Publications
- N. C. Onat, J. Mandouri, M. Kucukvar, B. Sen, S. A. Abbasi, W. Alhajyaseen, A. A. Kutty, R. Jabbar, M. Contestabile, and A. M. Hamouda, "Rebound effects undermine carbon footprint reduction potential of autonomous electric vehicles," Nature Communications, vol. 14, no. 1, 2023.
- T. Moulahi, R. Jabbar, A. Alabdulatif, S. Abbas, S. El Khediri, S. Zidi, and M. Rizwan, "Privacy‐preserving federated learning cyber‐threat detection for intelligent transport systems with blockchain‐based security," Expert Systems, vol. 40, no. 5, 2023.
- M. Abdelhedi, R. Jabbar, A. Ben Said, N. Fetais, and C. Abbes, "Machine learning for prediction of the uniaxial compressive strength within carbonate rocks," Earth Science Informatics, vol. 16, no. 2, 2023.
- M. Badr, M. Mahmoud, Y. Fang, M. Abdulaal, A. J. Aljohani, and M. Ibrahem, "Privacy-preserving andcommunication-efficient energy prediction scheme based on federated learning for smart grids", IEEE Internet of Things, 2023. Published online
-
H. Habbak, M. Mahmoud, K. Metwally, M. M. Fouda, and M. I. Ibrahem, "Load forecasting techniques and their applications in smart grids", Energies, vol. 16, no. 3, 2023
-
M. Badr, M. Mahmoud, M. Abdulaal, A. Aljohani, F. Alsolami, and A. Balamsh, "A novel evasion attack against global electricity theft detectors and a countermeasure", IEEE Internet of Things Journal, 2023.
-
Z. Sheikh Ali, A. Al-Ali, T. Elsayed, “Detecting Users Prone to Spread Fake News on Arabic Twitter,” Proceedings of the 5th Workshop on Open-Source Arabic Corpora and Processing Tools, Jun. 2022.
-
A. Alhaddad, H. Aly, H. Gad, A. Al-Ali, K. Sadasivuni, J. Cabibihan, R. Malik, "Sense and Learn: Recent Advances in Wearable Sensing and Machine Learning for Blood Glucose Monitoring and Trend-Detection," Frontiers in Bioengineering and Biotechnology, May 2022.
-
W. Mansour, T. Elsayed, and A. Al-Ali, “Did I See it Before? Detecting Previously-Checked Claims over Twitter”. Proceedings of the 44th European Conference on Information Retrieval, Apr. 2022.
-
Unal, Devrim, Shada Bennbaia, and Ferhat Ozgur Catak. "Machine learning for the security of healthcare systems based on Internet of Things and edge computing." Cybersecurity and Cognitive Science. Academic Press, 2022. 299-320.
-
Haris, Raseena M., Khaled M. Khan, and Armstrong Nhlabatsi. "Live migration of virtual machine memory content in networked systems: A review." Computer Networks (2022): 108898.
-
Mohammed Mudassir, Devrim Unal, Mohammad Hammoudeh, Farag Azzedin, "Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches", Wireless Communications and Mobile Computing, vol. 2022, Article ID 2845446, 12 pages,2022.
- Ferhat Ozgur Catak, Murat Kuzlu, Evren Catak, Umit Cali, Devrim Unal, Security concerns on machine learning solutions for 6G networks in mmWave beam prediction, Physical Communication, Volume 52, pp. 101626, 2022
- Lav Gupta, Tara Salman, Ali Ghubaish, Devrim Unal, Abdulla Khalid Al-Ali, Raj Jain, Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach, Applied Soft Computing, pp. 108439, Volume 118, 2022
- Mahima Aggarwal, Mohammed Zubair, Devrim Unal, Abdulla Al-Ali, Thomas Reimann, Guillaume Alinier, Fuzzy Identification-Based Encryption for healthcare user face authentication, Journal of Emergency Medicine, Trauma and Acute Care, Volume 2022, Issue 1 - Qatar Health 2022 Conference abstracts, Jan 2022
- X. Yan and Maode Ma, “A Privacy-Preserving Handover Authentication Protocol for a Group of MTC Devices in 5G Networks,” Computers and Security , Vol. 116, AN. 102601, May 2022.
- K. L. K. Sudheera, Maode Ma and P. H. J. Chong, “Real-Time Cooperative Data Routing and Scheduling in Software Defined Vehicular Networks,” Computer Communications , Vol. 181, January, 2022, pp. 203-214.
- C. Wang, X. Li, Maode Ma, and Y. Zhang, “A Novel and Efficient Anonymous Authentication Scheme Based on Extended Chebyshev Chaotic Maps for Smart Grid,” Proc-23rd IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2022 , WoWMoM2022, UK, June 2022.
