Skip to main content

Research Repository

Advanced Search

Outputs (256)

An Enhanced and Robust Data Publishing Scheme for Private and Useful 1:M Microdata (2024)
Journal Article
Rizwan, M., Hawbani, A., Xingfu, W., Anjum, A., Angin, P., Sever, Y., Chen, S., Zhao, L., & Al-Dubai, A. (online). An Enhanced and Robust Data Publishing Scheme for Private and Useful 1:M Microdata. IEEE Transactions on Big Data, https://doi.org/10.1109/TBDATA.2024.3495497

A data publishing deal conducted with anonymous microdata can preserve the privacy of people. However, anonymizing data with multiple records of an individual (1:M dataset) is still a challenging problem. After anonymizing the 1:M microdata, the vert... Read More about An Enhanced and Robust Data Publishing Scheme for Private and Useful 1:M Microdata.

CAST: Efficient Traffic Scenario Inpainting in Cellular Vehicle-to-Everything Systems (2024)
Journal Article
Zhao, L., Mao, C., Wan, S., Hawbani, A., Al-Dubai, A. Y., Min, G., & Zomaya, A. Y. (online). CAST: Efficient Traffic Scenario Inpainting in Cellular Vehicle-to-Everything Systems. IEEE Transactions on Mobile Computing, https://doi.org/10.1109/tmc.2024.3492148

As a promising vehicular communication technology, Cellular Vehicle-to-Everything (C-V2X) is expected to ensure the safety and convenience of Intelligent Transportation Systems (ITS) by providing global road information. However, it is difficult to o... Read More about CAST: Efficient Traffic Scenario Inpainting in Cellular Vehicle-to-Everything Systems.

IoT Authentication Protocols: Challenges, and Comparative Analysis (2024)
Journal Article
Alsheavi, A., Hawbani, A., Othman, W., Wang, X., Qaid, G. R. S., Zhao, L., Al-Dubai, A., Liu, Z., Ismail, A., Haveri, R. H., Alsamhi, S. H., & Al-Qaness, M. A. A. (in press). IoT Authentication Protocols: Challenges, and Comparative Analysis. ACM computing surveys, https://doi.org/10.1145/3703444

In the ever-evolving information technology landscape, the Internet of Things (IoT) is a groundbreaking concept that bridges the physical and digital worlds. It is the backbone of an increasingly sophisticated interactive environment, yet it is a sub... Read More about IoT Authentication Protocols: Challenges, and Comparative Analysis.

Novel Lagrange Multipliers-Driven Adaptive Offloading for Vehicular Edge Computing (2024)
Journal Article
Zhao, L., Li, T., Meng, G., Hawbani, A., Min, G., Al-Dubai, A., & Zomaya, A. (2024). Novel Lagrange Multipliers-Driven Adaptive Offloading for Vehicular Edge Computing. IEEE Transactions on Computers, 73(12), 2868-2881. https://doi.org/10.1109/TC.2024.3457729

Vehicular Edge Computing (VEC) is a transportation-specific version of Mobile Edge Computing (MEC) designed for vehicular scenarios. Task offloading allows vehicles to send computational tasks to nearby Roadside Units (RSUs) in order to reduce the co... Read More about Novel Lagrange Multipliers-Driven Adaptive Offloading for Vehicular Edge Computing.

User Preferences-Based Proactive Content Caching with Characteristics Differentiation in HetNets (2024)
Journal Article
Lin, N., Wang, Y., Zhang, E., Wan, S., Al-Dubai, A., & Zhao, L. (online). User Preferences-Based Proactive Content Caching with Characteristics Differentiation in HetNets. IEEE Transactions on Sustainable Computing, https://doi.org/10.1109/TSUSC.2024.3441606

With the proliferation of mobile applications, the explosion of mobile data traffic imposes a significant burden on backhaul links with limited capacity in heterogeneous cellular networks (HetNets). To alleviate this challenge, content caching based... Read More about User Preferences-Based Proactive Content Caching with Characteristics Differentiation in HetNets.

A Novel Autonomous Adaptive Frame Size for Time-Slotted LoRa MAC Protocol (2024)
Journal Article
Alahmadi, H., Bouabdallah, F., Al-Dubai, A., & Ghaleb, B. (2024). A Novel Autonomous Adaptive Frame Size for Time-Slotted LoRa MAC Protocol. IEEE Transactions on Industrial Informatics, 20(10), 12284-12293. https://doi.org/10.1109/tii.2024.3417308

LoRa networks represent a promising technology for IoT applications due to their long range, low cost, and energy efficiency. However, their ALOHA-based access method and duty cycle restrictions can limit their scalability and reliability in high-den... Read More about A Novel Autonomous Adaptive Frame Size for Time-Slotted LoRa MAC Protocol.

Wireless Power Transfer Technologies, Applications, and Future Trends: A Review (2024)
Journal Article
Alabsi, A., Hawbani, A., Wang, X., Dubai, A. A.-., Hu, J., Aziz, S. A., Kumar, S., Zhao, L., Shvetsov, A. V., & Alsamhi, S. H. (online). Wireless Power Transfer Technologies, Applications, and Future Trends: A Review. IEEE Transactions on Sustainable Computing, https://doi.org/10.1109/TSUSC.2024.3380607

Wireless Power Transfer (WPT) is a disruptive technology that allows wireless energy provisioning for energy- limited IoT devices, thus decreasing the over-reliance on batteries and wires. WPT could replace conventional energy provisioning (e.g., ene... Read More about Wireless Power Transfer Technologies, Applications, and Future Trends: A Review.

Potential of Satellite-Airborne Sensing Technologies for Agriculture 4.0 and Climate-Resilient: A Review (2023)
Journal Article
Hazmy, A. I., Hawbani, A., Wang, X., Al-Dubai, A., Ghannami, A., Yahya, A. A., Zhao, L., & Alsamhi, S. H. (2024). Potential of Satellite-Airborne Sensing Technologies for Agriculture 4.0 and Climate-Resilient: A Review. IEEE Sensors Journal, 24(4), 4161-4180. https://doi.org/10.1109/jsen.2023.3343428

Agriculture 4.0 offers the potential to revolutionize the agriculture sector through improved productivity and efficiency. However, adopting Agriculture 4.0 requires a period of transition and effort. Satellite-Airborne sensing technologies may becom... Read More about Potential of Satellite-Airborne Sensing Technologies for Agriculture 4.0 and Climate-Resilient: A Review.

A Comparative Study of VANET Routing Protocols for Safety Applications (2023)
Presentation / Conference Contribution
Coyle, K., Thomson, C., Wadhaj, I., & Ghaleb, B. (2023, November). A Comparative Study of VANET Routing Protocols for Safety Applications. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh

The rapid advancement of vehicular communication technologies has led to the emergence of Vehicular AdHoc Networks (VANETs), which hold immense potential for improving road safety and traffic efficiency. VANETs enable vehicles to communicate with eac... Read More about A Comparative Study of VANET Routing Protocols for Safety Applications.

Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities (2023)
Journal Article
Tallat,, R., Hawbani, A., Wang, X., Al-Dubai, A., Zhao, L., Liu, Z., Min, G., Zomaya, A., & Alsamhi, S. (2024). Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities. Communications Surveys and Tutorials, IEEE Communications Society, 26(2), 1080 - 1126. https://doi.org/10.1109/comst.2023.3329472

This century has been a major avenue for revolutionary changes in technology and industry. Industries have transitioned towards intelligent automation, relying less on human intervention, resulting in the fourth industrial revolution, Industry 4.0. T... Read More about Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities.

The humanitarian supply network: A paradigm problem and a big idea (2023)
Presentation / Conference Contribution
Duddy, D., Stantchev, D., & Weaver, M. (2023, September). The humanitarian supply network: A paradigm problem and a big idea. Paper presented at Logistics Research Network (LRN) Conference 2023, Heriot-Watt University, Edinburgh, Scotland

This research examines whether greater effectiveness and efficiency in humanitarian supply chains can be achieved by adopting a cybernetic approach to information flow. It looks at how, by taking a holistic view of humanitarian supply operations, the... Read More about The humanitarian supply network: A paradigm problem and a big idea.

Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method (2023)
Journal Article
Li, Z., Zhao, L., Min, G., Al-Dubai, A. Y., Hawbani, A., Zomaya, A. Y., & Luo, C. (2023). Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method. IEEE Transactions on Intelligent Transportation Systems, 24(12), 14022 - 14036. https://doi.org/10.1109/tits.2023.3300082

Greedy routing efficiently achieves routing solutions for vehicular networks due to its simplicity and reliability. However, the existing greedy routing schemes have mainly considered simple routing metrics only, e.g., distance based on the local vie... Read More about Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method.

ESPP: Efficient Sector-based Charging Scheduling and Path Planning for WRSNs with Hexagonal Topology (2023)
Journal Article
Naji, A., Hawbani, A., Wang, X., Al-Gunid, H. M., Al-Dhabi, Y., Al-Dubai, A., Hussain, A., Zhao, L., & Alsamhi, S. H. (2024). ESPP: Efficient Sector-based Charging Scheduling and Path Planning for WRSNs with Hexagonal Topology. IEEE Transactions on Sustainable Computing, 9(1), 31 - 45. https://doi.org/10.1109/tsusc.2023.3296607

Wireless Power Transfer (WPT) is a promising technology that can potentially mitigate the energy provisioning problem for sensor networks. In order to efficiently replenish energy for these battery-powered devices, designing appropriate scheduling an... Read More about ESPP: Efficient Sector-based Charging Scheduling and Path Planning for WRSNs with Hexagonal Topology.

MESON: A Mobility-aware Dependent Task Offloading Scheme for Urban Vehicular Edge Computing (2023)
Journal Article
Zhao, L., Zhang, E., Wan, S., Hawbani, A., Al-Dubai, A. Y., Min, G., & Zomaya, A. Y. (2024). MESON: A Mobility-aware Dependent Task Offloading Scheme for Urban Vehicular Edge Computing. IEEE Transactions on Mobile Computing, 23(5), 4259 - 4272. https://doi.org/10.1109/tmc.2023.3289611

Vehicular Edge Computing (VEC) is the transportation version of Mobile Edge Computing (MEC) in road scenarios. One key technology of VEC is task offloading, which allows vehicles to send their computation tasks to the surrounding Roadside Units (RSUs... Read More about MESON: A Mobility-aware Dependent Task Offloading Scheme for Urban Vehicular Edge Computing.

A Novel Federated Learning Scheme for Generative Adversarial Networks (2023)
Journal Article
Zhang, J., Zhao, L., Yu, K., Min, G., Al-Dubai, A., & Zomya, A. (2024). A Novel Federated Learning Scheme for Generative Adversarial Networks. IEEE Transactions on Mobile Computing, 23(5), 3633-3649. https://doi.org/10.1109/tmc.2023.3278668

Generative adversarial networks (GANs) have been advancing and gaining tremendous interests from both academia and industry. With the development of wireless technologies, a huge amount of data generated at the network edge provides an unprecedented... Read More about A Novel Federated Learning Scheme for Generative Adversarial Networks.

Blockchain for Cybersecurity in Cyber-Physical Systems (2023)
Book
Maleh, Y., Alazab, M., & Romdhani, I. (Eds.). (2023). Blockchain for Cybersecurity in Cyber-Physical Systems. Springer. https://doi.org/10.1007/978-3-031-25506-9

This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems. It presents crucial issues in this field and provides a sample of recent advances and insights into the research pr... Read More about Blockchain for Cybersecurity in Cyber-Physical Systems.

A Stacking Ensemble of Deep Learning Models for IoT Network Intrusion Detection (2023)
Preprint / Working Paper
Lazzarini, R., Tianfield, H., & Charissis, V. A Stacking Ensemble of Deep Learning Models for IoT Network Intrusion Detection

The number of Internet of Things (IoT) devices has increased considerably inthe past few years, which resulted in an exponential growth of cyber attackson IoT infrastructure. As a consequence, the prompt detection of attacks inIoT environments throug... Read More about A Stacking Ensemble of Deep Learning Models for IoT Network Intrusion Detection.

Improved ICS Honeypot Techniques (2023)
Presentation / Conference Contribution
McColm, D., & Macfarlane, R. (2023, June). Improved ICS Honeypot Techniques. Paper presented at International Conference on Computer Security in the Nuclear World: Security for Safety, Vienna, Austria

As work continues to advance the security posture of ICS systems across the UKNDA estate, opportunities arise to consider the deployment of deception technologies. With high-profile attacks on ICS occurring more frequently, and increasing numbers of... Read More about Improved ICS Honeypot Techniques.

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence (2022)
Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.). (2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. River Publishers

In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromise... Read More about Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence.