1
|
Hameed S, Islam A, Ahmad K, Belhaouari SB, Qadir J, Al-Fuqaha A. Deep learning based multimodal urban air quality prediction and traffic analytics. Sci Rep 2023; 13:22181. [PMID: 38092811 PMCID: PMC10719392 DOI: 10.1038/s41598-023-49296-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/04/2023] [Accepted: 12/06/2023] [Indexed: 12/17/2023] Open
Abstract
Urban activities, particularly vehicle traffic, are contributing significantly to environmental pollution with detrimental effects on public health. The ability to anticipate air quality in advance is critical for public authorities and the general public to plan and manage these activities, which ultimately help in minimizing the adverse impact on the environment and public health effectively. Thanks to recent advancements in Artificial Intelligence and sensor technology, forecasting air quality is possible through the consideration of various environmental factors. This paper presents our novel solution for air quality prediction and its correlation with different environmental factors and urban activities, such as traffic density. To this aim, we propose a multi-modal framework by integrating real-time data from different environmental sensors and traffic density extracted from Closed Circuit Television footage. The framework effectively addresses data inconsistencies arising from sensor and camera malfunctions within a streaming dataset. The dataset exhibits real-world complexities, including abrupt camera or station activations/deactivations, noise interference, and outliers. The proposed system tackles the challenge of predicting air quality at locations having no sensors or experiencing sensor failures by training a joint model on the data obtained from nearby stations/sensors using a Particle Swarm Optimization (PSO)-based merit fusion of the sensor data. The proposed methodology is evaluated using various variants of the LSTM model including Bi-directional LSTM, CNN-LSTM, and Convolutions LSTM (ConvLSTM) obtaining an improvement of 48%, 67%, and 173% for short-term, medium-term, and long-term periods, respectively, over the ARIMA model.
Collapse
Affiliation(s)
- Saad Hameed
- Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar
| | - Ashadul Islam
- Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar
| | - Kashif Ahmad
- Department of Computer Science, Munster Technological University Cork, Cork, Ireland
| | - Samir Brahim Belhaouari
- Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar
| | - Junaid Qadir
- Department of Computer Science and Engineering, College of Engineering, Qatar University, Doha, Qatar
| | - Ala Al-Fuqaha
- Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar.
| |
Collapse
|
2
|
Saleh H, Amer E, Abuhmed T, Ali A, Al-Fuqaha A, El-Sappagh S. Computer aided progression detection model based on optimized deep LSTM ensemble model and the fusion of multivariate time series data. Sci Rep 2023; 13:16336. [PMID: 37770490 PMCID: PMC10539296 DOI: 10.1038/s41598-023-42796-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/24/2023] [Accepted: 09/14/2023] [Indexed: 09/30/2023] Open
Abstract
Alzheimer's disease (AD) is the most common form of dementia. Early and accurate detection of AD is crucial to plan for disease modifying therapies that could prevent or delay the conversion to sever stages of the disease. As a chronic disease, patient's multivariate time series data including neuroimaging, genetics, cognitive scores, and neuropsychological battery provides a complete profile about patient's status. This data has been used to build machine learning and deep learning (DL) models for the early detection of the disease. However, these models still have limited performance and are not stable enough to be trusted in real medical settings. Literature shows that DL models outperform classical machine learning models, but ensemble learning has proven to achieve better results than standalone models. This study proposes a novel deep stacking framework which combines multiple DL models to accurately predict AD at an early stage. The study uses long short-term memory (LSTM) models as base models over patient's multivariate time series data to learn the deep longitudinal features. Each base LSTM classifier has been optimized using the Bayesian optimizer using different feature sets. As a result, the final optimized ensembled model employed heterogeneous base models that are trained on heterogeneous data. The performance of the resulting ensemble model has been explored using a cohort of 685 patients from the University of Washington's National Alzheimer's Coordinating Center dataset. Compared to the classical machine learning models and base LSTM classifiers, the proposed ensemble model achieves the highest testing results (i.e., 82.02, 82.25, 82.02, and 82.12 for accuracy, precision, recall, and F1-score, respectively). The resulting model enhances the performance of the state-of-the-art literature, and it could be used to build an accurate clinical decision support tool that can assist domain experts for AD progression detection.
