A survey of machine and deep learning methods for internet of things (IoT) security MA Al-Garadi, A Mohamed, AK Al-Ali, X Du, I Ali, M Guizani IEEE Communications Surveys & Tutorials 22 (3), 1646-1685, 2020 | 724 | 2020 |
Design challenges of multi-UAV systems in cyber-physical applications: A comprehensive survey and future directions R Shakeri, MA Al-Garadi, A Badawy, A Mohamed, T Khattab, AK Al-Ali, ... IEEE Communications Surveys & Tutorials 21 (4), 3340-3385, 2019 | 200 | 2019 |
Indoor positioning and wayfinding systems: a survey J Kunhoth, AG Karkar, S Al-Maadeed, A Al-Ali Human-centric Computing and Information Sciences 10 (1), 1-41, 2020 | 156 | 2020 |
RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database MF Al-Sa’d, A Al-Ali, A Mohamed, T Khattab, A Erbad Future Generation Computer Systems 100, 86-97, 2019 | 146 | 2019 |
Recent advances in the internet-of-medical-things (IoMT) systems security A Ghubaish, T Salman, M Zolanvari, D Unal, A Al-Ali, R Jain IEEE Internet of Things Journal 8 (11), 8707-8718, 2020 | 119 | 2020 |
Engineering students’ readiness to transition to emergency online learning in response to COVID-19: Case of Qatar KK Naji, X Du, F Tarlochan, U Ebead, MA Hasan, AK Al-Ali EURASIA Journal of Mathematics, Science and Technology Education 16 (10), 2020 | 93 | 2020 |
Audio Based Drone Detection and Identification using Deep Learning S Al-Emadi, A Al-Ali, A Mohammad, A Al-Ali 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 93 | 2019 |
DroneRF dataset: A dataset of drones for RF-based detection, classification and identification MHDS Allahham, MF Al-Sa'd, A Al-Ali, A Mohamed, T Khattab, A Erbad Data in brief 26, 104313, 2019 | 59 | 2019 |
A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants H Rathore, AK Al-Ali, A Mohamed, X Du, M Guizani IEEE Access 7, 24154-24164, 2019 | 51 | 2019 |
TFRC-CR: An equation-based transport protocol for cognitive radio networks AK Al-Ali, K Chowdhury Ad Hoc Networks 11 (6), 1836-1847, 2013 | 50 | 2013 |
Compress or Interfere? AA Abdellatif, L Samara, A Mohamed, A Al-Ali, A Erbad, M Guizani 2019 16th Annual IEEE International Conference on Sensing, Communication …, 2019 | 41 | 2019 |
Performance Evaluation of Hyperledger Fabric S Shalaby, AA Abdellatif, A Al-Ali, A Mohamed, A Erbad, M Guizani 2020 IEEE International Conference on Informatics, IoT, and Enabling …, 2020 | 39 | 2020 |
Simulating dynamic spectrum access using ns-3 for wireless networks in smart environments A Al-Ali, K Chowdhury 2014 eleventh annual IEEE international conference on sensing, communication …, 2014 | 39 | 2014 |
A review of security challenges, attacks and resolutions for wireless medical devices H Rathore, A Mohamed, A Al-Ali, X Du, M Guizani 2017 13th International Wireless Communications and Mobile Computing …, 2017 | 38 | 2017 |
Improving remote health monitoring: A low-complexity ECG compression approach M Elgendi, A Al-Ali, A Mohamed, R Ward Diagnostics 8 (1), 10, 2018 | 37 | 2018 |
Audio-Based Drone Detection and Identification Using Deep Learning Techniques with Dataset Enhancement through Generative Adversarial Networks S Al-Emadi, A Al-Ali, A Al-Ali Sensors 21 (15), 4953, 2021 | 30 | 2021 |
Biometric-based authentication scheme for Implantable Medical Devices during emergency situations T Belkhouja, X Du, A Mohamed, AK Al-Ali, M Guizani Future Generation Computer Systems 98, 109-119, 2019 | 29 | 2019 |
Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices M Zubair, D Unal, A Al-Ali, A Shikfa Proceedings of the 3rd International Conference on Future Networks and …, 2019 | 27 | 2019 |
Accessing spectrum databases using interference alignment in vehicular cognitive radio networks AK Al-Ali, Y Sun, M Di Felice, J Paavola, KR Chowdhury IEEE Transactions on Vehicular Technology 64 (1), 263-272, 2014 | 25 | 2014 |
IoT-Based Fire Alarm System A Mahgoub, N Tarrad, R Elsherif, A Al-Ali, L Ismail 2019 Third World Conference on Smart Trends in Systems Security and …, 2019 | 24 | 2019 |