- X. Yan, Maode Ma, and R. Su, “A Certificateless Efficient and Secure Group Handover Authentication Protocol in 5G Enabled Vehicular Networks,” Proc-IEEE ICC'22, South Korea, May 2022.
-
Zubair M, Ghubaish A, Unal D, Al-Ali A, Reimann T, Alinier G, Hammoudeh M, Qadir J. ," Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System", Sensors, October 2022.
-
Ruobin Gao, Ruilin Li, Minghui Hu, Ponnuthurai Nagaratnam Suganthan, Kum Fai Yuen, "Significant wave height forecasting using hybrid ensemble deep randomized networks with neurons pruning, Engineering Applications of Artificial Intelligence", November 2022.
-
Devrim Unal, Ferhat Ozgur Catak, Mohammad Talal Houkan, Mohammed Mudassir, Mohammad Hammoudeh, “Towards robust autonomous driving systems through adversarial test set generation”, ISA Transactions, November 2022,
-
Li, Ruilin, Ruobin Gao, Jian Cui, P. N. Suganthan, and Olga Sourina ,"Advanced Ensemble Deep Random Vector Functional Link for Eye-Tracking-based Situation Awareness Recognition", IEEE Symposium Series on Computational Intelligence (SSCI), 2022.
-
Ruobin Gao, P.N. Suganthan, Qin Zhou, Kum Fai Yuen, M. Tanveer,"Echo state neural network based ensemble deep learning for short-term load forecasting", IEEE SSCI, 2022.
-
Abdel-Nabi, Heba, Mostafa Ali, Mohammad Daoud, Rami Alazrai, Arafat Awajan, Robert Reynolds, and P.N. Suganthan, "An Enhanced Multi-Phase Stochastic Differential Evolution Framework for Numerical Optimization", IEEE Congress of Evolutionary Computation, 2022.
-
Hu, Minghui, Ruobin Gao, and P.N. Suganthan, "Deep Reservoir Computing Based Random Vector Functional Link for Non-sequential Classification", IEEE International Joint Conference on Neural Networks (IJCNN), 2022.
-
Ganaie, M.A., M. Tanveer, A.K. Malik, and P.N. Suganthan, "Minimum Variance Embedded Random Vector Functional Link Network with Privileged Information", IEEE International Joint Conference on Neural Networks (IJCNN), 2022.
-
Du, Liang, Ruobin Gao, Ponnuthurai Nagaratnam Suganthan, and David Z.W. Wang, "Time Series Forecasting Using Online Performance-based Ensemble Deep Random Vector Functional Link Neural Network", IEEE International Joint Conference on Neural Networks (IJCNN), 2022.
-
-
Shi, Q., and P. Suganthan, "Double Regularization-based RVFL and edRVFL Networks for Sparse-Dataset Classification", International Conference on Neural Information Processing (ICONIP), 2022, Springer.
-
Li, Ruilin, Jian Cui, Ruobin Gao, P. N. Suganthan, Olga Sourina, Lipo Wang, and Chun-Hsien Chen, "Situation Awareness Recognition Using EEG and Eye-Tracking data: a pilot study", IEEE International Conference on Cyberworlds (CW), 2022.
-
Malik, Ashwani Kumar, Mudasir Ahmad Ganaie, M Tanveer, and P.N. Suganthan, "Support vector machine based models with sparse auto-encoder based features for classification problem", International Conference on Neural Information Processing (ICONIP), 2022, Springer.
-
Hu, Minghui, Ruobin Gao, Ponnuthurai N. Suganthan, and M. Tanveer, "Automated layer-wise solution for ensemble deep randomized feed-forward neural network", Neurocomputing, 2022.
- Wu, Guohua, Ni Mao, Qizhang Luo, Binjie Xu, Jianmai Shi, and Ponnuthurai Nagaratnam Suganthan, "Collaborative Truck-Drone Routing for Contactless Parcel Delivery During the Epidemic", IEEE Transactions on Intelligent Transportation Systems, 2022.
-
Osaba, Eneko, Javier Del Ser, and Ponnuthurai N. Suganthan, "Evolutionary Multitask Optimization: Fundamental research questions, practices, and directions for the future", Swarm and Evolutionary Computation, 2022.
-
Du, Liang, Ruobin Gao, Ponnuthurai Nagaratnam Suganthan, and David Z.W. Wang, "Graph ensemble deep random vector functional link network for traffic forecasting", Applied Soft Computing, 2022.
-
Arora, Parul, Abbas Khosravi, B.K. Panigrahi, and P.N. Suganthan, "Remodelling state-space prediction with deep neural networks for probabilistic load forecasting", IEEE Transactions on Emerging Topics in Computational Intelligence, 2022.
-
Cheng, Wen Xin, Ruobin Gao, P.N. Suganthan, and Kum Fai Yuen, "EEG-based emotion recognition using random Convolutional Neural Networks", Engineering Applications of Artificial Intelligence, 2022.
- Gao, Ruobin, Liang Du, Ponnuthurai Nagaratnam Suganthan, Qin Zhou, and Kum Fai Yuen, "Random vector functional link neural network based ensemble deep learning for short-term load forecasting", Expert Systems with Applications, 2022.
-
Li, Changsong, Guojiang Xiong, Xiaofan Fu, Ali Wagdy Mohamed, Xufeng Yuan, Mohammed Azmi Al-Betar, and Ponnuthurai Nagaratnam Suganthan, "Takagi–Sugeno fuzzy based power system fault section diagnosis models via genetic learning adaptive GSK algorithm", Knowledge-Based Systems, 2022.
-
Wu, Guohua, Qizhang Luo, Xiao Du, Yingguo Chen, Ponnuthurai Nagaratnam Suganthan, and Xinwei Wang, "Ensemble of Metaheuristic and Exact Algorithm Based on the Divide-and-Conquer Framework for Multisatellite Observation Scheduling", IEEE Transactions on Aerospace and Electronic Systems, 2022.
- Gao, Ruobin, Wen Xin Cheng, P. N. Suganthan, and Kum Fai Yuen, "Inpatient discharges forecasting for Singapore hospitals by machine learning", IEEE Journal of Biomedical and Health Informatics, 2022.
-
Shi, Qiushi, Ponnuthurai Nagaratnam Suganthan, and Javier Del Ser, "Jointly optimized ensemble deep random vector functional link network for semi-supervised classification", Engineering Applications of Artificial Intelligence, 2022.
-
Li, Ruilin, Lipo Wang, P.N. Suganthan, and Olga Sourina, "Sample-Based Data Augmentation Based on Electroencephalogram Intrinsic Characteristics", IEEE Journal of Biomedical and Health Informatics, 2022.
-
Hu, M., and P. Suganthan, "Experimental evaluation of stochastic configuration networks: Is SC algorithm inferior to hyper-parameter optimization method?", Applied Soft Computing, 2022.
-
Ganaie, M.A., M. Tanveer, P.N. Suganthan, and V. Snasel, "Oblique and rotation double random forest", Neural Networks, 153, 2022.
-
Liu, Tianping, Guojiang Xiong, Ali Wagdy Mohamed, and Ponnuthurai Nagaratnam Suganthan, "Opposition-mutual learning differential evolution with hybrid mutation strategy for large-scale economic load dispatch problems with valve-point effects and multi-fuel options", Information Sciences, 2022.
-
Hu, M., and P. Suganthan, "Representation learning using deep random vector functional link networks for clustering", Pattern Recognition, 2022.
- Wu, Guohua, Xupeng Wen, Ling Wang, Witold Pedrycz, and Ponnuthurai Nagaratnam Suganthan, "A voting-mechanism-based ensemble framework for constraint handling techniques", IEEE Transactions on Evolutionary Computation, 2022.
-
Malik, Ashwani Kumar, M.A. Ganaie, M. Tanveer, and P.N. Suganthan, "Extended features based random vector functional link network for classification problem", IEEE Transactions on Computational Social Systems, 2022.
-
Luo, Qizhang, Guohua Wu, Bin Ji, Ling Wang, and Ponnuthurai Nagaratnam Suganthan, "Hybrid Multi-Objective Optimization Approach With Pareto Local Search for Collaborative Truck-Drone Routing Problems Considering Flexible Time Windows", IEEE Transactions on Intelligent Transportation Systems, 2022.
- Z. Ali, W. Mansour, T. Elsayed, A. Al-Ali, “The First Large Arabic Dataset of Naturally-Occurring Professionally-Verified Claims”, Proceedings of the Sixth Arabic Natural Language Processing Workshop, Apr. 2021.
- Z. Sheikh Ali, W. Mansour, T. Elsayed, and A. Al‐Ali, “AraFacts: The First Large Arabic Dataset of Naturally Occurring Claims,” in Proceedings of the Sixth Arabic Natural Language Processing Workshop, Kyiv, Ukraine (Virtual), Apr. 2021, pp. 231–236. Accessed: Sep. 08, 2021. [Online]. Available: https://aclanthology.org/2021.wanlp-1.26
- A. Belhi, A. Bouras, A. Al-Ali, A. Sadka, “Data Analytics for Cultural Heritage: Current Trends and Concepts”, Springer Nature, Mar. 2021.
- Alban, A. Q., Ayesh, M., Alhaddad, A. Y., Al-Ali, A., So, W. C., Connor, O., & Cabibihan, J.-J. (2021). Detection of Challenging Behaviours of Children with Autism Using Wearable Sensors during Interactions with Social Robots. 2021 30th IEEE International Conference on Robot Human Interactive Communication (RO-MAN), 852–857. https://doi.org/10.1109/RO-MAN50785.2021.9515459
- S. Al-Emadi, A. Al-Ali, and A. Al-Ali, “Audio-Based Drone Detection and Identification Using Deep Learning Techniques with Dataset Enhancement through Generative Adversarial Networks,” Sensors, vol. 21, no. 15, Art. no. 15, Jan. 2021, doi: 10.3390/s21154953.
-
Hijawi, D. Unal, R. Hamila, A. Gastli and O. Ellabban, "Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices," in IEEE Access, vol. 9, pp. 5640-5650, 2021, doi: 10.1109/ACCESS.2020.3048192.
- M. Noorizadeh, M. Shakerpour, N. Meskin, D. Unal and K. Khorasani, "A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed," in IEEE Access, vol. 9, pp. 16239-16253, 2021, doi: 10.1109/ACCESS.2021.3053135.
-
Devrim Unal, Abdulla Al-Ali, Ferhat Ozgur Catak, Mohammad Hammoudeh, A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption, Future Generation Computer Systems, Volume 125, 2021, Pages 433-445, ISSN 0167-739X, https://doi.org/10.1016/j.future.2021.06.050.
-
Devrim Unal, Mohammad Hammoudeh, Muhammad Asif Khan, Abdelrahman Abuarqoub, Gregory Epiphaniou, Ridha Hamila, Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things, Computers & Security, Volume 109, 2021, 102393, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2021.102393.
-
Zebo Yang, Ali Ghubaish, Devrim Unal, Raj Jain, "Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks", Wireless Communications and Mobile Computing, vol. 2021, Article ID 8870222, 13 pages, 2021. https://doi.org/10.1155/2021/8870222
- A. M. Nhlabatsi, K. M. Khan, J. B. Hong, D. S. D. Kim, R. Fernandez and N. Fetais, "Quantifying Satisfaction of Security Requirements of Cloud Software Systems," in IEEE Transactions on Cloud Computing, doi: 10.1109/TCC.2021.3097770.
- X. J. Li, Maode Ma, and Y. X. Yong, “A Blockchain-Based Security Scheme for Vehicular Ad Hoc Networks in Smart Cities,” Proc- IEEE TENCON 2021, New Zealand, December 2021.
- X. J. Li, Maode Ma, and C. W. Hlaing, “Improved Handshaking Procedures for Transport Layer Security in Software Defined Networks,” Proc- IEEE TENCON 2021, New Zealand, December 2021.
- H. S. Ilango, Maode Ma, and R. Su, "Low Rate DoS Attack Detection in IoT - SDN using Deep Learning," Proc- IEEE International Conference on Internet of Things 2021, iThings2021, Australia, December 2021.
- S. Bhushan and Maode Ma, “Priority-Queue based Dynamic Scaling for Efficient Resource Allocation in Fog Computing,” Proc-15th IEEE International Conference on Service Operations and Logistics, and Informatics 2021, SOLI 2021, Singapore, December 2021.
- A. Belhi, A. Bouras, A. Al-Ali, and S. Foufou, “A machine learning framework for enhancing digital experiences in cultural heritage,” Journal of Enterprise Information Management, vol. ahead-of-print, no. ahead-of-print, Jan. 2020, doi: 10.1108/JEIM-02-2020-0059.
- A. Belhi, A. Al-Ali, A. Bouras, S. Foufou, X. Yu, and H. Zhang, “Investigating low-delay deep learning-based cultural image reconstruction,” J Real-Time Image Proc, pp. 1–16, Jun. 2020, doi: 10.1007/s11554-020-00975-y.
- Basyoni, Lamiaa, et al. "Traffic Analysis Attacks on Tor: A Survey." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Mhaisen, Naram, Noora Fetais, and Ahmed Massoud. "Real-Time Scheduling for Electric Vehicles Charging/Discharging Using Reinforcement Learning." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Salahuddin, Tooba, and Uvais Qidwai. "A Cloud-based Solution for Rapid and Smart Neuropathy Detection." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Jabbar, Rateb, et al. "A Model-Based Testing Framework for Validating an IoT Solution for Blockchain-Based Vehicles Communication." (2020).
- Hammoudeh, Mohammad, et al. "A service-oriented approach for sensing in the Internet of Things: intelligent transportation systems and privacy use cases." IEEE Sensors Journal (2020).
- Jabbar, Rateb, et al. "Formal Verification and Model-Based Testing Techniques for Validating a Blockchain-Based Healthcare Records Sharing System." (2020).
- Jabbar, Rateb, et al. "Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Bhamare, Deval, et al. "Cybersecurity for industrial control systems: A survey." Computers & Security 89 (2020): 101677.
- Nhlabatsi, Armstrong, et al. "Design and Implementation of a Threat-Specific Security Risk Assessment Tool." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Hybrid Particle Swarm Optimization with Sine Cosine Algorithm and Nelder–Mead Simplex for Solving Engineering Design Problems
- Hijawi, Ula, et al. "Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Unal, Devrim, Mohammad Hammoudeh, and Mehmet Sabir Kiraz. "Policy specification and verification for blockchain and smart contracts in 5G networks." ICT Express 6.1 (2020): 43-47.
- Mhaisen, Naram, et al. "To chain or not to chain: A reinforcement learning approach for blockchain-enabled IoT monitoring applications." Future Generation Computer Systems 111 (2020): 39-51.
- Basyoni, Lamiaa, et al. "Traffic Analysis Attacks on Tor: A Survey." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Hijawi, Ula, et al. "Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Unal, Devrim, Mohammad Hammoudeh, and Mehmet Sabir Kiraz. "Policy specification and verification for blockchain and smart contracts in 5G networks." ICT Express 6.1 (2020): 43-47.
- Hijawi, Ula, et al. "Qatar Green Schools Initiative: Energy Management System with Cost-Efficient and Lightweight Networked IoT." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Barham, Reham Shawqi, Ahmad Sharieh, and Azzam Sleit. "A meta-heuristic framework based on clustering and preprocessed datasets for solving the link prediction problem." Journal of Information Science 45.6 (2019): 794-817.
- Kasit, KASIT KASIT. "An Enhanced K-means Clustering Algorithm for Multi-attributes Data." International Journal of Computer Science and Information Security (IJCSIS) 17.2 (2019).
- Fernandez, Rachael, Salma Shalaby, and Noora Fetais. "Cyber security in Banking: Challenges, Solutions and Trends."
- Zubair, Mohammed, et al. "Exploiting bluetooth vulnerabilities in e-health IoT devices." Proceedings of the 3rd International Conference on Future Networks and Distributed Systems. 2019.
- Alsawalqah, Hamad, et al. "Factors Impacting on CMMI Acceptance Among Software Development Firms: A Qualitative Assessment." Modern Applied Science 13.3 (2019).
- Eshtay, Mohammed, Azzam Sleit, and Monther Aldwairi. "Implementing bi-temporal properties into various NoSQL database categories." International Journal of Computing 18.1 (2019): 45-52.
- Al-Nsour, Esam, Azzam Sleit, and Mohammad Alshraideh. "SOLD: A node-Splitting algorithm for R-tree based on Objects’ Locations Distribution." Journal of Information Science 45.2 (2019): 169-195.
- Salem, Asma, et al. "Enhanced Authentication System Performance Based on Keystroke Dynamics using Classification algorithms." KSII Transactions on Internet & Information Systems 13.8 (2019).
- Yadegar, Meysam, Nader Meskin, and Wassim M. Haddad. "An output‐feedback adaptive control architecture for mitigating actuator attacks in cyber‐physical systems." International Journal of Adaptive Control and Signal Processing 33.6 (2019): 943-955.
- Baniamerian, Amir, Khashayar Khorasani, and Nader Meskin. "Determination of Security Index for Linear Cyber-Physical Systems Subject to Malicious Cyber Attacks." 2019 IEEE 58th Conference on Decision and Control (CDC). IEEE, 2019.
- Basyoni, Lamiaa, et al. "Empirical performance evaluation of QUIC protocol for Tor anonymity network." 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC). IEEE, 2019.
- Barham, Reham, Ahmad Sharieh, and Azzam Sleit. "Multi-moth flame optimization for solving the link prediction problem in complex networks." Evolutionary Intelligence .4 (2019): 563-591.
- Hong, Jin B., et al. "Systematic identification of threats in the cloud: A survey." Computer Networks 150 (2019): 46-69.
- Nhlabatsi, Armstrong, et al. "Threatriskevaluator: A tool for assessing threat-specific security risks in the cloud." 2019 International Conference on Cyber Security for Emerging Technologies (CSET). IEEE, 2019.
- Mahmood, Arif, and Somaya Al-Maadeed. "Action Recognition in Poor Quality Spectator Crowd Videos."
- Fetais, Noora, and Rachael Fernandez. "Framework for Visualizing Browsing Patterns Captured in Computer Logs." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3. Vol. 2018. No. 3. Hamad bin Khalifa University Press (HBKU Press), 2018.
