Skip Ribbon Commands
Skip to main content
Sign In

    Publications

    1. H. Aly, E. Altamimi, A. Al-Ali, A. Al-Ali, and Q. Malluhi, "Battery-Induced Load Hiding and Its Utility Consequences," 4th International Conference on Smart Grid and Renewable Energy, SGRE 2024 - Proceedings, IEEE, 2024.
    2. H. Mousa, M. R. Rozaimi, and S. M. Zughaier, "Vitamin D status affects proteomic profile of HDL-associated proteins and inflammatory mediators in dyslipidemia," The Journal of Nutritional Biochemistry, Elsevier Ltd, 2024.
    3. N. Li, M. Ma, and H. Wang, "ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things," Sensors, MDPI, 2024.
    4. R. AlSaad, Q. Malluhi, A. Abd-alrazaq, and S. Boughorbel, "Temporal self-attention for risk prediction from electronic health records using non-stationary kernel approximation," Artificial Intelligence in Medicine, Elsevier Ltd, 2024.
    5. W. Yu, R. Zhang, M. Ma, and C. Wang, "A Noval and Efficient Three-Party Identity Authentication and Key Negotiation Protocol Based on Elliptic Curve Cryptography in VANETs," Electronics, MDPI, 2024.
    6. E. Zaidan, A. Abulibdeh, R. Jabbar, N. C. Onat, and M. Kucukvar, "Evaluating the impact of the COVID-19 pandemic on the geospatial distribution of buildings' carbon footprints associated with electricity consumption," Energy Strategy Reviews, Elsevier Ltd, 2024.
    7. J. Zhou, Y. Zhang, J. Wang, and P. N. Suganthan, "Localized Constrained-Domination Principle for Constrained Multiobjective Optimization," IEEE Transactions on Systems, Man, and Cybernetics: Systems, IEEE, 2024.
    8. Y. Ren, K. Gao, Y. Fu, D. Li, and P. N. Suganthan, "Ensemble artificial bee colony algorithm with Q-learning for scheduling Bi-objective disassembly line," Applied Soft Computing, Elsevier Ltd, 2024.
    9. Y. Song, J. Ou, W. Pedrycz, P. N. Suganthan, X. Wang, L. Xing, and Y. Zhang, "Generalized Model and Deep Reinforcement Learning-Based Evolutionary Method for Multitype Satellite Observation Scheduling," IEEE Transactions on Systems, Man, and Cybernetics: Systems, IEEE, 2024.
    10. M. Sajid, A. K. Malik, M. Tanveer, and P. N. Suganthan, "Neuro-Fuzzy Random Vector Functional Link Neural Network for Classification and Regression Problems," IEEE Transactions on Fuzzy Systems, IEEE, 2024.
    11. R. Pilli, T. Goel, R. Murugan, M. Tanveer, and P. N. Suganthan, "Kernel Ridge Regression-based Randomized Network for Brain Age Classification and Estimation," IEEE Transactions on Cognitive and Developmental Systems, IEEE, 2024.
    12. A. G. Gad, E. H. Houssein, M. Zhou, P. N. Suganthan, and Y. M. Wazery, "Damping-Assisted Evolutionary Swarm Intelligence for Industrial IoT Task Scheduling in Cloud Computing," IEEE Internet of Things Journal, IEEE, 2024.
    13. S. Sun, G. Xiong, and P. N. Suganthan, "Orthogonal Experimental Design Based Binary Optimization Without Iteration for Fault Section Diagnosis of Power Systems," IEEE Transactions on Industrial Informatics, IEEE Computer Society, 2024.
    14. H. Yu, K. Gao, N. Wu, M. Zhou, P. N. Suganthan, and S. Wang, "Scheduling Multiobjective Dynamic Surgery Problems via $Q$-Learning-Based Meta-Heuristics," IEEE Transactions on Systems, Man, and Cybernetics: Systems, IEEE, 2024.
    15. J. Liang, Y. Zhang, K. Chen, B. Qu, K. Yu, C. Yue, and P. N. Suganthan, "An evolutionary multiobjective method based on dominance and decomposition for feature selection in classification," Science China Information Sciences, Science China Press, 2024.
    16. V. Snášel, M. Štěpnička, V. Ojha, P. N. Suganthan, R. Gao, and L. Kong, "Large-scale data classification based on the integrated fusion of fuzzy learning and graph neural network," Information Fusion, Elsevier B.V., 2024.
    17. K. Qiao, J. Liang, K. Yu, W. Guo, C. Yue, B. Qu, and P. N. Suganthan, "Benchmark problems for large-scale constrained multi-objective optimization with baseline results," Swarm and Evolutionary Computation, Elsevier B.V., 2024.
    1. A. Q. Alban, A. Y. Alhaddad, A. Al-Ali, W.-C. So, O. Connor, M. Ayesh, U. Ahmed Qidwai, and J.-J. Cabibihan, "Heart Rate as a Predictor of Challenging Behaviours among Children with Autism from Wearable Sensors in Social Robot Interactions," Robotics, MDPI, 2023.
    2. R. Gao, R. Li, M. Hu, P. N. Suganthan, and K. F. Yuen, "Online dynamic ensemble deep random vector functional link neural network for forecasting," Neural Networks, Elsevier Ltd, 2023.
    3. T. M. Elkaffash and A. M. Nhlabatsi, "Data-Leashing: Towards a Characterization of The Problem and Its Solution," Proceedings - 2023 10th International Conference on Dependable Systems and Their Applications, DSA 2023, IEEE, 2023.
    4. L.L. Dai, Q.-K. Pan, Z.-H. Miao, P. N. Suganthan, and K.-Z. Gao, "Multi-Objective Multi-Picking-Robot Task Allocation: Mathematical Model and Discrete Artificial Bee Colony Algorithm," IEEE Transactions on Intelligent Transportation Systems, IEEE, 2023.
    5. Z. Lin, K. Gao, N. Wu, and P. N. Suganthan, "Scheduling Eight-Phase Urban Traffic Light Problems via Ensemble Meta-Heuristics and Q-Learning Based Local Search," IEEE Transactions on Intelligent Transportation Systems, IEEE, 2023.
    6. H. Habbak, M. Mahmoud, K. Metwally, M. M. Fouda, and M. I. Ibrahem, "Load Forecasting Techniques and Their Applications in Smart Grids," Energies, MDPI, 2023.
    7. M. Z. Ali, H. Abdel-Nabi, R. Alazrai, B. AlHijawi, M. G. AlWadi, A. F. Al-Badarneh, P. N. Suganthan, M. I. Daoud, and R. G. Reynolds, "A cultural evolution with a modified selection function and adaptive α-cognition procedure for numerical optimization," Applied Soft Computing, Elsevier Ltd, 2023.
    8. Z. S. Ali, W. Mansour, F. Haouari, M. Hasanain, T. Elsayed, and A. Al-Ali, "Tahaqqaq: A Real-Time System for Assisting Twitter Users in Arabic Claim Verification," SIGIR 2023 - Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, Association for Computing Machinery, Inc, 2023.
    9. M. M. Badr, M. M. E. A. Mahmoud, M. Abdulaal, A. J. Aljohani, F. Alsolami, and A. Balamsh, "A Novel Evasion Attack Against Global Electricity Theft Detectors and a Countermeasure," IEEE Internet of Things Journal, IEEE, 2023.
    10. E. Altamimi, A. Al-Ali, Q. M. Malluhi, and A. K. Al-Ali, "Energy Theft Detection Using the Wasserstein Distance on Residuals," 2023 IEEE Texas Power and Energy Conference, TPEC 2023, IEEE, 2023.
    11. A. K. Malik, R. Gao, M. A. Ganaie, M. Tanveer, and P. N. Suganthan, "Random vector functional link network: Recent developments, applications, and future directions," Applied Soft Computing, Elsevier Ltd, 2023.
    12. J. Zhou, Y. Zhang, and P. N. Suganthan, "Dual population approximate constrained Pareto front for constrained multiobjective optimization," Information Sciences, Elsevier Inc., 2023.
    13. R. Li, R. Gao, and P. N. Suganthan, "A decomposition-based hybrid ensemble CNN framework for driver fatigue recognition," Information Sciences, Elsevier Inc., 2023.
