Skip to main content

Showing 1–25 of 25 results for author: Munir, S

  1. arXiv:2407.06862  [pdf, other

    cs.AI cs.LG

    Trust and Resilience in Federated Learning Through Smart Contracts Enabled Decentralized Systems

    Authors: Lorenzo Cassano, Jacopo D'Abramo, Siraj Munir, Stefano Ferretti

    Abstract: In this paper, we present a study of a Federated Learning (FL) system, based on the use of decentralized architectures to ensure trust and increase reliability. The system is based on the idea that the FL collaborators upload the (ciphered) model parameters on the Inter-Planetary File System (IPFS) and interact with a dedicated smart contract to track their behavior. Thank to this smart contract,… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

    Comments: TRUSTCHAIN workshop

    Journal ref: Proceedings of Blockchain-2024

  2. arXiv:2406.11856  [pdf

    cs.CY

    Google's Chrome Antitrust Paradox

    Authors: Shaoor Munir, Konrad Kollnig, Anastasia Shuba, Zubair Shafiq

    Abstract: This article delves into Google's dominance of the browser market, highlighting how Google's Chrome browser is playing a critical role in asserting Google's dominance in other markets. While Google perpetuates the perception that Google Chrome is a neutral platform built on open-source technologies, we argue that Chrome is instrumental in Google's strategy to reinforce its dominance in online adve… ▽ More

    Submitted 26 June, 2024; v1 submitted 4 April, 2024; originally announced June 2024.

  3. arXiv:2406.07647  [pdf, other

    cs.CR

    FP-Inconsistent: Detecting Evasive Bots using Browser Fingerprint Inconsistencies

    Authors: Hari Venugopalan, Shaoor Munir, Shuaib Ahmed, Tangbaihe Wang, Samuel T. King, Zubair Shafiq

    Abstract: As browser fingerprinting is increasingly being used for bot detection, bots have started altering their fingerprints for evasion. We conduct the first large-scale evaluation of evasive bots to investigate whether and how altering fingerprints helps bots evade detection. To systematically investigate evasive bots, we deploy a honey site incorporating two anti-bot services (DataDome and BotD) and s… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  4. arXiv:2405.18385  [pdf, other

    cs.CR

    Blocking Tracking JavaScript at the Function Granularity

    Authors: Abdul Haddi Amjad, Shaoor Munir, Zubair Shafiq, Muhammad Ali Gulzar

    Abstract: Modern websites extensively rely on JavaScript to implement both functionality and tracking. Existing privacy enhancing content blocking tools struggle against mixed scripts, which simultaneously implement both functionality and tracking, because blocking the script would break functionality and not blocking it would allow tracking. We propose Not.js, a fine grained JavaScript blocking tool that o… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  5. arXiv:2403.06388  [pdf, other

    cs.CR cs.LG

    A Zero Trust Framework for Realization and Defense Against Generative AI Attacks in Power Grid

    Authors: Md. Shirajum Munir, Sravanthi Proddatoori, Manjushree Muralidhara, Walid Saad, Zhu Han, Sachin Shetty

    Abstract: Understanding the potential of generative AI (GenAI)-based attacks on the power grid is a fundamental challenge that must be addressed in order to protect the power grid by realizing and validating risk in new attack vectors. In this paper, a novel zero trust framework for a power grid supply chain (PGSC) is proposed. This framework facilitates early detection of potential GenAI-driven attack vect… ▽ More

    Submitted 10 March, 2024; originally announced March 2024.

    Comments: Accepted article by IEEE International Conference on Communications (ICC 2024), Copyright 2024 IEEE

  6. arXiv:2402.09452  [pdf, other

    eess.SP cs.LG eess.SY

    Data Distribution Dynamics in Real-World WiFi-Based Patient Activity Monitoring for Home Healthcare

    Authors: Mahathir Monjur, Jia Liu, Jingye Xu, Yuntong Zhang, Xiaomeng Wang, Chengdong Li, Hyejin Park, Wei Wang, Karl Shieh, Sirajum Munir, Jing Wang, Lixin Song, Shahriar Nirjon

    Abstract: This paper examines the application of WiFi signals for real-world monitoring of daily activities in home healthcare scenarios. While the state-of-the-art of WiFi-based activity recognition is promising in lab environments, challenges arise in real-world settings due to environmental, subject, and system configuration variables, affecting accuracy and adaptability. The research involved deploying… ▽ More

    Submitted 3 February, 2024; originally announced February 2024.

