Mohamed Mahmoud
YOU?
Author Swipe
View article: “Facial Recognition Technology in Law Enforcement: Navigating the Balance Between Security and Civil Liberties in the UK and Europe”
“Facial Recognition Technology in Law Enforcement: Navigating the Balance Between Security and Civil Liberties in the UK and Europe” Open
The increasing use of facial recognition technology (FRT) by law enforcement has sparked considerable debate over its potential impacts on privacy, civil liberties, and human rights. This research provides an in-depth analysis of the regul…
View article: PDLRecover: Privacy-preserving Decentralized Model Recovery with Machine Unlearning
PDLRecover: Privacy-preserving Decentralized Model Recovery with Machine Unlearning Open
Decentralized learning is vulnerable to poison attacks, where malicious clients manipulate local updates to degrade global model performance. Existing defenses mainly detect and filter malicious models, aiming to prevent a limited number o…
View article: Privacy-Focused Smart Device for Non-Invasive Bathroom Activity Detection and Health Monitoring
Privacy-Focused Smart Device for Non-Invasive Bathroom Activity Detection and Health Monitoring Open
This project introduces the design and implementation of a device that tracks the ambient conditions around the sink of a washroom, with potential of identifying ambient changes that may correlate with an event within the space. With the s…
View article: Hardware Acceleration-Based Privacy-Aware Authentication Scheme for Internet of Vehicles Using Physical Unclonable Function
Hardware Acceleration-Based Privacy-Aware Authentication Scheme for Internet of Vehicles Using Physical Unclonable Function Open
Due to technological advancement, the advent of smart cities has facilitated the deployment of advanced urban management systems. This integration has been made possible through the Internet of Vehicles (IoV), a foundational technology. By…
View article: A Privacy-Preserving RL-Based Secure Charging Coordinator Using Efficient FL for Smart Grid Home Batteries
A Privacy-Preserving RL-Based Secure Charging Coordinator Using Efficient FL for Smart Grid Home Batteries Open
Smart power grids (SGs) enhance efficiency, reliability, and sustainability by integrating distributed energy resources (DERs) such as solar panels and wind turbines. A key challenge in SGs is managing home battery charging during periods …
View article: False Data Injection Attacks on Reinforcement Learning-Based Charging Coordination in Smart Grids and a Countermeasure
False Data Injection Attacks on Reinforcement Learning-Based Charging Coordination in Smart Grids and a Countermeasure Open
Reinforcement learning (RL) is proven effective in optimizing home battery charging coordination within smart grids. However, its vulnerability to adversarial behavior poses a significant challenge to the security and fairness of the charg…
View article: XAI-Based Accurate Anomaly Detector That Is Robust Against Black-Box Evasion Attacks for the Smart Grid
XAI-Based Accurate Anomaly Detector That Is Robust Against Black-Box Evasion Attacks for the Smart Grid Open
In the realm of smart grids, machine learning (ML) detectors—both binary (or supervised) and anomaly (or unsupervised)—have proven effective in detecting electricity theft (ET). However, binary detectors are designed for specific attacks, …
View article: Accurate Power Consumption Predictor and One-Class Electricity Theft Detector for Smart Grid “Change-and-Transmit” Advanced Metering Infrastructure
Accurate Power Consumption Predictor and One-Class Electricity Theft Detector for Smart Grid “Change-and-Transmit” Advanced Metering Infrastructure Open
The advanced metering infrastructure (AMI) of the smart grid plays a critical role in energy management and billing by enabling the periodic transmission of consumers’ power consumption readings. To optimize data collection efficiency, AMI…
View article: Reinforcement Learning for Fair and Efficient Charging Coordination for Smart Grid
Reinforcement Learning for Fair and Efficient Charging Coordination for Smart Grid Open
The integration of renewable energy sources, such as rooftop solar panels, into smart grids poses significant challenges for managing customer-side battery storage. In response, this paper introduces a novel reinforcement learning (RL) app…
View article: Federated Learning Enabled IDS for Internet of Things on non-IID Data
Federated Learning Enabled IDS for Internet of Things on non-IID Data Open