    14. Z. Qiao, M. Hu, X. Jiang, P. N. Suganthan, and R. Savitha, "Class-Incremental Learning on Multivariate Time Series Via Shape-Aligned Temporal Distillation," ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, IEEE, 2023.
    15. D. Unal, F. O. Catak, M. T. Houkan, M. Mudassir, and M. Hammoudeh, "Towards robust autonomous driving systems through adversarial test set generation," ISA Transactions, ISA - Instrumentation, Systems, and Automation Society, 2023.
    16. M. Hu, R. Gao, and P. N. Suganthan, "Self-Distillation for Randomized Neural Networks," IEEE Transactions on Neural Networks and Learning Systems, IEEE, 2023.
    17. Q. Shi and P. N. Suganthan, "Double Regularization-Based RVFL and edRVFL Networks for Sparse-Dataset Classification," Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Science and Business Media Deutschland GmbH, 2023.
    18. M. Hu, J. Herng Chion, P. N. Suganthan, and R. K. Katuwal, "Ensemble Deep Random Vector Functional Link Neural Network for Regression," IEEE Transactions on Systems, Man, and Cybernetics: Systems, IEEE, 2023.
    19. A. Al-Mousa, A. A. Tarifi, A. Shtaya, and I. M. Ghanem, "Transglabellar resection of frontal sinus cholesterol granuloma extending cranially through cecum foramina: Technical note," Surgical Neurology International, Scientific Scholar, 2023.
    20. A. Song, G. Wu, P. N. Suganthan, and W. Pedrycz, "Automatic Variable Reduction," IEEE Transactions on Evolutionary Computation, IEEE, 2023.
    21. H. H. Alasaad, D. Diri, and F. Hwaij, "Case report: Hydatid cyst of bone in the distal femur with untypical presentation treated surgically," International Journal of Surgery Case Reports, Elsevier Ltd, 2023.
    22. T. M. Khan, M. Arsalan, S. Iqbal, I. Razzak, and E. Meijering, "Feature Enhancer Segmentation Network (FES-Net)for Vessel Segmentation," 2023 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2023, IEEE, 2023.
    23. H. Abdel-Nabi, M. Ali, A. Awajan, M. Daoud, R. Alazrai, P. N. Suganthan, and T. Ali, "A comprehensive review of the deep learning-based tumor analysis approaches in histopathological images: segmentation, classification and multi-learning tasks," Cluster Computing, Springer, 2023.
    24. R. Gao, R. Li, M. Hu, P. N. Suganthan, and K. F. Yuen, "Significant wave height forecasting using hybrid ensemble deep randomized networks with neurons pruning," Engineering Applications of Artificial Intelligence, Elsevier Ltd, 2023.
    25. R. Sharma, T. Goel, M. Tanveer, P. N. Suganthan, I. Razzak, and R. Murugan, "Conv-eRVFL: Convolutional Neural Network Based Ensemble RVFL Classifier for Alzheimer's Disease Diagnosis," IEEE Journal of Biomedical and Health Informatics, IEEE, 2023.
    26. R. Gao, R. Li, M. Hu, P. N. Suganthan, and K. F. Yuen, "Dynamic ensemble deep echo state network for significant wave height forecasting," Applied Energy, Elsevier Ltd, 2023.
    27. P. Arora, S. M. J. Jalali, S. Ahmadian, B. K. Panigrahi, P. N. Suganthan, and A. Khosravi, "Probabilistic Wind Power Forecasting Using Optimized Deep Auto-Regressive Recurrent Neural Networks," IEEE Transactions on Industrial Informatics, IEEE Computer Society, 2023.
    28. Y. Song, P. N. Suganthan, W. Pedrycz, J. Ou, Y. He, Y. Chen, and Y. Wu, "Ensemble reinforcement learning: A survey," Applied Soft Computing, Elsevier Ltd, 2023.
    29. B. Ahadzadeh, M. Abdar, F. Safara, A. Khosravi, M. B. Menhaj, and P. N. Suganthan, "SFE: A Simple, Fast, and Efficient Feature Selection Algorithm for High-Dimensional Data," IEEE Transactions on Evolutionary Computation, IEEE, 2023.
    30. L. Wang, K. Gao, Z. Lin, W. Huang, and P. N. Suganthan, "Problem feature based meta-heuristics with Q-learning for solving urban traffic light scheduling problems," Applied Soft Computing, Elsevier Ltd, 2023.
    31. M. Tanveer, S. Verma, R. Sharma, T. Goel, and P. N. Suganthan, "Weighted Kernel Ridge Regression based Randomized Network for Alzheimer's Disease Diagnosis using Susceptibility Weighted Images," Proceedings of the International Joint Conference on Neural Networks, IEEE, 2023.
    32. A. Nhlabatsi, K. M. Khan, J. B. Hong, D. S. Kim, R. Fernandez, and N. Fetais, "Quantifying Satisfaction of Security Requirements of Cloud Software Systems," IEEE Transactions on Cloud Computing, IEEE, 2023.
    33. N. F. Kamal, A. K. Al-Ali, A. Al-Ali, S. Bayhan, and Q. M. Malluhi, "LPPDA: A Light-Weight Privacy-Preserving Data Aggregation Protocol for Smart Grids," IEEE Access, IEEE, 2023.
    34. N. C. Onat, J. Mandouri, M. Kucukvar, B. Sen, S. A. Abbasi, W. Alhajyaseen, A. A. Kutty, R. Jabbar, M. Contestabile, and A. M. Hamouda, "Rebound effects undermine carbon footprint reduction potential of autonomous electric vehicles," Nature Communications, Nature Research, 2023.
    35. R. Li, R. Gao, L. Yuan, P. N. Suganthan, L. Wang, and O. Sourina, "An enhanced ensemble deep random vector functional link network for driver fatigue recognition," Engineering Applications of Artificial Intelligence, Elsevier Ltd, 2023.
    36. S. Shiva, M. Hu, and P. N. Suganthan, "Online learning using deep random vector functional link network," Engineering Applications of Artificial Intelligence, Elsevier Ltd, 2023.
    37. M. M. Badr, M. M. E. A. Mahmoud, Y. Fang, M. Abdulaal, A. J. Aljohani, W. Alasmary, and M. I. Ibrahem, "Privacy-Preserving and Communication-Efficient Energy Prediction Scheme Based on Federated Learning for Smart Grids," IEEE Internet of Things Journal, IEEE, 2023.
    38. R. Li, R. Gao, P. N. Suganthan, J. Cui, O. Sourina, and L. Wang, "A spectral-ensemble deep random vector functional link network for passive brain–computer interface," Expert Systems with Applications, Elsevier Ltd, 2023.
    39. M. Maayah, A. Al-Ali, and A. Belhi, "Using Context Specific Generative Adversarial Networks for Audio Data Completion," 2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, JEEIT 2023, IEEE, 2023.
    40. V. Haripriya, S. Mahalaxmi, S. Vidhya, and P. V. Purushothaman, "Antibacterial efficacy of curcumin, allicin, gingerol and cinnamon against Enterococcus faecalis: An in vitro study," Journal of HerbMed Pharmacology, Shahrekord University of Medical Sciences, 2023.
    41. C. Wang, P. Hou, M. Ma, T. Zhou, and Y. Zhang, "A Provable Secure and Lightweight ECC-based Authenticated Key Agreement Scheme for Edge Computing Infrastructure in Smart Grid," Computing, Springer, 2023.
    42. X.-S. Vu, M. Ma, and M. Bhuyan, "MetaVSID: A Robust Meta-Reinforced Learning Approach for VSI-DDoS Detection on the Edge," IEEE Transactions on Network and Service Management, IEEE, 2023.
    43. X. J. Li, M. Ma, and Y. Sun, "Adaptive Deep Learning Neural Networks for Intrusion Detection in Smart Grids," Algorithms, Elsevier Ltd, 2023.
    44. R. Zhu, A. Anjum, H. Li, and M. Ma, "Edge Intelligence-enabled Cyber-physical Systems," Concurrency and Computation-Practice & Experience, Elsevier Ltd, 2023.
    45. C. Wang, X. Li, M. Ma, T. Zhou, G. Xu, N. Xiong, and Y. Zhang, "PSAK: A Provably Secure Authenticated Key Agreement Scheme Based on Extended Chebyshev Chaotic Maps for Smart Grid Environments," Transactions on Emerging Telecommunications Technologies, IEEE, 2023.
    46. X. Yan, M. Ma, and R. Su, "Efficient Group Handover Authentication for Secure 5G-based Communications in Platoons," IEEE Transactions on Intelligent Transportation Systems, IEEE, 2023.
    47. B. Li and M. Ma, "An Advanced Hierarchical Identity-based Security Mechanism by Blockchain in Named Data Networking," Journal of Network and Systems Management, Elsevier Ltd, 2023.
    48. Y. Huang and M. Ma, "ILL-IDS: An Incremental Lifetime Learning IDS for VANETs," Computers & Security, Elsevier Ltd, 2023.
    49. D. R. Junaidi, M. Ma, and R. Su, "An Efficient Multi-Blockchain Approach towards Secure Platoon Management," Proc-IEEE 17th International Conference on Service Operations and Logistics, and Informatics 2023, SOLI2023, IEEE, 2023.
    50. L. Huang, R. Su, M. Ma, Y. Lu, B. Wang, and Z. Hu, "Preserving Data-Privacy Cooperative Control of Discrete-Time Multi-Agent Systems," Proc-IEEE 62nd Conference on Decision and Control 2023, CDC2023, IEEE, 2023.
    51. Y. Zhang, X. Guo, and M. Ma, "ADMBIFA: Accurate Detection and Mitigation of Blended Interest Flooding Attacks in NDN Networks," Proc-IEEE 24th International Conference on High-Performance and Routing 2023, HPSR2023, IEEE, 2023.
    52. J. Liang, M. Ma, and G. Yang, "Efficient-Lightweight CRL Distribution in VANETs: A Multilayer Coded Caching Methodology," Proc-IEEE Wireless Communication and Networking Conference 2023, WCNC2023, IEEE, 2023.
    53. R. Zhu, M. Li, H. Liu, L. Liu, and M. Ma, "Federated Deep Reinforcement Learning-based Spectrum Access Algorithm with Warranty Contract in Intelligent Transportation Systems," IEEE Transaction on Intelligent Transportation Systems, IEEE, 2023.
    54. H. Gad, E. Elgassim, I. Mohammed, A. Y. Alhaddad, H. A. H. Z. Aly, J.-J. Cabibihan, A. Al-Ali, K. K. Sadasivuni, I. N. Petropoulos, G. Ponirakis, W. Abuhelaiqa, A. Jayyousi, D. AlMohanadi, K. Baagar, and R. A. Malik, "Cardiovascular autonomic neuropathy is associated with increased glycemic variability driven by hyperglycemia rather than hypoglycemia in patients with diabetes," Diabetes Research and Clinical Practice, Elsevier Ireland Ltd, 2023.
    55. T. Goel, R. Sharma, M. Tanveer, P. N. Suganthan, K. Maji, and R. Pilli, "Multimodal Neuroimaging based Alzheimer's Disease Diagnosis using Evolutionary RVFL Classifier," IEEE Journal of Biomedical and Health Informatics, IEEE, 2023.
    56. R. Gao, S. Yang, M. Yuan, X. Song, P. N. Suganthan, and W. T. Ang, "Online ensemble deep random vector functional link for the assistive robots," Proceedings of the International Joint Conference on Neural Networks, IEEE, 2023.
    57. W. Mansour, T. Elsayed, and A. Al-Ali, "This is not new! Spotting previously-verified claims over Twitter," Information Processing and Management, Elsevier Ltd, 2023.
    58. W. X. Cheng and P. N. Suganthan, "Adaptive Scaling for U-Net in Time Series Classification," Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Science and Business Media Deutschland GmbH, 2023.
    59. Z. Ma, G. Wu, P. N. Suganthan, A. Song, and Q. Luo, "Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms," Swarm and Evolutionary Computation, Elsevier B.V., 2023.
    60. A. Sarabakha, Z. Qiao, S. Ramasamy, and P. N. Suganthan, "Online Continual Learning for Control of Mobile Robots," Proceedings of the International Joint Conference on Neural Networks, IEEE, 2023.
    61. X. He, Q.-K. Pan, L. Gao, L. Wang, and P. N. Suganthan, "A Greedy Cooperative Co-Evolutionary Algorithm With Problem-Specific Knowledge for Multiobjective Flowshop Group Scheduling Problems," IEEE Transactions on Evolutionary Computation, IEEE, 2023.
    62. H. Abdel-Nabi, M. Z. Ali, A. Awajan, R. Alazrai, M. I. Daoud, and P. N. Suganthan, "An iterative cyclic tri-strategy hybrid stochastic fractal with adaptive differential algorithm for global numerical optimization," Information Sciences, Elsevier Inc., 2023.
    63. H. Abdel-Nabi, M. Z. Ali, A. Awajan, R. Alazrai, M. I. Daoud, P. N. Suganthan, and R. Reynolds, "3-sCHSL: Three-Stage Cyclic Hybrid SFS and L-SHADE Algorithm for Single Objective Optimization," 2023 IEEE Congress on Evolutionary Computation, CEC 2023, IEEE, 2023.
    64. K. V. Price, A. Kumar, and P. N. Suganthan, "Trial-based dominance for comparing both the speed and accuracy of stochastic optimizers with standard non-parametric tests," Swarm and Evolutionary Computation, Elsevier B.V., 2023.
    65. Y. He, X. Ye, L. Cui, P. Fournier-Viger, C. Luo, J. Z. Huang, and P. N. Suganthan, "Wireless Network Slice Assignment With Incremental Random Vector Functional Link Network," IEEE Transactions on Network Science and Engineering, IEEE Computer Society, 2023.
    66. A. Y. Alhaddad, H. Aly, H. Gad, E. Elgassim, I. Mohammed, K. Baagar, A. Al-Ali, K. K. Sadasivuni, J.-J. Cabibihan, and R. A. Malik, "Longitudinal Studies of Wearables in Patients with Diabetes: Key Issues and Solutions," Sensors, MDPI, 2023.
    67. J. Chen, H. Wang, M. Hu, and P. N. Suganthan, "Versatile LiDAR-Inertial Odometry with SE(2) Constraints for Ground Vehicles," IEEE Robotics and Automation Letters, IEEE, 2023.
    68. Y.-Z. Li, K. Gao, L.-L. Meng, and P. N. Suganthan, "A problem-specific knowledge based artificial bee colony algorithm for scheduling distributed permutation flowshop problems with peak power consumption," Engineering Applications of Artificial Intelligence, Elsevier Ltd, 2023.
    69. L. Kong, V. Ojha, R. Gao, P. N. Suganthan, and V. Snášel, "Low-rank and global-representation-key-based attention for graph transformer," Information Sciences, Elsevier Inc., 2023.
    70. M. Alnajar, M. Abdalrahim, S. Mosleh, M. Farhan, K. Amro, and M. Darawad, "The need of patients living with cancer for palliative care," International Journal of Palliative Nursing, MA Healthcare Ltd, 2023.
    71. H. Liu, G. Wu, L. Zhou, W. Pedrycz, and P. N. Suganthan, "Tangent-Based Path Planning for UAV in a 3-D Low Altitude Urban Environment," IEEE Transactions on Intelligent Transportation Systems, IEEE, 2023.
    72. F. Luo and S. Al-Kuwari, "Generic Construction of Black-Box Traceable Attribute-Based Encryption," IEEE Transactions on Cloud Computing, IEEE, 2023.
    73. K. Malik, M. A. Ganaie, M. Tanveer, and P. N. Suganthan, "Support Vector Machine Based Models with Sparse Auto-encoder Based Features for Classification Problem," Lecture Notes in Computer Science , Springer, 2023.
    1. Z. Sheikh Ali, A. Al-Ali, T. Elsayed, “Detecting Users Prone to Spread Fake News on Arabic Twitter,” Proceedings of the 5th Workshop on Open-Source Arabic Corpora and Processing Tools, Jun. 2022.

    2. A. Alhaddad, H. Aly, H. Gad, A. Al-Ali, K. Sadasivuni, J. Cabibihan, R. Malik, "Sense and Learn: Recent Advances in Wearable Sensing and Machine Learning for Blood Glucose Monitoring and Trend-Detection," Frontiers in Bioengineering and Biotechnology, May 2022.

    3. W. Mansour, T. Elsayed, and A. Al-Ali, “Did I See it Before? Detecting Previously-Checked Claims over Twitter”. Proceedings of the 44th European Conference on Information Retrieval, Apr. 2022.

    4. Unal, Devrim, Shada Bennbaia, and Ferhat Ozgur Catak. "Machine learning for the security of healthcare systems based on Internet of Things and edge computing." Cybersecurity and Cognitive Science. Academic Press, 2022. 299-320.

    5. Haris, Raseena M., Khaled M. Khan, and Armstrong Nhlabatsi. "Live migration of virtual machine memory content in networked systems: A review." Computer Networks (2022): 108898.   

    6. Mohammed Mudassir, Devrim Unal, Mohammad Hammoudeh, Farag Azzedin, "Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches", Wireless Communications and Mobile Computing, vol. 2022, Article ID 2845446, 12 pages,2022.

    7. Ferhat Ozgur Catak, Murat Kuzlu, Evren Catak, Umit Cali, Devrim Unal, Security concerns on machine learning solutions for 6G networks in mmWave beam prediction, Physical Communication, Volume 52, pp. 101626, 2022
    8. Lav Gupta, Tara Salman, Ali Ghubaish, Devrim Unal, Abdulla Khalid Al-Ali, Raj Jain, Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach, Applied Soft Computing, pp. 108439, Volume 118, 2022
    9. Mahima Aggarwal, Mohammed Zubair, Devrim Unal, Abdulla Al-Ali, Thomas Reimann, Guillaume Alinier, Fuzzy Identification-Based Encryption for healthcare user face authentication, Journal of Emergency Medicine, Trauma and Acute Care, Volume 2022, Issue 1 - Qatar Health 2022 Conference abstracts, Jan 2022
    10. X. Yan and Maode Ma, “A Privacy-Preserving Handover Authentication Protocol for a Group of MTC Devices in 5G Networks,” Computers and Security , Vol. 116, AN. 102601, May 2022.
    11. K. L. K. Sudheera, Maode Ma and P. H. J. Chong, “Real-Time Cooperative Data Routing and Scheduling in Software Defined Vehicular Networks,” Computer Communications , Vol. 181, January, 2022, pp. 203-214.
    12. C. Wang, X. Li, Maode Ma, and Y. Zhang, “A Novel and Efficient Anonymous Authentication Scheme Based on Extended Chebyshev Chaotic Maps for Smart Grid,” Proc-23rd IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2022 , WoWMoM2022, UK, June 2022.
    13. X. Yan, Maode Ma, and R. Su, “A Certificateless Efficient and Secure Group Handover Authentication Protocol in 5G Enabled Vehicular Networks,” Proc-IEEE ICC'22, South Korea, May 2022.
    14. Zubair M, Ghubaish A, Unal D, Al-Ali A, Reimann T, Alinier G, Hammoudeh M, Qadir J. ," Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System", Sensors, October 2022.

    15. Ruobin Gao, Ruilin Li, Minghui Hu, Ponnuthurai Nagaratnam Suganthan, Kum Fai Yuen, "Significant wave height forecasting using hybrid ensemble deep randomized networks with neurons pruning, Engineering Applications of Artificial Intelligence", November 2022.

    16. Devrim Unal, Ferhat Ozgur Catak, Mohammad Talal Houkan, Mohammed Mudassir, Mohammad Hammoudeh, “Towards robust autonomous driving systems through adversarial test set generation”, ISA Transactions, November 2022,

    17. Li, Ruilin, Ruobin Gao, Jian Cui, P. N. Suganthan, and Olga Sourina ,"Advanced Ensemble Deep Random Vector Functional Link for Eye-Tracking-based Situation Awareness Recognition", IEEE Symposium Series on Computational Intelligence (SSCI), 2022.

    18. Ruobin Gao, P.N. Suganthan, Qin Zhou, Kum Fai Yuen, M. Tanveer,"Echo state neural network based ensemble deep learning for short-term load forecasting", IEEE SSCI, 2022.

    19. Abdel-Nabi, Heba, Mostafa Ali, Mohammad Daoud, Rami Alazrai, Arafat Awajan, Robert Reynolds, and P.N. Suganthan, "An Enhanced Multi-Phase Stochastic Differential Evolution Framework for Numerical Optimization", IEEE Congress of Evolutionary Computation, 2022.

    20. Hu, Minghui, Ruobin Gao, and P.N. Suganthan, "Deep Reservoir Computing Based Random Vector Functional Link for Non-sequential Classification", IEEE International Joint Conference on Neural Networks (IJCNN), 2022.

    21. Ganaie, M.A., M. Tanveer, A.K. Malik, and P.N. Suganthan, "Minimum Variance Embedded Random Vector Functional Link Network with Privileged Information", IEEE International Joint Conference on Neural Networks (IJCNN), 2022.

    22. Du, Liang, Ruobin Gao, Ponnuthurai Nagaratnam Suganthan, and David Z.W. Wang, "Time Series Forecasting Using Online Performance-based Ensemble Deep Random Vector Functional Link Neural Network", IEEE International Joint Conference on Neural Networks (IJCNN), 2022.

    23.  Cheng, W. X., and P. Suganthan, "Adaptive Pooling for U-Net in Time Series Classification", International Conference on Neural Information Processing (ICONIP), 2022, Springer.

    24. Shi, Q., and P. Suganthan, "Double Regularization-based RVFL and edRVFL Networks for Sparse-Dataset Classification", International Conference on Neural Information Processing (ICONIP), 2022, Springer.

    25. Li, Ruilin, Jian Cui, Ruobin Gao, P. N. Suganthan, Olga Sourina, Lipo Wang, and Chun-Hsien Chen, "Situation Awareness Recognition Using EEG and Eye-Tracking data: a pilot study", IEEE International Conference on Cyberworlds (CW), 2022.

    26. Malik, Ashwani Kumar, Mudasir Ahmad Ganaie, M Tanveer, and P.N. Suganthan, "Support vector machine based models with sparse auto-encoder based features for classification problem", International Conference on Neural Information Processing (ICONIP), 2022, Springer.

    27. Hu, Minghui, Ruobin Gao, Ponnuthurai N. Suganthan, and M. Tanveer, "Automated layer-wise solution for ensemble deep randomized feed-forward neural network", Neurocomputing, 2022.

    28. Wu, Guohua, Ni Mao, Qizhang Luo, Binjie Xu, Jianmai Shi, and Ponnuthurai Nagaratnam Suganthan, "Collaborative Truck-Drone Routing for Contactless Parcel Delivery During the Epidemic", IEEE Transactions on Intelligent Transportation Systems, 2022.
    29. Osaba, Eneko, Javier Del Ser, and Ponnuthurai N. Suganthan, "Evolutionary Multitask Optimization: Fundamental research questions, practices, and directions for the future", Swarm and Evolutionary Computation, 2022.

    30. Du, Liang, Ruobin Gao, Ponnuthurai Nagaratnam Suganthan, and David Z.W. Wang, "Graph ensemble deep random vector functional link network for traffic forecasting", Applied Soft Computing, 2022.

    31. Arora, Parul, Abbas Khosravi, B.K. Panigrahi, and P.N. Suganthan, "Remodelling state-space prediction with deep neural networks for probabilistic load forecasting", IEEE Transactions on Emerging Topics in Computational Intelligence, 2022.

    32. Cheng, Wen Xin, Ruobin Gao, P.N. Suganthan, and Kum Fai Yuen, "EEG-based emotion recognition using random Convolutional Neural Networks", Engineering Applications of Artificial Intelligence, 2022.

    33. Gao, Ruobin, Liang Du, Ponnuthurai Nagaratnam Suganthan, Qin Zhou, and Kum Fai Yuen, "Random vector functional link neural network based ensemble deep learning for short-term load forecasting", Expert Systems with Applications, 2022.
    34. Li, Changsong, Guojiang Xiong, Xiaofan Fu, Ali Wagdy Mohamed, Xufeng Yuan, Mohammed Azmi Al-Betar, and Ponnuthurai Nagaratnam Suganthan, "Takagi–Sugeno fuzzy based power system fault section diagnosis models via genetic learning adaptive GSK algorithm", Knowledge-Based Systems, 2022.

    35. Wu, Guohua, Qizhang Luo, Xiao Du, Yingguo Chen, Ponnuthurai Nagaratnam Suganthan, and Xinwei Wang, "Ensemble of Metaheuristic and Exact Algorithm Based on the Divide-and-Conquer Framework for Multisatellite Observation Scheduling", IEEE Transactions on Aerospace and Electronic Systems, 2022.

    36. Gao, Ruobin, Wen Xin Cheng, P. N. Suganthan, and Kum Fai Yuen, "Inpatient discharges forecasting for Singapore hospitals by machine learning", IEEE Journal of Biomedical and Health Informatics, 2022.
    37. Shi, Qiushi, Ponnuthurai Nagaratnam Suganthan, and Javier Del Ser, "Jointly optimized ensemble deep random vector functional link network for semi-supervised classification", Engineering Applications of Artificial Intelligence, 2022.

    38. Li, Ruilin, Lipo Wang, P.N. Suganthan, and Olga Sourina, "Sample-Based Data Augmentation Based on Electroencephalogram Intrinsic Characteristics", IEEE Journal of Biomedical and Health Informatics, 2022.

    39. Hu, M., and P. Suganthan, "Experimental evaluation of stochastic configuration networks: Is SC algorithm inferior to hyper-parameter optimization method?", Applied Soft Computing, 2022.

    40. Ganaie, M.A., M. Tanveer, P.N. Suganthan, and V. Snasel, "Oblique and rotation double random forest", Neural Networks, 153, 2022.

    41. Liu, Tianping, Guojiang Xiong, Ali Wagdy Mohamed, and Ponnuthurai Nagaratnam Suganthan, "Opposition-mutual learning differential evolution with hybrid mutation strategy for large-scale economic load dispatch problems with valve-point effects and multi-fuel options", Information Sciences, 2022.

    42. Hu, M., and P. Suganthan, "Representation learning using deep random vector functional link networks for clustering", Pattern Recognition, 2022.

    43. Wu, Guohua, Xupeng Wen, Ling Wang, Witold Pedrycz, and Ponnuthurai Nagaratnam Suganthan, "A voting-mechanism-based ensemble framework for constraint handling techniques", IEEE Transactions on Evolutionary Computation, 2022.
    44. Malik, Ashwani Kumar, M.A. Ganaie, M. Tanveer, and P.N. Suganthan, "Extended features based random vector functional link network for classification problem", IEEE Transactions on Computational Social Systems, 2022.

    45. Luo, Qizhang, Guohua Wu, Bin Ji, Ling Wang, and Ponnuthurai Nagaratnam Suganthan, "Hybrid Multi-Objective Optimization Approach With Pareto Local Search for Collaborative Truck-Drone Routing Problems Considering Flexible Time Windows", IEEE Transactions on Intelligent Transportation Systems, 2022.

    1. Z. Ali, W. Mansour, T. Elsayed, A. Al-Ali, “The First Large Arabic Dataset of Naturally-Occurring Professionally-Verified Claims”, Proceedings of the Sixth Arabic Natural Language Processing Workshop, Apr. 2021.
    2. Z. Sheikh Ali, W. Mansour, T. Elsayed, and A. Al‐Ali, “AraFacts: The First Large Arabic Dataset of Naturally Occurring Claims,” in Proceedings of the Sixth Arabic Natural Language Processing Workshop, Kyiv, Ukraine (Virtual), Apr. 2021, pp. 231–236. Accessed: Sep. 08, 2021. [Online]. Available: https://aclanthology.org/2021.wanlp-1.26
    3. A. Belhi, A. Bouras, A. Al-Ali, A. Sadka, “Data Analytics for Cultural Heritage: Current Trends and Concepts”, Springer Nature, Mar. 2021.
    4. Alban, A. Q., Ayesh, M., Alhaddad, A. Y., Al-Ali, A., So, W. C., Connor, O., & Cabibihan, J.-J. (2021). Detection of Challenging Behaviours of Children with Autism Using Wearable Sensors during Interactions with Social Robots. 2021 30th IEEE International Conference on Robot Human Interactive Communication (RO-MAN), 852–857. https://doi.org/10.1109/RO-MAN50785.2021.9515459
    5. S. Al-Emadi, A. Al-Ali, and A. Al-Ali, “Audio-Based Drone Detection and Identification Using Deep Learning Techniques with Dataset Enhancement through Generative Adversarial Networks,” Sensors, vol. 21, no. 15, Art. no. 15, Jan. 2021, doi: 10.3390/s21154953.
    6. Hijawi, D. Unal, R. Hamila, A. Gastli and O. Ellabban, "Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices," in IEEE Access, vol. 9, pp. 5640-5650, 2021, doi: 10.1109/ACCESS.2020.3048192.

    7. M. Noorizadeh, M. Shakerpour, N. Meskin, D. Unal and K. Khorasani, "A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed," in IEEE Access, vol. 9, pp. 16239-16253, 2021, doi: 10.1109/ACCESS.2021.3053135.
    8. Devrim Unal, Abdulla Al-Ali, Ferhat Ozgur Catak, Mohammad Hammoudeh, A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption, Future Generation Computer Systems, Volume 125, 2021, Pages 433-445, ISSN 0167-739X, https://doi.org/10.1016/j.future.2021.06.050.

    9. Devrim Unal, Mohammad Hammoudeh, Muhammad Asif Khan, Abdelrahman Abuarqoub, Gregory Epiphaniou, Ridha Hamila, Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things, Computers & Security, Volume 109, 2021, 102393, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2021.102393.

    10. Zebo Yang, Ali Ghubaish, Devrim Unal, Raj Jain, "Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks", Wireless Communications and Mobile Computing, vol. 2021, Article ID 8870222, 13 pages, 2021. https://doi.org/10.1155/2021/8870222

    11. A. M. Nhlabatsi, K. M. Khan, J. B. Hong, D. S. D. Kim, R. Fernandez and N. Fetais, "Quantifying Satisfaction of Security Requirements of Cloud Software Systems," in IEEE Transactions on Cloud Computing, doi: 10.1109/TCC.2021.3097770.
    12. X. J. Li, Maode Ma, and Y. X. Yong, “A Blockchain-Based Security Scheme for Vehicular Ad Hoc Networks in Smart Cities,” Proc- IEEE TENCON 2021, New Zealand, December 2021.
    13. X. J. Li, Maode Ma, and C. W. Hlaing, “Improved Handshaking Procedures for Transport Layer Security in Software Defined Networks,” Proc- IEEE TENCON 2021, New Zealand, December 2021.
    14. H. S. Ilango, Maode Ma, and R. Su, "Low Rate DoS Attack Detection in IoT - SDN using Deep Learning," Proc- IEEE International Conference on Internet of Things 2021, iThings2021, Australia, December 2021.
    15. S. Bhushan and Maode Ma, “Priority-Queue based Dynamic Scaling for Efficient Resource Allocation in Fog Computing,” Proc-15th IEEE International Conference on Service Operations and Logistics, and Informatics 2021, SOLI 2021, Singapore, December 2021.
    1. A. Belhi, A. Bouras, A. Al-Ali, and S. Foufou, “A machine learning framework for enhancing digital experiences in cultural heritage,” Journal of Enterprise Information Management, vol. ahead-of-print, no. ahead-of-print, Jan. 2020, doi: 10.1108/JEIM-02-2020-0059.
    2. A. Belhi, A. Al-Ali, A. Bouras, S. Foufou, X. Yu, and H. Zhang, “Investigating low-delay deep learning-based cultural image reconstruction,” J Real-Time Image Proc, pp. 1–16, Jun. 2020, doi: 10.1007/s11554-020-00975-y.
    3. Basyoni, Lamiaa, et al. "Traffic Analysis Attacks on Tor: A Survey." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
    4. Mhaisen, Naram, Noora Fetais, and Ahmed Massoud. "Real-Time Scheduling for Electric Vehicles Charging/Discharging Using Reinforcement Learning." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
    5. Salahuddin, Tooba, and Uvais Qidwai. "A Cloud-based Solution for Rapid and Smart Neuropathy Detection." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
    6. Jabbar, Rateb, et al. "A Model-Based Testing Framework for Validating an IoT Solution for Blockchain-Based Vehicles Communication." (2020).
    7. Hammoudeh, Mohammad, et al. "A service-oriented approach for sensing in the Internet of Things: intelligent transportation systems and privacy use cases." IEEE Sensors Journal (2020).
    8. Jabbar, Rateb, et al. "Formal Verification and Model-Based Testing Techniques for Validating a Blockchain-Based Healthcare Records Sharing System." (2020).
    9. Jabbar, Rateb, et al. "Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
    10. Bhamare, Deval, et al. "Cybersecurity for industrial control systems: A survey." Computers & Security 89 (2020): 101677.
    11. Nhlabatsi, Armstrong, et al. "Design and Implementation of a Threat-Specific Security Risk Assessment Tool." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
    12. Hybrid Particle Swarm Optimization with Sine Cosine Algorithm and Nelder–Mead Simplex for Solving Engineering Design Problems
    13. Hijawi, Ula, et al. "Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
    14. Unal, Devrim, Mohammad Hammoudeh, and Mehmet Sabir Kiraz. "Policy specification and verification for blockchain and smart contracts in 5G networks." ICT Express 6.1 (2020): 43-47.
    15. Mhaisen, Naram, et al. "To chain or not to chain: A reinforcement learning approach for blockchain-enabled IoT monitoring applications." Future Generation Computer Systems 111 (2020): 39-51.
    16. Basyoni, Lamiaa, et al. "Traffic Analysis Attacks on Tor: A Survey." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
    17. Hijawi, Ula, et al. "Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
    18. Unal, Devrim, Mohammad Hammoudeh, and Mehmet Sabir Kiraz. "Policy specification and verification for blockchain and smart contracts in 5G networks." ICT Express 6.1 (2020): 43-47.
    19. Hijawi, Ula, et al. "Qatar Green Schools Initiative: Energy Management System with Cost-Efficient and Lightweight Networked IoT." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
    1. Barham, Reham Shawqi, Ahmad Sharieh, and Azzam Sleit. "A meta-heuristic framework based on clustering and preprocessed datasets for solving the link prediction problem." Journal of Information Science 45.6 (2019): 794-817.
    2. Kasit, KASIT KASIT. "An Enhanced K-means Clustering Algorithm for Multi-attributes Data." International Journal of Computer Science and Information Security (IJCSIS) 17.2 (2019).
    3. Fernandez, Rachael, Salma Shalaby, and Noora Fetais. "Cyber security in Banking: Challenges, Solutions and Trends."
    4. Zubair, Mohammed, et al. "Exploiting bluetooth vulnerabilities in e-health IoT devices." Proceedings of the 3rd International Conference on Future Networks and Distributed Systems. 2019.
    5. Alsawalqah, Hamad, et al. "Factors Impacting on CMMI Acceptance Among Software Development Firms: A Qualitative Assessment." Modern Applied Science 13.3 (2019).
    6. Eshtay, Mohammed, Azzam Sleit, and Monther Aldwairi. "Implementing bi-temporal properties into various NoSQL database categories." International Journal of Computing 18.1 (2019): 45-52.
    7. Al-Nsour, Esam, Azzam Sleit, and Mohammad Alshraideh. "SOLD: A node-Splitting algorithm for R-tree based on Objects’ Locations Distribution." Journal of Information Science 45.2 (2019): 169-195.
    8. Salem, Asma, et al. "Enhanced Authentication System Performance Based on Keystroke Dynamics using Classification algorithms." KSII Transactions on Internet & Information Systems 13.8 (2019).
    9. Yadegar, Meysam, Nader Meskin, and Wassim M. Haddad. "An output‐feedback adaptive control architecture for mitigating actuator attacks in cyber‐physical systems." International Journal of Adaptive Control and Signal Processing 33.6 (2019): 943-955.
    10. Baniamerian, Amir, Khashayar Khorasani, and Nader Meskin. "Determination of Security Index for Linear Cyber-Physical Systems Subject to Malicious Cyber Attacks." 2019 IEEE 58th Conference on Decision and Control (CDC). IEEE, 2019.
    11. Basyoni, Lamiaa, et al. "Empirical performance evaluation of QUIC protocol for Tor anonymity network." 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC). IEEE, 2019.
    12. Barham, Reham, Ahmad Sharieh, and Azzam Sleit. "Multi-moth flame optimization for solving the link prediction problem in complex networks." Evolutionary Intelligence .4 (2019): 563-591.
    13. Hong, Jin B., et al. "Systematic identification of threats in the cloud: A survey." Computer Networks 150 (2019): 46-69.
    14. Nhlabatsi, Armstrong, et al. "Threatriskevaluator: A tool for assessing threat-specific security risks in the cloud." 2019 International Conference on Cyber Security for Emerging Technologies (CSET). IEEE, 2019.
    15. Mahmood, Arif, and Somaya Al-Maadeed. "Action Recognition in Poor Quality Spectator Crowd Videos."
    1. Fetais, Noora, and Rachael Fernandez. "Framework for Visualizing Browsing Patterns Captured in Computer Logs." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3. Vol. 2018. No. 3. Hamad bin Khalifa University Press (HBKU Press), 2018.‏
    2. Shalaby, Salma Tarek, Engy Khaled Soliman, and Noora Fetais. "Visualization of Electricity Consumption in Qatar." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3. Vol. 2018. No. 3. Hamad bin Khalifa University Press (HBKU Press), 2018.‏ 
    3. Al-Hathal, Turkea, and Noora Fetais. "Virtual reality glove for falconry." 2018 International Conference on Computer and Applications (ICCA). IEEE, 2018.
    4. Fetais, Noora, et al. "Virtual Reality Game for Falconry." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3. Vol. 2018. No. 3. Hamad bin Khalifa University Press (HBKU Press), 2018.‏ 
    5. Kharbach, Sarah, et al. "Virtual Reality Falconry: Simulation of a Traditional Qatari Sport Methodology and Techniques." 2018 International Conference on Computer and Applications (ICCA). IEEE, 2018.‏ 
    6. Al-Thani, Haya, et al. "Unsupervised Technique for Anomaly Detection in Qatar Stock Market." 2018 International Conference on Computer and Applications (ICCA). IEEE, 2018.‏ 
    7. Nhlabatsi, Armstrong Mazinyane, et al. "Threat-specific security risk evaluation in the cloud." IEEE Transactions on Cloud Computing (2018).‏
    8. Nhlabatsi, Armstrong, et al. "ThreatBased Security Risk Evaluation in the Cloud." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3. Vol. 2018. No. 3. Hamad bin Khalifa University Press (HBKU Press), 2018.
    9. Moataz, Tarik, et al. "Substring search over encrypted data." Journal of Computer Security 26.1 (2018): 1-30.‏
    10. Amin, Hafsa, et al. "SLiFi: Exploiting Visible Light Communication VLC to Authenticate WiFi Access Points." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3. Vol. 2018. No. 3. Hamad bin Khalifa University Press (HBKU Press), 2018.
    11. Barham, Reham, Ahmad Sharieh, and Azzam Sleit. "Moth flame optimization based on golden section search and its application for link prediction problem." Mod Appl Sci 13.1 (2018): 10-27.
    12. Senturk, Izzet F., et al. "A resource provisioning framework for bioinformatics applications in multi-cloud environments." Future Generation Computer Systems 78 (2018): 379-391.
    1. Abdelbarr, Mohamed, et al. "3D dynamic displacement-field measurement for structural health monitoring using inexpensive RGB-D based sensor." Smart materials and structures 26.12 (2017): 125016.
    2. Kamran, Saadat, et al. "Abstract TP62: To Determine the Evolution of Stroke Volume Overtime Using ANFIS." Stroke 48.suppl_1 (2017): ATP62-ATP62.
    3. Soliman, Engy, Salma Shalaby, and Noora Fetais. "An Interactive Visualization Web Solution for Electricity Consumption in Qatar." 2017 International Conference on Computer and Applications (ICCA). IEEE, 2017.
    4. Jiang, Richard, et al. Biometric Security and Privacy. Springer International Publishing AG, 2017.
    5. Punekar, Mayur, et al. "Candidate MDS Array Codes for Tolerating Three Disk Failures in RAID-7 Architectures." Proceedings of the Fourth IEEE/ACM International Conference on Big Data Computing, Applications and Technologies. 2017.
    6. Gupta, Lav, et al. "COLAP: A predictive framework for service function chain placement in a multi-cloud environment." 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2017.
    7. Djelouat, Hamza, et al. "Compressive sensing based electronic nose platform." Digital Signal Processing 60 (2017): 350-359.
    8. Qidwai, Uvais, and Muhammad Ali Akbar. "Coordinated robotic system for civil structural health monitoring." MATEC Web of Conferences. Vol. 120. EDP Sciences, 2017.
    9. Khan, Khaled M., Mahboob Shaheen, and Yongge Wang. "Data confidentiality in cloud-based pervasive system." Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing. 2017.
    10. Chaudhry, Junaid, et al. "Data security among ISO/IEEE 11073 compliant personal healthcare devices through statistical fingerprinting." Institute of Electrical and Electronics Engineers, 2017.
    11. Hong, Jin Bum, and Dong Seong Kim. "Discovering and mitigating new attack paths using graphical security models." 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, 2017.
    12. Zhai, Xiaojun, et al. "ECG encryption and identification based security solution on the Zynq SoC for connected health systems." Journal of Parallel and Distributed Computing 106 (2017): 143-152.
    13. Di Pietro, Roberto, and Gabriele Oligeri. "Enabling broadcast communications in presence of jamming via probabilistic pairing." Computer Networks 116 (2017): 33-46.
    14. Ali, Amine Ait Si, et al. "Enhanced Biometric Security and Privacy Using ECG on the Zynq SoC." Biometric Security and Privacy. Springer, Cham, 2017. 179-202.
    15. Yusuf, Simon Enoch, et al. "Evaluating the effectiveness of security metrics for dynamic networks." 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017.
    16. Gupta, Lav, et al. "Fault and performance management in multi-cloud based NFV using shallow and deep predictive structures." Journal of Reliable Intelligent Environments 3.4 (2017): 221-231.
    17. Awan, Ruqayya, et al. "Glandular morphometrics for objective grading of colorectal adenocarcinoma histology images." Scientific Reports 7.1 (2017): 1-12.
    18. Elwell, Jesse, et al. "Hardening extended memory access control schemes with self-verified address spaces." 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 2017.
    19. Nita, G. M., et al. "Higher order statistical frequency domain decomposition for operational modal analysis." Mechanical Systems and Signal Processing 84 (2017): 100-112.
    20. Khan, Khaled M., and Armstrong Nhlabatsi. "Identifying Common Behavioural Traits of Lone-Wolves in Recent Terrorist Attacks in Europe." International Journal of Humanities and Social Sciences 11.7 (2017): 1821-1824.
    21. Abdaoui, Abderrazak, Tarek M. El Fouly, and Mohamed H. Ahmed. "Impact of time synchronization error on the mode-shape identification and damage detection/localization in WSNs for structural health monitoring." Journal of Network and Computer Applications 83 (2017): 181-189.
    22. Khan, Khaled M., and Zhuhan Jiang. "Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service." 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 2017.
    23. Mansourkiaie, Fatemeh, et al. "Maximizing lifetime in wireless sensor network for structural health monitoring with and without energy harvesting." IEEE Access 5 (2017): 2383-2395.
    24. Bhamare, Deval, et al. "Multi-objective scheduling of micro-services for optimal service function chains." 2017 IEEE international conference on communications (ICC). IEEE, 2017.
    25. Farhat, Ali AH, et al. "OCR-based hardware implementation for Qatari number plate on the Zynq SoC." 2017 9th IEEE-GCC Conference and Exhibition (GCCCE). IEEE, 2017. 
    26. Zhang, Peng, and Mikhail J. Atallah. "On approximate pattern matching with thresholds." Information Processing Letters 123 (2017): 21-26.
    27. Bhamare, Deval, et al. "Optimal virtual network function placement in multi-cloud service function chaining architecture." Computer Communications 102 (2017): 1-16.
    28. Bahig, Hazem M., Mostafa M. Abbas, and M. M. Mohie-Eldin. "Parallelizing partial digest problem on multicore system." International Conference on Bioinformatics and Biomedical Engineering. Springer, Cham, 2017.
    29. Kamran, Saadat, et al. "Prediction of infarction volume and infarction growth rate in acute ischemic stroke." Scientific reports 7.1 (2017): 1-8.
    30. Wang, Yongge, and Qutaibah M. Malluhi. "Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project." IACR Cryptol. ePrint Arch. 2017 (2017): 1258. 
    31. Jahanshahi, Mohammad R., et al. "Reconfigurable swarm robots for structural health monitoring: a brief review." International Journal of Intelligent Robotics and Applications 1.3 (2017): 287-305.
    32. Hu, Jinwei, et al. "Role updating in information systems using model checking." Knowledge and Information Systems 51.1 (2017): 187-234.
    33. Wang, Shumiao, et al. "Secure collaboration in engineering systems design." Journal of Computing and Information Science in Engineering 17.4 (2017).
    34. Nassar, Mohamed, et al. "Securing aggregate queries for dna databases." IEEE Transactions on Cloud Computing (2017).
    35. Fernandez, Rachael, and Noora Fetais. "Short survey of techniques for visualizing events recorded in logs." 2017 9th IEEE-GCC Conference and Exhibition (GCCCE). IEEE, 2017.
    36. Noel, Adam B., et al. "Structural health monitoring using wireless sensor networks: A comprehensive survey." IEEE Communications Surveys & Tutorials 19.3 (2017): 1403-1423.
    37. Fernandez, Rachael, and Noora Fetais. "Survey of information visualization techniques for enhancing visual analysis." 2017 International Conference on Computer and Applications (ICCA). IEEE, 2017.
    38. Bao, Bin, et al. "Treating triple negative breast cancer cells with erlotinib plus a select antioxidant overcomes drug resistance by targeting cancer cell heterogeneity." Scientific Reports 7 (2017): 44125.
    39. Soliman, Engy, and Noora Fetais. "Visualization as a mean of big data management: Using Qatar's electricity consumption data." 2017 9th IEEE-GCC Conference and Exhibition (GCCCE). IEEE, 2017.
    40. Elsayed, Mohamed, et al. "Walsh transform with moving average filtering for data compression in wireless sensor networks." 2017 IEEE 13th International Colloquium on Signal Processing & its Applications (CSPA). IEEE, 2017.
    41. Dehghan, Afshin, and Mubarak Shah. "Binary quadratic programing for online tracking of hundreds of people in extremely crowded scenes." IEEE transactions on pattern analysis and machine intelligence 40.3 (2017): 568-581.
    1. Qidwai, Uvais, et al. "Intelligent integrated instrumentation platform for monitoring long-term bedridden patients." 2016 IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES). IEEE, 2016.‏
    2. Rihan, Rana Adnan, and Khaled M. Khan. "Using Block Cipher for Confidentiality of Images in Cloud-Based Systems." 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW). IEEE, 2016.‏
    3. Al Marri, Wadha J., et al. "The similarity-aware relational database set operators." Information Systems 59 (2016): 79-93.‏
    4. Rachid, Maan Haj, and Qutaibah Malluhi. "Solving All-Pairs Suffix Prefix–Theory and Practice." Qatar Foundation Annual Research Conference Proceedings Volume 2016 Issue 1. Vol. 2016. No. 1. Hamad bin Khalifa University Press (HBKU Press), 2016.‏
    5. Yusuf, Simon Enoch, et al. "Security modeling and analysis of dynamic enterprise networks." 2016 IEEE International Conference on Computer and Information Technology (CIT). IEEE, 2016.‏
    6. Raza, Shan E. Ahmed, et al. "Robust normalization protocols for multiplexed fluorescence bioimage analysis." BioData mining 9.1 (2016): 11.‏
    7. Asuncion, Vernon, et al. "Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming." International Journal of Cooperative Information Systems 25.01 (2016): 1650003.‏
    8. Aliakbar, Muhammad, et al. "Progressive image stitching algorithm for vision based automated inspection." 2016 International Conference on Machine Learning and Cybernetics (ICMLC). Vol. 1. IEEE, 2016.‏
    9. Wang, Yongge, and Qutaibah M. Malluhi. "Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes." European Symposium on Research in Computer Security. Springer, Cham, 2016.‏ 
    10. Elsersy, Mohamed, et al. "Performance evaluation of experimental damage detection in structure health monitoring using acceleration." 2016 International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, 2016.‏
    11. Malik, Saif Ur Rehman, et al. "Performance analysis of data intensive cloud systems based on data management and replication: a survey." Distributed and Parallel Databases 34.2 (2016): 179-215.‏
    12. Badawy, Ahmed, et al. "On the performance of spectrum sensing based on GLR for full-duplex cognitive radio networks." 2016 IEEE Wireless Communications and Networking Conference. IEEE, 2016.
    13. Qidwai, Uvais, et al. "Monitoring DVT cuffs for long-term operation: A fuzzy approach." 2016 IEEE 12th International Colloquium on Signal Processing & Its Applications (CSPA). IEEE, 2016.‏
    14. Zhai, Xiaojun, et al. "MLP neural network-based gas classification system on Zynq SoC." IEEE Access 4 (2016): 8138-8146.
    15. ‏ 15. Sirinukunwattana, Korsuk, et al. "Locality sensitive deep learning for detection and classification of nuclei in routine colon cancer histology images." IEEE transactions on medical imaging 35.5 (2016): 1196-1206.‏
    16. Elsersy, Mohamed, Tarek Mohamed Elfouly, and Mohamed Hossam Ahmed. "Joint optimal placement, routing, and flow assignment in wireless sensor networks for structural health monitoring." IEEE Sensors Journal 16.12 (2016): 5095-5106.
    17. ‏ 17. Gutierrez, Christopher N., et al. "Inhibiting and detecting offline password cracking using ErsatzPasswords." ACM Transactions on Privacy and Security (TOPS) 19.3 (2016): 1-30.‏
    18. Abdaoui, Abderrazak, Mohamed H. Ahmed, and Tarek M. El Fouly. "Impact of time synchronization error on the mode-shape calculation in wireless sensor networks for structural health monitoring." 2016 IEEE Wireless Communications and Networking Conference. IEEE, 2016.‏
    19. Akbar, Muhammad Ali. "Image Stitching System With Scanning Microscopy for Histopathological Applications." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 2. Vol. 2018. No. 2. Hamad bin Khalifa University Press (HBKU Press), 2018.‏
    20. Tahir, Anas, and Uvais Qidwai. "Humanoid Robots for children with Autism: Experiences with Robosapien and NAO."‏
    21. Awan, Ruqayya, et al. "How divided is a cell? Eigenphase nuclei for classification of mitotic phase in cancer histology images." 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI). IEEE, 2016.‏
    22. Wang, Yongge, Qutaibah M. Malluhi, and Khaled MD Khan. "Garbled computation in cloud." Future Generation Computer Systems 62 (2016): 54-65.‏
    23. Bhamare, Deval, et al. "Feasibility of supervised machine learning for cloud security." 2016 International Conference on Information Science and Security (ICISS). IEEE, 2016.‏
    24. El-Manzalawy, Yasser, et al. "FastRNABindR: Fast and accurate prediction of protein-RNA interface residues." PloS one 11.7 (2016): e0158445.‏
    25. Gupta, Lav, Raj Jain, and Mohammed Samaka. "Analysis of an application delivery platform for software defined infrastructures." International Journal of Communication Networks and Distributed Systems 17.3 (2016): 296-314.