  7. arXiv:2310.09021  [pdf, other

    cs.NI

    Generative AI-driven Semantic Communication Framework for NextG Wireless Network

    Authors: Avi Deb Raha, Md. Shirajum Munir, Apurba Adhikary, Yu Qiao, Choong Seon Hong

    Abstract: This work designs a novel semantic communication (SemCom) framework for the next-generation wireless network to tackle the challenges of unnecessary transmission of vast amounts that cause high bandwidth consumption, more latency, and experience with bad quality of services (QoS). In particular, these challenges hinder applications like intelligent transportation systems (ITS), metaverse, mixed re… ▽ More

    Submitted 13 October, 2023; originally announced October 2023.

  8. arXiv:2308.03417  [pdf, other

    cs.CR cs.LG

    PURL: Safe and Effective Sanitization of Link Decoration

    Authors: Shaoor Munir, Patrick Lee, Umar Iqbal, Zubair Shafiq, Sandra Siby

    Abstract: While privacy-focused browsers have taken steps to block third-party cookies and mitigate browser fingerprinting, novel tracking techniques that can bypass existing countermeasures continue to emerge. Since trackers need to share information from the client-side to the server-side through link decoration regardless of the tracking technique they employ, a promising orthogonal approach is to detect… ▽ More

    Submitted 6 March, 2024; v1 submitted 7 August, 2023; originally announced August 2023.

  9. arXiv:2306.07993  [pdf, other

    cs.CR cs.AI cs.LG

    Trustworthy Artificial Intelligence Framework for Proactive Detection and Risk Explanation of Cyber Attacks in Smart Grid

    Authors: Md. Shirajum Munir, Sachin Shetty, Danda B. Rawat

    Abstract: The rapid growth of distributed energy resources (DERs), such as renewable energy sources, generators, consumers, and prosumers in the smart grid infrastructure, poses significant cybersecurity and trust challenges to the grid controller. Consequently, it is crucial to identify adversarial tactics and measure the strength of the attacker's DER. To enable a trustworthy smart grid controller, this w… ▽ More

    Submitted 11 June, 2023; originally announced June 2023.

    Comments: Submitted for peer review

  10. arXiv:2304.01950  [pdf, other

    cs.LG cs.AI cs.CV cs.DC

    MP-FedCL: Multiprototype Federated Contrastive Learning for Edge Intelligence

    Authors: Yu Qiao, Md. Shirajum Munir, Apurba Adhikary, Huy Q. Le, Avi Deb Raha, Chaoning Zhang, Choong Seon Hong

    Abstract: Federated learning-assisted edge intelligence enables privacy protection in modern intelligent services. However, not independent and identically distributed (non-IID) distribution among edge clients can impair the local model performance. The existing single prototype-based strategy represents a class by using the mean of the feature space. However, feature spaces are usually not clustered, and a… ▽ More

    Submitted 11 October, 2023; v1 submitted 1 April, 2023; originally announced April 2023.

    Comments: Accepted by IEEE Internet of Things

  11. arXiv:2301.06079  [pdf, other

    cs.CR cs.SE

    Pre-deployment Analysis of Smart Contracts -- A Survey

    Authors: Sundas Munir, Walid Taha

    Abstract: Smart contracts are programs that execute transactions involving independent parties and cryptocurrencies. As programs, smart contracts are susceptible to a wide range of errors and vulnerabilities. Such vulnerabilities can result in significant losses. Furthermore, by design, smart contract transactions are irreversible. This creates a need for methods to ensure the correctness and security of co… ▽ More

    Submitted 30 June, 2023; v1 submitted 15 January, 2023; originally announced January 2023.