Collapse
Affiliation(s)
- Hager Saleh
- Faculty of Computers and Artificial Intelligence, South Valley University, Hurghada, Egypt
| | - Eslam Amer
- Communications and Information Technology, The Institute of Electronics, Queen's University of Belfast, Belfast, UK
| | - Tamer Abuhmed
- Information Laboratory (InfoLab), College of Computing and Informatics, Sungkyunkwan University, Seoul, Suwon, 16419, South Korea.
| | - Amjad Ali
- Information and Computing Technology (ICT) Division, College of Science and Engineering (CSE), Hamad Bin Khalifa University, Doha, Qatar
| | - Ala Al-Fuqaha
- Information and Computing Technology (ICT) Division, College of Science and Engineering (CSE), Hamad Bin Khalifa University, Doha, Qatar
| | - Shaker El-Sappagh
- Information Laboratory (InfoLab), College of Computing and Informatics, Sungkyunkwan University, Seoul, Suwon, 16419, South Korea.
- Faculty of Computer Science and Engineering, Galala University, Suez, 435611, Egypt.
- Faculty of Computers and Artificial Intelligence, Benha University, Banha, 13518, Egypt.
| |
Collapse
|
3
|
Maqour Z, El Bakkali H, Benhaddou D, Benbrahim H, Abou-Zbiba W, El Gadi H, Al-Fuqaha A, Anan M, Taha AE. An Overview of Funded Research Projects in The MENA Region on Intelligent Transportation Systems. 2023 International Wireless Communications and Mobile Computing (IWCMC) 2023. [DOI: 10.1109/iwcmc58020.2023.10182803] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
Affiliation(s)
- Zaina Maqour
- Mohammed V University in Rabat,Rabat IT Center, ENSIAS,Morocco
| | | | - Driss Benhaddou
- University of Houston,Engineering Technology Department,Houston,TX,USA
| | - Houda Benbrahim
- Mohammed V University in Rabat,Rabat IT Center, ENSIAS,Morocco
| | | | - Hajar El Gadi
- Mohammed V University in Rabat,Rabat IT Center, ENSIAS,Morocco
| | - Ala Al-Fuqaha
- Hamad Bin Khalifa University,College of Science and Engineering (CSE),Doha,Qatar
| | - Muhammad Anan
- Alfaisal University,College of Engineering,Electrical Engineering Department,Riyadh,Saudi Arabia
| | - Abd-Elhamid Taha
- Alfaisal University,College of Engineering,Electrical Engineering Department,Riyadh,Saudi Arabia
| |
Collapse
|
4
|
Khalid N, Qayyum A, Bilal M, Al-Fuqaha A, Qadir J. Privacy-preserving artificial intelligence in healthcare: Techniques and applications. Comput Biol Med 2023; 158:106848. [PMID: 37044052 DOI: 10.1016/j.compbiomed.2023.106848] [Citation(s) in RCA: 11] [Impact Index Per Article: 11.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/06/2022] [Revised: 03/21/2023] [Accepted: 03/30/2023] [Indexed: 04/14/2023]
Abstract
There has been an increasing interest in translating artificial intelligence (AI) research into clinically-validated applications to improve the performance, capacity, and efficacy of healthcare services. Despite substantial research worldwide, very few AI-based applications have successfully made it to clinics. Key barriers to the widespread adoption of clinically validated AI applications include non-standardized medical records, limited availability of curated datasets, and stringent legal/ethical requirements to preserve patients' privacy. Therefore, there is a pressing need to improvise new data-sharing methods in the age of AI that preserve patient privacy while developing AI-based healthcare applications. In the literature, significant attention has been devoted to developing privacy-preserving techniques and overcoming the issues hampering AI adoption in an actual clinical environment. To this end, this study summarizes the state-of-the-art approaches for preserving privacy in AI-based healthcare applications. Prominent privacy-preserving techniques such as Federated Learning and Hybrid Techniques are elaborated along with potential privacy attacks, security challenges, and future directions.
