Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges H Shakhatreh, AH Sawalmeh, A Al-Fuqaha, Z Dou, E Almaita, I Khalil, ... Ieee Access 7, 48572-48634, 2019 | 2089 | 2019 |
Systematization of knowledge (sok): A systematic review of software-based web phishing detection Z Dou, I Khalil, A Khreishah, A Al-Fuqaha, M Guizani IEEE Communications Surveys & Tutorials 19 (4), 2797-2819, 2017 | 118 | 2017 |
Use of network latency profiling and redundancy for cloud server selection M Kwon, Z Dou, W Heinzelman, T Soyata, H Ba, J Shi 2014 IEEE 7th International Conference on Cloud Computing, 826-832, 2014 | 61 | 2014 |
Robust insider attacks countermeasure for Hadoop: Design and implementation Z Dou, I Khalil, A Khreishah, A Al-Fuqaha IEEE Systems Journal 12 (2), 1874-1885, 2017 | 26 | 2017 |
Unmanned aerial vehicles: A survey on civil applications and key research challenges. arXiv 2018 H Shakhatreh, A Sawalmeh, A Al-Fuqaha, Z Dou, E Almaita, I Khalil, ... arXiv preprint arXiv:1805.00881, 0 | 25 | |
A novel privacy-preserving federated genome-wide association study framework and its application in identifying potential risk variants in ankylosing spondylitis X Wu, H Zheng, Z Dou, F Chen, J Deng, X Chen, S Xu, G Gao, M Li, ... Briefings in bioinformatics 22 (3), bbaa090, 2021 | 24 | 2021 |
TPM-based authentication mechanism for apache hadoop I Khalil, Z Dou, A Khreishah International Conference on Security and Privacy in Communication Networks …, 2015 | 20 | 2015 |
A novel and robust authentication factor based on network communications latency Z Dou, I Khalil, A Khreishah IEEE Systems Journal 12 (4), 3279-3290, 2017 | 10 | 2017 |
CLAS: A novel communications latency based authentication scheme Z Dou, I Khalil, A Khreishah Security and Communication Networks 2017 (1), 4286903, 2017 | 8 | 2017 |
Benefits of utilizing an edge server (cloudlet) in the mocha architecture Z Dou University of Rochester. Department of Electrical and Computer Engineering, 2013 | 8 | 2013 |
Your credentials are compromised, do not panic: You can be well protected I Khalil, Z Dou, A Khreishah Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 5 | 2016 |
Data sharing and privacy in pharmaceutical studies R Chen, Y Zhang, Z Dou, F Chen, K Xie, S Wang Current Pharmaceutical Design 27 (7), 911-918, 2021 | 2 | 2021 |
生物医疗大数据隐私与安全保护的应对策略与技术 窦佐超, 汪诚弘, 邓杰仁, 郑灏, 谢康, 沈百荣, 王爽 中华医学图书情报杂志 28 (11), 11-15, 2019 | 2 | 2019 |
Secure entity authentication Z Dou New Jersey Institute of Technology, 2018 | 2 | 2018 |
联盟学习在生物医学大数据隐私保护中的原理与应用 窦佐超, 陈峰, 邓杰仁, 陈如梵, 郑灏, 孙琪, 谢康, 沈百荣, 王爽 医学信息学杂志 41 (5), 2-10, 2020 | | 2020 |