• Threat-specific security risk evaluation in the cloud 

      Nhlabatsi, Armstrong; Hong, Jin B.; Kim, Dong Seong; Fernandez, Rachael; Hussein, Alaa; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
    • ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud 

      Nhlabatsi A.; Hussein A.; Fernandez R.; Fetais N.; Hong J.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ...
    • Time Series Forecasting Using Online Performance-based Ensemble Deep Random Vector Functional Link Neural Network 

      Du, Liang; Gao, Ruobin; Suganthan, Ponnuthurai Nagaratnam; Wang, David Z.W. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Time series forecasting remains a challenging task in data science while it is of great relevance to decision-making in various industries such as transportation, finance, electricity resource management, meteorology. ...
    • Using block cipher for confidentiality of images in cloud-based systems 

      Rihan, Rana Adnan; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...
    • A Voting-Mechanism-Based Ensemble Framework for Constraint Handling Techniques 

      Wu, Guohua; Wen, Xupeng; Wang, Ling; Pedrycz, Witold; Suganthan, Ponnuthurai Nagaratnam ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Effective constraint handling techniques (CHTs) are of great significance for evolutionary algorithms (EAs) dealing with constrained optimization problems (COPs). To date, many CHTs, such as penalty function, superiority ...
    • Watermarking: A review of software and hardware techniques 

      Sleit, Azzam; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Watermarking is a well-known technique traditionally used in banknotes and other documents to discourage counterfeiting. It usually consists of semi-transparent symbols embedded on paper. Similar concepts were applied to ...
    • Weighting and pruning based ensemble deep random vector functional link network for tabular data classification 

      Shi, Qiushi; Hu, Minghui; Suganthan, Ponnuthurai Nagaratnam; Katuwal, Rakesh ( Elsevier Ltd , 2022 , Article)
      In this paper, we first integrate normalization to the Ensemble Deep Random Vector Functional Link network (edRVFL). This re-normalization step can help the network avoid divergence of the hidden features. Then, we propose ...
    • Wireless Network Slice Assignment with Incremental Random Vector Functional Link Network 

      He, Yu Lin; Ye, Xuan; Cui, Laizhong; Fournier-Viger, Philippe; Luo, Chengwen; ... more authors ( IEEE Computer Society , 2022 , Article)
      This paper presents an artificial intelligence-assisted network slice prediction method, which utilizes a novel incremental random vector functional link (IRVFL) network to deal with the wireless network slice assignment ...