default search action
Mohamed Mahmoud 0001
Person information
- affiliation: Tennessee Technological University, Cookeville, TN, USA
- affiliation (PhD 2011): University of Waterloo, ON, Canada
Other persons with the same name
- Mohamed Mahmoud — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j63]Kan Yang, Rongxing Lu, Mohamed M. E. A. Mahmoud, Xiaohua Jia:
Guest Editorial Special Issue on Recent Advances of Security, Privacy, and Trust in Mobile Crowdsourcing. IEEE Internet Things J. 11(2): 1784-1787 (2024) - [j62]Islam Elgarhy, Mahmoud M. Badr, Mohamed M. E. A. Mahmoud, Mahmoud Nabil Mahmoud, Maazen Alsabaan, Mohamed I. Ibrahem:
Securing Smart Grid False Data Detectors Against White-Box Evasion Attacks Without Sacrificing Accuracy. IEEE Internet Things J. 11(20): 33873-33889 (2024) - [j61]Ahmed Shafee, Mohamed Mahmoud, Jerry W. Bruce, Gautam Srivastava, Abdullah Balamsh, Abdulah Jeza Aljohani:
False Data Detector for Electrical Vehicles Temporal-Spatial Charging Coordination Secure Against Evasion and Privacy Adversarial Attacks. IEEE Trans. Dependable Secur. Comput. 21(4): 2027-2044 (2024) - [c67]Madeleine Miller, Hany Habbak, Mahmoud M. Badr, Mohamed Baza, Mohamed Mahmoud, Mostafa M. Fouda:
Electricity Theft Detection Approach Using One-Class Classification for AMI. CCNC 2024: 260-265 - [c66]Islam Elgarhy, Ahmed T. El-Toukhy, Mahmoud M. Badr, Mohamed Mahmoud, Mostafa M. Fouda, Maazen Alsabaan, Hisham A. Kholidy:
Secured Cluster-Based Electricity Theft Detectors Against Blackbox Evasion Attacks. CCNC 2024: 333-338 - [c65]Ahmed T. El-Toukhy, Mohamed Mahmoud, Atef H. Bondok, Mostafa M. Fouda, Maazen Alsabaan:
Evasion Attacks in Smart Power Grids: A Deep Reinforcement Learning Approach. CCNC 2024: 708-713 - [c64]Atef H. Bondok, Mohamed Mahmoud, Mahmoud M. Badr, Mostafa M. Fouda, Maazen Alsabaan:
A Distillation-Based Attack Against Adversarial Training Defense for Smart Grid Federated Learning. CCNC 2024: 963-968 - [c63]Ahmed T. El-Toukhy, Islam Elgarhy, Mahmoud M. Badr, Mohamed Mahmoud, Mostafa M. Fouda, Mohamed I. Ibrahem, Fathi Amsaad:
Securing Smart Grids: Deep Reinforcement Learning Approach for Detecting Cyber-Attacks. SmartNets 2024: 1-6 - 2023
- [j60]Ahmed T. El-Toukhy, Mahmoud M. Badr, Mohamed M. E. A. Mahmoud, Gautam Srivastava, Mostafa M. Fouda, Maazen Alsabaan:
Electricity Theft Detection Using Deep Reinforcement Learning in Smart Power Grids. IEEE Access 11: 59558-59574 (2023) - [j59]Mohammed J. Abdulaal, Mohamed M. E. A. Mahmoud, Saheed A. Bello, Junaid Khalid, Abdulah Jeza Aljohani, Ahmad H. Milyani, Abdullah M. Abusorrah, Mohamed I. Ibrahem:
Privacy-Preserving Detection of Power Theft in Smart Grid Change and Transmit (CAT) Advanced Metering Infrastructure. IEEE Access 11: 68569-68587 (2023) - [j58]Ahmed A. Shafee, Mohamed M. E. A. Mahmoud, Gautam Srivastava, Mostafa M. Fouda, Maazen Alsabaan, Mohamed I. Ibrahem:
Detection of Distributed Denial of Charge (DDoC) Attacks Using Deep Neural Networks With Vector Embedding. IEEE Access 11: 75381-75397 (2023) - [j57]Ahmed T. El-Toukhy, Mohamed M. E. A. Mahmoud, Atef H. Bondok, Mostafa M. Fouda, Maazen Alsabaan:
Countering Evasion Attacks for Smart Grid Reinforcement Learning-Based Detectors. IEEE Access 11: 97373-97390 (2023) - [j56]Islam Elgarhy, Mahmoud M. Badr, Mohamed M. E. A. Mahmoud, Mostafa M. Fouda, Maazen Alsabaan, Hisham A. Kholidy:
Clustering and Ensemble Based Approach for Securing Electricity Theft Detectors Against Evasion Attacks. IEEE Access 11: 112147-112164 (2023) - [j55]Atef H. Bondok, Mohamed Mahmoud, Mahmoud M. Badr, Mostafa M. Fouda, Mohamed M. Abdallah, Maazen Alsabaan:
Novel Evasion Attacks Against Adversarial Training Defense for Smart Grid Federated Learning. IEEE Access 11: 112953-112972 (2023) - [j54]Mahmoud M. Badr, Mohamed M. E. A. Mahmoud, Yuguang Fang, Mohammed J. Abdulaal, Abdulah Jeza Aljohani, Waleed Alasmary, Mohamed I. Ibrahem:
Privacy-Preserving and Communication-Efficient Energy Prediction Scheme Based on Federated Learning for Smart Grids. IEEE Internet Things J. 10(9, May 1): 7719-7736 (2023) - [j53]Mahmoud M. Badr, Mohamed M. E. A. Mahmoud, Mohammed J. Abdulaal, Abdulah Jeza Aljohani, Fawaz Alsolami, Abdullah Saeed Balamash:
A Novel Evasion Attack Against Global Electricity Theft Detectors and a Countermeasure. IEEE Internet Things J. 10(12): 11038-11053 (2023) - [j52]Sherif Abdelfattah, Mahmoud M. Badr, Mohamed M. E. A. Mahmoud, Khalid Abualsaud, Elias Yaacoub, Mohsen Guizani:
Efficient and Privacy-Preserving Cloud-Based Medical Diagnosis Using an Ensemble Classifier With Inherent Access Control and Micro-Payment. IEEE Internet Things J. 10(24): 22096-22110 (2023) - [j51]Kasem Khalil, Mohammad Mahbubur Rahman Khan Mamun, Ahmed B. T. Sherif, Mohamed Said Elsersy, Ahmad Abdel-Aliem Imam, Mohamed Mahmoud, Maazen Alsabaan:
A Federated Learning Model Based on Hardware Acceleration for the Early Detection of Alzheimer's Disease. Sensors 23(19): 8272 (2023) - [j50]Sherif Abdelfattah, Mohamed Baza, Mohamed Mahmoud, Mostafa M. Fouda, Khalid Abualsaud, Elias Yaacoub, Maazen Alsabaan, Mohsen Guizani:
Lightweight Multi-Class Support Vector Machine-Based Medical Diagnosis System with Privacy Preservation. Sensors 23(22): 9033 (2023) - [c62]Kasem Khalil, Ahmed B. T. Sherif, Mohammad M. R. Khan Mamun, Mohamed Elsersy, Ahmad Abdel-Aliem Imam, Muhammad Hataba, Mohamed Mahmoud:
Privacy-Preserving and Hardware Acceleration-Based Authentication Scheme for Data Collection in E-Health Applications. MWSCAS 2023: 703-707 - 2022
- [j49]Mohammed J. Abdulaal, Mohamed I. Ibrahem, Mohamed M. E. A. Mahmoud, Junaid Khalid, Abdulah Jeza Aljohani, Ahmad H. Milyani, Abdullah M. Abusorrah:
Real-Time Detection of False Readings in Smart Grid AMI Using Deep and Ensemble Learning. IEEE Access 10: 47541-47556 (2022) - [j48]Mahmoud Nabil, Ahmed B. T. Sherif, Mohamed Mahmoud, Waleed Alasmary, Maazen Alsabaan:
Accurate and Privacy-Preserving Person Localization Using Federated-Learning and the Camera Surveillance Systems of Public Places. IEEE Access 10: 109894-109907 (2022) - [j47]Mahmoud M. Badr, Mohamed I. Ibrahem, Mohamed Mahmoud, Mostafa M. Fouda, Fawaz Alsolami, Waleed Alasmary:
Detection of False-Reading Attacks in Smart Grid Net-Metering System. IEEE Internet Things J. 9(2): 1386-1401 (2022) - [j46]Seham A. Alansari, Mahmoud M. Badr, Mohamed M. E. A. Mahmoud, Waleed Alasmary, Fawaz Alsolami, Abdullah Marish Ali:
Efficient and Privacy-Preserving Infection Control System for Covid-19-Like Pandemics Using Blockchain. IEEE Internet Things J. 9(4): 2744-2760 (2022) - [j45]Noora Al-Maslamani, Bekir Sait Ciftler, Mohamed M. Abdallah, Mohamed M. E. A. Mahmoud:
Toward Secure Federated Learning for IoT Using DRL-Enabled Reputation Mechanism. IEEE Internet Things J. 9(21): 21971-21983 (2022) - [j44]Mohamed I. Ibrahem, Mohamed M. E. A. Mahmoud, Fawaz Alsolami, Waleed Alasmary, Abdullah Saad Al-Malaise Al-Ghamdi, Xuemin Shen:
Electricity-Theft Detection for Change-and-Transmit Advanced Metering Infrastructure. IEEE Internet Things J. 9(24): 25565-25580 (2022) - [j43]Muhammad Hataba, Ahmed B. T. Sherif, Mohamed Mahmoud, Mohamed Abdallah, Waleed Alasmary:
Security and Privacy Issues in Autonomous Vehicles: A Layer-Based Survey. IEEE Open J. Commun. Soc. 3: 811-829 (2022) - [j42]Sherif Abdelfattah, Mohamed Baza, Mohamed M. E. A. Mahmoud, Mostafa M. Fouda, Khalid Abualsaud, Mohsen Guizani:
Multidata-Owner Searchable Encryption Scheme Over Medical Cloud Data With Efficient Access Control. IEEE Syst. J. 16(3): 5067-5078 (2022) - [j41]Mohamed Baza, Mahmoud Nabil, Mohamed M. E. A. Mahmoud, Niclas Bewermeier, Kemal Fidan, Waleed Alasmary, Mohamed Abdallah:
Detecting Sybil Attacks Using Proofs of Work and Location in VANETs. IEEE Trans. Dependable Secur. Comput. 19(1): 39-53 (2022) - [j40]Mohamed Baza, Marbin Pazos-Revilla, Ahmed B. T. Sherif, Mahmoud Nabil, Abdulah Jeza Aljohani, Mohamed Mahmoud, Waleed Alasmary:
Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grids. IEEE Trans. Dependable Secur. Comput. 19(4): 2226-2243 (2022) - [c61]Mohamed I. Ibrahem, Mohamed Mahmoud, Mostafa M. Fouda, Basem M. ElHalawany, Waleed Alasmary:
Privacy-preserving and Efficient Decentralized Federated Learning-based Energy Theft Detector. GLOBECOM 2022: 287-292 - [c60]Harishma T. Haridas, Mostafa M. Fouda, Zubair Md. Fadlullah, Mohamed Mahmoud, Basem M. ElHalawany, Mohsen Guizani:
MED-GPVS: A Deep Learning-Based Joint Biomedical Image Classification and Visual Question Answering System for Precision e-Health. ICC 2022: 3838-3843 - [c59]Hisham A. Kholidy, Andrew Karam, James L. Sidoran, Mohammad Ashiqur Rahman, Mohamed Mahmoud, Mahmoud M. Badr, Maqsood Mahmud, Ahmed F. Sayed:
Toward Zero Trust Security IN 5G Open Architecture Network Slices. MILCOM 2022: 577-582 - 2021
- [j39]Maazen Alsabaan, Waleed Alasmary, Abdulaziz Alquniah, Mohamed Mahmoud, Mahmoud Nabil:
A Distributed Surveillance System With Full Coverage Guarantee Using Positive Orthogonal Codes. IEEE Access 9: 16837-16848 (2021) - [j38]Mahmoud Nabil, Ahmed B. T. Sherif, Mohamed Mahmoud, Waleed Alasmary, Maazen Alsabaan:
Privacy-Preserving Non-Participatory Surveillance System for COVID-19-Like Pandemics. IEEE Access 9: 79911-79926 (2021) - [j37]Fathi H. Amsaad, Ahmed Oun, Mohammed Y. Niamat, Abdul Razaque, Selçuk Köse, Mohamed Mahmoud, Waleed Alasmary, Fawaz Alsolami:
Enhancing the Performance of Lightweight Configurable PUF for Robust IoT Hardware-Assisted Security. IEEE Access 9: 136792-136810 (2021) - [j36]Sherif Abdelfattah, Mohamed Baza, Mahmoud M. Badr, Mohamed M. E. A. Mahmoud, Gautam Srivastava, Fawaz Alsolami, Abdullah Marish Ali:
Efficient Search Over Encrypted Medical Data With Known-Plaintext/Background Models and Unlinkability. IEEE Access 9: 151129-151141 (2021) - [j35]Mohamed I. Ibrahem, Mahmoud Nabil, Mostafa M. Fouda, Mohamed M. E. A. Mahmoud, Waleed Alasmary, Fawaz Alsolami:
Efficient Privacy-Preserving Electricity Theft Detection With Dynamic Billing and Load Monitoring for AMI Networks. IEEE Internet Things J. 8(2): 1243-1258 (2021) - [j34]Mohamed I. Ibrahem, Mohamed Mahmoud, Mostafa M. Fouda, Fawaz Alsolami, Waleed Alasmary, Xuemin Shen:
Privacy Preserving and Efficient Data Collection Scheme for AMI Networks Using Deep Learning. IEEE Internet Things J. 8(23): 17131-17146 (2021) - [j33]Zaher Haddad, Mohamed Baza, Mohamed M. E. A. Mahmoud, Waleed Alasmary, Fawaz Alsolami:
Secure and Efficient AKA Scheme and Uniform Handover Protocol for 5G Network Using Blockchain. IEEE Open J. Commun. Soc. 2: 2616-2627 (2021) - [j32]Abdulrahman Takiddin, Muhammad Ismail, Mahmoud Nabil, Mohamed M. E. A. Mahmoud, Erchin Serpedin:
Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings. IEEE Syst. J. 15(3): 4189-4198 (2021) - [j31]Mahmoud Nabil, Ahmed B. T. Sherif, Mohamed Mahmoud, Ahmad Alsharif, Mohamed M. Abdallah:
Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services. IEEE Trans. Dependable Secur. Comput. 18(3): 1291-1306 (2021) - [j30]Mohamed Baza, Noureddine Lasla, Mohamed M. E. A. Mahmoud, Gautam Srivastava, Mohamed Abdallah:
B-Ride: Ride Sharing With Privacy-Preservation, Trust and Fair Payment Atop Public Blockchain. IEEE Trans. Netw. Sci. Eng. 8(2): 1214-1229 (2021) - [j29]Mohamed Baza, Ahmed B. T. Sherif, Mohamed M. E. A. Mahmoud, Spiridon Bakiras, Waleed Alasmary, Mohamed M. Abdallah, Xiaodong Lin:
Privacy-Preserving Blockchain-Based Energy Trading Schemes for Electric Vehicles. IEEE Trans. Veh. Technol. 70(9): 9369-9384 (2021) - [c58]Mohamed Baza, Ramy Amer, Amar A. Rasheed, Gautam Srivastava, Mohamed Mahmoud, Waleed Alasmary:
A Blockchain-Based Energy Trading Scheme for Electric Vehicles. CCNC 2021: 1-7 - [c57]Mohamed Baza, Ramy Amer, Fathi Amsaad, Mohamed Mahmoud, Waleed Alasmary:
Efficient Privacy-preserving Charging Coordination with Linkability-resistance in the Smart Grid. GLOBECOM (Workshops) 2021: 1-5 - [c56]Seham A. Alansari, Mahmoud M. Badr, Mohamed Mahmoud, Waleed Alasmary:
Efficient and Privacy-Preserving Contact Tracing System for Covid-19 using Blockchain. ICC Workshops 2021: 1-6 - [c55]Muneera Alotaibi, Mohamed I. Ibrahem, Waleed Alasmary, Dawood Al-Abri, Mohamed Mahmoud:
UBLS: User-Based Location Selection Scheme for Preserving Location Privacy. ICC Workshops 2021: 1-6 - [c54]Sherif Abdelfattah, Mohamed Baza, Mohamed Mahmoud, Waleed Alasmary:
CSES: Customized Searchable Encryption Scheme with Efficient Key Management Over Medical Cloud Data. ISNCC 2021: 1-7 - [c53]Mahmoud M. Badr, Mohamed Baza, Sherif Abdelfattah, Mohamed Mahmoud, Waleed Alasmary:
Blockchain-Based Ride-Sharing System with Accurate Matching and Privacy-Preservation. ISNCC 2021: 1-8 - [c52]Mahmoud M. Badr, Mohamed I. Ibrahem, Mohamed Baza, Mohamed Mahmoud, Waleed Alasmary:
Detecting Electricity Fraud in the Net-Metering System Using Deep Learning. ISNCC 2021: 1-6 - [c51]Mohamed I. Ibrahem, Sherif Abdelfattah, Mohamed Mahmoud, Waleed Alasmary:
Detecting Electricity Theft Cyber-attacks in CAT AMI System Using Machine Learning. ISNCC 2021: 1-6 - [c50]Mohamed I. Ibrahem, Mahmoud M. Badr, Mohamed Mahmoud, Mostafa M. Fouda, Waleed Alasmary:
Countering Presence Privacy Attack in Efficient AMI Networks Using Interactive Deep-Learning. ISNCC 2021: 1-7 - [c49]Ahmed Shafee, Mahmoud Nabil, Mohamed Mahmoud, Waleed Alasmary, Fathi H. Amsaad:
Detection of Denial of Charge (DoC) Attacks in Smart Grid Using Convolutional Neural Networks. ISNCC 2021: 1-7 - [c48]Muhammad Hataba, Ahmed B. T. Sherif, Mohamed Elsersy, Mahmoud Nabil, Mohamed Mahmoud, Khaled Hatem Almotairi:
Privacy-Preserving Biometric-based Authentication Scheme for Electric Vehicles Charging System. MENACOMM 2021: 86-91 - [i18]Seham A. Alansari, Mahmoud M. Badr, Mohamed Mahmoud, Waleed Alasmary:
Efficient and Privacy-Preserving Infection Control System for Covid-19-Like Pandemics using Blockchain. CoRR abs/2104.02263 (2021) - 2020
- [j28]Mahmoud M. Badr, Wesam Al Amiri, Mostafa M. Fouda, Mohamed M. E. A. Mahmoud, Abdulah Jeza Aljohani, Waleed Alasmary:
Smart Parking System With Privacy Preservation and Reputation Management Using Blockchain. IEEE Access 8: 150823-150843 (2020) - [j27]Ahmed Shafee, Mostafa M. Fouda, Mohamed M. E. A. Mahmoud, Abdulah Jeza Aljohani, Waleed Alasmary, Fathi H. Amsaad:
Detection of Lying Electrical Vehicles in Charging Coordination Using Deep Learning. IEEE Access 8: 179400-179414 (2020) - [j26]Hongwei Li, Rongxing Lu, Mohamed M. E. A. Mahmoud:
Security and privacy of machine learning assisted P2P networks. Peer-to-Peer Netw. Appl. 13(6): 2234-2236 (2020) - [j25]Hongwei Li, Chao Zhang, Mohamed Mahmoud, Rongxing Lu:
Guest Editorial Introduction to the Special Section on Blockchains in Emerging Vehicular Social Networks. IEEE Trans. Veh. Technol. 69(6): 5732-5735 (2020) - [c47]Wesam Al Amiri, Mohamed Baza, Karim Banawan, Mohamed Mahmoud, Waleed Alasmary, Kemal Akkaya:
Towards Secure Smart Parking System Using Blockchain Technology. CCNC 2020: 1-2 - [c46]Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud:
Mimic Learning to Generate a Shareable Network Intrusion Detection Model. CCNC 2020: 1-6 - [c45]Zaher Haddad, Mostafa M. Fouda, Mohamed Mahmoud, Mohamed M. Abdallah:
Blockchain-based Authentication for 5G Networks. ICIoT 2020: 189-194 - [c44]Mohamed Baza, Andrew Salazar, Mohamed Mahmoud, Mohamed Abdallah, Kemal Akkaya:
On Sharing Models Instead of Data using Mimic learning for Smart Health Applications. ICIoT 2020: 231-236 - [c43]Mohamed I. Ibrahem, Mahmoud M. Badr, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Zubair Md. Fadlullah:
PMBFE: Efficient and Privacy-Preserving Monitoring and Billing Using Functional Encryption for AMI Networks. ISNCC 2020: 1-7 - [c42]Mohamed Baza, Mohamed Mahmoud, Gautam Srivastava, Waleed Alasmary, Mohamed F. Younis:
A Light Blockchain-Powered Privacy-Preserving Organization Scheme for Ride Sharing Services. VTC Spring 2020: 1-6 - [i17]Mohamed I. Ibrahem, Mahmoud Nabil, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Fawaz Alsolami:
Efficient Privacy-Preserving Electricity Theft Detection with Dynamic Billing and Load Monitoring for AMI Networks. CoRR abs/2005.13793 (2020) - [i16]Ahmed Shafee, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Abdulah Jeza Aljohani, Fathi Amsaad:
Detection of Lying Electrical Vehicles in Charging Coordination Application Using Deep Learning. CoRR abs/2005.13813 (2020) - [i15]Mohamed I. Ibrahem, Mohamed Mahmoud, Mostafa M. Fouda, Fawaz Alsolami, Waleed Alasmary, Xuemin Shen:
Privacy-Preserving and Efficient Data Collection Scheme for AMI Networks Using Deep Learning. CoRR abs/2011.03814 (2020) - [i14]Mahmoud M. Badr, Mohamed I. Ibrahem, Mohamed Mahmoud, Mostafa M. Fouda, Waleed Alasmary:
Detection of False-Reading Attacks in the AMI Net-Metering System. CoRR abs/2012.01983 (2020)
2010 – 2019
- 2019
- [j24]Ahmad Alsharif, Mahmoud Nabil, Mohamed M. E. A. Mahmoud, Mohamed M. Abdallah:
EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks. IEEE Access 7: 27829-27845 (2019) - [j23]Mahmoud Nabil, Muhammad Ismail, Mohamed M. E. A. Mahmoud, Waleed Alasmary, Erchin Serpedin:
PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks. IEEE Access 7: 96334-96348 (2019) - [j22]Ranyiah Wazirali, Waleed Alasmary, Mohamed M. E. A. Mahmoud, Ahmad Alhindi:
An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms. IEEE Access 7: 133496-133508 (2019) - [j21]Ahmad Alsharif, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, Kemal Akkaya:
EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks. IEEE Internet Things J. 6(2): 3309-3321 (2019) - [j20]Ahmad Alsharif, Mahmoud Nabil, Ahmed B. T. Sherif, Mohamed Mahmoud, Min Song:
MDMS: Efficient and Privacy-Preserving Multidimension and Multisubset Data Collection for AMI Networks. IEEE Internet Things J. 6(6): 10363-10374 (2019) - [j19]Mohamed Mahmoud, Khaled Rabieh, Ahmed B. T. Sherif, Enahoro Oriero, Muhammad Ismail, Erchin Serpedin, Khalid A. Qaraqe:
Privacy-Preserving Fine-Grained Data Retrieval Schemes for Mobile Social Networks. IEEE Trans. Dependable Secur. Comput. 16(5): 871-884 (2019) - [c41]Mohamed Baza, Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Erchin Serpedin, Mohammad Ashiqur Rahman:
Blockchain-Based Charging Coordination Mechanism for Smart Grid Energy Storage Units. Blockchain 2019: 504-509 - [c40]Eman Mohammed Radi, Noureddine Lasla, Spiridon Bakiras, Mohamed Mahmoud:
Privacy-Preserving Electric Vehicle Charging for Peer-to-Peer Energy Trading Ecosystems. ICC 2019: 1-6 - [c39]Mahmoud Nabil, Mohamed Mahmoud, Muhammad Ismail, Erchin Serpedin:
Deep Recurrent Electricity Theft Detection in AMI Networks with Evolutionary Hyper-Parameter Tuning. iThings/GreenCom/CPSCom/SmartData 2019: 1002-1008 - [c38]Ahmad Alsharif, Ahmad Shafee, Mahmoud Nabil, Mohamed Mahmoud, Waleed Alasmary:
A Multi-Authority Attribute-Based Signcryption Scheme with Efficient Revocation for Smart Grid Downlink Communication. iThings/GreenCom/CPSCom/SmartData 2019: 1025-1032 - [c37]Wesam Al Amiri, Mohamed Baza, Karim Banawan, Mohamed Mahmoud, Waleed Alasmary, Kemal Akkaya:
Privacy-Preserving Smart Parking System Using Blockchain and Private Information Retrieval. SmartNets 2019: 1-6 - [c36]Mohamed Baza, Mahmoud Nabil, Noureddine Lasla, Kemal Fidan, Mohamed Mahmoud, Mohamed M. Abdallah:
Blockchain-based Firmware Update Scheme Tailored for Autonomous Vehicles. WCNC 2019: 1-7 - [i13]Mohamed Baza, Mahmoud Nabil, Niclas Bewermeier, Kemal Fidan, Mohamed Mahmoud, Mohamed M. Abdallah:
Detecting Sybil Attacks using Proofs of Work and Location in VANETs. CoRR abs/1904.05845 (2019) - [i12]Wesam Al Amiri, Mohamed Baza, Karim Banawan, Mohamed Mahmoud, Waleed Alasmary, Kemal Akkaya:
Privacy-Preserving Smart Parking System Using Blockchain and Private Information Retrieval. CoRR abs/1904.09703 (2019) - [i11]Ahmad Alsharif, Ahmad Shafee, Mahmoud Nabil, Mohamed Mahmoud, Waleed S. Alasmary:
A Multi-Authority Attribute-Based Signcryption Scheme with Efficient Revocation for Smart Grid Downlink Communication. CoRR abs/1904.11105 (2019) - [i10]Ahmad Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud:
Mimic Learning to Generate a Shareable Network Intrusion Detection Model. CoRR abs/1905.00919 (2019) - [i9]Marbin Pazos-Revilla, Mohamed Baza, Mahmoud Nabil, Ahmed B. T. Sherif, Mohamed Mahmoud, Waleed Alasmary:
Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grid. CoRR abs/1905.04666 (2019) - [i8]Mohamed Baza, Noureddine Lasla, Mohamed Mahmoud, Mohamed M. Abdallah:
B-Ride: Ride Sharing with Privacy-preservation, Trust and Fair Payment atop Public Blockchain. CoRR abs/1906.09968 (2019) - [i7]Mohamed Baza, Andrew Salazar, Mohamed Mahmoud, Mohamed M. Abdallah, Kemal Akkaya:
On Sharing Models Instead of Data using Mimic learning for Smart Health Applications. CoRR abs/1912.11210 (2019) - 2018
- [j18]Hongwei Li, Rongxing Lu, Jelena V. Misic, Mohamed Mahmoud:
Security and Privacy of Connected Vehicular Cloud Computing. IEEE Netw. 32(3): 4-6 (2018) - [j17]Marbin Pazos-Revilla, Ahmad Alsharif, Surya Gunukula, Terry N. Guo, Mohamed Mahmoud, Xuemin Shen:
Secure and Privacy-Preserving Physical-Layer-Assisted Scheme for EV Dynamic Charging System. IEEE Trans. Veh. Technol. 67(4): 3304-3318 (2018) - [c35]Mahmoud Nabil, Ahmad Alsharif, Ahmed B. T. Sherif, Mohamed Mahmoud, Mohamed F. Younis:
Efficient Multi-Keyword Ranked Search over Encrypted Data for Multi-Data-Owner Settings. ICC 2018: 1-6 - [c34]Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Mostafa Ali Shahin, Khalid A. Qaraqe, Erchin Serpedin:
Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters. ICPR 2018: 740-745 - [c33]Ahmed Sherifl, Ahmad Alsharif, Mohamed Mahmoud, Mohamed M. Abdallah, Min Song:
Efficient Privacy-Preserving Aggregation Scheme for Data Sets. ICT 2018: 191-195 - [c32]Ahmad Alsharif, Mahmoud Nabil, Mohamed Mahmoud, Mohamed M. Abdallah:
Privacy-Preserving Collection of Power Consumption Data for Enhanced AMI Networks. ICT 2018: 196-201 - [i6]Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Mostafa Ali Shahin, Khalid A. Qaraqe, Erchin Serpedin:
Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters. CoRR abs/1809.01774 (2018) - [i5]Mohammad Hadian, Xiaohui Liang, Thamer Altuwaiyan, Mohamed M. E. A. Mahmoud:
Privacy-preserving mHealth Data Release with Pattern Consistency. CoRR abs/1809.04579 (2018) - [i4]Mahmoud Nabil, Mohamed Mahmoud, Ahmed B. T. Sherif, Ahmad Alsharif, Mohamed M. Abdallah:
Efficient and Privacy-Preserving Ride SharingOrganization for Transferable andNon-Transferable Services. CoRR abs/1809.07314 (2018) - [i3]Ahmad Alsharif, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, Kemal Akkaya:
EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks. CoRR abs/1810.01851 (2018) - [i2]Mohamed Baza, Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Erchin Serpedin, Mohammad Ashiqur Rahman:
Blockchain-based Privacy-Preserving Charging Coordination Mechanism for Energy Storage Units. CoRR abs/1811.02001 (2018) - [i1]Mohamed Baza, Mahmoud Nabil, Noureddine Lasla, Kemal Fidan, Mohamed Mahmoud, Mohamed M. Abdallah:
Blockchain-based Firmware Update Scheme Tailored for Autonomous Vehicles. CoRR abs/1811.05905 (2018) - 2017
- [j16]Ahmed B. T. Sherif, Khaled Rabieh, Mohamed M. E. A. Mahmoud, Xiaohui Liang:
Privacy-Preserving Ride Sharing Scheme for Autonomous Vehicles in Big Data Era. IEEE Internet Things J. 4(2): 611-618 (2017) - [j15]Mohamed M. E. A. Mahmoud, Nico Saputro, Prem Akula, Kemal Akkaya:
Privacy-Preserving Power Injection Over a Hybrid AMI/LTE Smart Grid Network. IEEE Internet Things J. 4(4): 870-880 (2017) - [j14]Khaled Rabieh, Mohamed M. E. A. Mahmoud, Kemal Akkaya, Samet Tonyali:
Scalable Certificate Revocation Schemes for Smart Grid AMI Networks Using Bloom Filters. IEEE Trans. Dependable Secur. Comput. 14(4): 420-432 (2017) - [j13]Khaled Rabieh, Mohamed M. E. A. Mahmoud, Mohamed F. Younis:
Privacy-Preserving Route Reporting Schemes for Traffic Management Systems. IEEE Trans. Veh. Technol. 66(3): 2703-2713 (2017) - [c31]Nico Saputro, Samet Tonyali, Kemal Akkaya, Mumin Cebe, Mohamed Mahmoud:
Efficient Certificate Verification for Vehicle-to-Grid Communications. FNSS 2017: 3-18 - [c30]Surya Gunukula, Ahmed B. T. Sherif, Marbin Pazos-Revilla, B. Ausby, Mohamed Mahmoud, Xuemin Sherman Shen:
Efficient scheme for secure and privacy-preserving electric vehicle dynamic charging system. ICC 2017: 1-6 - [c29]Zaher Haddad, Ahmad Alsharif, Ahmed B. T. Sherif, Mohamed Mahmoud:
Privacy-Preserving Intra-MME Group Handover via MRN in LTE-A Networks for Repeated Trips. VTC Fall 2017: 1-5 - [c28]Ahmed B. T. Sherif, Ahmad Alsharif, Jacob Moran, Mohamed Mahmoud:
Privacy-Preserving Ride Sharing Organization Scheme for Autonomous Vehicles in Large Cities. VTC Fall 2017: 1-5 - 2016
- [j12]Samet Tonyali, Ozan Cakmak, Kemal Akkaya, Mohamed M. E. A. Mahmoud, Ismail Güvenç:
Secure Data Obfuscation Scheme to Enable Privacy-Preserving State Estimation in Smart Grid AMI Networks. IEEE Internet Things J. 3(5): 709-719 (2016) - [c27]Mohammad Hadian, Xiaohui Liang, Thamer Altuwaiyan, Mohamed M. E. A. Mahmoud:
Privacy-Preserving mHealth Data Release with Pattern Consistency. GLOBECOM 2016: 1-6 - [c26]Hawzhin Mohammed, Samet Tonyali, Khaled Rabieh, Mohamed Mahmoud, Kemal Akkaya:
Efficient Privacy-Preserving Data Collection Scheme for Smart Grid AMI Networks. GLOBECOM 2016: 1-6 - [c25]Zaher Haddad, Mohamed Mahmoud, Imane Aly Saroit, Sanaa Taha:
Secure and efficient uniform handover scheme for LTE-A networks. WCNC 2016: 1-6 - [c24]Mohamed Mahmoud, Muhammad Ismail, Prem Akula, Kemal Akkaya, Erchin Serpedin, Khalid A. Qaraqe:
Privacy-aware power charging coordination in future smart grid. WCNC 2016: 1-6 - [c23]Enahoro Oriero, Khaled Rabieh, Mohamed Mahmoud, Muhammad Ismail, Erchin Serpedin, Khalid A. Qaraqe:
Trust-based and privacy-preserving fine-grained data retrieval scheme for MSNs. WCNC 2016: 1-6 - 2015
- [j11]Mohamed M. E. A. Mahmoud, Jelena V. Misic, Kemal Akkaya, Xuemin Shen:
Investigating Public-Key Certificate Revocation in Smart Grid. IEEE Internet Things J. 2(6): 490-503 (2015) - [j10]Khaled Rabieh, Mohamed M. E. A. Mahmoud, Marianne Azer, Mahmoud Allam:
A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks. Secur. Commun. Networks 8(17): 3271-3281 (2015) - [j9]Mohamed M. E. A. Mahmoud, Xiaodong Lin, Xuemin Sherman Shen:
Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks. IEEE Trans. Parallel Distributed Syst. 26(4): 1140-1153 (2015) - [j8]Kemal Akkaya, Khaled Rabieh, Mohamed Mahmoud, Samet Tonyali:
Customized Certificate Revocation Lists for IEEE 802.11s-Based Smart Grid AMI Networks. IEEE Trans. Smart Grid 6(5): 2366-2374 (2015) - [c22]Khaled Rabieh, Mohamed Mahmoud, Ambareen Siraj, Jelena V. Misic:
Efficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks. GLOBECOM 2015: 1-6 - [c21]Khaled Rabieh, Mohamed M. E. A. Mahmoud, Mohamed F. Younis:
Privacy-preserving route reporting scheme for traffic management in VANETs. ICC 2015: 7286-7291 - [c20]Khaled Rabieh, Mohamed M. E. A. Mahmoud, Terry N. Guo, Mohamed F. Younis:
Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs. ICC 2015: 7298-7303 - [c19]Prem Akula, Mohamed Mahmoud, Kemal Akkaya, Min Song:
Privacy-preserving and secure communication scheme for power injection in smart grid. SmartGridComm 2015: 37-42 - [c18]Zaher Haddad, Mohamed Mahmoud, Sanaa Taha, Imane Aly Saroit:
Secure and privacy-preserving AMI-utility communications via LTE-A networks. WiMob 2015: 748-755 - 2014
- [b1]Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen:
Security for Multi-hop Wireless Networks. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-04602-0, pp. 1-99 - [j7]Mohamed M. E. A. Mahmoud, Sanaa Taha, Jelena V. Misic, Xuemin Shen:
Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks. IEEE Trans. Parallel Distributed Syst. 25(8): 2077-2090 (2014) - [c17]Andrew Beussink, Kemal Akkaya, Izzet F. Senturk, Mohamed M. E. A. Mahmoud:
Preserving consumer privacy on IEEE 802.11s-based smart grid AMI networks using data obfuscation. INFOCOM Workshops 2014: 658-663 - [c16]Mohamed Mahmoud, Kemal Akkaya, Khaled Rabieh, Samet Tonyali:
An efficient certificate revocation scheme for large-scale AMI networks. IPCCC 2014: 1-8 - [c15]Kemal Akkaya, Khaled Rabieh, Mohamed Mahmoud, Samet Tonyali:
Efficient generation and distribution of CRLs for IEEE 802.11s-based Smart Grid AMI networks. SmartGridComm 2014: 982-988 - 2013
- [j6]Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen:
A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks. IEEE Trans. Parallel Distributed Syst. 24(2): 209-224 (2013) - [c14]Mohamed M. E. A. Mahmoud, Jelena V. Misic, Xuemin Shen:
Efficient public-key certificate revocation schemes for smart grid. GLOBECOM 2013: 778-783 - [c13]Mohamed M. E. A. Mahmoud, Jelena V. Misic, Xuemin Shen:
A scalable public key infrastructure for smart grid communications. GLOBECOM 2013: 784-789 - 2012
- [j5]Mohamed Elsalih Mahmoud, Xuemin (Sherman) Shen:
FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks. IEEE Trans. Mob. Comput. 11(5): 753-766 (2012) - [j4]Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen:
A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 23(10): 1805-1818 (2012) - [c12]Mohamed Elsalih Mahmoud, Xuemin (Sherman) Shen:
A novel traffic-analysis back tracing attack for locating source nodes in wireless sensor networks. ICC 2012: 939-943 - [c11]Mohamed Elsalih Mahmoud, Xuemin (Sherman) Shen:
Secure and efficient source location privacy-preserving scheme for wireless sensor networks. ICC 2012: 1123-1127 - 2011
- [j3]Mohamed Elsalih Mahmoud, Xuemin (Sherman) Shen:
ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multihop Wireless Networks. IEEE Trans. Mob. Comput. 10(7): 997-1010 (2011) - [j2]Mohamed Elsalih Mahmoud, Xuemin Shen:
An Integrated Stimulation and Punishment Mechanism for Thwarting Packet Dropping Attack in Multihop Wireless Networks. IEEE Trans. Veh. Technol. 60(8): 3947-3962 (2011) - [c10]Mrinmoy Barua, Mohamed Elsalih Mahmoud, Xuemin Shen:
ASTP: Agent-Based Secure and Trustworthy Packet-Forwarding Protocol for eHealth. GLOBECOM 2011: 1-5 - [c9]Mohamed Elsalih Mahmoud, Mrinmoy Barua, Xuemin Shen:
SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks. GLOBECOM 2011: 1-5 - [c8]Mohamed Elsalih Mahmoud, Xuemin Shen:
RISE: Receipt-Free Cooperation Incentive Scheme for Multihop Wireless Networks. ICC 2011: 1-5 - [c7]Mohamed Elsalih Mahmoud, Xuemin Shen:
Trust-Based and Energy-Aware Incentive Routing Protocol for Multi-Hop Wireless Networks. ICC 2011: 1-5 - 2010
- [j1]Mohamed Elsalih Mahmoud, Xuemin Shen:
PIS: A Practical Incentive System for Multihop Wireless Networks. IEEE Trans. Veh. Technol. 59(8): 4012-4025 (2010) - [c6]Mohamed Elsalih Mahmoud, Xuemin Shen:
Credit-Based Mechanism Protecting Multi-Hop Wireless Networks from Rational and Irrational Packet Drop. GLOBECOM 2010: 1-5 - [c5]Mohamed Elsalih Mahmoud, Xuemin Shen:
Secure Cooperation Incentive Scheme with Limited Use of Public Key Cryptography for Multi-Hop Wireless Network. GLOBECOM 2010: 1-5 - [c4]Mohamed Elsalih Mahmoud, Xuemin Shen:
Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System. INFOCOM 2010: 776-784 - [c3]Mohamed Elsalih Mahmoud, Xuemin Shen:
MYRPA: An Incentive System with Reduced Payment Receipts for Multi-hop Wireless Networks. VTC Fall 2010: 1-5
2000 – 2009
- 2009
- [c2]Mohamed Elsalih Mahmoud, Xuemin (Sherman) Shen:
DSC: Cooperation Incentive Mechanism for Multi-Hop Cellular Networks. ICC 2009: 1-6 - [c1]Mohamed Elsalih Mahmoud, Xuemin (Sherman) Shen:
Anonymous and Authenticated Routing in Multi-Hop Cellular Networks. ICC 2009: 1-6
Coauthor Index
aka: Waleed S. Alasmary
aka: Mostafa M. Fouda
aka: Mahmoud Nabil Mahmoud
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint