Now showing items 1690-1709 of 2262

    • PredictPTB: an interpretable preterm birth prediction model using attention-based recurrent neural networks 

      AlSaad, Rawan; Malluhi, Qutaibah; Boughorbel, Sabri ( BioMed Central Ltd , 2022 , Article)
      Background: Early identification of pregnant women at risk for preterm birth (PTB), a major cause of infant mortality and morbidity, has a significant potential to improve prenatal care. However, we lack effective predictive ...
    • Preface 

      Jaoua, Ali; Jaam, Jihad Mohamad; Hasnah, Ahmad; Akbar, Abdulhamid Sadiq ( Elsevier , 2003 , Article)
      In recent years the involvement of Information Technology in business, governments, and education has increased dramatically. More and more research works have been conducted in different areas of Information Technology such ...
    • Preface : Distributed Computing and Artificial Intelligence, 12th International Conference 

      Omatu, Sigeru; Gonzalez, Sara Rodríguez; Giulioni, Gianfranco; Malluhi, Qutaibah M.; Bocewicz, Grzegorz; ... more authors ( Springer , 2015 , Other)
      The 12th International Symposium on Distributed Computing and Artificial Intelligence 2015 (DCAI 2015) is a forum to present applications of innovative techniques for solving complex problems in these areas. The exchange ...
    • Preference-based semantic matching of web service security policies 

      Alhazbi, Saleh; Khan, Kahled M.; Erradi, Abdelkarim ( IEEE , 2013 , Conference Paper)
      This electronic document is a live template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document. 2013 IEEE.
    • Present landscape of quantum computing 

      Hassija, Vikas; Chamola, Vinay; Saxena, Vikas; Chanana, Vaibhav; Parashari, Prakhar; ... more authors ( John Wiley and Sons Inc , 2020 , Other)
      Quantum computing is currently a topic of interest that harnesses the phenomena of quantum mechanics. It can address several scientific challenges and generate new business opportunities. Recently, for the first time in ...
    • Prioritizing deadline-constrained data flows in cloud datacenter networks 

      Khabbaz, Maurice; Shaban, Khaled; Assi, Chadi; Qu, Long ( Association for Computing Machinery , 2016 , Conference Paper)
      Real-time interactive application workloads (e.g. web search, social networking, etc.) are composed of a remarkably large number of mini request partitions that require stringent delayminimal aggregation of responses and ...
    • Priority-based medium access control for wireless body area networks with high-performance design 

      Sun G.; Wang K.; Yu H.; Du X.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      The wireless body area network (WBAN) has attracted considerable attention. Two main problems exist in WBANs: 1) the quality of service (QoS) requirements and 2) the energy efficiency of data transmission. To solve the ...
    • Privacy and security issues in online social networks 

      Ali, Shaukat; Islam, Naveed; Rauf, Azhar; Din, Ikram U.; Guizani, Mohsen; ... more authors ( MDPI AG , 2018 , Article)
      The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual ...
    • Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study 

      Xu, Rixin; Zeng, Qiang; Zhu, Liehuang; Chi, Haotian; Du, Xiaojiang; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ...
    • Privacy Preservation of Aggregated Data Using Virtual Battery in the Smart Grid 

      Kserawi, Fawaz; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Smart Meters (SM) are IoT end devices used to collect user utility consumption with limited processing power on the edge of the smart grid (SG). While SMs have great applications in providing data analysis to the utility ...
    • Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs 

      Wang, Yongge; Malluhi, Qutaibah M. ( Springer , 2022 , Conference Paper)
      When users store encrypted data in a cloud environment, it is important for users to ask cloud to carry out some computation on the remote data remotely. ORAM is a good potential approach to carry out this kind of remote ...
    • Privacy-Aware Collaborative Task Offloading in Fog Computing 

      Razaq, Mian Muaz; Tak, Byungchul; Peng, Limei; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Numerous new applications have been proliferated with the mature of 5G, which generates a large number of latency-sensitive and computationally intensive mobile data requests. The real-time requirement of these mobile data ...
    • Privacy-preserving artificial intelligence in healthcare: Techniques and applications 

      Khalid, Nazish; Qayyum, Adnan; Bilal, Muhammad; Al-Fuqaha, Ala; Qadir, Junaid ( Elsevier , 2023 , Article Review)
      There has been an increasing interest in translating artificial intelligence (AI) research into clinically-validated applications to improve the performance, capacity, and efficacy of healthcare services. Despite substantial ...
    • Privacy-preserving Deep-learning Models for Fingerprint Data using Differential Privacy 

      Mohammadi, Maryam; Sabry, Farida; Labda, Wadha; Malluhi, Qutaibah ( Association for Computing Machinery, Inc , 2023 , Conference Paper)
      Fingerprint recognition is a widely adopted biometric authentication method that leverages the unique characteristics of fingerprints to identify individuals. Its applications range from access control and authentication ...
    • Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems 

      Tabassum A.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Existing techniques for incremental learning are computationally expensive and produce duplicate features leading to higher false positive and true negative rates. We propose a novel privacy-preserving intrusion detection ...
    • Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation 

      Kserawi, Fawaz; Al-Marri, Saeed; Malluhi, Qutaibah ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      The edge of the smart grid has a massive number of power and resource-constrained interconnected devices. Mainly, smart meters report power consumption data from consumer homes, industrial buildings, and other connected ...
    • A Privacy-Preserving Medical Data Sharing Scheme Based on Consortium Blockchain 

      Liu, Jingwei; Liang, Tianyu; Sun, Rong; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Electronic medical records (EMRs) can provide medical institutes with a number of research materials, which could promote the development of medical field. In order to protect patients' privacy while achieving efficient ...
    • Privacy-Preserving Support Vector Machine Training over Blockchain-Based Encrypted IoT Data in Smart Cities 

      Shen M.; Tang X.; Zhu L.; Du X.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      Machine learning (ML) techniques have been widely used in many smart city sectors, where a huge amount of data is gathered from various (IoT) devices. As a typical ML model, support vector machine (SVM) enables efficient ...
    • Private Function Evaluation Using Intel's SGX 

      Abou Selo, Omar; Rachid, Maan Haj; Shikfa, Abdullatif; Wang, Yongge; Malluhi, Qutaibah ( John Wiley and Sons Inc , 2020 , Article)
      Private Function Evaluation (PFE) is the problem of evaluating one party's private data using a private function owned by another party. Existing solutions for PFE are based on universal circuits evaluated in secure ...
    • PRNU Estimation based on Weighted Averaging for Source Smartphone Video Identification 

      Lawgaly, Ashref; Khelifi, Fouad; Bouridane, Ahmed; Al-Maaddeed, Somaya; Akbari, Younes ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Photo response non-uniformity (PRNU) noise is a sensor pattern noise characterizing imperfections in the imaging device. The PRNU is a unique noise for each sensor device, and it has been generally utilized in the literature ...