关注
Alsharif (Sharif) Abuadbba
Alsharif (Sharif) Abuadbba
Team Leader - CSIRO's Data61, Australia
在 data61.csiro.au 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
End-to-end evaluation of federated learning and split learning for Internet of Things
Y Gao, M Kim, A Abuadbba, Y Kim, C Thapa, K Kim, SA Camtepe, H Kim, ...
2020 International Symposium on Reliable Distributed Systems (SRDS), 2020
1872020
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
A Abuadbba, K Kim, M Kim, C Thapa, SA Camtepe, Y Gao, H Kim, ...
Proceedings of the 15th ACM AsiaCCS, 305-318, 2020
1062020
Hybrid cryptographic access control for cloud-based EHR systems
U Premarathne, A Abuadbba, A Alabdulatif, I Khalil, Z Tari, A Zomaya, ...
IEEE Cloud Computing 3 (4), 58-64, 2016
732016
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Y Gao, M Kim, C Thapa, A Abuadbba, Z Zhang, S Camtepe, H Kim, ...
IEEE Transactions on Computers, 2021
522021
Data conversion systems and methods
SA Fernandez, B Conway, D Conway, DJ Gotrik, A Ibaida, ALS Dhiah, ...
US Patent 10,587,399, 2020
422020
Walsh–Hadamard-based 3-D steganography for protecting sensitive information in point-of-care
A Abuadbba, I Khalil
IEEE Transactions on Biomedical Engineering 64 (9), 2186-2195, 2016
422016
Gaussian approximation-based lossless compression of smart meter readings
A Abuadbba, I Khalil, X Yu
IEEE Transactions on Smart Grid 9 (5), 5047-5056, 2017
322017
Privacy-preserving compression model for efficient IoMT ECG sharing
A Ibaida, A Abuadbba, N Chilamkurti
Computer Communications 166, 1-8, 2021
302021
Energy-efficient hybrid routing protocol for IoT communication systems in 5G and beyond
M Baniata, HT Reda, N Chilamkurti, A Abuadbba
Sensors 21 (2), 537, 2021
302021
Quantization backdoors to deep learning commercial frameworks
H Ma, H Qiu, Y Gao, Z Zhang, A Abuadbba, M Xue, A Fu, J Zhang, ...
IEEE Transactions on Dependable and Secure Computing, 2023
282023
Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings
A Abuadbba, I Khalil
Information Systems 53, 224-236, 2015
282015
Dangerous cloaking: Natural trigger based backdoor attacks on object detectors in the physical world
H Ma, Y Li, Y Gao, A Abuadbba, Z Zhang, A Fu, H Kim, SF Al-Sarawi, ...
arXiv preprint arXiv:2201.08619, 2022
232022
Binarizing split learning for data privacy enhancement and computation reduction
ND Pham, A Abuadbba, Y Gao, KT Phan, N Chilamkurti
IEEE Transactions on Information Forensics and Security 18, 3088-3100, 2023
222023
Towards IoT Security Automation and Orchestration
Y Zheng, A Pal, A Abuadbba, SR Pokhrel, S Nepal, H Janicke
2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020
222020
Cost-effective authenticated data redaction with privacy protection in IoT
F Zhu, X Yi, A Abuadbba, I Khalil, S Nepal, X Huang
IEEE Internet of Things Journal 8 (14), 11678-11689, 2021
202021
Robust privacy preservation and authenticity of the collected data in cognitive radio network—Walsh–Hadamard based steganographic approach
A Abuadbba, I Khalil, M Atiquzzaman
Pervasive and Mobile Computing 22, 58-70, 2015
202015
Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices
S Tariq, A Abuadbba, K Moore
ACM ASIACCS 2023, 2023
182023
Reliability and robustness analysis of machine learning based phishing url detectors
B Sabir, MA Babar, R Gaire, A Abuadbba
IEEE Transactions on Dependable and Secure Computing, 2022
18*2022
Token-modification adversarial attacks for natural language processing: A survey
T Roth, Y Gao, A Abuadbba, S Nepal, W Liu
arXiv preprint arXiv:2103.00676, 2021
172021
Can differential privacy practically protect collaborative deep learning inference for IoT?
J Ryu, Y Zheng, Y Gao, A Abuadbba, J Kim, D Won, S Nepal, H Kim, ...
Wireless Networks, 1-21, 2022
16*2022
系统目前无法执行此操作,请稍后再试。
文章 1–20