Follow
Abdulla Al-Ali
Title
Cited by
Cited by
Year
A survey of machine and deep learning methods for internet of things (IoT) security
MA Al-Garadi, A Mohamed, AK Al-Ali, X Du, I Ali, M Guizani
IEEE Communications Surveys & Tutorials 22 (3), 1646-1685, 2020
11992020
Indoor positioning and wayfinding systems: a survey
J Kunhoth, AG Karkar, S Al-Maadeed, A Al-Ali
Human-centric Computing and Information Sciences 10, 1-41, 2020
2862020
Recent advances in the internet-of-medical-things (IoMT) systems security
A Ghubaish, T Salman, M Zolanvari, D Unal, A Al-Ali, R Jain
IEEE Internet of Things Journal 8 (11), 8707-8718, 2020
2842020
Design challenges of multi-UAV systems in cyber-physical applications: A comprehensive survey and future directions
R Shakeri, MA Al-Garadi, A Badawy, A Mohamed, T Khattab, AK Al-Ali, ...
IEEE Communications Surveys & Tutorials 21 (4), 3340-3385, 2019
2642019
RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database
MF Al-Sa’d, A Al-Ali, A Mohamed, T Khattab, A Erbad
Future Generation Computer Systems 100, 86-97, 2019
2402019
Audio Based Drone Detection and Identification using Deep Learning
S Al-Emadi, A Al-Ali, A Mohammad, A Al-Ali
2019 15th International Wireless Communications & Mobile Computing …, 2019
1482019
Engineering students' readiness to transition to emergency online learning in response to COVID-19: Case of Qatar
KK Naji, X Du, F Tarlochan, U Ebead, MA Hasan, AK Al-Ali
EURASIA Journal of Mathematics, Science and Technology Education 16 (10), 1886, 2020
1392020
DroneRF dataset: A dataset of drones for RF-based detection, classification and identification
MHDS Allahham, MF Al-Sa'd, A Al-Ali, A Mohamed, T Khattab, A Erbad
Data in brief 26, 104313, 2019
1082019
Performance Evaluation of Hyperledger Fabric
S Shalaby, AA Abdellatif, A Al-Ali, A Mohamed, A Erbad, M Guizani
2020 IEEE International Conference on Informatics, IoT, and Enabling …, 2020
702020
A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants
H Rathore, AK Al-Ali, A Mohamed, X Du, M Guizani
IEEE Access 7, 24154-24164, 2019
702019
Audio-Based Drone Detection and Identification Using Deep Learning Techniques with Dataset Enhancement through Generative Adversarial Networks
S Al-Emadi, A Al-Ali, A Al-Ali
Sensors 21 (15), 4953, 2021
682021
A review of security challenges, attacks and resolutions for wireless medical devices
H Rathore, A Mohamed, A Al-Ali, X Du, M Guizani
2017 13th International Wireless Communications and Mobile Computing …, 2017
562017
Comparing models of problem and project-based learning (PBL) courses and student engagement in civil engineering in Qatar
KK Naji, U Ebead, AK Al-Ali, X Du
Modestum LTD, 2020
522020
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
D Unal, A Al-Ali, FO Catak, M Hammoudeh
Future Generation Computer Systems 125, 433-445, 2021
502021
TFRC-CR: An equation-based transport protocol for cognitive radio networks
AK Al-Ali, K Chowdhury
Ad Hoc Networks 11 (6), 1836-1847, 2013
502013
Improving remote health monitoring: A low-complexity ECG compression approach
M Elgendi, A Al-Ali, A Mohamed, R Ward
Diagnostics 8 (1), 10, 2018
472018
Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach
L Gupta, T Salman, A Ghubaish, D Unal, AK Al-Ali, R Jain
Applied Soft Computing 118, 108439, 2022
432022
IoT-Based Fire Alarm System
A Mahgoub, N Tarrad, R Elsherif, A Al-Ali, L Ismail
2019 Third World Conference on Smart Trends in Systems Security and …, 2019
432019
Simulating dynamic spectrum access using ns-3 for wireless networks in smart environments
A Al-Ali, K Chowdhury
2014 eleventh annual IEEE international conference on sensing, communication …, 2014
422014
Vulnerabilities and countermeasures in electrical substations
S Hussain, JH Fernandez, AK Al-Ali, A Shikfa
International Journal of Critical Infrastructure Protection 33, 100406, 2021
412021
The system can't perform the operation now. Try again later.
Articles 1–20