Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–18 of 18 results for author: Shojafar, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.08577  [pdf, other

    cs.NI cs.CR cs.PF eess.SY

    Intelligent Control in 6G Open RAN: Security Risk or Opportunity?

    Authors: Sanaz Soltani, Mohammad Shojafar, Ali Amanlou, Rahim Tafazolli

    Abstract: The Open Radio Access Network (Open RAN) framework, emerging as the cornerstone for Artificial Intelligence (AI)-enabled Sixth-Generation (6G) mobile networks, heralds a transformative shift in radio access network architecture. As the adoption of Open RAN accelerates, ensuring its security becomes critical. The RAN Intelligent Controller (RIC) plays a central role in Open RAN by improving network… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

    Comments: 36 pages, 14 figures, IEEE COMST (in review)

  2. arXiv:2401.02323  [pdf, other

    eess.SP cs.LG

    Multi-Agent Context Learning Strategy for Interference-Aware Beam Allocation in mmWave Vehicular Communications

    Authors: Abdulkadir Kose, Haeyoung Lee, Chuan Heng Foh, Mohammad Shojafar

    Abstract: Millimeter wave (mmWave) has been recognized as one of key technologies for 5G and beyond networks due to its potential to enhance channel bandwidth and network capacity. The use of mmWave for various applications including vehicular communications has been extensively discussed. However, applying mmWave to vehicular communications faces challenges of high mobility nodes and narrow coverage along… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

    Comments: Accepted in IEEE Transactions on Intelligent Transportation Systems

  3. arXiv:2204.07772  [pdf, other

    cs.CR cs.LG

    SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment

    Authors: Marjan Golmaryami, Rahim Taheri, Zahra Pooranian, Mohammad Shojafar, Pei Xiao

    Abstract: In recent years, malware detection has become an active research topic in the area of Internet of Things (IoT) security. The principle is to exploit knowledge from large quantities of continuously generated malware. Existing algorithms practice available malware features for IoT devices and lack real-time prediction behaviors. More research is thus required on malware detection to cope with real-t… ▽ More

    Submitted 16 April, 2022; originally announced April 2022.

    Comments: 20 pages, 6 figures, 2 Tables, Submitted to ACM Transactions on Multimedia Computing, Communications, and Applications

  4. arXiv:2204.01690  [pdf, other

    cs.CR cs.LG

    Deep Image: A precious image based deep learning method for online malware detection in IoT Environment

    Authors: Meysam Ghahramani, Rahim Taheri, Mohammad Shojafar, Reza Javidan, Shaohua Wan

    Abstract: The volume of malware and the number of attacks in IoT devices are rising everyday, which encourages security professionals to continually enhance their malware analysis tools. Researchers in the field of cyber security have extensively explored the usage of sophisticated analytics and the efficiency of malware detection. With the introduction of new malware kinds and attack routes, security exper… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

    Comments: 10 pages, 17 figures, SUBMITTED TO IEEE INTERNET OF THINGS JOURNAL, MARCH 2022

  5. arXiv:2104.13974  [pdf, other

    cs.DC math.OC

    Joint QoS-aware and Cost-efficient Task Scheduling for Fog-Cloud Resources in a Volunteer Computing System

    Authors: Farooq Hoseiny, Sadoon Azizi, Mohammad Shojafar, Rahim Tafazolli

    Abstract: Volunteer computing is an Internet-based distributed computing system in which volunteers share their extra available resources to manage large-scale tasks. However, computing devices in a Volunteer Computing System (VCS) are highly dynamic and heterogeneous in terms of their processing power, monetary cost, and data transferring latency. To ensure both the high Quality of Service (QoS) and low co… ▽ More

    Submitted 28 April, 2021; originally announced April 2021.

    Comments: 21 pages, 6 figures, ACM Transactions on Internet Technology (TOIT)

    MSC Class: 52 ACM Class: C.2.1; G.1.6

  6. arXiv:2101.06676  [pdf

    cs.CR cs.DC cs.IT

    A Technical Report for Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment

    Authors: Ali Shahidinejad, Mostafa Ghobaei-Arani, Alireza Souri, Mohammad Shojafar, Saru Kumari

    Abstract: Selected procedures in [1] and additional simulation results are presented in detail in this report. We first present the IoT device registration in Section I, and we provide the details of fuzzy-based trust computation in Section II. In the end, we show some additional simulation results for formal validation of the Light-Edge under On-the-Fly Model Checker (OFMC) and Constraint-Logic-based ATtac… ▽ More

    Submitted 17 January, 2021; originally announced January 2021.