  12. arXiv:2301.01592  [pdf, other

    cs.NI cs.AI cs.HC eess.SY

    CarFi: Rider Localization Using Wi-Fi CSI

    Authors: Sirajum Munir, Hongkai Chen, Shiwei Fang, Mahathir Monjur, Shan Lin, Shahriar Nirjon

    Abstract: With the rise of hailing services, people are increasingly relying on shared mobility (e.g., Uber, Lyft) drivers to pick up for transportation. However, such drivers and riders have difficulties finding each other in urban areas as GPS signals get blocked by skyscrapers, in crowded environments (e.g., in stadiums, airports, and bars), at night, and in bad weather. It wastes their time, creates a b… ▽ More

    Submitted 21 December, 2022; originally announced January 2023.

    ACM Class: C.3

  13. arXiv:2210.06649  [pdf, other

    cs.AI cs.NI

    Neuro-symbolic Explainable Artificial Intelligence Twin for Zero-touch IoE in Wireless Network

    Authors: Md. Shirajum Munir, Ki Tae Kim, Apurba Adhikary, Walid Saad, Sachin Shetty, Seong-Bae Park, Choong Seon Hong

    Abstract: Explainable artificial intelligence (XAI) twin systems will be a fundamental enabler of zero-touch network and service management (ZSM) for sixth-generation (6G) wireless networks. A reliable XAI twin system for ZSM requires two composites: an extreme analytical ability for discretizing the physical behavior of the Internet of Everything (IoE) and rigorous methods for characterizing the reasoning… ▽ More

    Submitted 12 October, 2022; originally announced October 2022.

    Comments: Submitted to a journal for peer review

  14. arXiv:2208.12370  [pdf, other

    cs.CR

    COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies

    Authors: Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso

    Abstract: As third-party cookie blocking is becoming the norm in browsers, advertisers and trackers have started to use first-party cookies for tracking. We conduct a differential measurement study on 10K websites with third-party cookies allowed and blocked. This study reveals that first-party cookies are used to store and exfiltrate identifiers to known trackers even when third-party cookies are blocked.… ▽ More

    Submitted 27 November, 2023; v1 submitted 25 August, 2022; originally announced August 2022.

  15. arXiv:2201.10822  [pdf, other

    cs.AI cs.LG cs.NI

    An Explainable Artificial Intelligence Framework for Quality-Aware IoE Service Delivery

    Authors: Md. Shirajum Munir, Seong-Bae Park, Choong Seon Hong

    Abstract: One of the core envisions of the sixth-generation (6G) wireless networks is to accumulate artificial intelligence (AI) for autonomous controlling of the Internet of Everything (IoE). Particularly, the quality of IoE services delivery must be maintained by analyzing contextual metrics of IoE such as people, data, process, and things. However, the challenges incorporate when the AI model conceives a… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

    Comments: Accepted article by IEEE International Conference on Communications (ICC 2022), Copyright 2022 IEEE

  16. arXiv:2108.01466  [pdf, other

    cs.AI cs.CE cs.LG cs.MA

    Risk Adversarial Learning System for Connected and Autonomous Vehicle Charging

    Authors: Md. Shirajum Munir, Ki Tae Kim, Kyi Thar, Dusit Niyato, Choong Seon Hong

    Abstract: In this paper, the design of a rational decision support system (RDSS) for a connected and autonomous vehicle charging infrastructure (CAV-CI) is studied. In the considered CAV-CI, the distribution system operator (DSO) deploys electric vehicle supply equipment (EVSE) to provide an EV charging facility for human-driven connected vehicles (CVs) and autonomous vehicles (AVs). The charging request by… ▽ More

    Submitted 2 February, 2022; v1 submitted 1 August, 2021; originally announced August 2021.