Collapse
Affiliation(s)
- Nazish Khalid
- Information Technology University, Lahore, Pakistan.
| | - Adnan Qayyum
- Information Technology University, Lahore, Pakistan.
| | - Muhammad Bilal
- Big Data Enterprise and Artificial Intelligence Lab (Big-DEAL), University of the West England, Bristol, United Kingdom.
| | | | | |
Collapse
|
5
|
Butt MA, Qayyum A, Ali H, Al-Fuqaha A, Qadir J. Towards Secure Private and Trustworthy Human-Centric Embedded Machine Learning: An Emotion-Aware Facial Recognition Case Study. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.103058] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/14/2022]
|
6
|
Tehseen A, Ehsan T, Liaqat HB, Ali A, Al-Fuqaha A. Neural POS Tagging of Shahmukhi by Using Contextualized Word Representations. Journal of King Saud University - Computer and Information Sciences 2022. [DOI: 10.1016/j.jksuci.2022.12.004] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/24/2022]
|
7
|
Rasheed K, Qayyum A, Ghaly M, Al-Fuqaha A, Razi A, Qadir J. Explainable, trustworthy, and ethical machine learning for healthcare: A survey. Comput Biol Med 2022; 149:106043. [PMID: 36115302 DOI: 10.1016/j.compbiomed.2022.106043] [Citation(s) in RCA: 24] [Impact Index Per Article: 12.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/22/2022] [Revised: 08/15/2022] [Accepted: 08/20/2022] [Indexed: 12/18/2022]
Abstract
With the advent of machine learning (ML) and deep learning (DL) empowered applications for critical applications like healthcare, the questions about liability, trust, and interpretability of their outputs are raising. The black-box nature of various DL models is a roadblock to clinical utilization. Therefore, to gain the trust of clinicians and patients, we need to provide explanations about the decisions of models. With the promise of enhancing the trust and transparency of black-box models, researchers are in the phase of maturing the field of eXplainable ML (XML). In this paper, we provided a comprehensive review of explainable and interpretable ML techniques for various healthcare applications. Along with highlighting security, safety, and robustness challenges that hinder the trustworthiness of ML, we also discussed the ethical issues arising because of the use of ML/DL for healthcare. We also describe how explainable and trustworthy ML can resolve all these ethical problems. Finally, we elaborate on the limitations of existing approaches and highlight various open research problems that require further development.
Collapse
Affiliation(s)
- Khansa Rasheed
- IHSAN Lab, Information Technology University of the Punjab (ITU), Lahore, Pakistan.
| | - Adnan Qayyum
- IHSAN Lab, Information Technology University of the Punjab (ITU), Lahore, Pakistan.
| | - Mohammed Ghaly
- Research Center for Islamic Legislation and Ethics (CILE), College of Islamic Studies, Hamad Bin Khalifa University (HBKU), Doha, Qatar.
| | - Ala Al-Fuqaha
- Information and Computing Technology Division, College of Science and Engineering, Hamad Bin Khalifa University (HBKU), Doha, Qatar.
| | - Adeel Razi
- Turner Institute for Brain and Mental Health, Monash University, Clayton, Australia; Monash Biomedical Imaging, Monash University, Clayton, Australia; Wellcome Centre for Human Neuroimaging, UCL, London, United Kingdom; CIFAR Azrieli Global Scholars program, CIFAR, Toronto, Canada.
| | - Junaid Qadir
- Department of Computer Science and Engineering, College of Engineering, Qatar University, Doha, Qatar.