- Shalaby, Salma Tarek, Engy Khaled Soliman, and Noora Fetais. "Visualization of Electricity Consumption in Qatar." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3. Vol. 2018. No. 3. Hamad bin Khalifa University Press (HBKU Press), 2018.
- Al-Hathal, Turkea, and Noora Fetais. "Virtual reality glove for falconry." 2018 International Conference on Computer and Applications (ICCA). IEEE, 2018.
- Fetais, Noora, et al. "Virtual Reality Game for Falconry." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3. Vol. 2018. No. 3. Hamad bin Khalifa University Press (HBKU Press), 2018.
- Kharbach, Sarah, et al. "Virtual Reality Falconry: Simulation of a Traditional Qatari Sport Methodology and Techniques." 2018 International Conference on Computer and Applications (ICCA). IEEE, 2018.
- Al-Thani, Haya, et al. "Unsupervised Technique for Anomaly Detection in Qatar Stock Market." 2018 International Conference on Computer and Applications (ICCA). IEEE, 2018.
- Nhlabatsi, Armstrong Mazinyane, et al. "Threat-specific security risk evaluation in the cloud." IEEE Transactions on Cloud Computing (2018).
- Nhlabatsi, Armstrong, et al. "ThreatBased Security Risk Evaluation in the Cloud." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3. Vol. 2018. No. 3. Hamad bin Khalifa University Press (HBKU Press), 2018.
- Moataz, Tarik, et al. "Substring search over encrypted data." Journal of Computer Security 26.1 (2018): 1-30.
- Amin, Hafsa, et al. "SLiFi: Exploiting Visible Light Communication VLC to Authenticate WiFi Access Points." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3. Vol. 2018. No. 3. Hamad bin Khalifa University Press (HBKU Press), 2018.
- Barham, Reham, Ahmad Sharieh, and Azzam Sleit. "Moth flame optimization based on golden section search and its application for link prediction problem." Mod Appl Sci 13.1 (2018): 10-27.
- Senturk, Izzet F., et al. "A resource provisioning framework for bioinformatics applications in multi-cloud environments." Future Generation Computer Systems 78 (2018): 379-391.
- Abdelbarr, Mohamed, et al. "3D dynamic displacement-field measurement for structural health monitoring using inexpensive RGB-D based sensor." Smart materials and structures 26.12 (2017): 125016.
- Kamran, Saadat, et al. "Abstract TP62: To Determine the Evolution of Stroke Volume Overtime Using ANFIS." Stroke 48.suppl_1 (2017): ATP62-ATP62.
- Soliman, Engy, Salma Shalaby, and Noora Fetais. "An Interactive Visualization Web Solution for Electricity Consumption in Qatar." 2017 International Conference on Computer and Applications (ICCA). IEEE, 2017.
- Jiang, Richard, et al. Biometric Security and Privacy. Springer International Publishing AG, 2017.
- Punekar, Mayur, et al. "Candidate MDS Array Codes for Tolerating Three Disk Failures in RAID-7 Architectures." Proceedings of the Fourth IEEE/ACM International Conference on Big Data Computing, Applications and Technologies. 2017.
- Gupta, Lav, et al. "COLAP: A predictive framework for service function chain placement in a multi-cloud environment." 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2017.
- Djelouat, Hamza, et al. "Compressive sensing based electronic nose platform." Digital Signal Processing 60 (2017): 350-359.
- Qidwai, Uvais, and Muhammad Ali Akbar. "Coordinated robotic system for civil structural health monitoring." MATEC Web of Conferences. Vol. 120. EDP Sciences, 2017.
- Khan, Khaled M., Mahboob Shaheen, and Yongge Wang. "Data confidentiality in cloud-based pervasive system." Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing. 2017.
- Chaudhry, Junaid, et al. "Data security among ISO/IEEE 11073 compliant personal healthcare devices through statistical fingerprinting." Institute of Electrical and Electronics Engineers, 2017.
- Hong, Jin Bum, and Dong Seong Kim. "Discovering and mitigating new attack paths using graphical security models." 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, 2017.
- Zhai, Xiaojun, et al. "ECG encryption and identification based security solution on the Zynq SoC for connected health systems." Journal of Parallel and Distributed Computing 106 (2017): 143-152.
- Di Pietro, Roberto, and Gabriele Oligeri. "Enabling broadcast communications in presence of jamming via probabilistic pairing." Computer Networks 116 (2017): 33-46.
- Ali, Amine Ait Si, et al. "Enhanced Biometric Security and Privacy Using ECG on the Zynq SoC." Biometric Security and Privacy. Springer, Cham, 2017. 179-202.
- Yusuf, Simon Enoch, et al. "Evaluating the effectiveness of security metrics for dynamic networks." 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017.
- Gupta, Lav, et al. "Fault and performance management in multi-cloud based NFV using shallow and deep predictive structures." Journal of Reliable Intelligent Environments 3.4 (2017): 221-231.
