Blockchain-enabled and data-driven smart healthcare solution for secure and privacy-preserving data access M Younis, W Lalouani, N Lasla, L Emokpae, M Abdallah IEEE Systems Journal 16 (3), 3746-3757, 2021 | 34 | 2021 |
Smart multimodal telehealth-IoT system for COVID-19 patients LE Emokpae, RN Emokpae, W Lalouani, M Younis IEEE Pervasive Computing 20 (2), 73-80, 2021 | 28 | 2021 |
Optimized repair of a partitioned network topology W Lalouani, M Younis, N Badache Computer Networks 128, 63-77, 2017 | 22 | 2017 |
Interconnecting isolated network segments through intermittent links W Lalouani, M Younis, N Badache Journal of Network and Computer Applications 108, 53-63, 2018 | 20 | 2018 |
A novel modeling-attack resilient arbiter-PUF design M Ebrahimabadi, M Younis, W Lalouani, N Karimi 2021 34th International Conference on VLSI Design and 2021 20th …, 2021 | 14 | 2021 |
A wearable multi-modal acoustic system for breathing analysis LE Emokpae, RN Emokpae, E Bowry, J Bin Saif, M Mahmud, W Lalouani, ... The Journal of the Acoustical Society of America 151 (2), 1033-1038, 2022 | 12 | 2022 |
Robust distributed intrusion detection system for edge of things W Lalouani, M Younis 2021 IEEE Global Communications Conference (GLOBECOM), 01-06, 2021 | 10 | 2021 |
Countering PUF modeling attacks through adversarial machine learning M Ebrahimabadi, W Lalouani, M Younis, N Karimi 2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 356-361, 2021 | 9 | 2021 |
Energy-efficient collection of wearable sensor data through predictive sampling W Lalouani, M Younis, I White-Gittens, RN Emokpae Jr, LE Emokpae Smart Health 21, 100208, 2021 | 9 | 2021 |
Countering modeling attacks in puf-based iot security solutions W Lalouani, M Younis, M Ebrahimabadi, N Karimi ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-28, 2022 | 8 | 2022 |
Countering radiometric signature exploitation using adversarial machine learning based protocol switching W Lalouani, M Younis, U Baroudi Computer Communications 174, 109-121, 2021 | 8 | 2021 |
Mitigating voltage fingerprint spoofing attacks on the controller area network bus W Lalouani, Y Dang, M Younis Cluster Computing 26 (2), 1447-1460, 2023 | 7 | 2023 |
Dynamic road management in the era of cav M Younis, S Lee, W Lalouani, D Tan, S Gupte Connected and Autonomous Vehicles in Smart Cities, 133-172, 2020 | 6 | 2020 |
Sec-PUF: Securing UAV Swarms Communication with Lightweight Physical Unclonable Functions W Lalouani 2023 19th International Conference on Wireless and Mobile Computing …, 2023 | 5 | 2023 |
Collusion-resistant. lightweight and privacy-preserving authentication protocol for iov W Lalouani, M Younis 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), 269-274, 2023 | 4 | 2023 |
Sweet: Security protocol for wearables embedded devices’ data transmission M Ebrahimabadi, M Younis, W Lalouani, A Alshaeri, N Karimi 2022 IEEE International Conference on E-health Networking, Application …, 2022 | 4 | 2022 |
A robust distributed intrusion detection system for collusive attacks on edge of things W Lalouani, M Younis 2022 IEEE Wireless Communications and Networking Conference (WCNC), 1004-1009, 2022 | 4 | 2022 |
PALM: platoons based adaptive traffic light control system for mixed vehicular traffic D Tan, M Younis, W Lalouani, S Lee 2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2021 | 4 | 2021 |
Multi-observable reputation scoring system for flagging suspicious user sessions W Lalouani, M Younis Computer Networks 182, 107474, 2020 | 4 | 2020 |
DPark: decentralized smart private-parking system using blockchains G Brenner, M Baza, A Rasheed, W Lalouani, M Badr, H Alshahrani Journal of Grid Computing 21 (3), 43, 2023 | 2 | 2023 |