| |
Collapse
|
8
|
|
9
|
Hassan SZ, Ahmad K, Hicks S, Halvorsen P, Al-Fuqaha A, Conci N, Riegler M. Visual Sentiment Analysis from Disaster Images in Social Media. Sensors (Basel) 2022; 22:s22103628. [PMID: 35632034 PMCID: PMC9146152 DOI: 10.3390/s22103628] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/23/2021] [Revised: 12/16/2021] [Accepted: 12/16/2021] [Indexed: 02/04/2023]
Abstract
The increasing popularity of social networks and users’ tendency towards sharing their feelings, expressions, and opinions in text, visual, and audio content have opened new opportunities and challenges in sentiment analysis. While sentiment analysis of text streams has been widely explored in the literature, sentiment analysis from images and videos is relatively new. This article focuses on visual sentiment analysis in a societally important domain, namely disaster analysis in social media. To this aim, we propose a deep visual sentiment analyzer for disaster-related images, covering different aspects of visual sentiment analysis starting from data collection, annotation, model selection, implementation, and evaluations. For data annotation and analyzing people’s sentiments towards natural disasters and associated images in social media, a crowd-sourcing study has been conducted with a large number of participants worldwide. The crowd-sourcing study resulted in a large-scale benchmark dataset with four different sets of annotations, each aiming at a separate task. The presented analysis and the associated dataset, which is made public, will provide a baseline/benchmark for future research in the domain. We believe the proposed system can contribute toward more livable communities by helping different stakeholders, such as news broadcasters, humanitarian organizations, as well as the general public.
Collapse
Affiliation(s)
| | - Kashif Ahmad
- Information and Computing Technology Division, College of Science and Engineering, Hamad Bin Khalifa University (HBKU), Doha 34110, Qatar;
- Correspondence:
| | - Steven Hicks
- SimulaMet, 0167 Oslo, Norway; (S.Z.H.); (S.H.); (P.H.); (M.R.)
| | - Pål Halvorsen
- SimulaMet, 0167 Oslo, Norway; (S.Z.H.); (S.H.); (P.H.); (M.R.)
| | - Ala Al-Fuqaha
- Information and Computing Technology Division, College of Science and Engineering, Hamad Bin Khalifa University (HBKU), Doha 34110, Qatar;
| | - Nicola Conci
- Department of Information Engineering and Computer Science, University of Trento, 38123 Trento, Italy;
| | - Michael Riegler
- SimulaMet, 0167 Oslo, Norway; (S.Z.H.); (S.H.); (P.H.); (M.R.)
| |
Collapse
|
10
|
Ahmad K, Alam F, Qadir J, Qolomany B, Khan I, Khan T, Suleman M, Said N, Hassan SZ, Gul A, Househ M, Al-Fuqaha A. Global User-Level Perception of COVID-19 Contact Tracing Applications: A Data-Driven Approach Using Natural Language Processing (Preprint). JMIR Form Res 2022; 6:e36238. [PMID: 35389357 PMCID: PMC9097863 DOI: 10.2196/36238] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/06/2022] [Revised: 02/06/2022] [Accepted: 03/16/2022] [Indexed: 01/14/2023] Open
Abstract
Background Contact tracing has been globally adopted in the fight to control the infection rate of COVID-19. To this aim, several mobile apps have been developed. However, there are ever-growing concerns over the working mechanism and performance of these applications. The literature already provides some interesting exploratory studies on the community’s response to the applications by analyzing information from different sources, such as news and users’ reviews of the applications. However, to the best of our knowledge, there is no existing solution that automatically analyzes users’ reviews and extracts the evoked sentiments. We believe such solutions combined with a user-friendly interface can be used as a rapid surveillance tool to monitor how effective an application is and to make immediate changes without going through an intense participatory design method. Objective In this paper, we aim to analyze the efficacy of AI and NLP techniques for automatically extracting and classifying the polarity of users’ sentiments by proposing a sentiment analysis framework to automatically analyze users’ reviews on COVID-19 contact tracing mobile apps. We also aim to provide a large-scale annotated benchmark data set to facilitate future research in the domain. As a proof of concept, we also developed a web application based on the proposed solutions, which is expected to help the community quickly analyze the potential of an application in the domain. Methods We propose a pipeline starting from manual annotation