- Awan, Ruqayya, et al. "Glandular morphometrics for objective grading of colorectal adenocarcinoma histology images." Scientific Reports 7.1 (2017): 1-12.
- Elwell, Jesse, et al. "Hardening extended memory access control schemes with self-verified address spaces." 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 2017.
- Nita, G. M., et al. "Higher order statistical frequency domain decomposition for operational modal analysis." Mechanical Systems and Signal Processing 84 (2017): 100-112.
- Khan, Khaled M., and Armstrong Nhlabatsi. "Identifying Common Behavioural Traits of Lone-Wolves in Recent Terrorist Attacks in Europe." International Journal of Humanities and Social Sciences 11.7 (2017): 1821-1824.
- Abdaoui, Abderrazak, Tarek M. El Fouly, and Mohamed H. Ahmed. "Impact of time synchronization error on the mode-shape identification and damage detection/localization in WSNs for structural health monitoring." Journal of Network and Computer Applications 83 (2017): 181-189.
- Khan, Khaled M., and Zhuhan Jiang. "Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service." 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 2017.
- Mansourkiaie, Fatemeh, et al. "Maximizing lifetime in wireless sensor network for structural health monitoring with and without energy harvesting." IEEE Access 5 (2017): 2383-2395.
- Bhamare, Deval, et al. "Multi-objective scheduling of micro-services for optimal service function chains." 2017 IEEE international conference on communications (ICC). IEEE, 2017.
- Farhat, Ali AH, et al. "OCR-based hardware implementation for Qatari number plate on the Zynq SoC." 2017 9th IEEE-GCC Conference and Exhibition (GCCCE). IEEE, 2017.
- Zhang, Peng, and Mikhail J. Atallah. "On approximate pattern matching with thresholds." Information Processing Letters 123 (2017): 21-26.
- Bhamare, Deval, et al. "Optimal virtual network function placement in multi-cloud service function chaining architecture." Computer Communications 102 (2017): 1-16.
- Bahig, Hazem M., Mostafa M. Abbas, and M. M. Mohie-Eldin. "Parallelizing partial digest problem on multicore system." International Conference on Bioinformatics and Biomedical Engineering. Springer, Cham, 2017.
- Kamran, Saadat, et al. "Prediction of infarction volume and infarction growth rate in acute ischemic stroke." Scientific reports 7.1 (2017): 1-8.
- Wang, Yongge, and Qutaibah M. Malluhi. "Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project." IACR Cryptol. ePrint Arch. 2017 (2017): 1258.
- Jahanshahi, Mohammad R., et al. "Reconfigurable swarm robots for structural health monitoring: a brief review." International Journal of Intelligent Robotics and Applications 1.3 (2017): 287-305.
- Hu, Jinwei, et al. "Role updating in information systems using model checking." Knowledge and Information Systems 51.1 (2017): 187-234.
- Wang, Shumiao, et al. "Secure collaboration in engineering systems design." Journal of Computing and Information Science in Engineering 17.4 (2017).
- Nassar, Mohamed, et al. "Securing aggregate queries for dna databases." IEEE Transactions on Cloud Computing (2017).
- Fernandez, Rachael, and Noora Fetais. "Short survey of techniques for visualizing events recorded in logs." 2017 9th IEEE-GCC Conference and Exhibition (GCCCE). IEEE, 2017.
- Noel, Adam B., et al. "Structural health monitoring using wireless sensor networks: A comprehensive survey." IEEE Communications Surveys & Tutorials 19.3 (2017): 1403-1423.
- Fernandez, Rachael, and Noora Fetais. "Survey of information visualization techniques for enhancing visual analysis." 2017 International Conference on Computer and Applications (ICCA). IEEE, 2017.
- Bao, Bin, et al. "Treating triple negative breast cancer cells with erlotinib plus a select antioxidant overcomes drug resistance by targeting cancer cell heterogeneity." Scientific Reports 7 (2017): 44125.
- Soliman, Engy, and Noora Fetais. "Visualization as a mean of big data management: Using Qatar's electricity consumption data." 2017 9th IEEE-GCC Conference and Exhibition (GCCCE). IEEE, 2017.
- Elsayed, Mohamed, et al. "Walsh transform with moving average filtering for data compression in wireless sensor networks." 2017 IEEE 13th International Colloquium on Signal Processing & its Applications (CSPA). IEEE, 2017.
- Dehghan, Afshin, and Mubarak Shah. "Binary quadratic programing for online tracking of hundreds of people in extremely crowded scenes." IEEE transactions on pattern analysis and machine intelligence 40.3 (2017): 568-581.
