• 3D Beamforming with Massive Cylindrical Arrays for Physical Layer Secure Data Transmission 

      Yaacoub E.; Al-Husseini M.; Chehab A.; Abualsaud K.; Khattab T.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      In this letter, a novel approach for physical layer security is implemented using massive cylindrical antenna arrays. A part of the arrays is used for transmitting a signal reliably from source to destination using highly ...
    • A secure client-side framework for protecting the privacy of health data stored on the cloud 

      Sakr A.; Yaacoub E.; Noura H.; Al-Husseini M.; Abualsaud K.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are ...
    • A Simple Approach for Securing IoT Data Transmitted over Multi-RATs 

      Diba R.; Yaacoub E.; Al-Husseini M.; Noura H.; Abualsaud K.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      In an mHealth remote patient monitoring scenario, usually control units/data aggregators receive data from the body area network (BAN) sensors then send it to the network or 'cloud'. The control unit would have to transmit ...
    • Classification for Imperfect EEG Epileptic Seizure in IoT applications: A Comparative Study 

      Abualsaud K.; Mohamed A.; Khattab T.; Yaacoub E.; Hasna M.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Epileptic seizure detection could be detected through investigating the electroencephalography (EEG), which is deemed to be very important for IoT wearable sensor-based health systems. EEG-based classification is crucial ...
    • Combating jamming attacks in multi-channel IoT networks using game theory 

      Guizani M.; Gouissem A.; Abualsaud K.; Yaacoub E.; Khattab T. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the ...
    • Combating jamming attacks in multi-channel IoT networks using game theory 

      Guizani, Mohsen; Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the ...
    • Dynamic Resource Allocation of eMBB-uRLLC Traffic in 5G New Radio 

      Al-Ali M.; Yaacoub E.; Mohamed A. ( IEEE Computer Society , 2020 , Conference Paper)
      5G technology is intended to support three promising services with heterogeneous requirements: Ultra-Reliable and Low Latency Communication (uRLLC), enhanced Mobile Broadband (eMBB) and massive Machine Type Communication ...
    • Energy-Aware Distributed Edge ML for mHealth Applications with Strict Latency Requirements 

      Hashash O.; Sharafeddine S.; Dawy Z.; Mohamed A.; Yaacoub E. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Edge machine learning (Edge ML) is expected to serve as a key enabler for real-time mobile health (mHealth) applications. However, its reliability is governed by the limited energy and computing resources of user equipment ...
    • Federated Learning Stability Under Byzantine Attacks 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Federated Learning (FL) is a machine learning approach that enables private and decentralized model training. Although FL has been shown to be very useful in several applications, its privacy constraints cause a lack of ...
    • Hybrid Physical Layer Security for Passive RFID Communication 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Thanks to its low cost, small weight and energy efficiency, passive radio frequency identification (RFID) backscatter communications systems have attracted a lot of attention in several application fields. However, such ...
    • Hybrid Physical Layer Security for Passive RFID Communication 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Thanks to its low cost, small weight and energy efficiency, passive radio frequency identification (RFID) backscatter communications systems have attracted a lot of attention in several application fields. However, such ...
    • I-SEE: Intelligent, Secure, and Energy-Efficient Techniques for Medical Data Transmission Using Deep Reinforcement Learning 

      Saria Allahham M.; Awad Abdellatif A.; Mohamed A.; Erbad A.; Yaacoub E.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      The rapid evolution of remote health monitoring applications is foreseen to be a crucial solution for facing an unpredictable health crisis and improving the quality of life. However, such applications come with many ...
    • IoT Anti-Jamming Strategy Using Game Theory and Neural Network 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread and its heterogeneity. In such networks, jamming attacks are widely used by malicious users to compromise the private and ...
    • IoT Anti-Jamming Strategy Using Game Theory and Neural Network 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread and its heterogeneity. In such networks, jamming attacks are widely used by malicious users to compromise the private and ...
    • On the delay of finite buffered multi-hop relay wireless internet of things 

      Elsamadouny A.; Hasna M.; Khattab T.; Abualsaud K.; Yaacoub E. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      The evolution of Internet of Things (IoT) as a new application in wireless networks mandates the utilization of wireless cooperative relaying to overcome the energy limitations of IoT devices. Multi-hop relaying is a ...
    • Optimizing Energy-Distortion Trade-off for Vital Signs Delivery in Mobile Health Applications 

      Almarridi A.; Kharbach S.; Yaacoub E.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Healthcare is considered a top priority worldwide, considering the swift increase in the number of chronic patients who require continuous monitoring. This motivates the researchers to develop scalable remote health ...
    • Robust Decentralized Federated Learning Using Collaborative Decisions 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Federated Learning (FL) has attracted a lot of attention in numerous applications due to recent data privacy regulations and increased awareness about data handling issues, combined with the ever-increasing big-data sizes. ...
    • Secure DoF for the MIMO MAC: The case of knowing eavesdropper's channel statistics only 

      Amir M.; Khattab T.; Yaacoub E.; Abualsaud K.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Physical layer security has attracted research attention as a means to achieve secure communication without the need for complicated upper layer encryption techniques. The secure degrees of freedom (SDoF) of various networks ...
    • Secure mHealth IoT data transfer from the patient to the hospital: A three-tier approach 

      Yaacoub E.; Abualsaud K.; Khattab T.; Guizani M.; Chehab A. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      eHealth and mHealth applications are gaining increasing importance with advances in the IoT and the ubiquity of sensor deployments. Measured IoT mHealth data needs to be captured, transmitted, and stored securely, without ...
    • Securing IoT Cooperative Networks Using Energy Harvesting. 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      An energy efficient and secure Internet of Things (IoT) healthcare system is proposed in this paper. By exploiting spatial diversity, energy harvesting and physical layer security techniques, the proposed approach secures ...