hh.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (6 of 6) Show all publications
Alkhabbas, F., Alawadi, S., Ayyad, M., Spalazzese, R. & Davidsson, P. (2023). ART4FL: An Agent-based Architectural Approach for Trustworthy Federated Learning in the IoT. In: 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC): . Paper presented at 8th IEEE International Conference on Fog and Mobile Edge Computing (FMEC 2023), Tartu, Estonia, 18-20 September, 2023 (pp. 270-275). IEEE
Open this publication in new window or tab >>ART4FL: An Agent-based Architectural Approach for Trustworthy Federated Learning in the IoT
Show others...
2023 (English)In: 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC), IEEE, 2023, p. 270-275Conference paper, Published paper (Refereed)
Abstract [en]

The integration of the Internet of Things (IoT) and Machine Learning (ML) technologies has opened up for the development of novel types of systems and services. Federated Learning (FL) has enabled the systems to collaboratively train their ML models while preserving the privacy of the data collected by their IoT devices and objects. Several FL frameworks have been developed, however, they do not enable FL in open, distributed, and heterogeneous IoT environments. Specifically, they do not support systems that collect similar data to dynamically discover each other, communicate, and negotiate about the training terms (e.g., accuracy, communication latency, and cost). Towards bridging this gap, we propose ART4FL, an end-to-end framework that enables FL in open IoT settings. The framework enables systems’ users to configure agents that participate in FL on their behalf. Those agents negotiate and make commitments (i.e., contractual agreements) to dynamically form federations. To perform FL, the framework deploys the needed services dynamically, monitors the training rounds, and calculates agents’ trust scores based on the established commitments. ART4FL exploits a blockchain network to maintain the trust scores, and it provides those scores to negotiating agents’ during the federations’ formation phase. © 2023 IEEE.

Place, publisher, year, edition, pages
IEEE, 2023
Keywords
Agents, Internet of Things, Machine Learning, Trustworthy Federated Learning
National Category
Computer Sciences
Identifiers
urn:nbn:se:hh:diva-52325 (URN)10.1109/FMEC59375.2023.10306036 (DOI)2-s2.0-85179515213 (Scopus ID)979-8-3503-1697-1 (ISBN)979-8-3503-1698-8 (ISBN)
Conference
8th IEEE International Conference on Fog and Mobile Edge Computing (FMEC 2023), Tartu, Estonia, 18-20 September, 2023
Projects
Intelligent and Trustworthy IoT Systems
Funder
Knowledge Foundation, 20220087
Available from: 2023-12-22 Created: 2023-12-22 Last updated: 2023-12-22Bibliographically approved
Al Khatib, S. M., Alkharabsheh, K. & Alawadi, S. (2023). Selection of human evaluators for design smell detection using dragonfly optimization algorithm: An empirical study. Information and Software Technology, 155, Article ID 107120.
Open this publication in new window or tab >>Selection of human evaluators for design smell detection using dragonfly optimization algorithm: An empirical study
2023 (English)In: Information and Software Technology, ISSN 0950-5849, E-ISSN 1873-6025, Vol. 155, article id 107120Article in journal (Refereed) Published
Abstract [en]

Context: Design smell detection is considered an efficient activity that decreases maintainability expenses and improves software quality. Human context plays an essential role in this domain. Objective: In this paper, we propose a search-based approach to optimize the selection of human evaluators for design smell detection. Method: For this purpose, Dragonfly Algorithm (DA) is employed to identify the optimal or near-optimal human evaluator's profiles. An online survey is designed and asks the evaluators to evaluate a sample of classes for the presence of god class design smell. The Kappa-Fleiss test has been used to validate the proposed approach. Results: The results show that the dragonfly optimization algorithm can be utilized effectively to decrease the efforts (time, cost ) of design smell detection concerning the identification of the number and the optimal or near-optimal profile of human experts required for the evaluation process. Conclusions: A Search-based approach can be effectively used for improving a god-class design smell detection. Consequently, this leads to minimizing the maintenance cost. © 2022 The Author(s)

Place, publisher, year, edition, pages
Amsterdam: Elsevier, 2023
Keywords
Design smell detection, Dragonfly Algorithm, Empirical study, God class, Optimization, Search-based software engineering, Software quality
National Category
Computer Sciences
Identifiers
urn:nbn:se:hh:diva-48954 (URN)10.1016/j.infsof.2022.107120 (DOI)000901826200009 ()2-s2.0-85143513583 (Scopus ID)
Available from: 2022-12-19 Created: 2022-12-19 Last updated: 2023-08-21Bibliographically approved
Alkhabbas, F., Alsadi, M., Alawadi, S., Awaysheh, F. M., Kebande, V. R. & Moghaddam, M. T. (2022). ASSERT: A Blockchain-Based Architectural Approach for Engineering Secure Self-Adaptive IoT Systems. Sensors, 22(18), Article ID 6842.
Open this publication in new window or tab >>ASSERT: A Blockchain-Based Architectural Approach for Engineering Secure Self-Adaptive IoT Systems
Show others...
2022 (English)In: Sensors, E-ISSN 1424-8220, Vol. 22, no 18, article id 6842Article in journal (Refereed) Published
Abstract [en]

Internet of Things (IoT) systems are complex systems that can manage mission-critical, costly operations or the collection, storage, and processing of sensitive data. Therefore, security represents a primary concern that should be considered when engineering IoT systems. Additionally, several challenges need to be addressed, including the following ones. IoT systems’ environments are dynamic and uncertain. For instance, IoT devices can be mobile or might run out of batteries, so they can become suddenly unavailable. To cope with such environments, IoT systems can be engineered as goal-driven and self-adaptive systems. A goal-driven IoT system is composed of a dynamic set of IoT devices and services that temporarily connect and cooperate to achieve a specific goal. Several approaches have been proposed to engineer goal-driven and self-adaptive IoT systems. However, none of the existing approaches enable goal-driven IoT systems to automatically detect security threats and autonomously adapt to mitigate them. Toward bridging these gaps, this paper proposes a distributed architectural Approach for engineering goal-driven IoT Systems that can autonomously SElf-adapt to secuRity Threats in their environments (ASSERT). ASSERT exploits techniques and adopts notions, such as agents, federated learning, feedback loops, and blockchain, for maintaining the systems’ security and enhancing the trustworthiness of the adaptations they perform. The results of the experiments that we conducted to validate the approach’s feasibility show that it performs and scales well when detecting security threats, performing autonomous security adaptations to mitigate the threats and enabling systems’ constituents to learn about security threats in their environments collaboratively. © 2022 by the authors.

Place, publisher, year, edition, pages
basel: MDPI, 2022
Keywords
blockchain, Internet of Things, multi-agent systems, security, self-adaptive and goal-driven systems, software architecture
National Category
Computer Sciences
Identifiers
urn:nbn:se:hh:diva-48790 (URN)10.3390/s22186842 (DOI)000858946100001 ()36146191 (PubMedID)2-s2.0-85138427481 (Scopus ID)
Note

This research was partially funded by the Knowledge Foundation (Stiftelsen för Kunskaps- och Kompetensutveckling), grant number 20140035. Further, the work of Feras M. Awaysheh has been financed by European Social Fund via “ICT programme” measure, European Regional Development Funds via the Mobilitas Plus programme, grant number MOBTT75.

Available from: 2022-12-09 Created: 2022-12-09 Last updated: 2022-12-09Bibliographically approved
Awaysheh, F. M., Alawadi, S. & Alzubi, S. (2022). FLIoDT: A Federated Learning Architecture from Privacy by Design to Privacy by Default over IoT. In: Saleh I., Ghedira C., Jararweh Y., Benkhelifa E., Boubchir L. (Ed.), 2022 Seventh International Conference on Fog and Mobile Edge Computing (FMEC): Paris, France, 12-15 December 2022. Paper presented at 7th International Conference on Fog and Mobile Edge Computing, FMEC 2022, 12 December 2022 through 15 December 2022, 187257, 2022 (pp. 1-6). Piscataway, N.J.: IEEE
Open this publication in new window or tab >>FLIoDT: A Federated Learning Architecture from Privacy by Design to Privacy by Default over IoT
2022 (English)In: 2022 Seventh International Conference on Fog and Mobile Edge Computing (FMEC): Paris, France, 12-15 December 2022 / [ed] Saleh I., Ghedira C., Jararweh Y., Benkhelifa E., Boubchir L., Piscataway, N.J.: IEEE, 2022, p. 1-6Conference paper, Published paper (Refereed)
Abstract [en]

The Internet of Things (IoT) realized exponential growth of smart devices with decent capabilities, promising an era of Edge Intelligence. This paradigm creates a timely need to shift many computations closer to the data source at the network's edge. Data privacy is paramount, as security breaches can severely impact such an environment with its vast attack surface. The advent of Federated learning (FL), a privacy-by-design with decentralized machine learning (ML), enables participants to collaboratively train a model without sharing their sensitive data. Nevertheless, privacy implications are a glaring concern and perrier for widening the utilization of FL approaches and their mass adoption over IoT applications. This paper introduces the notion of FL over the Internet of Disconnected Things (FLIoDT), a functionality separation of concerns following the air-gapped networks. FLIoDT provides a practical methodology to mitigate Data threats/attacks in the FL domain. FLIoDT proves a practical architectural approach to mitigate several attacks in an Edge environment. Data dredging and adversarial attacks, like data poisoning, to name some. This study investigates human activity recognition of health monitoring patient data over edge computing to validate FLIoDT. © 2022 IEEE.