- Qidwai, Uvais, et al. "Intelligent integrated instrumentation platform for monitoring long-term bedridden patients." 2016 IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES). IEEE, 2016.
- Rihan, Rana Adnan, and Khaled M. Khan. "Using Block Cipher for Confidentiality of Images in Cloud-Based Systems." 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW). IEEE, 2016.
- Al Marri, Wadha J., et al. "The similarity-aware relational database set operators." Information Systems 59 (2016): 79-93.
- Rachid, Maan Haj, and Qutaibah Malluhi. "Solving All-Pairs Suffix Prefix–Theory and Practice." Qatar Foundation Annual Research Conference Proceedings Volume 2016 Issue 1. Vol. 2016. No. 1. Hamad bin Khalifa University Press (HBKU Press), 2016.
- Yusuf, Simon Enoch, et al. "Security modeling and analysis of dynamic enterprise networks." 2016 IEEE International Conference on Computer and Information Technology (CIT). IEEE, 2016.
- Raza, Shan E. Ahmed, et al. "Robust normalization protocols for multiplexed fluorescence bioimage analysis." BioData mining 9.1 (2016): 11.
- Asuncion, Vernon, et al. "Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming." International Journal of Cooperative Information Systems 25.01 (2016): 1650003.
- Aliakbar, Muhammad, et al. "Progressive image stitching algorithm for vision based automated inspection." 2016 International Conference on Machine Learning and Cybernetics (ICMLC). Vol. 1. IEEE, 2016.
- Wang, Yongge, and Qutaibah M. Malluhi. "Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes." European Symposium on Research in Computer Security. Springer, Cham, 2016.
- Elsersy, Mohamed, et al. "Performance evaluation of experimental damage detection in structure health monitoring using acceleration." 2016 International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, 2016.
- Malik, Saif Ur Rehman, et al. "Performance analysis of data intensive cloud systems based on data management and replication: a survey." Distributed and Parallel Databases 34.2 (2016): 179-215.
- Badawy, Ahmed, et al. "On the performance of spectrum sensing based on GLR for full-duplex cognitive radio networks." 2016 IEEE Wireless Communications and Networking Conference. IEEE, 2016.
- Qidwai, Uvais, et al. "Monitoring DVT cuffs for long-term operation: A fuzzy approach." 2016 IEEE 12th International Colloquium on Signal Processing & Its Applications (CSPA). IEEE, 2016.
- Zhai, Xiaojun, et al. "MLP neural network-based gas classification system on Zynq SoC." IEEE Access 4 (2016): 8138-8146.
- 15. Sirinukunwattana, Korsuk, et al. "Locality sensitive deep learning for detection and classification of nuclei in routine colon cancer histology images." IEEE transactions on medical imaging 35.5 (2016): 1196-1206.
- Elsersy, Mohamed, Tarek Mohamed Elfouly, and Mohamed Hossam Ahmed. "Joint optimal placement, routing, and flow assignment in wireless sensor networks for structural health monitoring." IEEE Sensors Journal 16.12 (2016): 5095-5106.
- 17. Gutierrez, Christopher N., et al. "Inhibiting and detecting offline password cracking using ErsatzPasswords." ACM Transactions on Privacy and Security (TOPS) 19.3 (2016): 1-30.
- Abdaoui, Abderrazak, Mohamed H. Ahmed, and Tarek M. El Fouly. "Impact of time synchronization error on the mode-shape calculation in wireless sensor networks for structural health monitoring." 2016 IEEE Wireless Communications and Networking Conference. IEEE, 2016.
- Akbar, Muhammad Ali. "Image Stitching System With Scanning Microscopy for Histopathological Applications." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 2. Vol. 2018. No. 2. Hamad bin Khalifa University Press (HBKU Press), 2018.
- Tahir, Anas, and Uvais Qidwai. "Humanoid Robots for children with Autism: Experiences with Robosapien and NAO."
- Awan, Ruqayya, et al. "How divided is a cell? Eigenphase nuclei for classification of mitotic phase in cancer histology images." 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI). IEEE, 2016.
- Wang, Yongge, Qutaibah M. Malluhi, and Khaled MD Khan. "Garbled computation in cloud." Future Generation Computer Systems 62 (2016): 54-65.
- Bhamare, Deval, et al. "Feasibility of supervised machine learning for cloud security." 2016 International Conference on Information Science and Security (ICISS). IEEE, 2016.
- El-Manzalawy, Yasser, et al. "FastRNABindR: Fast and accurate prediction of protein-RNA interface residues." PloS one 11.7 (2016): e0158445.
- Gupta, Lav, Raj Jain, and Mohammed Samaka. "Analysis of an application delivery platform for software defined infrastructures." International Journal of Communication Networks and Distributed Systems 17.3 (2016): 296-314.