Marwa Qaraqe
YOU?
Author Swipe
View article: Integrating identity and emotion information in faces in ASD – capacity limits of information processing
Integrating identity and emotion information in faces in ASD – capacity limits of information processing Open
The ability to combine identity and emotional information when viewing faces allows typically developing individuals to process facial information efficiently. The purpose of this study was to examine whether adults with autism spectrum di…
View article: A temporal–spatial deep learning framework leveraging dynamic 3D attention maps for violence detection
A temporal–spatial deep learning framework leveraging dynamic 3D attention maps for violence detection Open
In intelligent systems for real-time security and safety monitoring, the proliferation of surveillance cameras has fueled a growing interest in using deep learning-based artificial intelligence (AI) models for violence detection. Most curr…
View article: Contactless Sleep Monitoring with Potential Application to Early Autism Detection
Contactless Sleep Monitoring with Potential Application to Early Autism Detection Open
patients, diagnosing chronic conditions, and enable behavioural detection of autism. Existing methods, particularly visionbased and wearable systems, face limitations including privacy concerns, sensitivity to lighting and occlusion, compl…
View article: Secure Pinching Antenna-aided ISAC
Secure Pinching Antenna-aided ISAC Open
In this letter, a pinching antenna (PA)-aided scheme for establishing a secure integrated sensing and communication system (ISAC) is investigated. The underlying system comprises a dual-functional radar communication (DFRC) base station (B…
View article: Advancements and challenges in robotic surgery: A holistic examination of operational dynamics and future directions
Advancements and challenges in robotic surgery: A holistic examination of operational dynamics and future directions Open
Integrating advanced technologies into RAS has improved surgical outcomes, shortened hospital stays, and enhanced working environments. This study advocates for a holistic multi-criteria decision-making approach, considering factors like k…
View article: A survey of transformers and large language models for ECG diagnosis: advances, challenges, and future directions
A survey of transformers and large language models for ECG diagnosis: advances, challenges, and future directions Open
Electrocardiograms (ECGs) are widely utilized in clinical practice as a non-invasive diagnostic tool for detecting cardiovascular diseases. Convolutional neural networks (CNNs) have been the primary choice for ECG analysis due to their cap…
View article: On the Secrecy of RIS-aided THz Wireless System subject to $α-μ$ fading with Pointing Errors
On the Secrecy of RIS-aided THz Wireless System subject to $α-μ$ fading with Pointing Errors Open
The study examines the secrecy outage probability (SOP) and intercept probability (IP) of a reflecting intelligent surface (RIS)-enabled THz wireless network experiencing $α-μ$ fading with pointing errors. Specifically, the base station (B…
View article: Autistic Traits and Internet Use Disorder Tendencies in the Middle East: Insights from Qatar
Autistic Traits and Internet Use Disorder Tendencies in the Middle East: Insights from Qatar Open
Several studies have observed a small positive association between higher autistic traits and generalized Internet Use Disorder (IUD) tendencies, as well as with specific IUDs such as social network use disorder and Internet gaming disorde…
View article: Integrating Communication, Sensing, and Security: Progress and Prospects of PLS in ISAC Systems
Integrating Communication, Sensing, and Security: Progress and Prospects of PLS in ISAC Systems Open
The sixth generation of wireless networks defined several key performance indicators (KPIs) for assessing its networks, mainly in terms of reliability, coverage, and sensing. In this regard, remarkable attention has been paid recently to t…
View article: On the Vulnerability of Underwater Magnetic Induction Communication
On the Vulnerability of Underwater Magnetic Induction Communication Open
Typical magnetic induction (MI) communication is commonly considered a secure underwater wireless communication (UWC) technology due to its non-audible and non-visible nature compared to acoustic and optical UWC technologies. However, vuln…
View article: Anomaly Detection on Smart Grids With Optimized Convolutional Long Short-Term Memory Model
Anomaly Detection on Smart Grids With Optimized Convolutional Long Short-Term Memory Model Open
The integration of digital technologies into traditional power systems has increased the efficiency and sustainability of power grids, transforming traditional grids into smart grids. However, this transformation has also introduced new vu…
View article: Secrecy Performance of a RIS-Assisted Wireless Network: A Comprehensive Analysis Under Outdated CSI
Secrecy Performance of a RIS-Assisted Wireless Network: A Comprehensive Analysis Under Outdated CSI Open
Reconfigurable intelligent surfaces have manifested notable merits in enhancing networks’ security from a physical layer perspective by leveraging smart genuine signal reflection using its reflective elements (REs) towards legitimate users…
View article: Optimal Stopping Theory-Based Online Node Selection in IoT Networks for Multi-Parameter Federated Learning
Optimal Stopping Theory-Based Online Node Selection in IoT Networks for Multi-Parameter Federated Learning Open
Federated Learning (FL) has attracted the interest of researchers since it hinders inefficient resource utilization by developing a global learning model based on local model parameters (LMP). This study introduces a novel optimal stopping…
View article: Robust ConvLSTM Model With Deep Reinforcement Learning for Stealth Attack Detection in Smart Grids
Robust ConvLSTM Model With Deep Reinforcement Learning for Stealth Attack Detection in Smart Grids Open
The advent of modern electricity distribution systems, comprising digital communication technologies and principles, has triggered a new era of smart grids, in which advanced metering infrastructure plays a crucial role in functions, such …
View article: Autism and Play: An Overview of the Methodological Approach and Preliminary Results
Autism and Play: An Overview of the Methodological Approach and Preliminary Results Open
Recent research has discussed co-designing with autistic children in several settings. However, none of these studies have investigated the inclusive play field. This project aims to co-design and evaluate a tool to promote inclusive, coll…
View article: VMGuard: Reputation-Based Incentive Mechanism for Poisoning Attack Detection in Vehicular Metaverse
VMGuard: Reputation-Based Incentive Mechanism for Poisoning Attack Detection in Vehicular Metaverse Open
The vehicular Metaverse represents an emerging paradigm that merges vehicular communications with virtual environments, integrating real-world data to enhance in-vehicle services. However, this integration faces critical security challenge…
View article: Performance Analysis of Underwater Acoustic Channel Amid Jamming by Random Jammers
Performance Analysis of Underwater Acoustic Channel Amid Jamming by Random Jammers Open
Underwater communication networks are increasingly popularized by various important maritime applications. However, this also leads to an increased threat landscape. This letter presents the first study that considers jamming attacks by ra…
View article: Coordinated Half-Duplex/Full-Duplex Cooperative Rate-Splitting Multiple Access in Multi-Cell Networks
Coordinated Half-Duplex/Full-Duplex Cooperative Rate-Splitting Multiple Access in Multi-Cell Networks Open
This paper explores downlink Cooperative Rate-Splitting Multiple Access (C-RSMA) in a multi-cell wireless network with the assistance of Joint-Transmission Coordinated Multipoint (JT-CoMP). In this network, each cell consists of a base sta…
View article: Crowd behavior detection: leveraging video swin transformer for crowd size and violence level analysis
Crowd behavior detection: leveraging video swin transformer for crowd size and violence level analysis Open
In recent years, crowd behavior detection has posed significant challenges in the realm of public safety and security, even with the advancements in surveillance technologies. The ability to perform real-time surveillance and accurately id…
View article: CoST-UNet: Convolution and swin transformer based deep learning architecture for cardiac segmentation
CoST-UNet: Convolution and swin transformer based deep learning architecture for cardiac segmentation Open
Automatic segmentation of two-dimensional (2D) echocardiogram is beneficial for heart disease diagnosis and assessment. Convolutional Neural Network (CNN) based U-shaped architectures such as UNet have shown remarkable success for medical …
View article: Autocleandeepfood: auto-cleaning and data balancing transfer learning for regional gastronomy food computing
Autocleandeepfood: auto-cleaning and data balancing transfer learning for regional gastronomy food computing Open
Food computing has emerged as a promising research field, employing artificial intelligence, deep learning, and data science methodologies to enhance various stages of food production pipelines. To this end, the food computing community ha…
View article: Enhancing ECG-based heart age: impact of acquisition parameters and generalization strategies for varying signal morphologies and corruptions
Enhancing ECG-based heart age: impact of acquisition parameters and generalization strategies for varying signal morphologies and corruptions Open
Electrocardiogram (ECG) is a non-invasive approach to capture the overall electrical activity produced by the contraction and relaxation of the cardiac muscles. It has been established in the literature that the difference between ECG-deri…
View article: FedPot: A Quality-Aware Collaborative and Incentivized Honeypot-Based Detector for Smart Grid Networks
FedPot: A Quality-Aware Collaborative and Incentivized Honeypot-Based Detector for Smart Grid Networks Open
Honeypot technologies provide an effective defense strategy for the Industrial Internet of Things (IIoT), particularly in enhancing the Advanced Metering Infrastructure's (AMI) security by bolstering the network intrusion detection system.…
View article: On the Impact of Age of Channel Information on Secure RIS-Assisted mmWave Networks
On the Impact of Age of Channel Information on Secure RIS-Assisted mmWave Networks Open
Reconfigurable Intelligent Surfaces (RISs) have shown great prospects in securing mmWave communication from potential eavesdropping by configuring reflecting elements to strengthen the signal strength at the desired location and creating n…
View article: Enhancing Trust and Security in the Vehicular Metaverse: A Reputation-Based Mechanism for Participants with Moral Hazard
Enhancing Trust and Security in the Vehicular Metaverse: A Reputation-Based Mechanism for Participants with Moral Hazard Open
In this paper, we tackle the issue of moral hazard within the realm of the vehicular Metaverse. A pivotal facilitator of the vehicular Metaverse is the effective orchestration of its market elements, primarily comprised of sensing internet…
View article: A novel multi-scale violence and public gathering dataset for crowd behavior classification
A novel multi-scale violence and public gathering dataset for crowd behavior classification Open
Dependable utilization of computer vision applications, such as smart surveillance, requires training deep learning networks on datasets that sufficiently represent the classes of interest. However, the bottleneck in many computer vision a…
View article: Performance Analysis of Underwater Acoustic Channel Amid Jamming by Random Jammers
Performance Analysis of Underwater Acoustic Channel Amid Jamming by Random Jammers Open
Underwater communication networks are increasingly popularized by various important maritime applications. However, this also leads to an increased threat landscape. This letter presents the first study that considers jamming attacks by ra…
View article: On the Secrecy Enhancement of an Integrated Ground-Aerial Network with a Hybrid FSO/THz Feeder Link
On the Secrecy Enhancement of an Integrated Ground-Aerial Network with a Hybrid FSO/THz Feeder Link Open
High altitude platforms (HAPs)-aided terrestrial-aerial communication technology based on free-space optical (FSO) and Terahertz (THz) feeder links has been attracting notable interest recently due to its great potential in reaching a high…