Tara Salman
YOU?
Author Swipe
View article: FedECPA: An Efficient Countermeasure Against Scaling-Based Model Poisoning Attacks in Blockchain-Based Federated Learning
FedECPA: An Efficient Countermeasure Against Scaling-Based Model Poisoning Attacks in Blockchain-Based Federated Learning Open
Artificial intelligence (AI) and machine learning (ML) have become integral to various applications, leveraging vast amounts of heterogeneous, globally distributed Internet of Things (IoT) data to identify patterns and build accurate ML mo…
View article: GradualDiff-Fed: A Federated Learning Specialized Framework for Large Language Model
GradualDiff-Fed: A Federated Learning Specialized Framework for Large Language Model Open
The rapid proliferation of large language models (LLMs) has created an unprecedented demand for fine-tuning models for specialized domains, such as medical science. While federated learning (FL) offers a decentralized and privacy-preservin…
View article: Hierarchical Federated Learning: Approaches, Applications, and Open Challenges
Hierarchical Federated Learning: Approaches, Applications, and Open Challenges Open
Federated learning (FL) is a machine learning (ML) paradigm that enables models to be trained collaboratively across distributed clients without breaking privacy. By allowing data to remain on clients’ devices and only sharing model update…
View article: A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions
A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions Open
Internet of Vehicles (IoVs) consist of smart vehicles, Autonomous Vehicles (AVs) as well as roadside units (RSUs) that communicate wirelessly to provide enhanced transportation services such as improved traffic efficiency and reduced traff…
View article: Decentralization Using Quantum Blockchain: A Theoretical Analysis
Decentralization Using Quantum Blockchain: A Theoretical Analysis Open
Blockchain technology has been prominent recently due to its applications in cryptocurrency. Numerous decentralized blockchain applications have been possible due to blockchains’ nature of distributed, secured, and peer-to-peer storage. On…
View article: A Collaborative Knowledge-Based Security Risk Assessments Solution using Blockchains
A Collaborative Knowledge-Based Security Risk Assessments Solution using Blockchains Open
Artificial intelligence and machine learning have recently gained wide adaptation in building intelligent yet simple and proactive security risk assessment solutions. Intrusion identification, malware detection, and threat intelligence are…
View article: Experiments with a LoRaWAN-Based Remote ID System for Locating Unmanned Aerial Vehicles (UAVs)
Experiments with a LoRaWAN-Based Remote ID System for Locating Unmanned Aerial Vehicles (UAVs) Open
Federal Aviation Administration (FAA) of the United States considers Remote ID systems for unmanned aerial vehicles (UAVs).ese systems act as license plates used on automobiles, but they transmit information using radio waves.However, the …
View article: Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security
Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security Open
The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to reshape many networking applications. Healthcare systems are among th…
View article: Safety Score as an Evaluation Metric for Machine Learning Models of Security Applications
Safety Score as an Evaluation Metric for Machine Learning Models of Security Applications Open
Machine learning studies have traditionally used accuracy, F 1 score, etc. to measure the goodness of models. We show that these conventional metrics do not necessarily represent risks in security applications and may result in models that…
View article: Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study
Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study Open
Introducing IoT systems to healthcare applications has made it possible to remotely monitor patients' information and provide proper diagnostics whenever needed. However, providing high-security features that guarantee the correctness and …
View article: SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach
SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach Open
This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank’s control system, which is a stage in the process of wat…
View article: Security Services Using Blockchains: A State of the Art Survey
Security Services Using Blockchains: A State of the Art Survey Open
This article surveys blockchain-based approaches for several security services. These services include authentication, confidentiality, privacy and access control list (ACL), data and resource provenance, and integrity assurance. All these…
View article: A Survey of Protocols and Standards for Internet of Things
A Survey of Protocols and Standards for Internet of Things Open
The rapid growth in technology and internet connected devices has enabled Internet of Things (IoT) to be one of the important fields in computing. Standards, technologies and platforms targeting IoT ecosystem are being developed at a very …
View article: Feasibility of Supervised Machine Learning for Cloud Security
Feasibility of Supervised Machine Learning for Cloud Security Open
Cloud computing is gaining significant attention, however, security is the biggest hurdle in its wide acceptance. Users of cloud services are under constant fear of data loss, security threats and availability issues. Recently, learning-ba…