    Comments: 5 pages, 13 figures, 5 tables, technical report of IEEE Consumer Electronics Magazine paper (Light-Edge)

  7. arXiv:2009.13640  [pdf, other

    cs.NI

    TEL: Low-Latency Failover Traffic Engineering in Data Plane

    Authors: Habib Mostafaei, Mohammad Shojafar, Mauro Conti

    Abstract: Modern network applications demand low-latency traffic engineering in the presence of network failure while preserving the quality of service constraints like delay and capacity. Fast Re-Route (FRR) mechanisms are widely used for traffic re-routing purposes in failure scenarios. Control plane FRR typically computes the backup forwarding rules to detour the traffic in the data plane when the failur… ▽ More

    Submitted 21 July, 2021; v1 submitted 28 September, 2020; originally announced September 2020.

    Journal ref: IEEE Transactions on Network and Service Management, 2021

  8. arXiv:1908.05759  [pdf, other

    cs.CR cs.LG cs.NE stat.ML

    Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features

    Authors: Rahim Taheri, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Mauro Conti

    Abstract: In this paper, we develop four malware detection methods using Hamming distance to find similarity between samples which are first nearest neighbors (FNN), all nearest neighbors (ANN), weighted all nearest neighbors (WANN), and k-medoid based nearest neighbors (KMNN). In our proposed methods, we can trigger the alarm if we detect an Android app is malicious. Hence, our solutions help us to avoid t… ▽ More

    Submitted 27 November, 2019; v1 submitted 12 August, 2019; originally announced August 2019.

    Comments: 20 pages, 8 figures, 11 tables, FGCS Elsevier journal

  9. arXiv:1908.04473  [pdf, other

    cs.LG cs.AI stat.ML

    On Defending Against Label Flipping Attacks on Malware Detection Systems

    Authors: Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti

    Abstract: Label manipulation attacks are a subclass of data poisoning attacks in adversarial machine learning used against different applications, such as malware detection. These types of attacks represent a serious threat to detection systems in environments having high noise rate or uncertainty, such as complex networks and Internet of Thing (IoT). Recent work in the literature has suggested using the… ▽ More

    Submitted 16 June, 2020; v1 submitted 12 August, 2019; originally announced August 2019.

    Comments: 21 pages, 6 figures, 4 tables, NCAA Springer Journal

  10. arXiv:1904.09433  [pdf, other

    cs.CR cs.AI cs.CC cs.LG

    Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach

    Authors: Rahim Taheri, Reza Javidan, Mohammad Shojafar, Vinod P, Mauro Conti

    Abstract: The widespread adoption of smartphones dramatically increases the risk of attacks and the spread of mobile malware, especially on the Android platform. Machine learning-based solutions have been already used as a tool to supersede signature-based anti-malware systems. However, malware authors leverage features from malicious and legitimate samples to estimate statistical difference in-order to cre… ▽ More

    Submitted 29 February, 2020; v1 submitted 20 April, 2019; originally announced April 2019.

    Comments: 20 pages, 6 figures, 5 tables

    ACM Class: D.3; I.2; F.2

    Journal ref: Cluster Computing 2020

  11. arXiv:1809.09035  [pdf, other

    cs.CR cs.LG stat.ML

    FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware

    Authors: Deepa K, Radhamani G, Vinod P, Mohammad Shojafar, Neeraj Kumar, Mauro Conti

    Abstract: Ever increasing number of Android malware, has always been a concern for cybersecurity professionals. Even though plenty of anti-malware solutions exist, a rational and pragmatic approach for the same is rare and has to be inspected further. In this paper, we propose a novel two-set feature selection approach based on Rough Set and Statistical Test named as RSST to extract relevant system calls. T… ▽ More

    Submitted 17 September, 2018; originally announced September 2018.

    Comments: 26 pages, 6 figures, 9 tables, Journal Submission

  12. arXiv:1807.00324  [pdf, other

    cs.DC cs.NI

    Joint Failure Recovery, Fault Prevention, and Energy-efficient Resource Management for Real-time SFC in Fog-supported SDN

    Authors: Mohammad M. Tajiki, Mohammad Shojafar, Behzad Akbari, Stefano Salsano, Mauro Conti, Mukesh Singhal

    Abstract: In this paper, we focus on the problems of traffic engineering, failure recovery, fault prevention, and Service Function Chain (SFC) with reliability and energy consumption constraints in Software Defined Networks (SDN). These types of deployments use Fog computing as an emerging paradigm to manage the distributed small-size traffic flows passing through the SDN-enabled switches (possibly Fog Node… ▽ More

    Submitted 1 July, 2018; originally announced July 2018.

