top of page

My Publications

This is a summary of my publications, offering a glimpse into my research background and publication history. My primary research interests have centred on emerging communication networks, with a particular focus on cybersecurity and privacy challenges. Additionally, I have explored the use of AI to enhance Intrusion Detection Systems (IDS), improving their ability to detect and respond to evolving threats. For more information visit: https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=dAHQsYwAAAAJ

CHFL: A Collaborative Hierarchical Federated Intrusion Detection System for Vehicular Networks

In this paper, I proposed CHFL, a hierarchical federated intrusion detection system for vehicular networks. This system allows vehicles to collaborate in detecting and responding to threats while minimizing data exposure, thereby improving the security and resilience of the network.

image.png

A Two-Layer Collaborative Vehicle-Edge Intrusion Detection System for Vehicular Communications

I introduced a two-layer intrusion detection system designed for vehicular communications in this paper. By combining vehicle-based and edge-based detection, I aimed to enhance the detection and mitigation of cyber threats in real-time, ensuring secure data exchange in connected vehicles.

image.png

FIDS: A Federated Intrusion Detection System for 5G Smart Metering Network

​I developed a federated intrusion detection system (FIDS) aimed at securing 5G smart metering networks. This system leverages collaboration between devices to detect threats while maintaining data privacy, offering an innovative solution for securing smart meters in a 5G environment.

image.png

Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures)

In this work, I examined the security and privacy challenges within smart grids, comparing conventional threats with those emerging from the integration of machine learning. I analyze how machine learning can both introduce new vulnerabilities and serve as a countermeasure to enhance grid security.

image.png
ByteHerWay
Notice: The images on this website are generated using the AI tool provided by the WIX platform.
bottom of page