• Anonymity and privacy in bitcoin escrow trades 

      Sabry F.; Labda W.; Erbad A.; Al Jawaheri H.; Malluhi Q. ( Association for Computing Machinery , 2019 , Conference Paper)
      As a decentralized cryptocurrency, Bitcoin has been in market for around a decade. Bitcoin transactions are thought to be pseudoanonymous, however, there were many attempts to deanonymize these transactions making use of ...
    • Efficient Channel Allocation Scheme with Triangle Communication 

      Sungbum, Hong; Malluhi, Q.; Jacob, T. ( IEEE , 2009 , Article)
      Radio is a valuable resource for wireless/mobile communication systems. In this paper, we present an efficient algorithm using a novel triangle communication model to synchronize processes effectively by searching for free ...
    • Establishing trust in cloud computing 

      Khan, K.M.; Malluhi, Q. ( IEEE Computer Society , 2010 , Article)
      How can cloud providers earn their customers' trust when a third party is processing sensitive data in a remote machine located in various countries? Emerging technologies can help address the challenges of trust in cloud ...
    • Interpreting patient-Specific risk prediction using contextual decomposition of BiLSTMs: Application to children with asthma 

      Alsaad R.; Malluhi Q.; Janahi I.; Boughorbel S. ( BioMed Central Ltd. , 2019 , Article)
      Background: Predictive modeling with longitudinal electronic health record (EHR) data offers great promise for accelerating personalized medicine and better informs clinical decision-making. Recently, deep learning models ...
    • Performance Evaluation of Network-Parallel Data Storage 

      Malluhi, Q.; Zhi Lin; Malouhi, M. ( IEEE , 2006 , Conference Paper)
      This paper presents a unique storage architecture that utilizes the multiplicity of storage nodes in LAN and WAN network environments to achieve high reliability, high-performance, scalability, and cost effectiveness. The ...
    • Security-aware service composition for end users of small enterprises 

      Khan, K.; Malluhi, Q. ( IOS Press , 2010 , Article)
      This paper focuses on the service composition based on security properties of services from an end user perspective. End users are usually not expert in computer security, but expert users of computer software. They typically ...