Now showing items 20152-20171 of 49434

    • Priority-based scheduling for limited energy cognitive relaying 

      Elsaadany M.; Khattab T.; Hasna , Mazen; Abdallah M.; Khairy M. ( IEEE , 2010 , Conference Paper)
      We study the problem of cognitive relaying with limited-energy constraint in opportunistic spectrum access cognitive networks. Under this network setting, the cognitive user increases the spectrum availability for its own ...
    • Priority-based zero-forcing in spectrum sharing cognitive systems 

      Hamdi K.; Hasna , Mazen; Ghrayeb A.; Letaief K.B. ( IEEE , 2013 , Article)
      We consider a spectrum sharing scenario between cognitive radio (CR) users and a licensed primary user (PU), in which the PU is not able to successfully transmit data to its destined receiver. The cognitive base station ...
    • Privacy and gendered spaces in Arab Gulf homes 

      Sobh, Rana; Belk, Russell W. ( Taylor & Francis , 2015 , Article)
      We report the findings of a qualitative study of Qatari homes in the Arab Gulf. We identify the significance of privacy and gender segregation as anchors for identity, both national and religious. Maintaining these anchors ...
    • Privacy and security issues in online social networks 

      Ali, Shaukat; Islam, Naveed; Rauf, Azhar; Din, Ikram U.; Guizani, Mohsen; ... more authors ( MDPI AG , 2018 , Article)
      The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual ...
    • Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study 

      Xu, Rixin; Zeng, Qiang; Zhu, Liehuang; Chi, Haotian; Du, Xiaojiang; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ...
    • Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes 

      Wang, Yongge; Malluhi, Qutaibah M. ( Springer Verlag , 2016 , Conference Paper)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • Privacy-Aware Collaborative Task Offloading in Fog Computing 

      Razaq, Mian Muaz; Tak, Byungchul; Peng, Limei; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Numerous new applications have been proliferated with the mature of 5G, which generates a large number of latency-sensitive and computationally intensive mobile data requests. The real-time requirement of these mobile data ...
    • Privacy-preserving artificial intelligence in healthcare: Techniques and applications 

      Khalid, Nazish; Qayyum, Adnan; Bilal, Muhammad; Al-Fuqaha, Ala; Qadir, Junaid ( Elsevier , 2023 , Article Review)
      There has been an increasing interest in translating artificial intelligence (AI) research into clinically-validated applications to improve the performance, capacity, and efficacy of healthcare services. Despite substantial ...
    • Privacy-preserving data aggregation in smart power grid systems 

      Kserawi, Fawaz Ahmad (2021 , Master Thesis)
      Smart Meters (SMs) are IoT end devices used to collect user utility consumption withlimited processing power on the edge of the smart grid (SG). While SMs have significantapplications in providing data analysis to the ...
    • PRIVACY-PRESERVING DECENTRALIZED INTRUSION DETECTION SYSTEM FOR IOT DEVICES USING DEEP LEARNING 

      TABASSUM, ALIYA (2022 , Dissertation)
      The convergence of advanced networking, breakthrough distributed systems technologies, and smart services has rapidly expanded the threat landscape for IoT devices. Researchers have been looking into lightweight and ...
    • Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems 

      Tabassum A.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Existing techniques for incremental learning are computationally expensive and produce duplicate features leading to higher false positive and true negative rates. We propose a novel privacy-preserving intrusion detection ...
    • Privacy-preserving federated learning cyber-threat detection for intelligent transport systems with blockchain-based security 

      Moulahi, Tarek; Jabbar, Rateb; Alabdulatif, Abdulatif; Abbas, Sidra; El Khediri, Salim; ... more authors ( John Wiley and Sons Inc , 2022 , Article)
      Artificial intelligence (AI) techniques implemented at a large scale in intelligent transport systems (ITS), have considerably enhanced the vehicles' autonomous behaviour in making independent decisions about cyber threats, ...
    • A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks 

      Xiaobei, Yan; Ma, Maode ( Elsevier Ltd , 2022 , Article)
      Machine Type Communication (MTC) has been emerging for a wide range of applications and services for the Internet of Things (IoT). In some scenarios, a large group of MTC devices (MTCDs) may enter the communication coverage ...
    • A Privacy-Preserving Medical Data Sharing Scheme Based on Consortium Blockchain 

      Liu, Jingwei; Liang, Tianyu; Sun, Rong; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Electronic medical records (EMRs) can provide medical institutes with a number of research materials, which could promote the development of medical field. In order to protect patients' privacy while achieving efficient ...
    • Privacy-Preserving Support Vector Machine Training over Blockchain-Based Encrypted IoT Data in Smart Cities 

      Shen M.; Tang X.; Zhu L.; Du X.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      Machine learning (ML) techniques have been widely used in many smart city sectors, where a huge amount of data is gathered from various (IoT) devices. As a typical ML model, support vector machine (SVM) enables efficient ...
    • Private Function Evaluation Using Intel's SGX 

      Abdurahiman, Nihal; Qadeib alban, Ahmad; shikfa, abdullatif; Malluhi, Qutaibah ( Qatar University Press , 2020 , Poster)
      Private Function Evaluation (PFE) is the problem of evalu- ating one party's private data using a private function owned by another party. Several techniques were presented to tackle PFE by running universal circuits in ...
    • PRIVATIZATION AND CORPORATE PERFORMANCE 

      Abu-Abbas, Bassam ( Vallecchi Editore , 2016 , Article)
      This study investigates the effect of privatization on corporate performance in the mining, financial and services sectors in Jordan as a case study of privatization experience of an emerging market. The study includes six ...
    • Privileged but Immobile: Citizenship and Career Path of the Youths of Bicultural Families in Kuwait 

      WATANABE, Akiko ( Gulf Studies center - College of Arts & Sciences - Qatar University , 2020 , Conference Paper)
      This paper aims to depict privilegedness yet immobilities of the youths of bicultural families on their citizenship and career path, particularly on the second generations who have roots of Filipino traits on one side and ...
    • PriviPK: Certificate-less and secure email communication 

      AlSabah, Mashael; Tomescu, Alin; Lebedev, Ilia; Serpanos, Dimitrios; Devadas, Srini ( Elsevier Ltd , 2017 , Article)
      We introduce PriviPK, an infrastructure that is based on a novel combination of certificateless (CL) cryptography and key transparency techniques to enable e2e email encryption. Our design avoids (1) key escrow and deployment ...
    • PRMT5-PTEN molecular pathway regulates senescence and self-renewal of primary glioblastoma neurosphere cells 

      Banasavadi-Siddegowda, Y K; Russell, L; Frair, E; Karkhanis, V A; Relation, T; ... more authors ( Nature Publishing Group , 2017 , Article)
      Glioblastoma (GBM) represents the most common and aggressive histologic subtype among malignant astrocytoma and is associated with poor outcomes because of heterogeneous tumour cell population including mature non-stem-like ...