Umeå University's logo

umu.sePublications
Change search
Link to record
Permanent link

Direct link
Alternative names
Publications (10 of 73) Show all publications
Forough, J., Bhuyan, M. & Elmroth, E. (2026). Reinforced model selection for resource efficient anomaly detection in edge clouds. Future Generation Computer Systems, 176, Article ID 108161.
Open this publication in new window or tab >>Reinforced model selection for resource efficient anomaly detection in edge clouds
2026 (English)In: Future Generation Computer Systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 176, article id 108161Article in journal (Refereed) Published
Abstract [en]

Web application services and networks encounter a broad range of security and performance anomalies, necessitating sophisticated detection strategies. However, performing anomaly detection in edge cloud environments, often constrained by limited resources, presents significant computational challenges and demands minimized detection time for real-time response. In this paper, we propose a model selection approach for resource efficient anomaly detection in edge clouds by leveraging an adapted Deep Q-Network (DQN) reinforcement learning technique. The primary objective is to minimize the computational resources required for accurate anomaly detection while achieving low latency and high detection accuracy. Through extensive experimental evaluation in our testbed setup over different representative scenarios, we demonstrate that our adapted DQN approach can reduce resource usage by up to 45 % and detection time by up to 85 % while incurring less than an 8 % drop in F1 score. These results highlight the potential of the adapted DQN model selection strategy to enable efficient, low-latency anomaly detection in resource-constrained edge cloud environments.

Place, publisher, year, edition, pages
Elsevier, 2026
Keywords
Anomaly detection, Edge clouds, Model selection, Resource optimization
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:umu:diva-245566 (URN)10.1016/j.future.2025.108161 (DOI)001585411100001 ()2-s2.0-105017973376 (Scopus ID)
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)The Swedish Foundation for International Cooperation in Research and Higher Education (STINT)EU, Horizon Europe, 101092711
Available from: 2025-10-20 Created: 2025-10-20 Last updated: 2025-10-20Bibliographically approved
Kanneganti, D., Mistry, S., Fattah, S. M., Krishna, A. & Bhuyan, M. (2025). Adaptive composition of Machine Learning as a Service (MLaaS) for IoT environments. In: Rong N. Chang; Carl K. Chang; Jingwei Yang; Nimanthi Atukorala; Dan Chen; Sumi Helal; Sasu Tarkoma; Qiang He; Tevfik Kosar; Claudio Ardagna; Amin Beheshti; Bo Cheng; Walid Gaaloul (Ed.), Proceedings: 2025 IEEE International Conference  on Web Service. Paper presented at 2025 IEEE International Conference on Web Services (ICWS), Helsinki, Finland, July 7-12, 2025 (pp. 597-606). Los Alamitos: IEEE (2025)
Open this publication in new window or tab >>Adaptive composition of Machine Learning as a Service (MLaaS) for IoT environments
Show others...
2025 (English)In: Proceedings: 2025 IEEE International Conference  on Web Service / [ed] Rong N. Chang; Carl K. Chang; Jingwei Yang; Nimanthi Atukorala; Dan Chen; Sumi Helal; Sasu Tarkoma; Qiang He; Tevfik Kosar; Claudio Ardagna; Amin Beheshti; Bo Cheng; Walid Gaaloul, Los Alamitos: IEEE, 2025, no 2025, p. 597-606Conference paper, Published paper (Refereed)
Abstract [en]

The dynamic nature of Internet of Things (IoT) environments challenges the long-term effectiveness of Machine Learning as a Service (MLaaS) compositions. The uncertainty and variability of IoT environments lead to fluctuations in data distribution, e.g., concept drift and data heterogeneity, and evolving system requirements, e.g., scalability demands and resource limitations. This paper proposes an adaptive MLaaS composition framework to ensure a seamless, efficient, and scalable MLaaS composition. The framework integrates a service assessment model to identify underperforming MLaaS services and a candidate selection model to filter optimal replacements. An adaptive composition mechanism is developed that incrementally updates MLaaS compositions using a contextual multi-armed bandit optimization strategy. By continuously adapting to evolving IoT constraints, the approach maintains Quality of Service (QoS) while reducing the computational cost associated with recomposition from scratch. Experimental results on a real-world dataset demonstrate the efficiency of our proposed approach.

Place, publisher, year, edition, pages
Los Alamitos: IEEE, 2025
Keywords
Combinatorial Optimization, Contextual Multi-Armed Bandit, Internet of Things, MLaaS, Service Composition
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-245918 (URN)10.1109/ICWS67624.2025.00082 (DOI)2-s2.0-105018802246 (Scopus ID)979-8-3315-5563-4 (ISBN)
Conference
2025 IEEE International Conference on Web Services (ICWS), Helsinki, Finland, July 7-12, 2025
Funder
European CommissionWallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2025-11-20 Created: 2025-11-20 Last updated: 2025-11-20Bibliographically approved
Das, A. S., Pang, G. & Bhuyan, M. (2025). Adaptive deviation learning for visual anomaly detection with data contamination. In: 2025 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV): proceedings. Paper presented at 2025 IEEE/CVF Winter Conference on Applications of Computer Vision, WACV 2025, Tucson, Arizona, February 26 - March 6, 2025 (pp. 8863-8872). IEEE
Open this publication in new window or tab >>Adaptive deviation learning for visual anomaly detection with data contamination
2025 (English)In: 2025 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV): proceedings, IEEE, 2025, p. 8863-8872Conference paper, Published paper (Refereed)
Abstract [en]

Visual anomaly detection targets to detect images that notably differ from normal pattern, and it has found extensive application in identifying defective parts within the manufacturing industry. These anomaly detection paradigms predominantly focus on training detection models using only clean, unlabeled normal samples, assuming an absence of contamination; a condition often unmet in real-world scenarios. The performance of these methods significantly depends on the quality of the data and usually decreases when exposed to noise. We introduce a systematic adaptive method that employs deviation learning to compute anomaly scores end-to-end while addressing data contamination by assigning relative importance to the weights of individual instances. In this approach, the anomaly scores for normal instances are designed to approximate scalar scores obtained from the known prior distribution. Meanwhile, anomaly scores for anomaly examples are adjusted to exhibit statistically significant deviations from these reference scores. Our approach incorporates a constrained optimization problem within the deviation learning framework to update instance weights, resolving this problem for each mini-batch. Comprehensive experiments on the MVTec and VisA benchmark datasets indicate that our proposed method surpasses competing techniques and exhibits both stability and robustness in the presence of data contamination.

Our source code is available at https://github.com/anindyasdas/ADL4VAD/

Place, publisher, year, edition, pages
IEEE, 2025
Series
Proceedings (IEEE Workshop on Applications of Computer Vision), ISSN 2472-6737, E-ISSN 2642-9381
Keywords
adaptive deviation learning, anomaly detection, deviation networks, robust detection, visual anomalies
National Category
Signal Processing
Identifiers
urn:nbn:se:umu:diva-238465 (URN)10.1109/WACV61041.2025.00859 (DOI)2-s2.0-105003643758 (Scopus ID)979-8-3315-1083-1 (ISBN)979-8-3315-1084-8 (ISBN)
Conference
2025 IEEE/CVF Winter Conference on Applications of Computer Vision, WACV 2025, Tucson, Arizona, February 26 - March 6, 2025
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2025-05-08 Created: 2025-05-08 Last updated: 2025-05-08Bibliographically approved
Sui, H., Zhang, Y., Gu, Z. & Bhuyan, M. (2025). An attack–defense non-cooperative game model from the perspective of safety and security synergistically for aircraft avionics systems. Aerospace, 12(9), Article ID 809.
Open this publication in new window or tab >>An attack–defense non-cooperative game model from the perspective of safety and security synergistically for aircraft avionics systems
2025 (English)In: Aerospace, E-ISSN 2226-4310, Vol. 12, no 9, article id 809Article in journal (Refereed) Published
Abstract [en]

The interconnectivity of avionics systems supports the need to incorporate functional safety and information security into airworthiness validation and maintenance protocols, which is critical. This necessity arises from the demanding operational environments and the limitations on defense resource allocation. This study proposes an optimization model for the strategic deployment of defense mechanisms, leveraging the dynamic interplay between attack and defense modeled by non-cooperative game theory and aligning with the maintenance schedules of civil aircraft. By developing an Attack–Defense Tree and conducting a non-cooperative game analysis, this paper outlines strategies from both the attacker’s and defender’s perspectives, assessing the impact of focused defense improvements on the system’s security integrity. The results reveal that the broad expansion of defense measures reduces their effectiveness, whereas targeted deployment significantly enhances protection. Monte Carlo simulations are employed to approximate equilibrium solutions across the strategy space, reducing computational complexity while retaining robustness in capturing equilibrium trends. This approach supports efficient allocation of defense resources, strengthens overall system security, and provides a practical foundation for integrating security analysis into avionics maintenance and certification processes.

Place, publisher, year, edition, pages
MDPI, 2025
Keywords
aviation avionics systems, non-cooperative game model, safety-security integration
National Category
Computer Sciences Security, Privacy and Cryptography
Identifiers
urn:nbn:se:umu:diva-244982 (URN)10.3390/aerospace12090809 (DOI)001579435000001 ()2-s2.0-105017236848 (Scopus ID)
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2025-10-20 Created: 2025-10-20 Last updated: 2025-10-20Bibliographically approved
Mitra, D., Chaki, N. & Bhuyan, M. (2025). Detecting denial of wallet attacks in serverless computing: a neural ODE-LTC approach. In: Proceedings - 2025 IEEE International Conference on Joint Cloud Computing, JCC 2025: . Paper presented at 2025 IEEE International Conference on Joint Cloud Computing, JCC 2025, Tucson, AZ, USA, 21-24 July, 2025. (pp. 125-130). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Detecting denial of wallet attacks in serverless computing: a neural ODE-LTC approach
2025 (English)In: Proceedings - 2025 IEEE International Conference on Joint Cloud Computing, JCC 2025, Institute of Electrical and Electronics Engineers (IEEE), 2025, p. 125-130Conference paper, Published paper (Refereed)
Abstract [en]

The serverless Function-as-a-Service (FaaS) paradigm offers a fine granularity for the pay-per-use billing model, where users are charged based on the actual function execution time and do not have to pay for idle resources. Thereby, FaaS in a serverless environment brings the promise that it completely abstracts infrastructure management. This allows the developers to focus solely on application development. On the other hand, the serverless applications, being deployed as a dense web of FaaS artifacts, increase the attack surface. This makes the FaaS paradigm susceptible to financial exhaustion attacks, also known as Denial of Wallet (DoW), where the attacker attempts to inflate the usage bill by illegitimate escalation of resource consumption. This paper proposes a robust detection method for DoW attacks on the serverless platform using the Neural Ordinary Differential Equation (ODE) with a Liquid Time Constant (LTC). The experiments, conducted on a benchmark dataset, represent real-world attack scenarios, compared with baseline methods. The proposed method outperforms the baselines for multiple evaluation metrics, proving its effectiveness in precision-critical scenarios.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Denial of Wallet, Economic DDoS, FaaS, Financial Exhaustion Attack, Neural ODE, Serverless Computing
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-244593 (URN)10.1109/JCC67032.2025.00021 (DOI)2-s2.0-105016118977 (Scopus ID)9798331589158 (ISBN)
Conference
2025 IEEE International Conference on Joint Cloud Computing, JCC 2025, Tucson, AZ, USA, 21-24 July, 2025.
Funder
EU, Horizon 2020, 101092711Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2025-10-10 Created: 2025-10-10 Last updated: 2025-10-10Bibliographically approved
Massonet, P., Ponsard, C., Bouhou, M., Lessage, X., Mancini, M., Montero, R. S., . . . Townend, P. (2025). Executing mobile edge functions in the cloud-edge continuum: analyzing threats to location integrity. In: 2025 12th International Conference on Future Internet of Things and Cloud (FiCloud): . Paper presented at 12th International Conference on Future Internet of Things and Cloud, FiCloud 2025, Istanbul, Turkiye, 11-13 August, 2025 (pp. 18-25). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Executing mobile edge functions in the cloud-edge continuum: analyzing threats to location integrity
Show others...
2025 (English)In: 2025 12th International Conference on Future Internet of Things and Cloud (FiCloud), Institute of Electrical and Electronics Engineers (IEEE), 2025, p. 18-25Conference paper, Published paper (Refereed)
Abstract [en]

With the exponential growth of edge devices, the cloud edge continuum provides a natural evolution to the centralised cloud architecture to overcome the bottlenecks created by the growing data that devices generate. Resource constrained edge devices need to be able to offload computational tasks to the cloud edge continuum. Providing resources located at the edge, close to resource-constrained devices, allows devices to offload on demand potentially complex functions with low latency and response time requirements. The COGNIT framework introduces the novel concept of function as a services (FaaS) at the edge and novel AI techniques for cloud-edge management. In this paper, we show how the novel edge FaaS model can be used to offload critical security functions from edge devices and enable them to protect themselves even though they don't have the resources for such protection. The paper's main contribution is to show how the edge FaaS model enables to design multi-layer protection models between edge devices and the cloud-edge continuum AI-based orchestrator. In this model the edge device provides a first layer of defense using application knowledge to protect itself whereas the AI-based orchestrator provides a second layer of defense that is more generic because it does not know much about the edge application. The layered protection model is illustrated and validated on a cybersecurity case study where AI-based anomaly detection is deployed at the edge to secure mobile devices and detect anomalies as early and quickly as possible. This second contribution of the paper shows how continuous security anomaly detection can be designed as multiple functions that are triggered by monitored events to provide continuous detection at the edge for all events.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Series
International Conference on Future Internet of Things and Cloud (FiCloud), E-ISSN 2996-1017
Keywords
Anomaly detection, Edge Computing, FaaS, Mobile Device, Security architecture, Threat modelling
National Category
Computer Sciences Communication Systems
Identifiers
urn:nbn:se:umu:diva-248361 (URN)10.1109/FiCloud66139.2025.00010 (DOI)2-s2.0-105021954266 (Scopus ID)9798331554378 (ISBN)9798331554385 (ISBN)
Conference
12th International Conference on Future Internet of Things and Cloud, FiCloud 2025, Istanbul, Turkiye, 11-13 August, 2025
Funder
EU, Horizon Europe, 101092711
Available from: 2026-01-13 Created: 2026-01-13 Last updated: 2026-01-13Bibliographically approved
Takhellambam, L., Clinton, U. B., Hoque, N., Singh, K. R. & Bhuyan, M. (2025). FL-MU: a benchmark dataset for federated intrusion detection in IoT networks. IEEE Access, 13, 191037-191064
Open this publication in new window or tab >>FL-MU: a benchmark dataset for federated intrusion detection in IoT networks
Show others...
2025 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 13, p. 191037-191064Article in journal (Refereed) Published
Abstract [en]

Due to the tremendous deployment of sensors, actuators, and remote devices, Internet of Things (IoT) networks have gained popularity across a wide range of application domains. As a result, the number of attackers and the dynamics of IoT network attacks are also increasing proportionately. Moreover, IoT networks generate a huge amount of sensitive data that must be carefully protected to prevent potential exploitation and exploration by adversaries. The advent of Federated Learning (FL) paved the way for enhancing data privacy and security of IoT data. Although several FL-based security systems have been developed for IoT networks, many lack effectiveness and efficiency. This limitation is due to the unavailability of up-to-date benchmark IoT network intrusion datasets that accurately reflect real-world IoT network traffic, encompassing a wide range of IoT protocols and recent, diverse attack types. This discrepancy significantly hinders the development, validation, and comparative evaluation of existing security solutions. To meet this critical need, we develop a practical IoT network intrusion dataset called FL-MU using client-specific IoT network testbeds. Each client testbed comprises more than 30 devices communicating over seven different IoT communication protocols. The FL-MU dataset includes eleven types of attacks, comprising over 19 million instances with 121 features. The effectiveness of the dataset is established on multiple state-of-the-art FL-based Intrusion Detection Systems (IDSs). The FL-based IDS models exhibit superior performance when trained on our FL-MU dataset as compared to other existing datasets. This highlights the quality and suitability of the developed FL-MU dataset for training robust and accurate FL-based security systems. The FL-MU dataset and the related implementation codes are made available at the Kaggle repository: https://doi.org/10.34740/kaggle/dsv/13106381, contributing to the research community for the advancement of IoT security.

Place, publisher, year, edition, pages
IEEE, 2025
Keywords
Cybersecurity, Federated Learning, Internet of Things, Intrusion Detection System, IoT Dataset
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-246546 (URN)10.1109/ACCESS.2025.3628066 (DOI)2-s2.0-105020910303 (Scopus ID)
Available from: 2025-11-24 Created: 2025-11-24 Last updated: 2025-11-24Bibliographically approved
ur Rehman Khan, S., Bilal, O., Mistry, S., Deb, N., Mahmud, M. & Bhuyan, M. (2025). KDlight: a lightweight knowledge distillation framework for medical image classification. In: Proceedings of the International Joint Conference on Neural Networks: . Paper presented at 2025 International Joint Conference on Neural Networks, IJCNN 2025, Rome, Italy, 30 June - 5 July, 2025.. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>KDlight: a lightweight knowledge distillation framework for medical image classification
Show others...
2025 (English)In: Proceedings of the International Joint Conference on Neural Networks, Institute of Electrical and Electronics Engineers (IEEE), 2025Conference paper, Published paper (Refereed)
Abstract [en]

Conventional standalone approaches for diagnosing individual diseases often fail to achieve robust generalization because they are severely impacted by overfitting. This results in poor adaptability to diverse image representations and an inability to balance performance with computational efficiency. In this study, we propose KDLight, a lightweight, novel CNN model designed for efficient medical image classification across diverse modalities, including MRI, X-ray, radiography, skin images, and histopathology. We employ Knowledge Distillation (KD), where insights from an efficient teacher model (MobileNet) guide the learning process of the KDLight student model. The KDLight model minimizes the number of parameters while enhancing feature learning across diverse medical image representations. Experimental results show that KDLight achieves 95.55% classification accuracy with only 2.96 seconds and a compact 7.5 MB disk size, significantly reducing parameter size, accelerating inference, and lowering computational costs compared to traditional pre-trained models. Additionally, KDLight ability to efficiently learn diverse image representations can be extended to other domains, such as crack classification (e.g., road, window, and building cracks), enabling high-performance detection across different surface defect categories.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Series
International Joint Conference on Neural Networks, ISSN 2161-4393, E-ISSN 2161-4407
Keywords
Generalize Learning, Knowledge Distillation, Lightweights, Multi-Modality
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-247612 (URN)10.1109/IJCNN64981.2025.11228615 (DOI)2-s2.0-105023963455 (Scopus ID)9798331510428 (ISBN)979-8-3315-1043-5 (ISBN)
Conference
2025 International Joint Conference on Neural Networks, IJCNN 2025, Rome, Italy, 30 June - 5 July, 2025.
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2025-12-19 Created: 2025-12-19 Last updated: 2025-12-22Bibliographically approved
Bhuyan, M. & Chen, H. (2025). Message from the PC chairs. In: Proceedings - 2025 IEEE International Conference on Artificial Intelligence Testing, AITest 2025: . Paper presented at 7th IEEE International Conference on Artificial Intelligence Testing, AITest 2025 (pp. X-X). Paper presented at 7th IEEE International Conference on Artificial Intelligence Testing, AITest 2025. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Message from the PC chairs
2025 (English)In: Proceedings - 2025 IEEE International Conference on Artificial Intelligence Testing, AITest 2025, Institute of Electrical and Electronics Engineers (IEEE), 2025, p. X-XChapter in book (Other academic)
Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-244569 (URN)10.1109/AITest66680.2025.00005 (DOI)2-s2.0-105016177186 (Scopus ID)9798331589134 (ISBN)
Conference
7th IEEE International Conference on Artificial Intelligence Testing, AITest 2025
Note

Conference: 7th IEEE International Conference on Artificial Intelligence Testing, AITest 2025, Tucson, AZ, USA, 21-14 July, 2025.

Available from: 2025-10-10 Created: 2025-10-10 Last updated: 2025-10-10Bibliographically approved
Zaland, O., Onur, Y. & Bhuyan, M. (2025). Mitigating data heterogeneity with multi-tier federated GAN. In: Mufti Mahmud; Maryam Doborjeh, Kevin Wong; Andrew Chi Sing Leung; Zohreh Doborjeh; M. Tanveer (Ed.), Neural Information Processing: 31st International Conference, ICONIP 2024, Auckland, New Zealand, December 2–6, 2024, Proceedings, Part IX. Paper presented at 31st International Conference on Neural Information Processing, ICONIP 2024, Auckland, New Zealand, December 2-6, 2024 (pp. 225-239). Singapore: Springer
Open this publication in new window or tab >>Mitigating data heterogeneity with multi-tier federated GAN
2025 (English)In: Neural Information Processing: 31st International Conference, ICONIP 2024, Auckland, New Zealand, December 2–6, 2024, Proceedings, Part IX / [ed] Mufti Mahmud; Maryam Doborjeh, Kevin Wong; Andrew Chi Sing Leung; Zohreh Doborjeh; M. Tanveer, Singapore: Springer, 2025, p. 225-239Conference paper, Published paper (Refereed)
Abstract [en]

Federated Learning (FL) can help train collaborative machine learning models while preserving individual client privacy by keeping data local and private. Among other challenges, data heterogeneity brings extensive hurdles in learning collaborative models, as clients usually own non-independent and identically distributed (non-IID) data. One solution to improve model performance under non-IID data is implicit data augmentation, which requires global distribution modeling. This work proposes FedMGAN, a two-phase novel multi-tier generative adversarial network (GAN) based global data distribution modeling approach to tackle data heterogeneity in FL. In the first phase, FedMGAN utilizes a subset of clients for GAN training, whose generators are further improved against the remaining clients’ discriminators. In the second phase, the trained GAN is used to improve the performance of the global FL model. FedMGAN performs better than the current state-of-the-art FL approaches on four different benchmarking datasets under non-IID data distribution.

Place, publisher, year, edition, pages
Singapore: Springer, 2025
Series
Communications in Computer and Information Science, ISSN 1865-0929, E-ISSN 1865-0937
Keywords
Data Augmentation, Federated Learning, Generative Adverserial Networks (GAN), Label Distribution Skew
National Category
Computer Systems
Identifiers
urn:nbn:se:umu:diva-242245 (URN)10.1007/978-981-96-6972-1_16 (DOI)2-s2.0-105010189433 (Scopus ID)978-981-96-6971-4 (ISBN)978-981-96-6972-1 (ISBN)
Conference
31st International Conference on Neural Information Processing, ICONIP 2024, Auckland, New Zealand, December 2-6, 2024
Available from: 2025-07-17 Created: 2025-07-17 Last updated: 2025-07-17Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-9842-7840

Search in DiVA

Show all publications