via a crowd-sourcing study and concluding with the development and training of artificial intelligence (AI) models for automatic sentiment analysis of users’ reviews. In detail, we collected and annotated a large-scale data set of user reviews on COVID-19 contact tracing applications. We used both classical and deep learning methods for classification experiments. Results We used 8 different methods on 3 different tasks, achieving up to an average F1 score of 94.8%, indicating the feasibility of the proposed solution. The crowd-sourcing activity resulted in a large-scale benchmark data set composed of 34,534 manually annotated reviews. Conclusions The existing literature mostly relies on the manual or exploratory analysis of users’ reviews on applications, which is tedious and time-consuming. In existing studies, generally, data from fewer applications are analyzed. In this work, we showed that AI and natural language processing techniques provide good results for analyzing and classifying users’ sentiments’ polarity and that automatic sentiment analysis can help to analyze users’ responses more accurately and quickly. We also provided a large-scale benchmark data set. We believe the presented analysis, data set, and proposed solutions combined with a user-friendly interface can be used as a rapid surveillance tool to analyze and monitor mobile apps deployed in emergency situations leading to rapid changes in the applications without going through an intense participatory design method.
Collapse
Affiliation(s)
- Kashif Ahmad
- Information and Computing Technology Division, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar
| | - Firoj Alam
- Qatar Computing Research Institute, Hamad Bin Khalifa University, Doha, Qatar
| | - Junaid Qadir
- Department of Computer Science and Engineering, Faculty of Engineering, Qatar University, Doha, Qatar
| | - Basheer Qolomany
- Department of Cyber Systems, University of Nebraska, Kearney, NE, United States
| | - Imran Khan
- Department of Computer Systems Engineering, University of Engineering and Technology, Peshawar, Pakistan
| | - Talhat Khan
- Department of Computer Systems Engineering, University of Engineering and Technology, Peshawar, Pakistan
| | - Muhammad Suleman
- Department of Computer Systems Engineering, University of Engineering and Technology, Peshawar, Pakistan
| | - Naina Said
- Department of Computer Systems Engineering, University of Engineering and Technology, Peshawar, Pakistan
| | | | - Asma Gul
- Department of Statistics, Shaheed Benazir Bhutto Women University, Peshawar, Pakistan
| | - Mowafa Househ
- Information and Computing Technology Division, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar
| | - Ala Al-Fuqaha
- Information and Computing Technology Division, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar
| |
Collapse
|
11
|
Aledhari M, Razzak R, Qolomany B, Al-Fuqaha A, Saeed F. Biomedical IoT: Enabling Technologies, Architectural Elements, Challenges, and Future Directions. IEEE Access 2022; 10:31306-31339. [PMID: 35441062 PMCID: PMC9015691 DOI: 10.1109/access.2022.3159235] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/04/2023]
Abstract
This paper provides a comprehensive literature review of various technologies and protocols used for medical Internet of Things (IoT) with a thorough examination of current enabling technologies, use cases, applications, and challenges. Despite recent advances, medical IoT is still not considered a routine practice. Due to regulation, ethical, and technological challenges of biomedical hardware, the growth of medical IoT is inhibited. Medical IoT continues to advance in terms of biomedical hardware, and monitoring figures like vital signs, temperature, electrical signals, oxygen levels, cancer indicators, glucose levels, and other bodily levels. In the upcoming years, medical IoT is expected replace old healthcare systems. In comparison to other survey papers on this topic, our paper provides a thorough summary of the most relevant protocols and technologies specifically for medical IoT as well as the challenges. Our paper also contains several proposed frameworks and use cases of medical IoT in hospital settings as well as a comprehensive overview of previous architectures of IoT regarding the strengths and weaknesses. We hope to enable researchers of multiple disciplines, developers, and biomedical engineers to quickly become knowledgeable on how various technologies cooperate and how current frameworks can be modified for new use cases, thus inspiring more growth in medical IoT.
