Collections in this community

Recent Submissions

  • Skyline Discovery and Composition of Multi-Cloud Mashup Services 

    Zhang, Fan; Hwang, Kai; Khan, Samee U.; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers , 2016 , Article)
    A cloud mashup is composed of multiple services with shared datasets and integrated functionalities. For example, the elastic compute cloud (EC2) provided by Amazon Web Service (AWS), the authentication and authorization ...
  • A new technique for compacting secret key in attribute-based broadcast encryption 

    Canard, Sébastien; Phan, Duong Hieu; Trinh, Viet Cuong ( Springer Verlag , 2016 , Conference Paper)
    Public-key encryption has been generalized to adapt to more and more practical applications. Broadcast encryption, introduced by Fiat and Naor in 1993, aims for applications in pay-TV or satellite transmission and allows ...
  • MLP Neural Network Based Gas Classification System on Zynq SoC 

    Zhai, Xiaojun; Ali, Amine Ait Si; Amira, Abbes; Bensaali, Faycal ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)
    Systems based on wireless gas sensor networks offer a powerful tool to observe and analyze data in complex environments over long monitoring periods. Since the reliability of sensors is very important in those systems, gas ...
  • Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes 

    Wang, Yongge; Malluhi, Qutaibah M. ( Springer Verlag , 2016 , Conference Paper)
    With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
  • Real-time robotic avatar control using fuzzy gaze-classification for people with disability 

    Qidwai, Uvais; Shakir, Mohamed; Bahameish, Mariam ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
    Robotic control with gaze-classification has been an area of interest for quite some time. In this paper, a novel solution of implementing sensing system with intelligent visualization has been presented. Such a system can ...
  • Monitoring DVT cuffs for long-term operation: A fuzzy approach 

    Qidwai, Uvais; Kamran, Saadat; Al-Sulaiti, Sara; Ahmed, Ghadeer; Hegazy, Asmaa ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
    Stroke patients, as well as all those patients who are bed-bound for a long period of time are highly susceptible to deep vein thrombosis (DVT) as secondary complexity. DVT poses more dangers of a loose blood clot obstructing ...
  • A scalable solution for finding overlaps between sequences using map-reduce 

    Haj Rachid, Maan; Malluhi, Qutaibah M. ( The International Society for Computers and Their Applications (ISCA) , 2016 , Conference Paper)
    The overlap stage of a string graph-based assembler is considered one of the most time- and space-consuming stages in any de novo overlap-based assembler. This is due to the huge output of the next-generation sequencing ...
  • Image stitching system with scanning microscopy for histopathological applications 

    Qidwai, Uvais; Akbar, Muhammad Ali ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
    Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...
  • Using block cipher for confidentiality of images in cloud-based systems 

    Rihan, Rana Adnan; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
    This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...
  • Similarity Group-by Operators for Multi-Dimensional Relational Data 

    Tang, Mingjie; Tahboub, Ruby Y.; Aref, Walid G.; Atallah, Mikhail J.; Malluhi, Qutaibah M.; ... more authors ( IEEE Computer Society , 2016 , Conference Paper)
    The SQL group-by operator plays an important role in summarizing and aggregating large datasets in a data analytics stack. While the standard group-by operator, which is based on equality, is useful in several applications, ...
  • Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming 

    Asuncion, Vernon; Khan, Khaled M.; Erradi, Abdelkarim; Alhazbi, Saleh ( World Scientific Publishing Co. Pte Ltd , 2016 , Article)
    In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ...
  • A novel multi-hop body-To-body routing protocol for disaster and emergency networks 

    Ben Arbia, Dhafer; Alam, Muhammad Mahtab; Attia, Rabah; Ben Hamida, Elye ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
    In this paper, a new multi-hop routing protocol (called ORACE-Net) for disaster and emergency networks is proposed. The proposed hierarchical protocol creates an ad-hoc network through body-To-body (B2B) communication ...
  • An efficient instance hiding scheme 

    Malluhi, Qutaibah M.; Shikfa, Abdullatif; Trinh, Viet Cuong ( Association for Computing Machinery , 2016 , Conference Paper)
    Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally weak client wants to securely compute a very complex function f on ...
  • Group owner election in Wi-Fi direct 

    Khan, Muhammad Asif; Cherif, Wael; Filali, Fethi ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
    Wi-Fi Direct is a new protocol that standardizes the direct communication between Wi-Fi enabled mobile devices without requiring an access point. The specification proposes enhanced peer-to-peer functions to be supported ...
  • Green operator cooperation for radio frequency transmission minimization 

    Amamou, Lamis; Boujelben, Maissa; Ghazzai, Hakim; Bouallegue, Ammar; Besbes, Hichem ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
    The increasing demand for reliable mobile services with faster communications speed requires high capital investment in the radio access networks. This leads to enormous energy consumption, high operational costs (OPEX), ...
  • ECG encryption and identification based security solution on the Zynq SoC for connected health systems 

    Zhai, Xiaojun; Ait Si Ali, Amine; Amira, Abbes; Bensaali, Faycal ( Academic Press Inc. , 2017 , Article)
    Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ...
  • PriviPK: Certificate-less and secure email communication 

    AlSabah, Mashael; Tomescu, Alin; Lebedev, Ilia; Serpanos, Dimitrios; Devadas, Srini ( Elsevier Ltd , 2017 , Article)
    We introduce PriviPK, an infrastructure that is based on a novel combination of certificateless (CL) cryptography and key transparency techniques to enable e2e email encryption. Our design avoids (1) key escrow and deployment ...
  • Context-aware RAON middleware for opportunistic network 

    Lau, G.; Al-Sabah, M.; Jaseemuddin, M.; Razavi, H.; Bhuiyan, M. ( Elsevier B.V. , 2017 , Article)
    Application development and deployment on Mobile Ad Hoc Networks (MANET) is a major challenge in the widespread use of MANET. The increasing D2D communication in 5G networks has renewed interest in an effective middleware ...
  • Data confidentiality in cloud-based pervasive system 

    Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge ( Association for Computing Machinery , 2017 , Conference Paper)
    Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
  • Role updating in information systems using model checking 

    Hu, Jinwei; Khan, Khaled M.; Zhang, Yan; Bai, Yun; Li, Ruixuan ( Springer London , 2017 , Article)
    The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ...

View more