    Comments: 24 pages, 10 figures, 3 tables, Computer Networks Journal

  13. CECT: Computationally Efficient Congestion-avoidance and Traffic Engineering in Software-defined Cloud Data Centers

    Authors: Mohammad Mahdi Tajiki, Behzad Akbari, Mohammad Shojafar, Seyed Hesamedin Ghasemi Petroudi, Mahdi Latifi Barazandeh, Nader Mokari, Luca Chiaraviglio, Michael Zink

    Abstract: The proliferation of cloud data center applications and network function virtualization (NFV) boosts dynamic and QoS dependent traffic into the data centers network. Currently, lots of network routing protocols are requirement agnostic, while other QoS-aware protocols are computationally complex and inefficient for small flows. In this paper, a computationally efficient congestion avoidance scheme… ▽ More

    Submitted 30 December, 2020; v1 submitted 21 February, 2018; originally announced February 2018.

  14. arXiv:1710.02611  [pdf, other

    cs.NI

    Joint Energy Efficient and QoS-aware Path Allocation and VNF Placement for Service Function Chaining

    Authors: Mohammad M. Tajiki, Stefano Salsano, Luca Chiaraviglio, Mohammad Shojafar, Behzad Akbari

    Abstract: Service Function Chaining (SFC) allows the forwarding of a traffic flow along a chain of Virtual Network Functions (VNFs, e.g., IDS, firewall, and NAT). Software Defined Networking (SDN) solutions can be used to support SFC reducing the management complexity and the operational costs. One of the most critical issues for the service and network providers is the reduction of energy consumption, whic… ▽ More

    Submitted 12 July, 2018; v1 submitted 6 October, 2017; originally announced October 2017.

    Comments: Extended version of submitted paper - v7 - July 2018

  15. arXiv:1710.01801  [pdf, ps, other

    cs.DC cs.NI

    FOCAN: A Fog-supported Smart City Network Architecture for Management of Applications in the Internet of Everything Environments

    Authors: Paola G. Vinueza Naranjo, Zahra Pooranian, Mohammad Shojafar, Mauro Conti, Rajkumar Buyya

    Abstract: Smart city vision brings emerging heterogeneous communication technologies such as Fog Computing (FC) together to substantially reduce the latency and energy consumption of Internet of Everything (IoE) devices running various applications. The key feature that distinguishes the FC paradigm for smart cities is that it spreads communication and computing resources over the wired/wireless access netw… ▽ More

    Submitted 4 October, 2017; originally announced October 2017.

    Comments: Sapienza University of Rome, 3 Oct. 2017, in review, 16 pages, 6 figures

  16. arXiv:1404.5528  [pdf

    cs.DC cs.AI

    Hybrid Genetic Algorithm for Cloud Computing Applications

    Authors: Saeed Javanmardi, Mohammad Shojafar, Danilo Amendola, Nicola Cordeschi, Hongbo Liu, Ajith Abraham

    Abstract: In this paper with the aid of genetic algorithm and fuzzy theory, we present a hybrid job scheduling approach, which considers the load balancing of the system and reduces total execution time and execution cost. We try to modify the standard Genetic algorithm and to reduce the iteration of creating population with the aid of fuzzy theory. The main goal of this research is to assign the jobs to th… ▽ More

    Submitted 22 April, 2014; originally announced April 2014.

    Comments: 10 Pages, 5 figures, 1 table, IBICA2014, Accepted to publish

    ACM Class: C.2.4

  17. arXiv:1404.2632  [pdf

    cs.DC cs.NI

    FRTRUST: a fuzzy reputation based model for trust management in semantic P2P grids

    Authors: Saeed Javanmardi, Mohammad Shojafar, Shahdad Shariatmadari, Sima S. Ahrabi

    Abstract: Grid and peer-to-peer (P2P) networks are two ideal technologies for file sharing. A P2P grid is a special case of grid networks in which P2P communications are used for communication between nodes and trust management. Use of this technology allows creation of a network with greater distribution and scalability. Semantic grids have appeared as an expansion of grid networks in which rich resource m… ▽ More

    Submitted 29 April, 2014; v1 submitted 9 April, 2014; originally announced April 2014.

    Comments: 12 Pages, 10 Figures, 3 Tables, InderScience, International Journal of Grid and Utility Computing

  18. arXiv:1206.2297  [pdf

    cs.OH

    The Use of Fuzzy Cognitive Maps in Analyzing and Implementation of ITIL Processes

    Authors: Hamid Zarrazvand, Mohammad Shojafar

    Abstract: Information Technology Infrastructure Library (ITIL) is series of best practices that helps Information technology Organizations to provide Information technology (IT) services for their customers with better performances and quality. This article is looking for a way to implement ITIL in an organization and also using Fuzzy Cognitive Maps (FCM) to model the problem for better understanding of env… ▽ More

    Submitted 11 June, 2012; originally announced June 2012.

    Comments: 18 Figures, 11 references; IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 3, May 2012, ISSN (Online): 1694-0814