Qutaibah Malluhi's research while affiliated with Qatar University and other places

Publications (36)

Article
Full-text available
Using artificial intelligence and machine learning techniques in healthcare applications has been actively researched over the last few years. It holds promising opportunities as it is used to track human activities and vital signs using wearable devices and assist in diseases’ diagnosis, and it can play a great role in elderly care and patient’s h...
Article
Pediatric asthma is a leading cause of emergency department (ED) utilization, which is expensive and often preventable. Therefore, development of ED utilization predictive models that can accurately predict patients at high-risk of frequent ED use and subsequently steering their treatment pathway towards more personalized interventions, has high cl...
Article
Full-text available
With the ongoing advances in sensor technology and miniaturization of electronic chips, more applications are researched and developed for wearable devices. Hydration monitoring is among the problems that have been recently researched. Athletes, battlefield soldiers, workers in extreme weather conditions, people with adipsia who have no sensation o...
Article
Full-text available
Background Early identification of pregnant women at risk for preterm birth (PTB), a major cause of infant mortality and morbidity, has a significant potential to improve prenatal care. However, we lack effective predictive models which can accurately forecast PTB and complement these predictions with appropriate interpretations for clinicians. In...
Article
The edge of the smart grid has a massive number of power and resource-constrained interconnected devices. Mainly, smart meters report power consumption data from consumer homes, industrial buildings, and other connected infrastructures. Multiple approaches were proposed in the literature to preserve the privacy of consumers by altering the data via...
Preprint
Full-text available
Background: Early identification of pregnant women at risk for preterm birth (PTB), a major cause of infant mortality and morbidity, has a significant potential to improve prenatal care. However, we lack effective predictive models which can accurately forecast PTB and complement these predictions with appropriate interpretations for clinicians. In...
Article
Full-text available
Data stored in physical storage or transferred over a communication channel includes substantial redundancy. Compression techniques cut down the data redundancy to reduce space and communication time. Nevertheless, compression techniques lack proper security measures, e.g., secret key control, leaving the data susceptible to attack. Data encryption...
Conference Paper
Private Function Evaluation (PFE) is the problem of evaluating one party’s private data using a private function owned by another party. Several techniques were presented to tackle PFE by running universal circuits in secure multi-party computation and more recently by hiding the circuit’s topology and the gate’s functionalities. These solutions ho...
Article
Full-text available
Due to the ubiquity of spatial data applications and the large amounts of spatial data that these applications generate and process, there is a pressing need for scalable spatial query processing. In this paper, we present new techniques for spatial query processing and optimization in an in-memory and distributed setup to address scalability. More...
Article
Full-text available
Private Function Evaluation (PFE) is the problem of evaluating one party’s private data using a private function owned by another party. Existing solutions for PFE are based on universal circuits evaluated in secure multiparty computations or on hiding the circuit’s topology and the gate’s functionality through additive homomorphic encryption. Thes...
Article
Full-text available
Broadcast encryption ( BE ) allows a sender to encrypt a message to an arbitrary target set of legitimate users and to prevent non-legitimate users from recovering the broadcast information. BE has numerous practical applications such as satellite geolocation systems, file sharing systems, pay-TV systems, e-Health, social networks, cloud storage sy...
Article
Oblivious RAM (ORAM) schemes exist in order to protect the access pattern of data in a data store. Under an ORAM algorithm, a client accesses a data store in such a way that does not reveal which item it is interested in. This is typically accomplished by accessing multiple items each access and periodically reshuffling some, or all, of the data in...
Article
Full-text available
Could we detect anomalies during the run-time of a program by learning from the analysis of its previous traces for normally completed executions? In this paper we create a featured data set from program traces at run time, either during its regular life, or during its testing phase. This data set represents execution traces of relevant variables i...
Conference Paper
As a decentralized cryptocurrency, Bitcoin has been in market for around a decade. Bitcoin transactions are thought to be pseudo-anonymous, however, there were many attempts to deanonymize these transactions making use of public data. Escrow services have been introduced as a good private and secure way to handle Bitcoin payments between untrusted...
Article
Full-text available
Background: Predictive modeling with longitudinal electronic health record (EHR) data offers great promise for accelerating personalized medicine and better informs clinical decision-making. Recently, deep learning models have achieved state-of-the-art performance for many healthcare prediction tasks. However, deep models lack interpretability, wh...
Preprint
Due to the ubiquity of spatial data applications and the large amounts of spatial data that these applications generate and process, there is a pressing need for scalable spatial query processing. In this paper, we present new techniques for spatial query processing and optimization in an in-memory and distributed setup to address scalability. More...
Article
Although smart contracts are Turing complete, it is a misconception that they can fulfill all routine contracts.
Chapter
Since Yao introduced the garbled circuit concept in 1980s, it has been an open problem to design efficient reusable garbled Turing machines/circuits. Recently, Goldwasser et al. and Garg et al. answered this question affirmatively by designing reusable garbled circuits and reusable garbled Turing machines. Both of these reusable garbling schemes us...
Conference Paper
Full-text available
Online voting systems are gaining acceptance with the widespread use of secure web services and cloud computing such as electronic currency and online banking. However, they still face privacy, security and accountability issues. Designing a system that covers all the general requirements of secure voting is a research challenge. In this paper, we...
Article
Full-text available
Data curation activities in collaborative databases mandate that collaborators interact until they converge and agree on the content of their data. In a previous work, we presented a cloud-based collaborative database system that promotes and enables collaboration and data curation scenarios. Our system classifies different versions of a data item...
Article
Full-text available
Collaborative databases such as genome databases, often involve extensive curation activities where collaborators need to interact to be able to converge and agree on the content of data. In a typical scenario, a member of the collaboration makes some updates and these become visible to all collaborators for possible comments and modifications. At...
Article
Given a set of multidimensional data points, skyline queries retrieve those points that are not dominated by any other points in the set. Due to the ubiquitous use of skyline queries, there are several outstanding challenges that have not been well addressed. More specifically, in this paper, we are tackling the data straggler and data skew challen...
Conference Paper
Secure Multi-Party Computation (SMPC) enables parties to compute a pub- lic function over private inputs. A classical example is the millionaires problem, where two millionaires want to figure out who is wealthier without revealing their actual wealth to each other. The insight gained from the secure computa- tion is nothing more than what is revea...
Chapter
In CANS 2016, Chen, Laing, and Martin proposed an ideal (t, n)-threshold secret sharing scheme (the CLM scheme) based on random linear code. However, in this paper we show that this scheme is essentially same as the one proposed by Karnin, Greene, and Hellman in 1983 (the KGH scheme) from privacy perspective. Further, the authors did not analyzed m...
Conference Paper
Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one and two disk failures, respectively. Recently, the data generation has significantly increased due to the emergence of new techno...
Conference Paper
It has been demonstrated that encrypting confidential data before storing it is not sufficient because data access patterns can leak significant information about the data itself (Goldreich & Ostrovsky, 1996). Oblivious RAM (ORAM) schemes exist in order to protect the access pattern of data in a data-store. Under an ORAM algorithm, a client accesse...
Conference Paper
Current storage systems use RAID-5 and RAID-6 architectures to provide protection against one and two disk failures, respectively. However, as the size of storage system grows rapidly three concurrent disk failures are becoming more frequent. To cope up with three disk failure, we propose a new RAID level, i.e., RAID-7, for which three-column-erasu...
Conference Paper
The overlap stage is one of the most time- and space-consuming steps in de novo genome assembly. The huge size of output of Next Generation Sequencing (NGS), represented by small segments of multiple copies of the original genome, creates a serious computational challenge. The target is to find overlaps between each pair of sequences (reads) in ord...

Citations

... Arti cial intelligence (AI) algorithms and ML techniques can then be used to mine knowledge from the accumulated data [5,53]. Using these techniques large volumes of data can be rapidly be assessed almost in real-time to supplement traditional clinical methods [54]. However, bene ts of AI and ML need to be weighed against potential problems that may arise [55]. ...
... These publications fall into the category of architectures identified in KF4. We also found papers in the data trading schemata category (or related): two new data auction schemata enhanced with DP [178,179], a task assignment scheme in crowdsensing that hides the tasks' content with homomorphic encryption (HE) for crowdsensing [180], and another where they employ DP on billing data [181]. The latter publication, however, does not discuss fairness, which is critical in monetary use cases as a noisy bill can make data prosumers profit less from their data on some occasions. ...
... The HeartPy toolkit for Python is an excellent open source package that was designed mainly for evaluating heart rate signals from PPG data [13]. The toolkit has been applied to analyze heart rate data from commercially available devices [14][15][16] and even smartphone cameras [17]. Nevertheless, to the best of our knowledge, although HeartPy is an ideal tool for developers of novel heart rate sensors, the toolkit has not been used in conjunction with sensors that are under development. ...
... Identifying mothers that are at a higher risk through quantifying risk factors of preterm delivery at a population level helps clinicians to take preventive measures and mitigate the risks [12,13]. Traditionally, the identification of such risk factors is done through prospective studies. ...
... Each tool essentially offers a single parallel algorithm for this join. The most recent and advanced systems are GeoSpark [47] (a.k.a., Apache Sedona), Spatial Spark [46], Location Spark [41,42] and Magellan. All these algorithms have been integrated into JedAI-spatial. ...
... A corpus, in data compression, is a collection of representative files to evaluate the effectiveness of the compression ratio [49]. Calgary [50] and Canterbury [51] are corpuses used in lossless data compression. ...
... The problem becomes more complex if the number of interesting point is multiple and when the number of dimensions increases [9][10][11]. ...
... The workflow of SPPCS is divided into three phases: register phase, requirement matching computation phase, and hybrid transaction execution phase. In this paper, we do not take pitfalls arising from TEE into consideration, since many mitigations have been proposed to protect the security and availability of TEE [65,66]. For simplicity, we implement the credible reputation scheme in [43] and assign tasks to selected trusted nodes. ...
... Just as for Bitcoin, it may happen for IOTA too that a few unlawful clients use the cover of anonymity [75,14,33,85]. It was estimated that in 2017, BTCs worth $770 million were exchanged for unlawful exercises [42], a fourth of bitcoin clients were noxious, and 46% of all bitcoin action was illicit [29]. ...