Collapse
Affiliation(s)
- Mohammed Aledhari
- College of Computing and Software Engineering, Kennesaw State University, Marietta, GA 30060, USA
| | - Rehma Razzak
- College of Computing and Software Engineering, Kennesaw State University, Marietta, GA 30060, USA
| | - Basheer Qolomany
- College of Business and Technology, University of Nebraska at Kearney, Kearney, NE 68849, USA
| | - Ala Al-Fuqaha
- College of Science and Engineering (CSE), Hamad Bin Khalifa University, Doha, Qatar
| | - Fahad Saeed
- School of Computing and Information Sciences, Florida International University, Miami, FL 33199, USA
| |
Collapse
|
12
|
Zhang Y, Al-Fuqaha A, Humar I, Pace P. Editorial: Advances in multi-source information fusion for epidemic diseases. Inf Fusion 2021; 76:175-176. [PMID: 34108849 PMCID: PMC8178063 DOI: 10.1016/j.inffus.2021.05.016] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/01/2021] [Revised: 05/23/2021] [Accepted: 05/29/2021] [Indexed: 06/12/2023]
Affiliation(s)
- Yin Zhang
- University of Electronic Science and Technology of China, China
| | - Ala Al-Fuqaha
- Western Michigan University, United States of America
| | | | | |
Collapse
|
13
|
Qayyum A, Ijaz A, Usama M, Iqbal W, Qadir J, Elkhatib Y, Al-Fuqaha A. Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security. Front Big Data 2021; 3:587139. [PMID: 33693420 PMCID: PMC7931962 DOI: 10.3389/fdata.2020.587139] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/24/2020] [Accepted: 10/08/2020] [Indexed: 11/13/2022] Open
Abstract
With the advances in machine learning (ML) and deep learning (DL) techniques, and the potency of cloud computing in offering services efficiently and cost-effectively, Machine Learning as a Service (MLaaS) cloud platforms have become popular. In addition, there is increasing adoption of third-party cloud services for outsourcing training of DL models, which requires substantial costly computational resources (e.g., high-performance graphics processing units (GPUs)). Such widespread usage of cloud-hosted ML/DL services opens a wide range of attack surfaces for adversaries to exploit the ML/DL system to achieve malicious goals. In this article, we conduct a systematic evaluation of literature of cloud-hosted ML/DL models along both the important dimensions—attacks and defenses—related to their security. Our systematic review identified a total of 31 related articles out of which 19 focused on attack, six focused on defense, and six focused on both attack and defense. Our evaluation reveals that there is an increasing interest from the research community on the perspective of attacking and defending different attacks on Machine Learning as a Service platforms. In addition, we identify the limitations and pitfalls of the analyzed articles and highlight open research issues that require further investigation.
Collapse
Affiliation(s)
- Adnan Qayyum
- Information Technology University (ITU), Lahore, Pakistan
| | - Aneeqa Ijaz
- AI4Networks Research Center, University of Oklahoma, Norman, OK, United States
| | - Muhammad Usama
- Information Technology University (ITU), Lahore, Pakistan
| | - Waleed Iqbal
- Social Data Science (SDS) Lab, Queen Mary University of London, London, United Kingdom
| | - Junaid Qadir
- Information Technology University (ITU), Lahore, Pakistan
| | - Yehia Elkhatib
- School of Computing and Communications, Lancaster University, Lancaster, United Kingdom
| | | |
Collapse
|
14
|
Abstract
Recent years have witnessed widespread adoption of machine learning (ML)/deep learning (DL) techniques due to their superior performance for a variety of healthcare applications ranging from the prediction of cardiac arrest from one-dimensional heart signals to computer-aided diagnosis (CADx) using multi-dimensional medical images. Notwithstanding the impressive performance of ML/DL, there are still lingering doubts regarding the robustness of ML/DL in healthcare settings (which is traditionally considered quite challenging due to the myriad security and privacy issues involved), especially in light of recent results that have shown that ML/DL are vulnerable to adversarial attacks. In this paper, we present an overview of various application areas in healthcare that leverage such techniques from security and privacy point of view and present associated challenges. In addition, we present potential methods to ensure secure and privacy-preserving ML for healthcare applications. Finally, we provide insight into the current research challenges and promising directions for future research.
