• Classification for Imperfect EEG Epileptic Seizure in IoT applications: A Comparative Study 

      Abualsaud K.; Mohamed A.; Khattab T.; Yaacoub E.; Hasna M.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Epileptic seizure detection could be detected through investigating the electroencephalography (EEG), which is deemed to be very important for IoT wearable sensor-based health systems. EEG-based classification is crucial ...
    • Combating jamming attacks in multi-channel IoT networks using game theory 

      Guizani, Mohsen; Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the ...
    • Dynamic Resource Allocation of eMBB-uRLLC Traffic in 5G New Radio 

      Al-Ali M.; Yaacoub E.; Mohamed A. ( IEEE Computer Society , 2020 , Conference Paper)
      5G technology is intended to support three promising services with heterogeneous requirements: Ultra-Reliable and Low Latency Communication (uRLLC), enhanced Mobile Broadband (eMBB) and massive Machine Type Communication ...
    • Energy-Aware Distributed Edge ML for mHealth Applications with Strict Latency Requirements 

      Hashash O.; Sharafeddine S.; Dawy Z.; Mohamed A.; Yaacoub E. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Edge machine learning (Edge ML) is expected to serve as a key enabler for real-time mobile health (mHealth) applications. However, its reliability is governed by the limited energy and computing resources of user equipment ...
    • Federated Learning Stability Under Byzantine Attacks 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Federated Learning (FL) is a machine learning approach that enables private and decentralized model training. Although FL has been shown to be very useful in several applications, its privacy constraints cause a lack of ...
    • Hybrid Physical Layer Security for Passive RFID Communication 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Thanks to its low cost, small weight and energy efficiency, passive radio frequency identification (RFID) backscatter communications systems have attracted a lot of attention in several application fields. However, such ...
    • Hybrid Physical Layer Security for Passive RFID Communication 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Thanks to its low cost, small weight and energy efficiency, passive radio frequency identification (RFID) backscatter communications systems have attracted a lot of attention in several application fields. However, such ...
    • I-SEE: Intelligent, Secure, and Energy-Efficient Techniques for Medical Data Transmission Using Deep Reinforcement Learning 

      Saria Allahham M.; Awad Abdellatif A.; Mohamed A.; Erbad A.; Yaacoub E.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      The rapid evolution of remote health monitoring applications is foreseen to be a crucial solution for facing an unpredictable health crisis and improving the quality of life. However, such applications come with many ...
    • IoT Anti-Jamming Strategy Using Game Theory and Neural Network 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread and its heterogeneity. In such networks, jamming attacks are widely used by malicious users to compromise the private and ...
    • IoT Anti-Jamming Strategy Using Game Theory and Neural Network 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread and its heterogeneity. In such networks, jamming attacks are widely used by malicious users to compromise the private and ...
    • On the delay of finite buffered multi-hop relay wireless internet of things 

      Elsamadouny A.; Hasna M.; Khattab T.; Abualsaud K.; Yaacoub E. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      The evolution of Internet of Things (IoT) as a new application in wireless networks mandates the utilization of wireless cooperative relaying to overcome the energy limitations of IoT devices. Multi-hop relaying is a ...
    • Optimizing Energy-Distortion Trade-off for Vital Signs Delivery in Mobile Health Applications 

      Almarridi A.; Kharbach S.; Yaacoub E.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Healthcare is considered a top priority worldwide, considering the swift increase in the number of chronic patients who require continuous monitoring. This motivates the researchers to develop scalable remote health ...
    • Robust Decentralized Federated Learning Using Collaborative Decisions 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Federated Learning (FL) has attracted a lot of attention in numerous applications due to recent data privacy regulations and increased awareness about data handling issues, combined with the ever-increasing big-data sizes. ...
    • Secure DoF for the MIMO MAC: The case of knowing eavesdropper's channel statistics only 

      Amir M.; Khattab T.; Yaacoub E.; Abualsaud K.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Physical layer security has attracted research attention as a means to achieve secure communication without the need for complicated upper layer encryption techniques. The secure degrees of freedom (SDoF) of various networks ...
    • Securing IoT Cooperative Networks Using Energy Harvesting. 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      An energy efficient and secure Internet of Things (IoT) healthcare system is proposed in this paper. By exploiting spatial diversity, energy harvesting and physical layer security techniques, the proposed approach secures ...
    • Securing IoT Cooperative Networks Using Energy Harvesting. 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      An energy efficient and secure Internet of Things (IoT) healthcare system is proposed in this paper. By exploiting spatial diversity, energy harvesting and physical layer security techniques, the proposed approach secures ...
    • Survey of Immersive Techniques for Surgical Care Telemedicine Applications 

      Elmoghazy S.; Yaacoub E.; Navkar N.V.; Mohamed A.; Erbad A. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      Telemedicine is one of the rising and innovative tools in medicine that allows the remote delivery of health services over the internet. This technology enables people who do not have direct and urgent access to expert ...
    • Towards Secure IoT Networks in Healthcare Applications: A Game Theoretic Anti-Jamming Framework 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      The internet of Things (IoT) is used to interconnect a massive number of heterogeneous resource constrained smart devices. This makes such networks exposed to various types of malicious attacks. In particular, jamming ...