Smart Health Solution Integrating IoT and Cloud: A Case Study of Voice Pathology Monitoring G Muhammad, SMM Rahman, A Alelaiwi, A Alamri IEEE Communications Magazine 55 (1), 69-73, 2017 | 275 | 2017 |
Toward end-to-end biometrics-based security for IoT infrastructure MS Hossain, G Muhammad, SMM Rahman, A Wadud, A Alelaiwi, ... IEEE Wireless Communications 23 (5), 44-51, 2016 | 113 | 2016 |
Sybil Defense Techniques in Online Social Networks: A Survey M Al-Qurishi, M Al-Rakhami, A Alamri, M AlRubaian, M Rahman, ... IEEE Access 5, 1200-1219, 2017 | 106 | 2017 |
Pke-aet: Public key encryption with authorized equality test K Huang, R Tso, YC Chen, SMM Rahman, A Almogren, A Alamri The Computer Journal 58 (10), 2686-2697, 2015 | 97 | 2015 |
A software defined network routing in wireless multihop network J Wang, Y Miao, P Zhou, MS Hossain, SMM Rahman Journal of Network and Computer Applications 85, 76-83, 2017 | 95 | 2017 |
Anonymous on-demand position-based routing in mobile ad-hoc networks SMM Rahman, A Inomata, M Mambo, E Okamoto Information and Media Technologies 1 (2), 1191-1203, 2006 | 95 | 2006 |
Leveraging analysis of user behavior to identify malicious activities in large-scale social networks M Al-Qurishi, MS Hossain, M Alrubaian, SMM Rahman, A Alamri IEEE Transactions on Industrial Informatics 14 (2), 799-813, 2017 | 89 | 2017 |
Privacy-Preserved, Provable Secure, Mutually Authenticated Key Agreement Protocol for Healthcare in a Smart City Environment S Khatoon, SMM Rahman, M Alrubaian, A Alamri IEEE Access 7, 47962-47971, 2019 | 77 | 2019 |
Private key agreement and secure communication for heterogeneous sensor networks SMM Rahman, K El-Khatib Journal of Parallel and Distributed Computing 70 (8), 858-870, 2010 | 68 | 2010 |
A prediction system of Sybil attack in social network using deep-regression model M Al-Qurishi, M Alrubaian, SMM Rahman, A Alamri, MM Hassan Future Generation Computer Systems 87, 743-753, 2018 | 66 | 2018 |
Continuous authentication by electrocardiogram data M Guennoun, N Abbad, J Talom, SMM Rahman, K El-Khatib 2009 IEEE Toronto International Conference Science and Technology for …, 2009 | 61 | 2009 |
Proposal and evaluation of a dynamic resource allocation method based on the load of VMs on IaaS A Inomata, T Morikawa, M Ikebe, Y Okamoto, S Noguchi, K Fujikawa, ... 2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011 | 51 | 2011 |
TOLA: Topic-oriented learning assistance based on cyber-physical system and big data J Song, Y Zhang, K Duan, MS Hossain, SMM Rahman Future Generation Computer Systems 75, 200-205, 2017 | 44 | 2017 |
Secure time synchronization for wireless sensor networks based on bilinear pairing functions M Rahman, K El-Khatib IEEE Transactions on Parallel and Distributed Systems, 2010 | 40 | 2010 |
Chaos-cryptography based privacy preservation technique for video surveillance SMM Rahman, MA Hossain, H Mouftah, A El Saddik, E Okamoto Multimedia systems 18 (2), 145-155, 2012 | 38 | 2012 |
Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud R Tso, A Alelaiwi, SMM Rahman, ME Wu, MS Hossain Journal of Signal Processing Systems, 2016 | 37 | 2016 |
DL-HAR: Deep Learning-Based Human Activity Recognition Framework for Edge Computing G Abdu, AR Mabrook, AS Hussain, SMM Rahman, A Alamri CMC-Computers, Materials & Continua, 65 (2), 1033-1057, 2020 | 35* | 2020 |
Android vs. iOS: The security battle F Al-Qershi, M Al-Qurishi, S Md Mizanur Rahman, A Al-Amri 2014 World Congress on Computer Applications and Information Systems (WCCAIS …, 2014 | 35 | 2014 |
An efficient key agreement protocol for Sybil-precaution in online social network M Al-Qurishi, SMM Rahman, MS Hossain, A Almogren, M Alrubaian, ... Future Generation Computer Systems, 2017 | 34 | 2017 |
Multiple Disease Risk Assessment with Uniform Model based on Medical Clinical Notes X Shi, Y Hu, Y Zhang, W Li, Y Hao, A Alelaiwi, SMM Rahman, MS Hossain IEEE Access 4, 7074 - 7083, 2016 | 34 | 2016 |