An Artificial Intelligence-Driven Deep Representation Learning Model for Securing Privacy-Preserving Applications in Human–Computer Interface Systems

Authors

  • Hadi Oqaibi Information Systems Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia
Volume: 16 | Issue: 1 | Pages: 31839-31844 | February 2026 | https://doi.org/10.48084/etasr.15772

Abstract

The rapid progression of Internet connections has led to a significant increase in cyber-attack events, often resulting in severe and disastrous consequences. Malware is one of the primary weapons used to achieve malicious objectives in cyberspace, either through the exploitation of newly discovered vulnerabilities or through the misuse of features introduced by new technologies. The development of more effective and robust malware defense mechanisms is considered a critical necessity in cybersecurity. Human–Computer Interface (HCI) systems have become increasingly important, and as communication, computing, and display technologies continue to advance, conventional HCI methods may become a bottleneck in effectively handling the growing data flow. Federated Learning (FL) is a Machine Learning (ML) paradigm that aims to train models through decentralized devices, whereas the local data are kept private. In this manuscript, a Secure and Efficient Federated Learning using Optimization Algorithms and Deep Learning for Cybersecurity Applications (SEFL-OADLCA) model is proposed for HCI systems. The aim is to present an effective FL framework to address cybersecurity issues. First, the min–max scaler method is applied for data preprocessing. For the Dimensionality Reduction (DR) process, the Mountain Gazelle Optimizer (MGO) technique is employed. Furthermore, a hybrid Temporal Convolutional Network and Long Short-Term Memory (TCN+LSTM) technique is utilized for the attack classification process. Finally, the hyperparameter selection process is performed using the Remora Optimization Algorithm (ROA) to optimize the classification results. The comparison study of the SEFL-OADLCA method portrayed a superior accuracy of 99.46% compared with existing approaches on the NSL-KDD dataset.

Keywords:

Federated Learning (FL), Deep Learning (DL), cybersecurity, Human–Computer Interface (HCI), Remora Optimization Algorithm (ROA)

Downloads

Download data is not yet available.

References

W. S. Admass, Y. Y. Munaye, and A. A. Diro, "Cyber security: State of the art, challenges and future directions," Cyber Security and Applications, vol. 2, Jan. 2024, Art. no. 100031. DOI: https://doi.org/10.1016/j.csa.2023.100031

M. F. Safitra, M. Lubis, and H. Fakhrurroja, "Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity," Sustainability, vol. 15, no. 18, Sept. 2023, Art. no. 13369. DOI: https://doi.org/10.3390/su151813369

M. S. Alkatheiri, "Artificial intelligence assisted improved human-computer interactions for computer systems," Computers and Electrical Engineering, vol. 101, July 2022, Art. no. 107950. DOI: https://doi.org/10.1016/j.compeleceng.2022.107950

S. Gulati, J. McDonagh, S. Sousa, and D. Lamas, "Trust models and theories in human–computer interaction: A systematic literature review," Computers in Human Behavior Reports, vol. 16, Dec. 2024, Art. no. 100495. DOI: https://doi.org/10.1016/j.chbr.2024.100495

T. Unwin, Reclaiming Information and Communication Technologies for Development. Oxford, U.K.: Oxford University Press, 2017. DOI: https://doi.org/10.1093/oso/9780198795292.001.0001

Y. Li and Q. Liu, "A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments," Energy Reports, vol. 7, pp. 8176–8186, Nov. 2021. DOI: https://doi.org/10.1016/j.egyr.2021.08.126

A. Sanmorino, L. Marnisah, and H. D. Kesuma, "Detection of DDoS Attacks using Fine-Tuned Multi-Layer Perceptron Models," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16444–16449, Oct. 2024. DOI: https://doi.org/10.48084/etasr.8362

S. Alqaraleh, "An Efficient Ensemble Network Anomaly Detection System for Cyber-Attacks," Engineering, Technology & Applied Science Research, vol. 15, no. 4, pp. 25549–25554, Aug. 2025. DOI: https://doi.org/10.48084/etasr.11920

A. Tariq et al., "Trustworthy Federated Learning: A Comprehensive Review, Architecture, Key Challenges, and Future Research Prospects," IEEE Open Journal of the Communications Society, vol. 5, pp. 4920–4998, 2024. DOI: https://doi.org/10.1109/OJCOMS.2024.3438264

M. J. Idrissi et al., "Fed-ANIDS: Federated learning for anomaly-based network intrusion detection systems," Expert Systems with Applications, vol. 234, Dec. 2023, Art. no. 121000. DOI: https://doi.org/10.1016/j.eswa.2023.121000

H. Hameed et al., "Recognizing British Sign Language Using Deep Learning: A Contactless and Privacy-Preserving Approach," IEEE Transactions on Computational Social Systems, vol. 10, no. 4, pp. 2090–2098, Aug. 2023. DOI: https://doi.org/10.1109/TCSS.2022.3210288

J. Silva and M. Gomez, "Advancements in Human-Computer Interaction Through Natural Language Processing and Voice Recognition," Journal of Computing Innovations and Applications, vol. 3, no. 1, pp. 8–12, Jan. 2025.

S. T. Ahmed, A. C. Kaladevi, V. V. Kumar, A. Shankar, and F. Alqahtani, "Privacy Enhanced Edge-AI Healthcare Devices Authentication: A Federated Learning Approach," IEEE Transactions on Consumer Electronics, vol. 71, no. 2, pp. 5676–5682, May 2025. DOI: https://doi.org/10.1109/TCE.2025.3542955

N. Elisa, L. Yang, F. Chao, N. Naik, and T. Boongoen, "A Secure and Privacy-Preserving E-Government Framework Using Blockchain and Artificial Immunity," IEEE Access, vol. 11, pp. 8773–8789, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3239814

C. S. Kolli, V. V. Krishna Reddy, T. S. Reddy, M. K. Chandol, D. B. Dasari, and M. R. Reddy, "Deep learning-based privacy-preserving recommendations in federated learning," International Journal of General Systems, vol. 53, no. 6, pp. 651–677, Aug. 2024. DOI: https://doi.org/10.1080/03081079.2024.2302605

Z. Xihua, S. B. Goyal, M. Tesfayohanis, and C. Verma, "Blockchain-Based Privacy-Preserving Approach Using SVML for Encrypted Smart City Data in the Era of IR 4.0," Journal of Nanomaterials, vol. 2022, no. 1, July 2022, Art. no. 7463513. DOI: https://doi.org/10.1155/2022/7463513

T. Kandappu, V. Subbaraju, and Q. Xu, "PrivacyPrimer: Towards Privacy-Preserving Episodic Memory Support For Older Adults," Proceedings of the ACM on Human-Computer Interaction, vol. 5, no. CSCW2, Oct. 2021, Art. no. 306. DOI: https://doi.org/10.1145/3476047

U. Islam, H. Ullah, N. Khan, I. Ahmad, and K. Saleem, "Adaptive Federated Learning Framework for Privacy-Preserving Consumer-Centric IoMT: A Novel Secure Data Collaboration Model," IEEE Transactions on Consumer Electronics, 2025. DOI: https://doi.org/10.1109/TCE.2025.3606642

M. Wang, L. Zhou, X. Huang, and W. Zheng, "Towards Federated Learning Driving Technology for Privacy-Preserving Micro-Expression Recognition," Tsinghua Science and Technology, vol. 30, no. 5, pp. 2169–2183, Oct. 2025. DOI: https://doi.org/10.26599/TST.2024.9010098

S. Dutta, D. Irvin, and J. H. L. Hansen, "Exploring discrete speech units for privacy-preserving and efficient speech recognition for school-aged and preschool children," International Journal of Human-Computer Studies, vol. 199, May 2025, Art. no. 103460. DOI: https://doi.org/10.1016/j.ijhcs.2025.103460

N. Jia, S. Fu, G. Xu, K. Huang, and M. Xu, "Towards privacy-preserving and efficient word vector learning for lightweight IoT devices," Digital Communications and Networks, vol. 10, no. 4, pp. 895–903, Aug. 2024. DOI: https://doi.org/10.1016/j.dcan.2022.10.019

Y. Harrath, O. Adohinzin, J. Kaabi, and M. Saathoff, "Bridging Domains: Advances in Explainable, Automated, and Privacy-Preserving AI for Computer Science and Cybersecurity," Computers, vol. 14, no. 9, Sept. 2025, Art. no. 374. DOI: https://doi.org/10.3390/computers14090374

B. Abdollahzadeh, F. S. Gharehchopogh, N. Khodadadi, and S. Mirjalili, "Mountain Gazelle Optimizer: A new Nature-inspired Metaheuristic Algorithm for Global Optimization Problems," Advances in Engineering Software, vol. 174, Dec. 2022, Art. no. 103282. DOI: https://doi.org/10.1016/j.advengsoft.2022.103282

J. Bi, X. Zhang, H. Yuan, J. Zhang, and M. Zhou, "A Hybrid Prediction Method for Realistic Network Traffic With Temporal Convolutional Network and LSTM," IEEE Transactions on Automation Science and Engineering, vol. 19, no. 3, pp. 1869–1879, July 2022. DOI: https://doi.org/10.1109/TASE.2021.3077537

H. Jia, X. Peng, and C. Lang, "Remora optimization algorithm," Expert Systems with Applications, vol. 185, Dec. 2021, Art. no. 115665. DOI: https://doi.org/10.1016/j.eswa.2021.115665

"NSL-KDD." Kaggle. [Online]. Available: https://www.kaggle.com/datasets/hassan06/nslkdd.

S. Naseer et al., "Enhanced Network Anomaly Detection Based on Deep Neural Networks," IEEE Access, vol. 6, pp. 48231–48246, 2018. DOI: https://doi.org/10.1109/ACCESS.2018.2863036

J. Lee, J. Kim, I. Kim, and K. Han, "Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles," IEEE Access, vol. 7, pp. 165607–165626, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2953095

J. Bo, K. Chen, S. Li, and P. Gao, "Boosting Few-Shot Network Intrusion Detection with Adaptive Feature Fusion Mechanism," Electronics, vol. 13, no. 22, Nov. 2024, Art. no. 4560. DOI: https://doi.org/10.3390/electronics13224560

Downloads

How to Cite

[1]
H. Oqaibi, “An Artificial Intelligence-Driven Deep Representation Learning Model for Securing Privacy-Preserving Applications in Human–Computer Interface Systems”, Eng. Technol. Appl. Sci. Res., vol. 16, no. 1, pp. 31839–31844, Feb. 2026.

Metrics

Abstract Views: 83
PDF Downloads: 37

Metrics Information