Alert button
Picture for Ala Al-Fuqaha

Ala Al-Fuqaha

Alert button

Meta Reinforcement Learning for Strategic IoT Deployments Coverage in Disaster-Response UAV Swarms

Add code
Bookmark button
Alert button
Jan 20, 2024
Marwan Dhuheir, Aiman Erbad, Ala Al-Fuqaha

Viaarxiv icon

Empowering HWNs with Efficient Data Labeling: A Clustered Federated Semi-Supervised Learning Approach

Add code
Bookmark button
Alert button
Jan 19, 2024
Moqbel Hamood, Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha

Viaarxiv icon

Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally

Add code
Bookmark button
Alert button
Oct 05, 2023
Shawqi Al-Maliki, Adnan Qayyum, Hassan Ali, Mohamed Abdallah, Junaid Qadir, Dinh Thai Hoang, Dusit Niyato, Ala Al-Fuqaha

Figure 1 for Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally
Figure 2 for Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally
Figure 3 for Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally
Figure 4 for Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally
Viaarxiv icon

R2S100K: Road-Region Segmentation Dataset For Semi-Supervised Autonomous Driving in the Wild

Add code
Bookmark button
Alert button
Aug 11, 2023
Muhammad Atif Butt, Hassan Ali, Adnan Qayyum, Waqas Sultani, Ala Al-Fuqaha, Junaid Qadir

Figure 1 for R2S100K: Road-Region Segmentation Dataset For Semi-Supervised Autonomous Driving in the Wild
Figure 2 for R2S100K: Road-Region Segmentation Dataset For Semi-Supervised Autonomous Driving in the Wild
Figure 3 for R2S100K: Road-Region Segmentation Dataset For Semi-Supervised Autonomous Driving in the Wild
Figure 4 for R2S100K: Road-Region Segmentation Dataset For Semi-Supervised Autonomous Driving in the Wild
Viaarxiv icon

Membership Inference Attacks on DNNs using Adversarial Perturbations

Add code
Bookmark button
Alert button
Jul 11, 2023
Hassan Ali, Adnan Qayyum, Ala Al-Fuqaha, Junaid Qadir

Figure 1 for Membership Inference Attacks on DNNs using Adversarial Perturbations
Figure 2 for Membership Inference Attacks on DNNs using Adversarial Perturbations
Figure 3 for Membership Inference Attacks on DNNs using Adversarial Perturbations
Figure 4 for Membership Inference Attacks on DNNs using Adversarial Perturbations
Viaarxiv icon

Motion Comfort Optimization for Autonomous Vehicles: Concepts, Methods, and Techniques

Add code
Bookmark button
Alert button
Jun 15, 2023
Mohammed Aledhari, Mohamed Rahouti, Junaid Qadir, Basheer Qolomany, Mohsen Guizani, Ala Al-Fuqaha

Figure 1 for Motion Comfort Optimization for Autonomous Vehicles: Concepts, Methods, and Techniques
Figure 2 for Motion Comfort Optimization for Autonomous Vehicles: Concepts, Methods, and Techniques
Figure 3 for Motion Comfort Optimization for Autonomous Vehicles: Concepts, Methods, and Techniques
Figure 4 for Motion Comfort Optimization for Autonomous Vehicles: Concepts, Methods, and Techniques
Viaarxiv icon

Can We Revitalize Interventional Healthcare with AI-XR Surgical Metaverses?

Add code
Bookmark button
Alert button
Mar 25, 2023
Adnan Qayyum, Muhammad Bilal, Muhammad Hadi, Paweł Capik, Massimo Caputo, Hunaid Vohra, Ala Al-Fuqaha, Junaid Qadir

Figure 1 for Can We Revitalize Interventional Healthcare with AI-XR Surgical Metaverses?
Figure 2 for Can We Revitalize Interventional Healthcare with AI-XR Surgical Metaverses?
Viaarxiv icon

Consistent Valid Physically-Realizable Adversarial Attack against Crowd-flow Prediction Models

Add code
Bookmark button
Alert button
Mar 05, 2023
Hassan Ali, Muhammad Atif Butt, Fethi Filali, Ala Al-Fuqaha, Junaid Qadir

Figure 1 for Consistent Valid Physically-Realizable Adversarial Attack against Crowd-flow Prediction Models
Figure 2 for Consistent Valid Physically-Realizable Adversarial Attack against Crowd-flow Prediction Models
Figure 3 for Consistent Valid Physically-Realizable Adversarial Attack against Crowd-flow Prediction Models
Figure 4 for Consistent Valid Physically-Realizable Adversarial Attack against Crowd-flow Prediction Models
Viaarxiv icon

Topic Modeling Based on Two-Step Flow Theory: Application to Tweets about Bitcoin

Add code
Bookmark button
Alert button
Mar 03, 2023
Aos Mulahuwaish, Matthew Loucks, Basheer Qolomany, Ala Al-Fuqaha

Figure 1 for Topic Modeling Based on Two-Step Flow Theory: Application to Tweets about Bitcoin
Figure 2 for Topic Modeling Based on Two-Step Flow Theory: Application to Tweets about Bitcoin
Figure 3 for Topic Modeling Based on Two-Step Flow Theory: Application to Tweets about Bitcoin
Figure 4 for Topic Modeling Based on Two-Step Flow Theory: Application to Tweets about Bitcoin
Viaarxiv icon

Continual Conscious Active Fine-Tuning to Robustify Online Machine Learning Models Against Data Distribution Shifts

Add code
Bookmark button
Alert button
Nov 02, 2022
Shawqi Al-Maliki, Faissal El Bouanani, Mohamed Abdallah, Junaid Qadir, Ala Al-Fuqaha

Figure 1 for Continual Conscious Active Fine-Tuning to Robustify Online Machine Learning Models Against Data Distribution Shifts
Figure 2 for Continual Conscious Active Fine-Tuning to Robustify Online Machine Learning Models Against Data Distribution Shifts
Figure 3 for Continual Conscious Active Fine-Tuning to Robustify Online Machine Learning Models Against Data Distribution Shifts
Figure 4 for Continual Conscious Active Fine-Tuning to Robustify Online Machine Learning Models Against Data Distribution Shifts
Viaarxiv icon