    Comments: Accepted Article By IEEE Internet of Things Journal, DOI:10.1109/JIOT.2022.3149038 (In Press)

  17. arXiv:2106.07856  [pdf, other

    cs.CV cs.NI cs.RO eess.SP

    A Hybrid mmWave and Camera System for Long-Range Depth Imaging

    Authors: Akarsh Prabhakara, Diana Zhang, Chao Li, Sirajum Munir, Aswin Sankanaryanan, Anthony Rowe, Swarun Kumar

    Abstract: mmWave radars offer excellent depth resolution even at very long ranges owing to their high bandwidth. But their angular resolution is at least an order-of-magnitude worse than camera and lidar systems. Hence, mmWave radar is not a capable 3-D imaging solution in isolation. We propose Metamoran, a system that combines the complimentary strengths of radar and camera to obtain accurate, high resolut… ▽ More

    Submitted 24 February, 2022; v1 submitted 14 June, 2021; originally announced June 2021.

  18. arXiv:2008.10148  [pdf, other

    cs.HC cs.AI cs.LG eess.SY

    Drive Safe: Cognitive-Behavioral Mining for Intelligent Transportation Cyber-Physical System

    Authors: Md. Shirajum Munir, Sarder Fakhrul Abedin, Ki Tae Kim, Do Hyeon Kim, Md. Golam Rabiul Alam, Choong Seon Hong

    Abstract: This paper presents a cognitive behavioral-based driver mood repairment platform in intelligent transportation cyber-physical systems (IT-CPS) for road safety. In particular, we propose a driving safety platform for distracted drivers, namely \emph{drive safe}, in IT-CPS. The proposed platform recognizes the distracting activities of the drivers as well as their emotions for mood repair. Further,… ▽ More

    Submitted 23 August, 2020; originally announced August 2020.

    Comments: Submitted to IEEE Transactions on Intelligent Transportation Systems, Special Issue on Technologies for risk mitigation and support of impaired drivers

  19. Controlling the Outbreak of COVID-19: A Noncooperative Game Perspective

    Authors: Anupam Kumar Bairagi, Mehedi Masud, Do Hyeon Kim, Md. Shirajum Munir, Abdullah Al Nahid, Sarder Fakhrul Abedin, Kazi Masudul Alam, Sujit Biswas, Sultan S Alshamrani, Zhu Han, Choong Seon Hong

    Abstract: COVID-19 is a global epidemic. Till now, there is no remedy for this epidemic. However, isolation and social distancing are seemed to be effective preventive measures to control this pandemic. Therefore, in this paper, an optimization problem is formulated that accommodates both isolation and social distancing features of the individuals. To promote social distancing, we solve the formulated probl… ▽ More

    Submitted 26 November, 2020; v1 submitted 27 July, 2020; originally announced July 2020.

    Comments: Accepted article by IEEE Access. DOI: 10.1109/ACCESS.2020.3040821

  20. Data-driven Thermal Model Inference with ARMAX, in Smart Environments, based on Normalized Mutual Information

    Authors: Zhanhong Jiang, Jonathan Francis, Anit Kumar Sahu, Sirajum Munir, Charles Shelton, Anthony Rowe, Mario Bergés

    Abstract: Understanding the models that characterize the thermal dynamics in a smart building is important for the comfort of its occupants and for its energy optimization. A significant amount of research has attempted to utilize thermodynamics (physical) models for smart building control, but these approaches remain challenging due to the stochastic nature of the intermittent environmental disturbances. T… ▽ More

    Submitted 10 June, 2020; originally announced June 2020.

    Journal ref: American Control Conference (2018) 4634-4639

  21. arXiv:2003.04816  [pdf, other

    eess.SP cs.LG cs.NI eess.SY stat.ML

    Data Freshness and Energy-Efficient UAV Navigation Optimization: A Deep Reinforcement Learning Approach

    Authors: Sarder Fakhrul Abedin, Md. Shirajum Munir, Nguyen H. Tran, Zhu Han, Choong Seon Hong

    Abstract: In this paper, we design a navigation policy for multiple unmanned aerial vehicles (UAVs) where mobile base stations (BSs) are deployed to improve the data freshness and connectivity to the Internet of Things (IoT) devices. First, we formulate an energy-efficient trajectory optimization problem in which the objective is to maximize the energy efficiency by optimizing the UAV-BS trajectory policy.… ▽ More

    Submitted 21 February, 2020; originally announced March 2020.

    Comments: Submitted to IEEE Transactions on Intelligent Transportation Systems, Special Issue on Unmanned Aircraft System Traffic Management

  22. arXiv:2003.04551  [pdf, other

    cs.NI eess.SP

    Coexistence Mechanism between eMBB and uRLLC in 5G Wireless Networks

    Authors: Anupam Kumar Bairagi, Md. Shirajum Munir, Madyan Alsenwi, Nguyen H. Tran, Sultan S Alshamrani, Mehedi Masud, Zhu Han, Choong Seon Hong

    Abstract: uRLLC and eMBB are two influential services of the emerging 5G cellular network. Latency and reliability are major concerns for uRLLC applications, whereas eMBB services claim for the maximum data rates. Owing to the trade-off among latency, reliability and spectral efficiency, sharing of radio resources between eMBB and uRLLC services, heads to a challenging scheduling dilemma. In this paper, we… ▽ More

    Submitted 10 March, 2020; originally announced March 2020.

    Comments: 30 pages, 11 figures, IEEE Transactions on Communications

  23. arXiv:2003.02157  [pdf, other

    physics.soc-ph cs.LG eess.SP stat.ML

    Risk-Aware Energy Scheduling for Edge Computing with Microgrid: A Multi-Agent Deep Reinforcement Learning Approach

    Authors: Md. Shirajum Munir, Sarder Fakhrul Abedin, Nguyen H. Tran, Zhu Han, Eui-Nam Huh, Choong Seon Hong

    Abstract: In recent years, multi-access edge computing (MEC) is a key enabler for handling the massive expansion of Internet of Things (IoT) applications and services. However, energy consumption of a MEC network depends on volatile tasks that induces risk for energy demand estimations. As an energy supplier, a microgrid can facilitate seamless energy supply. However, the risk associated with energy supply… ▽ More

    Submitted 5 January, 2021; v1 submitted 20 February, 2020; originally announced March 2020.

    Comments: Accepted Article BY IEEE Transactions on Network and Service Management, DOI: 10.1109/TNSM.2021.3049381

  24. arXiv:2002.08567  [pdf, other

    cs.LG cs.MA eess.SP stat.ML

    Multi-Agent Meta-Reinforcement Learning for Self-Powered and Sustainable Edge Computing Systems

    Authors: Md. Shirajum Munir, Nguyen H. Tran, Walid Saad, Choong Seon Hong

    Abstract: The stringent requirements of mobile edge computing (MEC) applications and functions fathom the high capacity and dense deployment of MEC hosts to the upcoming wireless networks. However, operating such high capacity MEC hosts can significantly increase energy consumption. Thus, a base station (BS) unit can act as a self-powered BS. In this paper, an effective energy dispatch mechanism for self-po… ▽ More

    Submitted 9 February, 2021; v1 submitted 19 February, 2020; originally announced February 2020.

    Comments: Accepted article by IEEE Transactions on Network and Service Management, DOI: 10.1109/TNSM.2021.3057960. Copyright 2021 IEEE

  25. arXiv:1812.10193  [pdf, other

    cs.LG cs.CR stat.ML

    Application-driven Privacy-preserving Data Publishing with Correlated Attributes

    Authors: Aria Rezaei, Chaowei Xiao, Jie Gao, Bo Li, Sirajum Munir

    Abstract: Recent advances in computing have allowed for the possibility to collect large amounts of data on personal activities and private living spaces. To address the privacy concerns of users in this environment, we propose a novel framework called PR-GAN that offers privacy-preserving mechanism using generative adversarial networks. Given a target application, PR-GAN automatically modifies the data to… ▽ More

    Submitted 4 January, 2021; v1 submitted 25 December, 2018; originally announced December 2018.

    Comments: 12 pages