Critical applications in IoT systems are being targeted by attackers. Using a smart intrusion detection system (IDS) is crucial for protecting IoT systems. Centralized learning is commonly used to create smart IDS and has been successful i…
View article: Hybrid Encryption for Securing and Tracking Goods Delivery by Multipurpose Unmanned Aerial Vehicles in Rural Areas Using Cipher Block Chaining and Physical Layer Security
Hybrid Encryption for Securing and Tracking Goods Delivery by Multipurpose Unmanned Aerial Vehicles in Rural Areas Using Cipher Block Chaining and Physical Layer Security Open
This paper investigated the use of unmanned aerial vehicles (UAVs) for the delivery of critical goods to remote areas in the absence of network connectivity. Under such conditions, it is important to track the delivery process and record t…
View article: Guest Editorial Special Issue on Recent Advances of Security, Privacy, and Trust in Mobile Crowdsourcing
Guest Editorial Special Issue on Recent Advances of Security, Privacy, and Trust in Mobile Crowdsourcing Open
With the rapid advances in mobile and communication technologies, mobile devices are equipped with powerful processors, various sensors, large memories, and fast wireless communication modules. By taking advantage of powerful mobile device…
View article: Editorial for the Special Issue “Data Science and Big Data in Biology, Physical Science and Engineering”
Editorial for the Special Issue “Data Science and Big Data in Biology, Physical Science and Engineering” Open
Big Data analysis is one of the most contemporary areas of development and research in the present day [...]
View article: A Trojan Attack against Smart Grid Federated Learning and Countermeasures
A Trojan Attack against Smart Grid Federated Learning and Countermeasures Open
In smart power grid, consumers can hack their smart meters to report low electricity consumption readings to reduce their bills launching electricity theft cyberattacks. This study investigates a Trojan attack in federated learning of a de…
View article: Lightweight Multi-Class Support Vector Machine-Based Medical Diagnosis System with Privacy Preservation
Lightweight Multi-Class Support Vector Machine-Based Medical Diagnosis System with Privacy Preservation Open
Machine learning, powered by cloud servers, has found application in medical diagnosis, enhancing the capabilities of smart healthcare services. Research literature demonstrates that the support vector machine (SVM) consistently demonstrat…
View article: Efficient One-Class False Data Detector Based on Deep SVDD for Smart Grids
Efficient One-Class False Data Detector Based on Deep SVDD for Smart Grids Open
In the smart grid, malicious consumers can hack their smart meters to report false power consumption readings to steal electricity. Developing a machine-learning based detector for identifying these readings is a challenge due to the unava…
View article: A Federated Learning Model Based on Hardware Acceleration for the Early Detection of Alzheimer’s Disease
A Federated Learning Model Based on Hardware Acceleration for the Early Detection of Alzheimer’s Disease Open
Alzheimer’s disease (AD) is a progressive illness with a slow start that lasts many years; the disease’s consequences are devastating to the patient and the patient’s family. If detected early, the disease’s impact and prognosis can be alt…
View article: Postoperative Analgesia after Modified Radical Mastectomy with Focus on the Serratus Anterior Plane Block: Review Article
Postoperative Analgesia after Modified Radical Mastectomy with Focus on the Serratus Anterior Plane Block: Review Article Open
One of the most frequent procedures that may cause significant early postoperative discomfort in breast surgery is the modified radical mastectomy (MRM). Local anaesthetics techniques (Long-Acting Local Analgesia in Breast Surgery providin…
View article: The Relation between Work Involvement and the Quality of Nursing Care among Staff Nurses
The Relation between Work Involvement and the Quality of Nursing Care among Staff Nurses Open
Background: Workaholism, which is an intense drive to work that can result in decreased levels of job satisfaction and may influence the quality of nursing care.Aim of the study: The study aimed to assess the relation between work involvem…
View article: Comparative study between Cyanoacrylate Embolization and Radiofrequency Ablation in varicose veins with Incompetent Sapheno-femoral junction
Comparative study between Cyanoacrylate Embolization and Radiofrequency Ablation in varicose veins with Incompetent Sapheno-femoral junction Open
