, the existing solutions fail to capture the current high-performance network communication provided by the 5G network. As a result, the attributes of security and efficiency c...
Article
With the emergence of next-generation fiber materials and the development of sensors and wearable technologies, new breakthroughs also emerge in the field of wearable fabrics. By combining wearable fabrics with sensors, artificial intelligence and other technologies, the new intelligent fabrics create an intelligent, flexible and adaptive performan...
Article
5G networks are currently being developed rapidly and are dedicated to connect all things of the Internet with new technologies, components and services. Due to the crucial role of 5G, as well as new architectures and designs, 5G faces a great number of security threats and demands suitable security technologies. This article proposes an automated...
Article
IoT revolutionizes academia as well as industry. An increasing number of interconnected smart devices are gradually changing the urban lifestyle, among which, voting machines are one of the most widely used smart devices. However, the existing voting protocols for IoT are barely satisfactory, in the sense that most of them are centralized and subje...
Article
The development of Internet of Things technology and the decline of hardware costs have made large-scale camera interconnection possible. Security vendors have cooperated with governments to develop various security standards to achieve interconnection and unified management among cameras of different brands and models. However, there are still som...
Article
In recent years, several advances in artificial intelligence such as deep learning, computer vision, automatic driving, cognitive computing, and robotics, have laid the technological foundation for the large-scale application of Smart-AMPs in complex environments. Potential solutions have appeared for smart transportation, aerospace exploration, sm...
Article
The exponential growth in the use of Internet of Things (IoT) devices has introduced numerous challenges, in particular dealing with new security threats. In addition, connecting heterogeneous devices with different protocols, large networks need more effective software-based security systems that can defend against such unprecedented attacks that...
Article
UASN has gained much attention during the past decades. Based on fruitful research and development, UASN could be a compelling component of the global IoT in the future. From the view of location privacy preservation, state-of-the-art investigations mainly concentrate on UASN infrastructures and focus on the location privacy preserving of the sourc...
Article
High-quality CPNT is a key technology for deep-sea vehicles that dive into the deep sea and for detecting and developing the deep sea. At present, however, CPNT services for deep-sea vehicles are provided by separate communication, positioning, and navigation systems as well as separate synchronous clocks (atomic clocks). This directly affects the...
Article
Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) networking. Specifically, C-V2X lowers the number of entities involved in vehicular communications and allows the inclusion of cellular-security solutions to be applied to V2X. For t...
Article
Today, app stores offer ranking lists to help users to find quality apps that meet their needs. In order to prevent people from spreading fake reviews which can be used to defame certain apps or manipulate the ranking lists of the app store, we propose a method based on Positive and Unlabeled (PU) learning and behavior density to detect fake reviews...
Article
With the recent advancement in AI technology, IDSs reinforced by AI have been adopted to ensure system and network security. Unfortunately, computational and storage overheads of such systems prevent them from being deployed in IESs. To overcome the challenges that restrict the applicability of intrusion detection for IESs, we propose a lightweight...
Article
Stemming from the recent evolutionary progress of the 5G wireless communication and Internet of Things (IoT) relevant technologies, the vision of the Internet of Connected Vehicles (IoCV) has become more apparent. On the basis of the state-of-the-art IoCV conceptual implementations, the location of the vehicles is one of the essential driven data o...
Article
In the Industrial Internet of Things (IIoT), the security and efficiency are indispensable. For the railway industry, the video from inspection vehicle would be influenced by various factors with low visibility and hard for high level vision task, such as the fault diagnosis of catenary system. In this paper, we propose a method based on the multi-...
Preprint
Full-text available
The inspiring increase in the Internet-enabling devices has influenced health industry due to the nature of these devices where they offer health related information swiftly. One of the prominent characteristics of these devices is to provide physicians with effective diagnosis of sensitive diseases. Internet of Medical Things (IoMT) is a means of...
Article
In recent years, unprecedented work has been done in the area of smart cities. The purpose of developing smart cities is to enhance quality of life factors for people dwelling within them. To achieve that purpose, technologies such as IoT and cloud computing have been utilized. Blockchain technology is also among the promising technologies that can...
Article
Full-text available
The rapid proliferation of Internet-of-Things (IoT) devices has brought great challenges of data management, i.e., storing, retrieving and manipulating a large volume of IoT data. Conventional IoT systems rely on centralized architectures to manage IoT data, hence suffering from limited scalability, lack of transparency, and single point failure is...
Article
With the explosive growth of vehicles, traffic monitoring has garnered significant attention in recent years. Collecting vehicular speed is an effective way to monitor traffic conditions and help vehicles to find optimal routes. However, further progress may be impeded due to users' privacy concerns. In addition, traffic monitoring is more difficul...
Article
Full-text available
Merging mobile edge computing (MEC) service with the wireless local area networks (WLANs) provides enormous benefits such as intensive computation capabilities. Access to high-speed WLANs has become an urgent challenge due to the fast rate of application development and user adoption. Providing increased wireless resources is one solution, but mill...
