Marwan Omar

Orcid: 0000-0002-3392-0052

According to our database1, Marwan Omar authored at least 37 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
O-RAN-Based Digital Twin Function Virtualization for Sustainable IoV Service Response: An Asynchronous Hierarchical Reinforcement Learning Approach.
IEEE Trans. Green Commun. Netw., September, 2024

A Machine Learning Attack Resilient and Low-Latency Authentication Scheme for AI-Driven Patient Health Monitoring System.
IEEE Commun. Stand. Mag., September, 2024

An Internet of Medical Things-Based Mental Disorder Prediction System Using EEG Sensor and Big Data Mining.
J. Circuits Syst. Comput., July, 2024

Robust Risk-Sensitive Task Offloading for Edge-Enabled Industrial Internet of Things.
IEEE Trans. Consumer Electron., February, 2024

Machine Learning and Zero Knowledge Empowered Trustworthy Bitcoin Mixing for Next-G Consumer Electronics Payment.
IEEE Trans. Consumer Electron., February, 2024

Provably Secure Conditional-Privacy Access Control Protocol for Intelligent Customers-Centric Communication in VANET.
IEEE Trans. Consumer Electron., February, 2024

Threat Detection and Mitigation for Tactile Internet Driven Consumer IoT-Healthcare System.
IEEE Trans. Consumer Electron., February, 2024

Energy Maximization for Wireless Powered Communication Enabled IoT Devices With NOMA Underlaying Solar Powered UAV Using Federated Reinforcement Learning for 6G Networks.
IEEE Trans. Consumer Electron., February, 2024

Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application With Blockchain-Based Authentication.
IEEE Trans. Consumer Electron., February, 2024

IRS-Aided Federated Learning with Dynamic Differential Privacy for UAVs in Emergency Response.
IEEE Internet Things Mag., 2024

Web-Semantic-Driven Machine Learning and Blockchain for Transformative Change in the Future of Physical Education.
Int. J. Semantic Web Inf. Syst., 2024

An intelligent resource allocation strategy with slicing and auction for private edge cloud systems.
Future Gener. Comput. Syst., 2024

Exploring LLMs for Malware Detection: Review, Framework Design, and Countermeasure Approaches.
CoRR, 2024

Integrative Approaches in Cybersecurity and AI.
CoRR, 2024

A Binary Level Verification Framework for Real-Time Performance of PLC Program in Backhaul/Fronthaul Networks.
Proceedings of the IEEE International Conference on Communications, 2024

Two-Stage Solutions via Semidefinite Relaxation for Object Localization Using UAVs.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Millimeter-wave channel modeling in a VANETs using coding techniques.
PeerJ Comput. Sci., 2023

Does Synthetic Data Make Large Language Models More Efficient?
CoRR, 2023

Can pruning make Large Language Models more efficient?
CoRR, 2023

Can a student Large Language Model perform as well as it's teacher?
CoRR, 2023

Do Generative Large Language Models need billions of parameters?
CoRR, 2023

Detecting software vulnerabilities using Language Models.
CoRR, 2023

RobustNLP: A Technique to Defend NLP Models Against Backdoor Attacks.
CoRR, 2023

Backdoor Learning for NLP: Recent Advances, Challenges, and Future Research Directions.
CoRR, 2023

Harnessing the Power of Decision Trees to Detect IoT Malware.
CoRR, 2023

New Approach to Malware Detection Using Optimized Convolutional Neural Network.
CoRR, 2023

Text-Defend: Detecting Adversarial Examples using Local Outlier Factor.
Proceedings of the 17th IEEE International Conference on Semantic Computing, 2023

BcIIS: Blockchain-Based Intelligent Identification Scheme of Massive IoT Devices.
Proceedings of the IEEE Global Communications Conference, 2023

Privacy-Preserving EEG Signal Analysis with Electrode Attention for Depression Diagnosis: Joint FHE and CNN Approach.
Proceedings of the IEEE Global Communications Conference, 2023

VulDetect: A novel technique for detecting software vulnerabilities using Language Models.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Machine Learning for Cybersecurity - Innovative Deep Learning Solutions
Springer Briefs in Computer Science, Springer, ISBN: 978-3-031-15892-6, 2022

Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions.
IEEE Access, 2022

Making Adversarially-Trained Language Models Forget with Model Retraining: A Case Study on Hate Speech Detection.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts.
Proceedings of the CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 2022

2021
Security Breaches in the Healthcare Domain: A Spatiotemporal Analysis.
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021

2020
Net Neutrality Around the Globe: A Survey.
Proceedings of the 3rd International Conference on Information and Computer Technologies, 2020

2017
Defending against malicious insiders: a conceptual framework for predicting, detecting, and deterring malicious insiders.
Int. J. Bus. Process. Integr. Manag., 2017


  Loading...