Background: Varicose veins are common, and their management has undergone a number of changes over the years.Surgery has been the traditional treatment option, but towards the 21st century, new endovenous thermal ablation techniques, namel…
View article: Analyzing the Knowledge, Attitude, and Practices of Healthcare workers towards the awareness of nosocomial infections- A Global Survey
Analyzing the Knowledge, Attitude, and Practices of Healthcare workers towards the awareness of nosocomial infections- A Global Survey Open
Raw data for our article titled "Analyzing the Knowledge, Attitude, and Practices of Healthcare workers towards the awareness of nosocomial infections- A Global Survey"
View article: Analyzing the Knowledge, Attitude, and Practices of Healthcare workers towards the awareness of nosocomial infections- A Global Survey
Analyzing the Knowledge, Attitude, and Practices of Healthcare workers towards the awareness of nosocomial infections- A Global Survey Open
Raw data for our article titled "Analyzing the Knowledge, Attitude, and Practices of Healthcare workers towards the awareness of nosocomial infections- A Global Survey"
View article: EIDM: deep learning model for IoT intrusion detection systems
EIDM: deep learning model for IoT intrusion detection systems Open
Internet of Things (IoT) is a disruptive technology for the future decades. Due to its pervasive growth, it is susceptible to cyber-attacks, and hence the significance of Intrusion Detection Systems (IDSs) for IoT is pertinent. The viabili…
View article: AI-powered health monitoring of anode baking furnace pits in aluminum production using autonomous drones
AI-powered health monitoring of anode baking furnace pits in aluminum production using autonomous drones Open
Industrial health monitoring in factories is essential for quality assurance, energy and cost reduction, and health and safety. In aluminum factories, anode furnace pits' flue walls deform over time due to cyclic heating and cooling. They …
View article: Load Forecasting Techniques and Their Applications in Smart Grids
Load Forecasting Techniques and Their Applications in Smart Grids Open
The growing success of smart grids (SGs) is driving increased interest in load forecasting (LF) as accurate predictions of energy demand are crucial for ensuring the reliability, stability, and efficiency of SGs. LF techniques aid SGs in m…
View article: Privacy-Preserving and Communication-Efficient Energy Prediction Scheme Based on Federated Learning for Smart Grids
Privacy-Preserving and Communication-Efficient Energy Prediction Scheme Based on Federated Learning for Smart Grids Open
Energy forecasting is important because it enables infrastructure planning and power dispatching while reducing power outages and equipment failures. It is well-known that federated learning (FL) can be used to build a global energy predic…
View article: Detection of Distributed Denial of Charge (DDoC) Attacks Using Deep Neural Networks With Vector Embedding
Detection of Distributed Denial of Charge (DDoC) Attacks Using Deep Neural Networks With Vector Embedding Open
To prevent excessive strain on the electrical grid and avoid long waiting times of the electric vehicle (EV) at charging stations, charging coordination mechanisms have been implemented. However, there is a potential vulnerability that ena…
View article: Electricity Theft Detection Using Deep Reinforcement Learning in Smart Power Grids
Electricity Theft Detection Using Deep Reinforcement Learning in Smart Power Grids Open
In smart power grids, smart meters (SMs) are deployed at the end side of customers to report fine-grained power consumption readings periodically to the utility for energy management and load monitoring. However, electricity theft cyber-at…
View article: Novel Evasion Attacks Against Adversarial Training Defense for Smart Grid Federated Learning
Novel Evasion Attacks Against Adversarial Training Defense for Smart Grid Federated Learning Open
In the advanced metering infrastructure (AMI) of the smart grid, smart meters (SMs) are deployed to collect fine-grained electricity consumption data, enabling billing, load monitoring, and efficient energy management. However, some consum…
View article: Privacy-Preserving Detection of Power Theft in Smart Grid Change and Transmit (CAT) Advanced Metering Infrastructure
Privacy-Preserving Detection of Power Theft in Smart Grid Change and Transmit (CAT) Advanced Metering Infrastructure Open
For energy management and billing purposes, advanced metering infrastructure (AMI) requires periodic transmission of consumer power consumption readings by smart meters to the electric utility (EU). An efficient way for collecting readings…