[go: up one dir, main page]

Follow
Aiman Erbad
Aiman Erbad
Professor and VP Research, Qatar University
Verified email at qu.edu.qa - Homepage
Title
Cited by
Cited by
Year
Security services using blockchains: A state of the art survey
T Salman, M Zolanvari, A Erbad, R Jain, M Samaka
IEEE communications surveys & tutorials 21 (1), 858-880, 2018
6412018
Potentials, trends, and prospects in edge technologies: Fog, cloudlet, mobile edge, and micro data centers
K Bilal, O Khalid, A Erbad, SU Khan
Computer Networks 130, 94-120, 2018
4722018
Cybersecurity for Industrial Control Systems: A Survey
D Bhamare, M Zolanvari, A Erbad, R Jain, K Khan, N Meskin
Computers & Security 89, 101677, 2020
4532020
A survey on service function chaining
D Bhamare, R Jain, M Samaka, A Erbad
Journal of Network and Computer Applications 75, 138-155, 2016
4152016
Edge Computing For Smart Health: Context-aware Approaches, Opportunities, and Challenges
AA Abdellatif, A Mohamed, CF Chiasserini, M Tlili, A Erbad
IEEE Network, 2019
3282019
RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database
MF Al-Sa’d, A Al-Ali, A Mohamed, T Khattab, A Erbad
Future Generation Computer Systems 100, 86-97, 2019
3262019
Optimal virtual network function placement in multi-cloud service function chaining architecture
D Bhamare, M Samaka, A Erbad, R Jain, L Gupta, HA Chan
Computer Communications 102, 1-16, 2017
2602017
Pervasive AI for IoT applications: A Survey on Resource-efficient Distributed Artificial Intelligence
E Baccour, N Mhaisen, AA Abdellatif, A Erbad, A Mohamed, M Hamdi, ...
IEEE Communications Surveys & Tutorials, 2022
2242022
MEdge-Chain: Leveraging Edge Computing and Blockchain for Efficient Medical Data Exchange
AA Abdellatif, L Samara, A Mohamed, A Erbad, CF Chiasserini, M Guizani, ...
IEEE Internet of Things Journal, 2021
2172021
Optimal User-Edge Assignment in Hierarchical Federated Learning based on Statistical Properties and Network Topology Constraints
N Mhaisen, A Awad, A Mohamed, A Erbad, M Guizani
IEEE Transactions on Network Science and Engineering, 2021
1752021
Machine learning for anomaly detection and categorization in multi-cloud environments
T Salman, D Bhamare, A Erbad, R Jain, M Samaka
2017 IEEE 4th international conference on cyber security and cloud computing …, 2017
1752017
Communication-efficient hierarchical federated learning for IoT heterogeneous systems with imbalanced data
AA Abdellatif, N Mhaisen, A Mohamed, A Erbad, M Guizani, Z Dawy, ...
Future Generation Computer Systems 128, 406-419, 2022
1622022
ssHealth: toward secure, blockchain-enabled healthcare systems
AA Abdellatif, AZ Al-Marridi, A Mohamed, A Erbad, CF Chiasserini, ...
IEEE Network 34 (4), 312-319, 2020
1622020
DroneRF dataset: A dataset of drones for RF-based detection, classification and identification
MHDS Allahham, MF Al-Sa'd, A Al-Ali, A Mohamed, T Khattab, A Erbad
Data in brief 26, 104313, 2019
1602019
Fedgan-ids: Privacy-preserving ids using gan and federated learning
A Tabassum, A Erbad, W Lebda, A Mohamed, M Guizani
Computer Communications 192, 299-310, 2022
1462022
Edge computing for interactive media and video streaming
K Bilal, A Erbad
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC …, 2017
1452017
Feasibility of supervised machine learning for cloud security
D Bhamare, T Salman, M Samaka, A Erbad, R Jain
2016 International Conference on Information Science and Security (ICISS), 1-5, 2016
1432016
A survey on mobile edge computing for video streaming: Opportunities and challenges
MA Khan, E Baccour, Z Chkirbene, A Erbad, R Hamila, M Hamdi, ...
IEEE Access 10, 120514-120550, 2022
1242022
Deanonymizing Tor hidden service users through Bitcoin transactions analysis
H Al Jawaheri, M Al Sabah, Y Boshmaf, A Erbad
Computers & Security 89, 101684, 2020
1242020
TIDCS: A dynamic intrusion detection and classification system based feature selection
Z Chkirbene, A Erbad, R Hamila, A Mohamed, M Guizani, M Hamdi
IEEE access 8, 95864-95877, 2020
1122020
The system can't perform the operation now. Try again later.
Articles 1–20