Secure and trustworthy artificial intelligence-extended reality (AI-XR) for metaverses

A Qayyum, MA Butt, H Ali, M Usman, O Halabi… - ACM Computing …, 2024 - dl.acm.org
Metaverse is expected to emerge as a new paradigm for the next-generation Internet,
providing fully immersive and personalized experiences to socialize, work, and play in self …

Building robust machine learning systems: Current progress, research challenges, and opportunities

JJ Zhang, K Liu, F Khalid, MA Hanif… - Proceedings of the 56th …, 2019 - dl.acm.org
Machine learning, in particular deep learning, is being used in almost all the aspects of life
to facilitate humans, specifically in mobile and Internet of Things (IoT)-based applications …

[HTML][HTML] Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study

MA Butt, A Qayyum, H Ali, A Al-Fuqaha, J Qadir - Computers & Security, 2023 - Elsevier
The use of artificial intelligence (AI) at the edge is transforming every aspect of the lives of
human beings from scheduling daily activities to personalized shopping recommendations …

All your fake detector are belong to us: evaluating adversarial robustness of fake-news detectors under black-box settings

H Ali, MS Khan, A AlGhadhban, M Alazmi… - IEEE …, 2021 - ieeexplore.ieee.org
With the hyperconnectivity and ubiquity of the Internet, the fake news problem now presents
a greater threat than ever before. One promising solution for countering this threat is to …

[HTML][HTML] Tamp-X: Attacking explainable natural language classifiers through tampered activations

H Ali, MS Khan, A Al-Fuqaha, J Qadir - Computers & Security, 2022 - Elsevier
While the technique of Deep Neural Networks (DNNs) has been instrumental in achieving
state-of-the-art results for various Natural Language Processing (NLP) tasks, recent works …

Stain: Stealthy avenues of attacks on horizontally collaborated convolutional neural network inference and their mitigation

AA Adeyemo, JJ Sanderson, TA Odetola… - IEEE …, 2023 - ieeexplore.ieee.org
With significant potential improvement in device-to-device (D2D) communication due to
improved wireless link capacity (eg, 5G and NextG systems), a collaboration of multiple …

Fadec: A fast decision-based attack for adversarial machine learning

F Khalid, H Ali, MA Hanif, S Rehman… - … Joint Conference on …, 2020 - ieeexplore.ieee.org
Due to the excessive use of cloud-based machine learning (ML) services, the smart cyber-
physical systems (CPS) are increasingly becoming vulnerable to black-box attacks on their …

Overview of security for smart cyber-physical systems

F Khalid, S Rehman, M Shafique - Security of Cyber-Physical Systems …, 2020 - Springer
The tremendous growth of interconnectivity and dependencies of physical and cyber
domains in cyber-physical systems (CPS) makes them vulnerable to several security threats …

[HTML][HTML] Con-detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis

H Ali, MS Khan, A AlGhadhban, M Alazmi, A Alzamil… - Computers & …, 2023 - Elsevier
Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing
(NLP) tasks such as language-to-language translation, spam filtering, fake-news detection …

Exploiting vulnerabilities in deep neural networks: Adversarial and fault-injection attacks

F Khalid, MA Hanif, M Shafique - arXiv preprint arXiv:2105.03251, 2021 - arxiv.org
From tiny pacemaker chips to aircraft collision avoidance systems, the state-of-the-art Cyber-
Physical Systems (CPS) have increasingly started to rely on Deep Neural Networks (DNNs) …