Skip to main content

Research Repository

Advanced Search

Outputs (218)

A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models (2023)
Presentation / Conference Contribution
Almaini, A., Folz, J., Woelfl, D., Al-Dubai, A., Schramm, M., & Heigl, M. (2023, June). A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models. Presented at International Wireless Communications & Mobile Computing Conference (IWCMC 2023), Marrakesh, Morocco

Due to the increasing privacy demand in data processing, Fully Homomorphic Encryption (FHE) has recently received growing attention for its ability to perform calculations over encrypted data. Since the data can be processed in encrypted form and the... Read More about A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models.

ESPP: Efficient Sector-based Charging Scheduling and Path Planning for WRSNs with Hexagonal Topology (2023)
Journal Article
Naji, A., Hawbani, A., Wang, X., Al-Gunid, H. M., Al-Dhabi, Y., Al-Dubai, A., Hussain, A., Zhao, L., & Alsamhi, S. H. (2024). ESPP: Efficient Sector-based Charging Scheduling and Path Planning for WRSNs with Hexagonal Topology. IEEE Transactions on Sustainable Computing, 9(1), 31 - 45. https://doi.org/10.1109/tsusc.2023.3296607

Wireless Power Transfer (WPT) is a promising technology that can potentially mitigate the energy provisioning problem for sensor networks. In order to efficiently replenish energy for these battery-powered devices, designing appropriate scheduling an... Read More about ESPP: Efficient Sector-based Charging Scheduling and Path Planning for WRSNs with Hexagonal Topology.

MESON: A Mobility-aware Dependent Task Offloading Scheme for Urban Vehicular Edge Computing (2023)
Journal Article
Zhao, L., Zhang, E., Wan, S., Hawbani, A., Al-Dubai, A. Y., Min, G., & Zomaya, A. Y. (2024). MESON: A Mobility-aware Dependent Task Offloading Scheme for Urban Vehicular Edge Computing. IEEE Transactions on Mobile Computing, 23(5), 4259 - 4272. https://doi.org/10.1109/tmc.2023.3289611

Vehicular Edge Computing (VEC) is the transportation version of Mobile Edge Computing (MEC) in road scenarios. One key technology of VEC is task offloading, which allows vehicles to send their computation tasks to the surrounding Roadside Units (RSUs... Read More about MESON: A Mobility-aware Dependent Task Offloading Scheme for Urban Vehicular Edge Computing.

Application of a gene modular approach for clinical phenotype genotype association and sepsis prediction using machine learning in meningococcal sepsis (2023)
Journal Article
Rashid, A., Anwary, A. R., Al-Obeidat, F., Brierley, J., Uddin, M., Alkhzaimi, H., Sarpal, A., Toufiq, M., Malik, Z. A., Kadwa, R., Khilnani, P., Guftar Shaikh, M., Benakatti, G., Sharief, J., Ahmed Zaki, S., Zeyada, A., Al-Dubai, A., Hafez, W., & Hussain, A. (2023). Application of a gene modular approach for clinical phenotype genotype association and sepsis prediction using machine learning in meningococcal sepsis. Informatics in Medicine Unlocked, 41, Article 101293. https://doi.org/10.1016/j.imu.2023.101293

Sepsis is a major global health concern causing high morbidity and mortality rates. Our study utilized a Meningococcal Septic Shock (MSS) temporal dataset to investigate the correlation between gene expression (GE) changes and clinical features. The... Read More about Application of a gene modular approach for clinical phenotype genotype association and sepsis prediction using machine learning in meningococcal sepsis.

A Novel Federated Learning Scheme for Generative Adversarial Networks (2023)
Journal Article
Zhang, J., Zhao, L., Yu, K., Min, G., Al-Dubai, A., & Zomya, A. (2024). A Novel Federated Learning Scheme for Generative Adversarial Networks. IEEE Transactions on Mobile Computing, 23(5), 3633-3649. https://doi.org/10.1109/tmc.2023.3278668

Generative adversarial networks (GANs) have been advancing and gaining tremendous interests from both academia and industry. With the development of wireless technologies, a huge amount of data generated at the network edge provides an unprecedented... Read More about A Novel Federated Learning Scheme for Generative Adversarial Networks.

A Survey on the Integration of Blockchain and IoT: Challenges and Opportunities (2022)
Book Chapter
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Liu, X. (2022). A Survey on the Integration of Blockchain and IoT: Challenges and Opportunities. In R. Jiang, A. Bouridane, C.-T. Li, D. Crookes, S. Boussakta, F. Hao, & E. A. Edirisinghe (Eds.), Big Data Privacy and Security in Smart Cities (197-221). Springer. https://doi.org/10.1007/978-3-031-04424-3_11

Since Satoshi Nakamoto first introduced the blockchain as an open-source project for secure financial transactions, it has attracted the scientific community’s interest, paving the way for addressing problems in domains other than cryptocurrencies, o... Read More about A Survey on the Integration of Blockchain and IoT: Challenges and Opportunities.

Ontology-Based Linked Data to Support Decision Making within Universities (2022)
Journal Article
Ashour, G., Al-Dubai, A., Romdhani, I., & Alghazzawi, D. (2022). Ontology-Based Linked Data to Support Decision Making within Universities. Mathematics, 10(17), Article 3148. https://doi.org/10.3390/math10173148

In recent years, educational institutions worked hard to automate their work using more trending technologies that prove the success in supporting decision-making processes. Most the decisions in educational institutions rely on rating the academic r... Read More about Ontology-Based Linked Data to Support Decision Making within Universities.

Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher (2022)
Presentation / Conference Contribution
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2022, January). Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher. Presented at 2022 IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022), Tianjin, China

Lightweight cryptography is a novel diversion from conventional cryptography that targets internet-of-things (IoT) platform due to resource constraints. In comparison, it offers smaller cryptographic primitives such as shorter key sizes, block sizes... Read More about Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher.

A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract (2022)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Liu, X. (2022, May). A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract. Presented at 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH), Riyadh, Saudi Arabia

Two-factor authentication (2FA) is commonly used in Internet of Things (IoT) authentication to provide multi-layer protection. Tokens, often known as One-Time Passwords (OTP), are used to offer additional information. While this technique provides fl... Read More about A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract.

A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks (2022)
Journal Article
Alahmadi, H., Bouabdallah, F., & Al-Dubai, A. (2022). A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks. Future Generation Computer Systems, 134, 287-302. https://doi.org/10.1016/j.future.2022.04.003

Long Range (LoRa) networks provide long range, cost-effective and energy-efficient communications by utilising the free unlicensed ISM band, which makes them appealing for Internet of Things (IoT) applications. However, in high density networks, reli... Read More about A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks.