default search action
Abdulla K. Al-Ali
Person information
- affiliation: Qatar University, Department of Computer Science and Engineering, Qatar
- affiliation (PhD 2014): Northeastern University, Boston, MA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Faria Nawshin, Radwa Gad, Devrim Unal, Abdulla Khalid Al-Ali, Ponnuthurai N. Suganthan:
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey. Comput. Electr. Eng. 117: 109233 (2024) - [j26]Hela Chamkhia, Aiman Erbad, Amr Mohamed, Ahmed Refaey Hussein, Abdulla Khalid Al-Ali, Mohsen Guizani:
Stochastic Geometry-Based Physical-Layer Security Performance Analysis of a Hybrid NOMA-PDM-Based IoT System. IEEE Internet Things J. 11(2): 2027-2042 (2024) - [j25]Saleh Alhazbi, Afnan Al-ali, Aliya Tabassum, Abdulla K. Al-Ali, Ahmed Al-Emadi, Tamer Khattab, Mahmood A. Hasan:
Using learning analytics to measure self-regulated learning: A systematic review of empirical studies in higher education. J. Comput. Assist. Learn. 40(4): 1658-1674 (2024) - 2023
- [j24]Naheel Faisal Kamal, Abdulla Khalid Al-Ali, Abdulaziz Al-Ali, Sertac Bayhan, Qutaibah M. Malluhi:
LPPDA: A Light-Weight Privacy-Preserving Data Aggregation Protocol for Smart Grids. IEEE Access 11: 95358-95367 (2023) - [j23]Abdulrahman Soliman, Abdulla K. Al-Ali, Amr Mohamed, Hend Gedawy, Daniel Izham, Mohamad Bahri, Aiman Erbad, Mohsen Guizani:
AI-based UAV navigation framework with digital twin technology for mobile target visitation. Eng. Appl. Artif. Intell. 123(Part B): 106318 (2023) - [j22]Najmath Ottakath, Abdulla K. Al-Ali, Somaya Al-Máadeed, Omar Elharrouss, Amr Mohamed:
Enhanced computer vision applications with blockchain: A review of applications and opportunities. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101801 (2023) - [c29]Hussein A. Aly, Abdulaziz Alali, Abdulla K. Al-Ali, Qutaibah M. Malluhi:
Analysis of Predictive Models for Revealing Household Characteristics using Smart Grid Data. ISGT EUROPE 2023: 1-5 - [i6]Ali Ghubaish, Tara Salman, Maede Zolanvari, Devrim Unal, Abdulla K. Al-Ali, Raj Jain:
Recent Advances in the Internet of Medical Things (IoMT) Systems Security. CoRR abs/2302.04439 (2023) - [i5]Hussein Aly, Abdulaziz Al-Ali, Abdullah Al-Ali, Qutaibah M. Malluhi:
A Blackbox Model Is All You Need to Breach Privacy: Smart Grid Forecasting Models as a Use Case. CoRR abs/2309.01523 (2023) - 2022
- [j21]Lav Gupta, Tara Salman, Ali Ghubaish, Devrim Unal, Abdulla Khalid Al-Ali, Raj Jain:
Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach. Appl. Soft Comput. 118: 108439 (2022) - [j20]Mohammed Jouhari, Abdulla Khalid Al-Ali, Emna Baccour, Amr Mohamed, Aiman Erbad, Mohsen Guizani, Mounir Hamdi:
Distributed CNN Inference on Resource-Constrained UAVs for Surveillance Systems: Design and Optimization. IEEE Internet Things J. 9(2): 1227-1242 (2022) - [j19]Hela Chamkhia, Aiman Erbad, Abdulla Khalid Al-Ali, Amr Mohamed, Ahmed Refaey, Mohsen Guizani:
3-D Stochastic Geometry-Based Modeling and Performance Analysis of Efficient Security Enhancement Scheme for IoT Systems. IEEE Internet Things J. 9(9): 6663-6677 (2022) - [j18]Abderrazak Abdaoui, Aiman Erbad, Abdulla Khalid Al-Ali, Amr Mohamed, Mohsen Guizani:
Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things. IEEE Internet Things J. 9(12): 9987-9998 (2022) - [j17]Mohammed Zubair, Ali Ghubaish, Devrim Unal, Abdulla K. Al-Ali, Thomas Reimann, Guillaume Alinier, Mohammad Hammoudeh, Junaid Qadir:
Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System. Sensors 22(21): 8280 (2022) - [c28]Hela Chamkhia, Aiman Erbad, Abdulla K. Al-Ali, Amr Mohamed, Ahmed Refaey, Mohsen Guizani:
PLS Performance Analysis of a Hybrid NOMA-OMA based IoT System with Mobile Sensors. WCNC 2022: 1419-1424 - 2021
- [j16]Devrim Unal, Abdulla K. Al-Ali, Ferhat Özgür Çatak, Mohammad Hammoudeh:
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. Future Gener. Comput. Syst. 125: 433-445 (2021) - [j15]Shahbaz Hussain, Javier Hernandez Fernandez, Abdulla Khalid Al-Ali, Abdullatif Shikfa:
Vulnerabilities and countermeasures in electrical substations. Int. J. Crit. Infrastructure Prot. 33: 100406 (2021) - [j14]Ali Ghubaish, Tara Salman, Maede Zolanvari, Devrim Unal, Abdulla K. Al-Ali, Raj Jain:
Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security. IEEE Internet Things J. 8(11): 8707-8718 (2021) - [j13]Sara Al-Emadi, Abdulla K. Al-Ali, Abdulaziz Al-Ali:
Audio-Based Drone Detection and Identification Using Deep Learning Techniques with Dataset Enhancement through Generative Adversarial Networks. Sensors 21(15): 4953 (2021) - [c27]Abderrazak Abdaoui, Aiman Erbad, Abdulla K. Al-Ali, Amr Mohamed, Mohsen Guizani:
A Robust Protocol for Smart eHealthcare based on Elliptic Curve Cryptography and Fuzzy logic in IoT. GLOBECOM (Workshops) 2021: 1-6 - [c26]Hela Chamkhia, Aiman Erbad, Abdullah Al-Ali, Amr Mohamed, Ahmed Refaey, Mohsen Guizani:
Security Performance Analysis of a Health System using Hybrid NOMA-OMA based IoT System. GLOBECOM (Workshops) 2021: 1-6 - [c25]Mahima Aggarwal, Mohammed Zubair, Devrim Unal, Abdulla K. Al-Ali, Thomas Reimann, Guillaume Alinier:
A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System. ICFNDS 2021: 58-63 - [c24]Sarah Kharbach, Abdulla K. Al-Ali, Omar Aboumarzouk, Julien Abinahed, Abdulla Al-Ansari, Georges Younes:
Content Validity and User Satisfaction Evaluation of Visualization Training Tool for Surgeons for Urethral Dissection during Robot-Assisted Radical Prostatectomy. ICMHI 2021: 209-214 - [c23]Hend Gedawy, Abdulla K. Al-Ali, Amr Mohamed, Aiman Erbad, Mohsen Guizani:
UAVs Smart heuristics for Target Coverage and Path Planning Through Strategic Locations. IWCMC 2021: 278-284 - [c22]Hela Chamkhia, Abdulla K. Al-Ali, Amr Mohamed, Mohsen Guizani, Aiman Erbad, Ahmed Refaey:
Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users. WF-IoT 2021: 633-638 - [i4]Mohammed Jouhari, Abdulla K. Al-Ali, Emna Baccour, Amr Mohamed, Aiman Erbad, Mohsen Guizani, Mounir Hamdi:
Distributed CNN Inference on Resource-Constrained UAVs for Surveillance Systems: Design and Optimization. CoRR abs/2105.11013 (2021) - 2020
- [j12]Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla K. Al-Ali, Xiaojiang Du, Ihsan Ali, Mohsen Guizani:
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. IEEE Commun. Surv. Tutorials 22(3): 1646-1685 (2020) - [j11]Jayakanth Kunhoth, AbdelGhani Karkar, Somaya Al-Máadeed, Abdulla K. Al-Ali:
Indoor positioning and wayfinding systems: a survey. Hum. centric Comput. Inf. Sci. 10: 18 (2020) - [j10]Heena Rathore, Chenglong Fu, Amr Mohamed, Abdulla K. Al-Ali, Xiaojiang Du, Mohsen Guizani, Zhengtao Yu:
Multi-layer security scheme for implantable medical devices. Neural Comput. Appl. 32(9): 4347-4360 (2020) - [c21]Asma O. Mahgoub, Nourhan Tarrad, Rana Elsherif, Loay Ismail, Abdulla K. Al-Ali:
Fire Alarm System for Smart Cities Using Edge Computing. ICIoT 2020: 597-602 - [c20]Salma Shalaby, Alaa Awad Abdellatif, Abdulla K. Al-Ali, Amr Mohamed, Aiman Erbad, Mohsen Guizani:
Performance Evaluation of Hyperledger Fabric. ICIoT 2020: 608-613 - [i3]Alaa Awad Abdellatif, Lutfi Samara, Amr Mohamed, Mohsen Guizani, Aiman Erbad, Abdulla K. Al-Ali:
Compress or Interfere? CoRR abs/2006.15342 (2020)
2010 – 2019
- 2019
- [j9]Heena Rathore, Abdulla Khalid Al-Ali, Amr Mohamed, Xiaojiang Du, Mohsen Guizani:
A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants. IEEE Access 7: 24154-24164 (2019) - [j8]Reza Shakeri, Mohammed Ali Al-Garadi, Ahmed Badawy, Amr Mohamed, Tamer Khattab, Abdulla K. Al-Ali, Khaled A. Harras, Mohsen Guizani:
Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey and Future Directions. IEEE Commun. Surv. Tutorials 21(4): 3340-3385 (2019) - [j7]Taha Belkhouja, Xiaojiang Du, Amr Mohamed, Abdulla K. Al-Ali, Mohsen Guizani:
Biometric-based authentication scheme for Implantable Medical Devices during emergency situations. Future Gener. Comput. Syst. 98: 109-119 (2019) - [j6]Mohamed Fathi Al-Sa'D, Abdulla K. Al-Ali, Amr Mohamed, Tamer Khattab, Aiman Erbad:
RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database. Future Gener. Comput. Syst. 100: 86-97 (2019) - [c19]Belal Essam ElDiwany, Alaa Awad Abdellatif, Amr Mohamed, Abdulla K. Al-Ali, Mohsen Guizani, Xiaojiang Du:
On Physical Layer Security in Energy-Efficient Wireless Health Monitoring Applications. ICC 2019: 1-7 - [c18]Mohammed Zubair, Devrim Unal, Abdulla K. Al-Ali, Abdullatif Shikfa:
Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices. ICFNDS 2019: 10:1-10:7 - [c17]Sara Al-Emadi, Abdulla K. Al-Ali, Amr Mohammad, Abdulaziz Al-Ali:
Audio Based Drone Detection and Identification using Deep Learning. IWCMC 2019: 459-464 - [c16]Abeer Z. Al-Marridi, Amr Mohamed, Aiman Erbad, Abdulla K. Al-Ali, Mohsen Guizani:
Efficient EEG Mobile Edge Computing and Optimal Resource Allocation for Smart Health Applications. IWCMC 2019: 1261-1266 - [c15]Alaa Awad Abdellatif, Lutfi Samara, Amr Mohamed, Abdulla K. Al-Ali, Aiman Erbad, Mohsen Guizani:
Compress or Interfere? SECON 2019: 1-6 - 2018
- [j5]Abdulrahman Fahim, Tamer A. ElBatt, Amr Mohamed, Abdulla K. Al-Ali:
Towards Extended Bit Tracking for Scalable and Robust RFID Tag Identification Systems. IEEE Access 6: 27190-27204 (2018) - [j4]Heena Rathore, Lothar Wenzel, Abdulla K. Al-Ali, Amr Mohamed, Xiaojiang Du, Mohsen Guizani:
Multi-Layer Perceptron Model on Chip for Secure Diabetic Treatment. IEEE Access 6: 44718-44730 (2018) - [j3]Taha Belkhouja, Xiaojiang Du, Amr Mohamed, Abdulla K. Al-Ali, Mohsen Guizani:
Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems. J. Sens. Actuator Networks 7(2): 21 (2018) - [c14]Taha Belkhouja, Amr Mohamed, Abdulla K. Al-Ali, Xiaojiang Du, Mohsen Guizani:
Light-Weight Solution to Defend Implantable Medical Devices against Man-In-The-Middle Attack. GLOBECOM 2018: 1-5 - [c13]Taha Belkhouja, Amr Mohamed, Abdulla K. Al-Ali, Xiaojiang Du, Mohsen Guizani:
Salt Generation for Hashing Schemes based on ECG readings for Emergency Access to Implantable Medical Devices. ISNCC 2018: 1-6 - [c12]Heena Rathore, Abdulla K. Al-Ali, Amr Mohamed, Xiaojiang Du, Mohsen Guizani:
DTW based Authentication for Wireless Medical Device Security. IWCMC 2018: 476-481 - [i2]Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla K. Al-Ali, Xiaojiang Du, Mohsen Guizani:
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. CoRR abs/1807.11023 (2018) - [i1]Reza Shakeri, Mohammed Ali Al-Garadi, Ahmed Badawy, Amr Mohamed, Tamer Khattab, Abdulla K. Al-Ali, Khaled A. Harras, Mohsen Guizani:
Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey, and Future Directions. CoRR abs/1810.09729 (2018) - 2017
- [c11]Taha Belkhouja, Xiaojiang Du, Amr Mohamed, Abdulla K. Al-Ali, Mohsen Guizani:
New Plain-Text Authentication Secure Scheme for Implantable Medical Devices with Remote Control. GLOBECOM 2017: 1-5 - [c10]Heena Rathore, Abdulla K. Al-Ali, Amr Mohamed, Xiaojiang Du, Mohsen Guizani:
DLRT: Deep Learning Approach for Reliable Diabetic Treatment. GLOBECOM 2017: 1-6 - [c9]Heena Rathore, Amr Mohamed, Abdulla K. Al-Ali, Xiaojiang Du, Mohsen Guizani:
A review of security challenges, attacks and resolutions for wireless medical devices. IWCMC 2017: 1495-1501 - [c8]Yahia Shabara, Amr Mohamed, Abdulla K. Al-Ali:
A Hardware Implementation for Efficient Spectrum Access in Cognitive Radio Networks. WCNC 2017: 1-6 - [c7]Taha Belkhouja, Amr Mohamed, Abdulla K. Al-Ali, Xiaojiang Du, Mohsen Guizani:
Light-weight encryption of wireless communication for implantable medical devices using henon chaotic system (invited paper). WINCOM 2017: 1-6 - 2016
- [c6]Hany Kamal Hassan, Amr Mohamed, Abdulla K. Al-Ali:
DSA-Based Energy Efficient Cellular Networks: Integration with the Smart Grid. VTC Fall 2016: 1-6 - [c5]Ahmed M. Salama, Abdulla K. Al-Ali, Amr Mohamed:
An evolutionary game theoretic approach for cooperative spectrum sensing. WCNC 2016: 1-6 - 2015
- [j2]Abdulla K. Al-Ali, Yifan Sun, Marco Di Felice, Jarkko Paavola, Kaushik R. Chowdhury:
Accessing Spectrum Databases Using Interference Alignment in Vehicular Cognitive Radio Networks. IEEE Trans. Veh. Technol. 64(1): 263-272 (2015) - [c4]Fan Zhou, Abdulla K. Al-Ali, Kaushik R. Chowdhury:
Investigation of TCP Protocols in Dynamically Varying Bandwidth Conditions. CrownCom 2015: 176-186 - 2014
- [c3]Abdulla K. Al-Ali, Kaushik R. Chowdhury, Marco Di Felice, Jarkko Paavola:
Querying spectrum databases and improved sensing for vehicular cognitive radio networks. ICC 2014: 1379-1384 - [c2]Abdulla K. Al-Ali, Kaushik Roy Chowdhury:
Simulating dynamic spectrum access using ns-3 for wireless networks in smart environments. SECON Workshops 2014: 28-33 - 2013
- [j1]Abdulla K. Al-Ali, Kaushik R. Chowdhury:
TFRC-CR: An equation-based transport protocol for cognitive radio networks. Ad Hoc Networks 11(6): 1836-1847 (2013) - [c1]Abdulla K. Al-Ali, Kaushik R. Chowdhury:
TFRC-CR: An equation-based transport protocol for cognitive radio networks. ICNC 2013: 143-148
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint