Blockchain-based charging coordination mechanism for smart grid energy storage units

M Baza, M Nabil, M Ismail, M Mahmoud… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Energy storage units (ESUs) enable several attractive features of modern smart grids such
as enhanced grid resilience, effective demand response, and reduced bills. However …

PPETD: Privacy-preserving electricity theft detection scheme with load monitoring and billing for AMI networks

M Nabil, M Ismail, MMEA Mahmoud, W Alasmary… - IEEE …, 2019 - ieeexplore.ieee.org
In advanced metering infrastructure (AMI) networks, smart meters installed at the consumer
side should report fine-grained power consumption readings (every few minutes) to the …

Resilient participant selection under vulnerability induced colluding attacks for crowdsourcing

G Wang, Y Xu, J He, J Pan, F Zuo… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates the problem of participant selection considering colluding attacks for
crowdsourcing. Compared with existing work, a practical vulnerability-induced colluding …

On sharing models instead of data using mimic learning for smart health applications

M Baza, A Salazar, M Mahmoud… - … on informatics, iot …, 2020 - ieeexplore.ieee.org
Electronic health records (EHR) systems contain vast amounts of medical information about
patients. These data can be used to train machine learning models that can predict health …

[HTML][HTML] Privacy-Preserving Charging Coordination Scheme for Smart Power Grids Using a Blockchain

H Habbak, M Baza, MMEA Mahmoud, K Metwally… - Energies, 2022 - mdpi.com
With the rapid emergence of smart grids, charging coordination is considered the intrinsic
actor that merges energy storage units (ESUs) into the grid in addition to its substantial role …

Avoiding occupancy detection from smart meter using adversarial machine learning

I Yilmaz, A Siraj - IEEE Access, 2021 - ieeexplore.ieee.org
More and more conventional electromechanical meters are being replaced with smart
meters because of their substantial benefits such as providing faster bi-directional …

Mimic learning to generate a shareable network intrusion detection model

A Shafee, M Baza, DA Talbert… - 2020 IEEE 17th …, 2020 - ieeexplore.ieee.org
Purveyors of malicious network attacks continue to increase the complexity and the
sophistication of their techniques, and their ability to evade detection continues to improve …

Optimized caching and spectrum partitioning for D2D enabled cellular systems with clustered devices

R Amer, H Elsawy, MM Butt… - ieee transactions on …, 2020 - ieeexplore.ieee.org
Caching at mobile devices and leveraging device-to-device (D2D) communication are two
promising approaches to support massive content delivery over wireless networks. The …

Detecting State of Charge False Reporting Attacks via Reinforcement Learning Approach

MA Alomrani, MHK Tushar… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The increased push for green transportation has been apparent to address the alarming
increase in atmospheric levels, especially in the last five years. The success and popularity …

Blockchain-based distributed key management approach tailored for smart grid

M Baza, MM Fouda, M Nabil, AT Eldien… - … in the Age of Big Data …, 2020 - Springer
Smart grid (SG) is a new technology which enables the electrical power grid to be efficient,
resilient and less pollutant. The Advanced Metering Infrastructure (AMI) is one of the key …