السجلات المعروضة 6035 -- 6054 من 7996

    • Priority-based medium access control for wireless body area networks with high-performance design 

      Sun G.; Wang K.; Yu H.; Du X.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      The wireless body area network (WBAN) has attracted considerable attention. Two main problems exist in WBANs: 1) the quality of service (QoS) requirements and 2) the energy efficiency of data transmission. To solve the ...
    • Priority-based scheduling for limited energy cognitive relaying 

      Elsaadany M.; Khattab T.; Hasna , Mazen; Abdallah M.; Khairy M. ( IEEE , 2010 , Conference Paper)
      We study the problem of cognitive relaying with limited-energy constraint in opportunistic spectrum access cognitive networks. Under this network setting, the cognitive user increases the spectrum availability for its own ...
    • Priority-based zero-forcing in spectrum sharing cognitive systems 

      Hamdi K.; Hasna , Mazen; Ghrayeb A.; Letaief K.B. ( IEEE , 2013 , Article)
      We consider a spectrum sharing scenario between cognitive radio (CR) users and a licensed primary user (PU), in which the PU is not able to successfully transmit data to its destined receiver. The cognitive base station ...
    • Privacy and security issues in online social networks 

      Ali, Shaukat; Islam, Naveed; Rauf, Azhar; Din, Ikram U.; Guizani, Mohsen; ... more authors ( MDPI AG , 2018 , Article)
      The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual ...
    • Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study 

      Xu, Rixin; Zeng, Qiang; Zhu, Liehuang; Chi, Haotian; Du, Xiaojiang; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ...
    • Privacy Preservation of Aggregated Data Using Virtual Battery in the Smart Grid 

      Kserawi, Fawaz; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Smart Meters (SM) are IoT end devices used to collect user utility consumption with limited processing power on the edge of the smart grid (SG). While SMs have great applications in providing data analysis to the utility ...
    • Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs 

      Wang, Yongge; Malluhi, Qutaibah M. ( Springer , 2022 , Conference Paper)
      When users store encrypted data in a cloud environment, it is important for users to ask cloud to carry out some computation on the remote data remotely. ORAM is a good potential approach to carry out this kind of remote ...
    • Privacy-Aware Collaborative Task Offloading in Fog Computing 

      Razaq, Mian Muaz; Tak, Byungchul; Peng, Limei; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Numerous new applications have been proliferated with the mature of 5G, which generates a large number of latency-sensitive and computationally intensive mobile data requests. The real-time requirement of these mobile data ...
    • Privacy-preserving artificial intelligence in healthcare: Techniques and applications 

      Khalid, Nazish; Qayyum, Adnan; Bilal, Muhammad; Al-Fuqaha, Ala; Qadir, Junaid ( Elsevier , 2023 , Article Review)
      There has been an increasing interest in translating artificial intelligence (AI) research into clinically-validated applications to improve the performance, capacity, and efficacy of healthcare services. Despite substantial ...
    • Privacy-preserving Deep-learning Models for Fingerprint Data using Differential Privacy 

      Mohammadi, Maryam; Sabry, Farida; Labda, Wadha; Malluhi, Qutaibah ( Association for Computing Machinery, Inc , 2023 , Conference Paper)
      Fingerprint recognition is a widely adopted biometric authentication method that leverages the unique characteristics of fingerprints to identify individuals. Its applications range from access control and authentication ...
    • Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems 

      Tabassum A.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Existing techniques for incremental learning are computationally expensive and produce duplicate features leading to higher false positive and true negative rates. We propose a novel privacy-preserving intrusion detection ...
    • Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation 

      Kserawi, Fawaz; Al-Marri, Saeed; Malluhi, Qutaibah ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      The edge of the smart grid has a massive number of power and resource-constrained interconnected devices. Mainly, smart meters report power consumption data from consumer homes, industrial buildings, and other connected ...
    • A Privacy-Preserving Medical Data Sharing Scheme Based on Consortium Blockchain 

      Liu, Jingwei; Liang, Tianyu; Sun, Rong; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Electronic medical records (EMRs) can provide medical institutes with a number of research materials, which could promote the development of medical field. In order to protect patients' privacy while achieving efficient ...
    • Privacy-Preserving Support Vector Machine Training over Blockchain-Based Encrypted IoT Data in Smart Cities 

      Shen M.; Tang X.; Zhu L.; Du X.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      Machine learning (ML) techniques have been widely used in many smart city sectors, where a huge amount of data is gathered from various (IoT) devices. As a typical ML model, support vector machine (SVM) enables efficient ...
    • Private Function Evaluation Using Intel's SGX 

      Abou Selo, Omar; Rachid, Maan Haj; Shikfa, Abdullatif; Wang, Yongge; Malluhi, Qutaibah ( John Wiley and Sons Inc , 2020 , Article)
      Private Function Evaluation (PFE) is the problem of evaluating one party's private data using a private function owned by another party. Existing solutions for PFE are based on universal circuits evaluated in secure ...
    • PRNU Estimation based on Weighted Averaging for Source Smartphone Video Identification 

      Lawgaly, Ashref; Khelifi, Fouad; Bouridane, Ahmed; Al-Maaddeed, Somaya; Akbari, Younes ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Photo response non-uniformity (PRNU) noise is a sensor pattern noise characterizing imperfections in the imaging device. The PRNU is a unique noise for each sensor device, and it has been generally utilized in the literature ...
    • PRNU-Net: a Deep Learning Approach for Source Camera Model Identification based on Videos Taken with Smartphone 

      Akbari, Younes; Almaadeed, Noor; Al-Maadeed, Somaya; Khelifi, Fouad; Bouridane, Ahmed ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Recent advances in digital imaging have meant that every smartphone has a video camera that can record high-quality video for free and without restrictions. In addition, rapidly developing Internet technology has contributed ...
    • Proactive power allocation and caching node selection for regular service guarantees 

      Abdellatif B.; Tadrous J.; Khafagy M.G.; Khattab T. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      This paper studies the potential of proactive resource allocation to prolong the communication sessions in networks with limited energy budgets and stringent quality-of-service (QoS) requirement, particularly a regular ...
    • Proactive spectrum sharing incentive for physical layer security enhancement using outdated CSI 

      Tourki, Kamel; Hasna, Mazen O. ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)
      We investigate the spectrum sharing possibility as an incentive to enhancing the physical layer security. The concept behind this is that a legitimate source-destination pair, communicating in the presence of a passive ...
    • Proactive Video Chunks Caching and Processing for Latency and Cost Minimization in Edge Networks 

      Baccour E.; Erbad A.; Mohamed A.; Bilal K.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Recently, the growing demand for rich multimedia content such as Video on Demand (VoD) has made the data transmission from content delivery networks (CDN) to end-users quite challenging. Edge networks have been proposed ...