• Establishing trust in cloud computing 

      Khan, K.M.; Malluhi, Q. ( IEEE Computer Society , 2010 , Article)
      How can cloud providers earn their customers' trust when a third party is processing sensitive data in a remote machine located in various countries? Emerging technologies can help address the challenges of trust in cloud ...
    • Heterogeneous Implementation of ECG Encryption and Identification on the Zynq SoC 

      Ali, Amine Ait Si; Zhai, Xiaojun; Amira, Abbes; Bensaali, Faycal; Ramzan, Naeem ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      This paper presents an innovative and safe connected health solution for human identification. The system consists of the encryption and decryption of ECG signals using the advanced encryption standard (AES) as well as the ...
    • Hierarchical Federated Learning for Collaborative IDS in IoT Applications 

      Saadat H.; Aboumadi A.; Mohamed A.; Erbad A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      As the Internet-of-Things devices are being very widely adopted in all fields, such as smart houses, healthcare, and transportation, extremely huge amounts of data are being gathered, shared, and processed. This fact raises ...
    • Optimal operation and management of multi-microgrids using blockchain technology 

      Ghotbabadi, Misagh Dehghani; Dehnavi, Saeed Daneshvar; Fotoohabadi, Hadi; Mehrjerdi, Hasan; Chabok, Hossein ( John Wiley and Sons Inc , 2021 , Article)
      This paper tries to address the optimal operation of networked microgrid from the reliability perspective in a correlated atmosphere for the wind generators. The suggested approach performs based on unscented transformation ...
    • Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes 

      Wang, Yongge; Malluhi, Qutaibah M. ( Springer Verlag , 2016 , Conference Paper)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • RL-Based Federated Learning Framework Over Blockchain (RL-FL-BC) 

      Riahi, Ali; Mohamed, Amr; Erbad, Aiman ( IEEE , 2023 , Article)
      Federated learning (FL) paradigms aim to amalgamate diverse data properties stored locally at each user, while preserving data privacy through sharing users’ learning experiences and iteratively aggregating their ...
    • Secure mHealth IoT data transfer from the patient to the hospital: A three-tier approach 

      Yaacoub E.; Abualsaud K.; Khattab T.; Guizani M.; Chehab A. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      eHealth and mHealth applications are gaining increasing importance with advances in the IoT and the ubiquity of sensor deployments. Measured IoT mHealth data needs to be captured, transmitted, and stored securely, without ...
    • Security services using blockchains: A state of the art survey 

      Salman, Tara; Zolanvari, Maede; Erbad, Aiman; Jain, Raj; Samaka, Mohammed ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      This paper surveys blockchain-based approaches for several security services. These services include authentication, confidentiality, privacy and access control list, data and resource provenance, and integrity assurance. ...
    • User privacy and data trustworthiness in mobile crowd sensing 

      He, Daojing; Chan, Sammy; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)
      Smartphones and other trendy mobile wearable devices are rapidly becoming the dominant sensing, computing and communication devices in peoples' daily lives. Mobile crowd sensing is an emerging technology based on the sensing ...