Skip to main content

Research Repository

Advanced Search

All Outputs (217)

Shadow-Analyzer: An Efficient Neural Networks-based Ghost Objects Detection for Autonomous Vehicles (2025)
Journal Article
Almaini, A., Folz, . J., Koßmann, T., Böder, R., Al-Dubai, A., Sadik, M., Schramm, M., Heigl, M., Romdhani, I., & Kerrouche, A. (in press). Shadow-Analyzer: An Efficient Neural Networks-based Ghost Objects Detection for Autonomous Vehicles. IEEE Transactions on Intelligent Transportation Systems,

Several studies have been conducted to investigate the security and reliability of object detection systems in Autonomous Vehicles (AVs), which rely on sensors such as cameras and Light Detection and Ranging (LiDAR). These studies demonstrate the low... Read More about Shadow-Analyzer: An Efficient Neural Networks-based Ghost Objects Detection for Autonomous Vehicles.

A Survey on LoRaWAN MAC Schemes: From Conventional Solutions To AI-driven Protocols (2025)
Journal Article
Alahmadi, H., Bouabdallah, F., Al-Dubai, A., Ghaleb, B., Hussain, A., Chamola, V., Hawbani, A., Zhao, L., & Yu, R. (in press). A Survey on LoRaWAN MAC Schemes: From Conventional Solutions To AI-driven Protocols. Communications Surveys and Tutorials,

Long Range (LoRa) networks have emerged as a vital solution catering to applications requiring coverage over relatively long distances in the world of Internet of Things (IoT), where connectivity and efficient data transmission are paramount. LoRa’s... Read More about A Survey on LoRaWAN MAC Schemes: From Conventional Solutions To AI-driven Protocols.

Digital Twin-Enabled Lightweight Attack Detection for Software-Defined Edge Networks (2025)
Presentation / Conference Contribution
Yigit, Y., Gursu, K., Al-Dubai, A., Maglaras, L. A., & Canberk, B. (2025, March). Digital Twin-Enabled Lightweight Attack Detection for Software-Defined Edge Networks. Presented at IEEE Wireless Communications and Networking Conference (WCNC), Milan, Italy

With the development of software-defined edge networks, network management has become more flexible and realtime. However, this advancement has also led to critical security concerns, especially when detecting attacks efficiently in resourceconstrain... Read More about Digital Twin-Enabled Lightweight Attack Detection for Software-Defined Edge Networks.

Arabic Cyberbullying Detection: A Comprehensive Review of Datasets and Methodologies (2025)
Journal Article
Aljalaoud, H., Dashtipour, K., & AI_Dubai, A. (2025). Arabic Cyberbullying Detection: A Comprehensive Review of Datasets and Methodologies. IEEE Access, 13, 69021-69038. https://doi.org/10.1109/access.2025.3561132

The freedom of speech in online spaces has substantially promoted engagement on social media platforms, where cyberbullying has emerged as a significant consequence. While extensive research has been conducted on cyberbullying detection in English, e... Read More about Arabic Cyberbullying Detection: A Comprehensive Review of Datasets and Methodologies.

A new dynamic probabilistic broadcast in IPv6-based low-power and lossy networks for the internet of things (2025)
Journal Article
Ali Fedila, D., Ould Khaoua, M., & Al-Dubai, A. (2025). A new dynamic probabilistic broadcast in IPv6-based low-power and lossy networks for the internet of things. Computing, 107(4), Article 98. https://doi.org/10.1007/s00607-025-01457-4

Due to its attractive features, such as simplicity and ease of implementation, probabilistic broadcast has been widely investigated in IEEE 802.11-based networks. In contrast, hardly any research has investigated its merits in IEEE 802.15.4-based net... Read More about A new dynamic probabilistic broadcast in IPv6-based low-power and lossy networks for the internet of things.

Arabic Short-text Dataset for Sentiment Analysis of Tourism and Leisure Events (2025)
Journal Article
Basabain, S., Al‐Dubai, A., Cambria, E., Alomar, K., & Hussain, A. (2025). Arabic Short-text Dataset for Sentiment Analysis of Tourism and Leisure Events. Expert Systems, 42(5), Article e70030. https://doi.org/10.1111/exsy.70030

The focus of this study is to present the detailed process of collecting a dataset of Arabic short-text in the tourism context and annotating this dataset for the task of sentiment analysis using an automatic zero-shot labelling technique utilising t... Read More about Arabic Short-text Dataset for Sentiment Analysis of Tourism and Leisure Events.

Wireless Rechargeable Sensor Networks: Energy Provisioning Technologies, Charging Scheduling Schemes, and Challenges (2025)
Journal Article
Abdel Aziz, S., Wang, X., Hawbani, A., Qureshi, . B., Alsamhi, S. H., Alabsi, A., Zhao, L., Al-Dubai, A., & Ismail, . A. (online). Wireless Rechargeable Sensor Networks: Energy Provisioning Technologies, Charging Scheduling Schemes, and Challenges. IEEE Transactions on Sustainable Computing, https://doi.org/10.1109/TSUSC.2025.3549414

Recently, a plethora of promising green energy provisioning technologies has been discussed in the orientation of prolonging the lifetime of energy-limited devices (e.g., sensor nodes). Wireless rechargeable sensor networks (WRSNs) have emerged among... Read More about Wireless Rechargeable Sensor Networks: Energy Provisioning Technologies, Charging Scheduling Schemes, and Challenges.

Accurate AI-Driven Emergency Vehicle Location Tracking in Healthcare ITS’s Digital Twin (2025)
Presentation / Conference Contribution
Al-Shareeda, S., Celik, Y., Bilgili, B., Al-Dubai, A., & Canberk, B. (2025, February). Accurate AI-Driven Emergency Vehicle Location Tracking in Healthcare ITS’s Digital Twin. Presented at 2025 5th IEEE Middle East and North Africa Communications Conference (MENACOMM), Byblos, Lebanon

Creating a Digital Twin (DT) for Healthcare Intelligent Transportation Systems (HITS) is a hot research trend focusing on enhancing HITS management, particularly in emergencies where ambulance vehicles must arrive at the crash scene on time, and trac... Read More about Accurate AI-Driven Emergency Vehicle Location Tracking in Healthcare ITS’s Digital Twin.

IoT Authentication Protocols: Challenges, and Comparative Analysis (2025)
Journal Article
Alsheavi, A., Hawbani, A., Othman, W., Wang, X., Qaid, G. R. S., Zhao, L., Al-Dubai, A., Liu, Z., Ismail, A., Haveri, R. H., Alsamhi, S. H., & Al-Qaness, M. A. A. (2025). IoT Authentication Protocols: Challenges, and Comparative Analysis. ACM computing surveys, 57(5), Article 116. https://doi.org/10.1145/3703444

In the ever-evolving information technology landscape, the Internet of Things (IoT) is a groundbreaking concept that bridges the physical and digital worlds. It is the backbone of an increasingly sophisticated interactive environment, yet it is a sub... Read More about IoT Authentication Protocols: Challenges, and Comparative Analysis.

Integrating Reality: A Hybrid SDN Testbed for Enhanced Realism in Edge Computing Simulations (2024)
Presentation / Conference Contribution
Almaini, A., Koßmann, T., Folz, J., Schramm, M., Heigl, M., & Al-Dubai, A. (2024, June). Integrating Reality: A Hybrid SDN Testbed for Enhanced Realism in Edge Computing Simulations. Presented at UNet24: The International Conference on Ubiquitous Networking, Marrakesh, Morocco

Recent advancements in Software-Defined Networking (SDN) have facilitated its deployment across diverse network types, including edge networks. Given the broad applicability of SDN and the complexity of large-scale environments, establishing a compre... Read More about Integrating Reality: A Hybrid SDN Testbed for Enhanced Realism in Edge Computing Simulations.

A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments (2024)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Driss, M., & Buchanan, W. J. (2024, September). A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments. Presented at 28th International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES 2024), Spain

With the widespread use of the Internet of Things (IoT), securing the storage and transmission of multimedia content across IoT devices is a critical concern. Chaos-based Pseudo-Random Number Generators (PRNGs) play an essential role in enhancing the... Read More about A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments.

An Enhanced and Robust Data Publishing Scheme for Private and Useful 1:M Microdata (2024)
Journal Article
Rizwan, M., Hawbani, A., Xingfu, W., Anjum, A., Angin, P., Sever, Y., Chen, S., Zhao, L., & Al-Dubai, A. (online). An Enhanced and Robust Data Publishing Scheme for Private and Useful 1:M Microdata. IEEE Transactions on Big Data, https://doi.org/10.1109/TBDATA.2024.3495497

A data publishing deal conducted with anonymous microdata can preserve the privacy of people. However, anonymizing data with multiple records of an individual (1:M dataset) is still a challenging problem. After anonymizing the 1:M microdata, the vert... Read More about An Enhanced and Robust Data Publishing Scheme for Private and Useful 1:M Microdata.

CAST: Efficient Traffic Scenario Inpainting in Cellular Vehicle-to-Everything Systems (2024)
Journal Article
Zhao, L., Mao, C., Wan, S., Hawbani, A., Al-Dubai, A. Y., Min, G., & Zomaya, A. Y. (2025). CAST: Efficient Traffic Scenario Inpainting in Cellular Vehicle-to-Everything Systems. IEEE Transactions on Mobile Computing, 24(3), 2331-2345. https://doi.org/10.1109/tmc.2024.3492148

As a promising vehicular communication technology, Cellular Vehicle-to-Everything (C-V2X) is expected to ensure the safety and convenience of Intelligent Transportation Systems (ITS) by providing global road information. However, it is difficult to o... Read More about CAST: Efficient Traffic Scenario Inpainting in Cellular Vehicle-to-Everything Systems.

Stretchable electrospun PVDF/TPU nanofibers membranes: Acoustic signals detectors (2024)
Journal Article
Nair, R., El-kadery, A., Khalil, A. M., El-kaliuoby, M. I., Kandas, I., Jain, A., Omran, N., Gamal, M., Noman, S., Magdy, G., Maree, K., El-Khatib, A. M., Hassanin, A. H., Shyha, I., Jaradat, S., Al-Dubai, A., Trabelsi, M., Al Othman, B., & Shehata, N. (2024). Stretchable electrospun PVDF/TPU nanofibers membranes: Acoustic signals detectors. MRS Energy and Sustainability, 11, 659–668. https://doi.org/10.1557/s43581-024-00111-4

Devices that harvest energy are crucial for reducing reliance on energy transmission and distribution systems. This helps minimize energy loss and mitigate environmental impacts. In this study, we focused on manufacturing nanocomposites using various... Read More about Stretchable electrospun PVDF/TPU nanofibers membranes: Acoustic signals detectors.

Novel Lagrange Multipliers-Driven Adaptive Offloading for Vehicular Edge Computing (2024)
Journal Article
Zhao, L., Li, T., Meng, G., Hawbani, A., Min, G., Al-Dubai, A., & Zomaya, A. (2024). Novel Lagrange Multipliers-Driven Adaptive Offloading for Vehicular Edge Computing. IEEE Transactions on Computers, 73(12), 2868-2881. https://doi.org/10.1109/TC.2024.3457729

Vehicular Edge Computing (VEC) is a transportation-specific version of Mobile Edge Computing (MEC) designed for vehicular scenarios. Task offloading allows vehicles to send computational tasks to nearby Roadside Units (RSUs) in order to reduce the co... Read More about Novel Lagrange Multipliers-Driven Adaptive Offloading for Vehicular Edge Computing.

Context-Aware Audio-Visual Speech Enhancement Based on Neuro-Fuzzy Modelling and User Preference Learning (2024)
Journal Article
Chen, S., Kirton-Wingate, J., Doctor, F., Arshad, U., Dashtipour, K., Gogate, M., Halim, Z., Al-Dubai, A., Arslan, T., & Hussain, A. (2024). Context-Aware Audio-Visual Speech Enhancement Based on Neuro-Fuzzy Modelling and User Preference Learning. IEEE Transactions on Fuzzy Systems, 32(10), 5400-5412. https://doi.org/10.1109/tfuzz.2024.3435050

It is estimated that by 2050 approximately one in ten individuals globally will experience disabling hearing impairment. In the presence of everyday reverberant noise, a substantial proportion of individual users encounter challenges in speech compre... Read More about Context-Aware Audio-Visual Speech Enhancement Based on Neuro-Fuzzy Modelling and User Preference Learning.

VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography (2024)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Ali, M., Al Dubai, A., Pitropakis, N., & Buchanan, W. J. (2024, July). VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. Presented at 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP), Sousse, Tunisia

In this digital era, ensuring the security of data transmission is critically important. Digital data, especially image data, needs to be secured against unauthorized access. In this regards, this paper presents a robust image encryption scheme named... Read More about VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography.

User Preferences-Based Proactive Content Caching with Characteristics Differentiation in HetNets (2024)
Journal Article
Lin, N., Wang, Y., Zhang, E., Wan, S., Al-Dubai, A., & Zhao, L. (2025). User Preferences-Based Proactive Content Caching with Characteristics Differentiation in HetNets. IEEE Transactions on Sustainable Computing, 10(2), 333-344. https://doi.org/10.1109/TSUSC.2024.3441606

With the proliferation of mobile applications, the explosion of mobile data traffic imposes a significant burden on backhaul links with limited capacity in heterogeneous cellular networks (HetNets). To alleviate this challenge, content caching based... Read More about User Preferences-Based Proactive Content Caching with Characteristics Differentiation in HetNets.

A Novel Autonomous Adaptive Frame Size for Time-Slotted LoRa MAC Protocol (2024)
Journal Article
Alahmadi, H., Bouabdallah, F., Al-Dubai, A., & Ghaleb, B. (2024). A Novel Autonomous Adaptive Frame Size for Time-Slotted LoRa MAC Protocol. IEEE Transactions on Industrial Informatics, 20(10), 12284-12293. https://doi.org/10.1109/tii.2024.3417308

LoRa networks represent a promising technology for IoT applications due to their long range, low cost, and energy efficiency. However, their ALOHA-based access method and duty cycle restrictions can limit their scalability and reliability in high-den... Read More about A Novel Autonomous Adaptive Frame Size for Time-Slotted LoRa MAC Protocol.