Fatima M. Anwar

ORCID: 0000-0001-7119-7232
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Time Synchronization Technologies
  • Distributed systems and fault tolerance
  • Privacy-Preserving Technologies in Data
  • Virtual Reality Applications and Impacts
  • Context-Aware Activity Recognition Systems
  • Augmented Reality Applications
  • Security and Verification in Computing
  • Real-Time Systems Scheduling
  • Energy Efficient Wireless Sensor Networks
  • Robotics and Sensor-Based Localization
  • Adversarial Robustness in Machine Learning
  • Cryptographic Implementations and Security
  • IoT and Edge/Fog Computing
  • Advanced Vision and Imaging
  • Internet Traffic Analysis and Secure E-voting
  • 3D Surveying and Cultural Heritage
  • User Authentication and Security Systems
  • Advanced Malware Detection Techniques
  • Security in Wireless Sensor Networks
  • Robotic Path Planning Algorithms
  • Mobile Agent-Based Network Management
  • Bluetooth and Wireless Communication Technologies
  • Parallel Computing and Optimization Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Energy Harvesting in Wireless Networks

University of Massachusetts Amherst
2019-2025

University of California, Los Angeles
2016-2019

UCLA Health
2019

University of California System
2018

Ajou University
2009-2012

University of Manchester
2008

While the community has designed various defenses to counter threat of poisoning attacks in Federated Learning (FL), there are no guidelines for evaluating these defenses. These prone subtle pitfalls their experimental setups that lead a false sense security, rendering them unsuitable practical deployment. In this paper, we systematically understand, identify, and provide better approach address challenges. First, design comprehensive systemization FL along three dimensions: i) how client...

10.48550/arxiv.2502.05211 preprint EN arXiv (Cornell University) 2025-02-03

Despite the critical role of timing infrastructure in enabling essential services, from public key and smart grids to autonomous navigation high-frequency trading, modern stacks remain highly vulnerable malicious attacks. These threats emerge due several reasons, including inadequate security mechanisms, architectures unique vulnerability delays, implementation issues. In this paper, we aim obtain a holistic understanding issues that make adversarial manipulations, what challenges are...

10.48550/arxiv.2502.09837 preprint EN arXiv (Cornell University) 2025-02-13

Distractions in mixed reality (MR) environments can significantly influence user experience, affecting key factors such as presence, reaction time, cognitive load, and Break Presence (BIP). measures immersion, time captures responsiveness, load reflects mental effort, BIP represents moments when attention shifts from the virtual to real world, breaking immersion. While prior work has established that distractions impact these individually, relationship between constructs remains...

10.1109/tvcg.2025.3549575 article EN IEEE Transactions on Visualization and Computer Graphics 2025-01-01

Enhancing presence in mixed reality (MR) relies on precise measurement and quantification. While has traditionally been measured through subjective questionnaires, recent research links with objective metrics like reaction time. Past studies examined this correlation varying technical factors (object realism behavior) human conditioning, but the impact of interaction remains unclear. To answer question, we conducted a within-subjects study (N = 50) to explore between time across two...

10.1109/tvcg.2025.3549580 article EN IEEE Transactions on Visualization and Computer Graphics 2025-01-01

Many modern IoT applications integrate smartphones in their deployments to capture and interface with various sensors. Fusing across sensing modalities can often result improved application performance. An essential yet overlooked requirement multimodal fusion is the synchronization input data streams. Given universality of smartphone system clock, it commonly used timestamp data. Through a systematic study clock accuracy on smartphones, we show that there are drastic timing errors ranging...

10.1109/iotdi49375.2020.00022 article EN 2020-04-01

A prerequisite to improving the presence of a user in mixed reality (MR) is ability measure and quantify presence. Traditionally, subjective questionnaires have been used assess level However, recent studies shown that correlated with objective systemic human performance measures such as reaction time. These analyze correlation between time when technical factors object realism plausibility object's behavior change. additional psychological physiological can also impact It unclear if be...

10.1109/tvcg.2024.3372120 article EN IEEE Transactions on Visualization and Computer Graphics 2024-03-04

An accurate sense of elapsed time is essential for the safe and correct operation hardware, software, networked systems. Unfortunately, an adversary can manipulate system's violate causality, consistency, scheduling properties underlying applications. Although cryptographic techniques are used to secure data, they cannot ensure security as securing a source much more challenging, given that result inquiring must be delivered in timely fashion. In this paper, we first describe general attack...

10.1109/rtss46320.2019.00018 article EN 2019-12-01

Having a shared and accurate sense of time is critical to distributed Cyber-Physical Systems (CPS) the Internet Things (IoT). Thanks decades research in clock technologies synchronization protocols, it now possible measure synchronize across systems with unprecedented accuracy. However, applications have not benefited same extent due limitations system services that help manage time, hardware-OS OS-application interfaces through which timing information flows application. Due importance...

10.1109/rtss.2016.027 article EN 2016-11-01

Split Learning (SL) and Federated (FL) are two prominent distributed collaborative learning techniques that maintain data privacy by allowing clients to never share their private with other servers, find extensive IoT applications in smart healthcare, cities industry. Prior work has extensively explored the security vulnerabilities of FL form poisoning attacks. To mitigate effect these attacks, several defenses have also been proposed. Recently, a hybrid both emerged (commonly known as...

10.1145/3560905.3568302 article EN 2022-11-06

Abstract This paper presents the impact of utilizing a biased energy distribution (BED) scheme for clustering sensor networks. In networks, some nodes are elected as aggregators and they compress data from their cluster members before sending aggregated to sink. Existing routing protocols assume that all provided with equal amount but this shortens network lifetime makes unstable. proposes solution prioritizing into higher lower nodes. The aim approach is ensure well balanced consumption in...

10.21307/ijssis-2017-433 article EN International Journal on Smart Sensing and Intelligent Systems 2011-01-01

Measuring presence is critical to improving user involvement and performance in Mixed Reality (MR). <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Presence</i> , a crucial aspect of MR, traditionally gauged using subjective questionnaires, leading lack time-varying responses susceptibility bias. Inspired by the existing literature on relationship between human performance, proposed methodology systematically measures user's reaction time...

10.1109/tvcg.2023.3319563 article EN IEEE Transactions on Visualization and Computer Graphics 2023-09-26

10.1109/iros58592.2024.10802379 article EN 2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) 2024-10-14

Achieving precise time synchronization across a collection of smartphones poses unique challenges due to their limited hardware support, exclusively wireless networking interface, and restricted timing stack control. Given the ubiquity popularity in modern distributed applications, clock discrepancies often lead degraded application performance. In this paper, we present evaluate alternative approaches attain by leveraging various peripherals available on smartphone devices. Our evaluation...

10.1109/globalsip45357.2019.8969519 article EN 2019-11-01

There is a lack of datasets for visual-inertial odometry applications in Extended Reality (XR). To the best our knowledge, there no dataset available that captured from an XR headset with human as carrier. bridge this gap, we present novel pose estimation --- called HoloSet collected using Microsoft Hololens 2, which state-of-the-art head mounted device XR. Potential include odometry, simultaneous localization and mapping (SLAM), additional leverage data.

10.1145/3560905.3567763 article EN 2022-11-06

Precision time synchronization is critical for distributed sensing, and coordinated actuation in various low-range wireless applications Internet of Things Robotics. The state-of-the-art protocol however, known as Time Protocol (PTP) designed wired networks. In this work, we make an effort to enable PTP Low Range Wireless Personal Area Networks (LR-WPAN). IPv6 over power Network (6LoWPAN) represents the upper layers LR-WPAN MAC PHY stack. Since 6LoWPAN offers additional advantages software...

10.1109/ispcs.2017.8056739 article EN 2017-08-01

Event representation models provide a framework in which we can reason about events so as to interpret the collective behaviour of objects over time and space domains. Many are context-specific lack flexibility when faced with unstructured video. This paper proposes comprehensive event modelling for multimedia surveillance systems. An detection model incorporates strings new predicate set describing more complex scenarios. classification performance is evaluated on benchmarked datasets.

10.1049/cp:20080351 article EN 2008 5th International Conference on Visual Information Engineering (VIE 2008) 2008-01-01

Service discovery in Ubiquitous Sensor Networks has been targeted mostly for services available within certain proximity, but the service availability only close vicinity is no longer feasible pervasive and ubiquitous era. In order to address ubiquity discovery, we have proposed a framework that makes use of Electronic Number Mapping (ENUM) protocol. Our network architecture consists sensor nodes associated with few relatively powerful called master nodes. Only IPv6 enabled Low power...

10.1109/wcnc.2010.5506568 article EN 2010-04-01

The Beaglebone Black single-board computer is well-suited for real-time embedded applications because its system-on-a-chip contains two "Programmable Real-time Units" (PRUs): 200-MHz microcontrollers that run concurrently with the main 1-GHz CPU runs Linux. This paper introduces "Cyclops": a web-browser-based IDE facilitates development of on Black's PRU. Users write PRU code in simple JavaScript-inspired language, which Cyclops converts to assembly and deploys automatically configures...

10.1109/ispcs.2017.8056744 article EN 2017-08-01

Achieving precise time synchronization across a collection of smartphones poses unique challenges due to their limited hardware support, exclusively wireless networking interface, and restricted timing stack control. Given the ubiquity popularity in modern distributed applications, clock discrepancies often lead degraded application performance. In this paper, we present evaluate alternative approaches attain by leveraging various peripherals available on smartphone devices. Our evaluation...

10.1109/ispcs.2019.8886639 article EN 2019-09-01
Coming Soon ...