Article
With the people-oriented medical concept gradually gaining popularity and the rapid development of sensor network technology, connected healthcare systems (CHSs) have been proposed to remotely monitor the physical condition of patients and the elderly. However, there are many security issues in these systems. Threats from inside and outside the sys...
Article
The advances of artificial intelligence (AI) propels big data processing and transmission for Internet-of-Things (IoT), by capturing and structuring big data produced by heterogeneous devices. While applying blockchain to manage IoT devices and associated big data, the blockchain itself suffers from abuse of decentralization from anonymous users. S...
Article
Deep models, typically deep neural networks, have millions of parameters, analyze medical data accurately, yet in a time-consuming method. However, energy cost effectiveness and computational efficiency are important for prerequisites developing and deploying mobile-enabled devices, the mainstream trend in connected healthcare. Therefore, deep mode...
Article
With the advent of medical IoT devices, the types and volumes of medical images have significantly increased. Retrieving of medical images is of great importance to facilitate disease diagnosis and improve treatment efficiency. However, it may raise privacy concerns from individuals, since medical images contain patients' sensitive and private info...
Article
Computer-integrated manufacturing is a notable feature of Industry 4.0. Integrating machine learning (ML) into edge intelligent Industrial Internet of Things (IIoT) is a key enabling technology to achieve intelligent IIoT. To realize novel intelligent applications of edge-enhanced IIoT, ML methods are proposed to improve the cognitive ability of ed...
Article
Full-text available
An unprecedented proliferation of autonomous driving technologies has been observed in recent years, resulting in the emergence of reliable and safe transportation services. In the foreseeable future, millions of autonomous cars will communicate with each other and become prevalent in smart cities. Thus, scalable, robust, secure, fault-tolerant, an...
Article
IESs have a wide range of applications and special usage scenarios, but they are also expensive. Hence, it is common that a simulation platform is used to conduct security experiments on IESs, as well as to validate changes on the system and protocols. This article proposes a simulation framework based on a combination of hardware and software. Thi...
Article
X86-based software runs on some mainstream autonomous driving systems to perform intelligent operations and help to significantly improve driving safety. However, vulnerabilities of software in autonomous driving can lead to vehicle components and systems being attacked, which ultimately affects the work of the autonomous vehicle. Although many sch...
Article
With the continuous development of authentication approaches, password-based authentication is still the first choice for various online services today. The security of password-based authentication relies heavily on the strength of the passwords created by users. Password enhancement is a general way to increase the difficulty of cracking a passwo...
Article
Full-text available
Internet of Things (IoT) enables modern improvements in smart sensors, RFID, Internet technologies, and communication protocols. Sensor nodes are treated as smart devices and widely used to gather and forward sensed information. However, besides intrinsic constraints on sensor nodes, they are vulnerable to a variety of security threats. This paper...
Preprint
Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) networking. Specifically, C-V2X lowers the number of entities involved in vehicular communications and allows the inclusion of cellular-security solutions to be applied to V2X. For t...
Article
Fog computing has enabled the extension of cloud computing functions to the network edge by assisting the cloud and users in terms of communication, computation, and storage with a widely spread deployment of edge devices or fog nodes, as they become more powerful in capacities and functionalities. Smart grid is becoming the next-generation power g...
Article
With the frequent appearance and spread of infectious diseases and their impact on major population areas, there is a growing interest to develop models for analyzing the dynamic behavior of epidemics. Such analysis can provide a better decision making process to combat and confine disease. In this article, we briefly survey the literature on netwo...
Article
Edge computing provides high-class intelligent services and computing capabilities at the edge of the networks. The aim is to ease the backhaul impacts and offer an improved user experience. However, the edge artificial intelligence exacerbates the security of the cloud computing environment due to the dissociation of data, access control, and serv...
Article
Privacy is supreme in cryptocurrencies since most users do not want to reveal their identities or the transaction amount in financial transactions. Nevertheless, achieving privacy in blockchain-based cryptocurrencies remains challenging since blockchain is by default a public ledger. For instance, Bitcoin provides built-in pseudonymity rather than...
Preprint
Deep Models, typically Deep neural networks, have millions of parameters, analyze medical data accurately, yet in a time-consuming method. However, energy cost effectiveness and computational efficiency are important for prerequisites developing and deploying mobile-enabled devices, the mainstream trend in connected healthcare.
Preprint
Full-text available
Edge computing is providing higher class intelligent service and computing capabilities at the edge of the network. The aim is to ease the backhaul impacts and offer an improved user experience, however, the edge artificial intelligence exacerbates the security of the cloud computing environment due to the dissociation of data, access control and s...
Article
Full-text available
In this paper, depth and reliability aware delay 1 sensitive (DRADS), interference aware DRADS (iDRADS) and 2 cooperative iDRADS (Co-iDRADS) routing protocols are pro-3 posed for maximizing network good-put while minimizing end-4 to-end delay. We have introduced a new metric called depth 5 threshold to minimize the number of hops between source and...