Collapse
|
15
|
Qadir J, Taha AE, Yau KLA, Ponciano J, Hussain S, Al-Fuqaha A, Imran M. Leveraging the Force of Formative Assessment and Feedback for Effective Engineering Education. 2020 ASEE Virtual Annual Conference Content Access Proceedings 2020. [DOI: 10.18260/1-2--34923] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
Affiliation(s)
- Junaid Qadir
- Information Technology University, Lahore, Pakistan
| | | | | | | | | | | | | |
Collapse
|
16
|
Qadir J, Shafi A, Al-Fuqaha A, Taha AE, Yau KLA, Ponciano J, Hussain S, Imran M, Sheikh Muhammad S, Rais RNB, Rashid M, Tan B. Outcome-based (Engineering) Education (OBE): International Accreditation Practices. 2020 ASEE Virtual Annual Conference Content Access Proceedings 2020. [DOI: 10.18260/1-2--35020] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
Affiliation(s)
- Junaid Qadir
- Information Technology University, Lahore, Pakistan
| | - Aamir Shafi
- National University of Computing and Emerging Sciences, Lahore, Pakistan
| | | | | | | | | | | | | | | | | | | | | |
Collapse
|
17
|
Qadir J, Taha AM, Yau KA, Ponciano J, Hussain S, Al-fuqaha A, Imran MA. Leveraging the Force of Formative Assessment & Feedback for Effective Engineering Education.. [DOI: 10.35542/osf.io/a4d5q] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
Abstract
In recent years, there has been a fundamental shift in engineering education from an emphasis on covering content to a student-centric focus on ensuring the attainment of learning outcomes. To ensure attainment of the educational objectives, engineering education thought leaders have highlighted the importance of the development of effective authentic assessment schemes appropriate for the 21st century, and the alignment of assessment and instructional efforts with the planned learning objectives and outcomes. Our focus in this paper is on the use of formative assessment (also called assessment for learning) for engineering education. With formative assessment, an assessment is made of the current learning level and then pertinent feedback is provided to both the student and the instructor so that they can take concrete steps to facilitate learning improvement. This is in contrast with the ubiquitous summative feedback (assessment “of” learning)—in which the main aim is to grade or rank the student by ascertaining their current learning level without really giving them concrete advice on what to do next to improve learning performance. The use of formative assessment can transform students’ performance by empowering them with particularly potent “self-assessment” skills through which students become more aware of their learning and know what is it that they should do next (i.e., they become “self- directed”). Formative assessment is equally useful for the teaching staff—by helping them know their impact and tailor the instructional strategy and try to personalize their pedagogy to the individual needs of the students. The main contribution of our paper is that we present an easy-to-understand synthesis of the rich literature on formative assessment and effective feedback. Although there are numerous published books and plenty of research papers in this space, our paper fills the niche of providing in a single paper the main findings and insights of the discipline that can guide engineering educators who want to learn about the best practices in formative assessment.
Collapse
|
18
|
Schmidt B, Al-Fuqaha A, Gupta A, Kountanis D. Optimizing an artificial immune system algorithm in support of flow-Based internet traffic classification. Appl Soft Comput 2017. [DOI: 10.1016/j.asoc.2017.01.016] [Citation(s) in RCA: 18] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|