Place, publisher, year, edition, pages
Piscataway, N.J.: IEEE, 2022
Keywords
Data Privacy, Edge Intelligence, Federated Learning, Internet of Things, Security by Design
National Category
Communication Systems
Identifiers
urn:nbn:se:hh:diva-51358 (URN)10.1109/FMEC57183.2022.10062661 (DOI)000982337600026 ()2-s2.0-85150855800 (Scopus ID)9798350334524 (ISBN)
Conference
7th International Conference on Fog and Mobile Edge Computing, FMEC 2022, 12 December 2022 through 15 December 2022, 187257, 2022
Available from: 2023-08-11 Created: 2023-08-11 Last updated: 2023-08-11Bibliographically approved
Alkharabsheh, K., Alawadi, S., Ignaim, K., Zanoon, N., Crespo, Y., Manso, E. & Taboada, J. A. (2022). Prioritization of god class design smell: A multi-criteria based approach. Journal of King Saud University - Computer and Information Sciences, 34(10, Part B), 9332-9342
Open this publication in new window or tab >>Prioritization of god class design smell: A multi-criteria based approach
Show others...
2022 (English)In: Journal of King Saud University - Computer and Information Sciences, ISSN 1319-1578, Vol. 34, no 10, Part B, p. 9332-9342Article in journal (Refereed) Published
Abstract [en]

Context: Design smell Prioritization is a significant activity that tunes the process of software quality enhancement and raises its life cycle. Objective: A multi-criteria merge strategy for Design Smell prioritization is described. The strategy is exemplified with the case of God Class Design Smell. Method: An empirical adjustment of the strategy is performed using a dataset of 24 open source projects. Empirical evaluation was conducted in order to check how is the top ranked God Classes obtained by the proposed technique compared against the top ranked God class according to the opinion of developers involved in each of the projects in the dataset. Results: Results of the evaluation show the strategy should be improved. Analysis of the differences between projects where respondents answer correlates with the strategy and those projects where there is no correlation should be done. © 2022 The Author(s)

Place, publisher, year, edition, pages
Amsterdam: Elsevier, 2022
Keywords
Design smell, Design smell prioritization, Empirical evaluation, God class, Historical information, Software quality
National Category
Software Engineering
Identifiers
urn:nbn:se:hh:diva-48546 (URN)10.1016/j.jksuci.2022.09.011 (DOI)000999620800027 ()2-s2.0-85139724292 (Scopus ID)
Available from: 2022-11-08 Created: 2022-11-08 Last updated: 2023-08-21Bibliographically approved
Galozy, A., Alawadi, S., Kebande, V. & Nowaczyk, S.Beyond Random Noise: Insights on Anonymization Strategies from a Latent Bandit Study.
Open this publication in new window or tab >>Beyond Random Noise: Insights on Anonymization Strategies from a Latent Bandit Study
(English)Manuscript (preprint) (Other academic)
Abstract [en]

This paper investigates the issue of privacy in a learning scenario where users share knowledge for a recommendation task. Our study contributes to the growing body of research on privacy-preserving machine learning and underscores the need for tailored privacy techniques that address specific attack patterns rather than relying on one-size-fits-all solutions. We use the latent bandit setting to evaluate the trade-off between privacy and recommender performance by employing various aggregation strategies, such as averaging, nearest neighbor, and clustering combined with noise injection. More specifically, we simulate a linkage attack scenario leveraging publicly available auxiliary information acquired by the adversary. Our results on three open real-world datasets reveal that adding noise using the Laplace mechanism to an individual user's data record is a poor choice. It provides the highest regret for any noise level, relative to de-anonymization probability and the ADS metric. Instead, one should combine noise with appropriate aggregation strategies. For example, using averages from clusters of different sizes provides flexibility not achievable by varying the amount of noise alone. Generally, no single aggregation strategy can consistently achieve the optimum regret for a given desired level of privacy.

Keywords
Latent-bandit, Privacy, Linkage-attack
National Category
Computer Sciences
Identifiers
urn:nbn:se:hh:diva-52138 (URN)
Available from: 2023-11-29 Created: 2023-11-29 Last updated: 2023-11-29Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-6309-2892

Search in DiVA

Show all publications