default search action
Fahd N. Al-Wesabi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Ali Nauman, Mashael S. Maashi, Hend Khalid Alkahtani, Fahd N. Al-Wesabi, Nojood O. Aljehane, Mohammed Assiri, Sara Saadeldeen Ibrahim, Wali Ullah Khan:
Efficient resource allocation and user association in NOMA-enabled vehicular-aided HetNets with high altitude platforms. Comput. Commun. 216: 374-386 (2024) - [j45]Manal Abdullah Alohali, Muna Elsadig, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel:
Digital Text Document Watermarking Based Tampering Attack Detection via Internet. Comput. Syst. Sci. Eng. 48(3): 759-771 (2024) - [j44]Albandari Alsumayt, Majid Alshammari, Zeyad M. Alfawaer, Fahd N. Al-Wesabi, Nahla El-Haggar, Sumayh S. Aljameel, Sarah Albassam, Shahad AlGhareeb, Nouf Mohammed Alghamdi, Nawir Aldossary:
Efficient security level in wireless sensor networks (WSNs) using four-factors authentication over the Internet of Things (IoT). PeerJ Comput. Sci. 10: e2091 (2024) - [j43]Marwa Ismael Obayya, Fahd N. Al-Wesabi, Rana Alabdan, Majdi Khalid, Mohammed Assiri, Mohamed Ibrahim Alsaid, Azza Elneil Osman, Amani A. Alneil:
Artificial Intelligence for Traffic Prediction and Estimation in Intelligent Cyber-Physical Transportation Systems. IEEE Trans. Consumer Electron. 70(1): 1706-1715 (2024) - 2023
- [j42]Marwa Ismael Obayya, Fahd N. Al-Wesabi, Mashael S. Maashi, Abdullah Mohamed, Manar Ahmed Hamza, Suhanda Drar, Ishfaq Yaseen, Mohamed Ibrahim Alsaid:
Modified Salp Swarm Algorithm With Deep Learning Based Gastrointestinal Tract Disease Classification on Endoscopic Images. IEEE Access 11: 25959-25967 (2023) - [j41]Mofadal Alymani, Hadeel Alsolai, Mashael S. Maashi, Adeeb Alhebri, Hussain Alshahrani, Fahd N. Al-Wesabi, Abdullah Mohamed, Manar Ahmed Hamza:
Dispersal Foraging Strategy With Cuckoo Search Optimization Based Path Planning in Unmanned Aerial Vehicle Networks. IEEE Access 11: 31365-31372 (2023) - [j40]Fahd N. Al-Wesabi, Fadwa M. Alrowais, Heba G. Mohamed, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel:
Heuristic Optimization Algorithm Based Watermarking on Content Authentication and Tampering Detection for English Text. IEEE Access 11: 86104-86111 (2023) - [j39]Hadeel Alsolai, Mohammed Aljebreen, Jaber S. Alzahrani, Fahd N. Al-Wesabi, Anwer Mustafa Hilal, Abu Sarwar Zamani, Azza Elneil Osman, Amani A. Alneil:
Chaotic marine predators optimization based task scheduling scheme for resource limited cyber-physical systems. Comput. Electr. Eng. 106: 108597 (2023) - [j38]Fadwa M. Alrowais, Heba G. Mohamed, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel:
Cyber attack detection in healthcare data using cyber-physical system with optimized algorithm. Comput. Electr. Eng. 108: 108636 (2023) - [j37]Manal Abdullah Alohali, Muna Elsadig, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel:
Swarm intelligence for IoT attack detection in fog-enabled cyber-physical system. Comput. Electr. Eng. 108: 108676 (2023) - [j36]Anwer Mustafa Hilal, Manal Abdullah Alohali, Fahd N. Al-Wesabi, Nadhem Nemri, Hasan J. Alyamani, Deepak Gupta:
Enhancing quality of experience in mobile edge computing using deep learning based data offloading and cyberattack detection technique. Clust. Comput. 26(1): 59-70 (2023) - [j35]Anwer Mustafa Hilal, Shaha T. Al-Otaibi, Hany Mahgoub, Fahd N. Al-Wesabi, Ghadah Aldehim, Abdelwahed Motwakel, Mohammed Rizwanullah, Ishfaq Yaseen:
Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems. Clust. Comput. 26(3): 2085-2098 (2023) - [j34]Hanan Abdullah Mengash, Jaber S. Alzahrani, Majdy M. Eltahir, Fahd N. Al-Wesabi, Abdullah Mohamed, Manar Ahmed Hamza, Radwa Marzouk:
Search and Rescue Optimization with Machine Learning Enabled Cybersecurity Model. Comput. Syst. Sci. Eng. 45(2): 1393-1407 (2023) - [j33]Mesfer Al Duhayyim, Mrim M. Alnfiai, Nabil Sharaf Almalki, Fahd N. Al-Wesabi, Anwer Mustafa Hilal, Manar Ahmed Hamza:
IoT-Driven Optimal Lightweight RetinaNet-Based Object Detection for Visually Impaired People. Comput. Syst. Sci. Eng. 46(1): 475-489 (2023) - [j32]Mesfer Al Duhayyim, Heba G. Mohamed, Fadwa M. Alrowais, Fahd N. Al-Wesabi, Anwer Mustafa Hilal, Abdelwahed Motwakel:
Artificial Algae Optimization with Deep Belief Network Enabled Ransomware Detection in IoT Environment. Comput. Syst. Sci. Eng. 46(2): 1293-1310 (2023) - [j31]Anwer Mustafa Hilal, Fadwa M. Alrowais, Fahd N. Al-Wesabi, Radwa Marzouk:
Red Deer Optimization with Artificial Intelligence Enabled Image Captioning System for Visually Impaired People. Comput. Syst. Sci. Eng. 46(2): 1929-1945 (2023) - [j30]Manal Abdullah Alohali, Muna Elsadig, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel:
Optimal Deep Learning Based Ransomware Detection and Classification in the Internet of Things Environment. Comput. Syst. Sci. Eng. 46(3): 3087-3102 (2023) - [j29]S. Kiruthika Devi, Amani Abdulrahman Albraikan, Fahd N. Al-Wesabi, Mohamed K. Nour, Ahmed Ashour, Anwer Mustafa Hilal:
Intelligent Deep Convolutional Neural Network Based Object Detection Model for Visually Challenged People. Comput. Syst. Sci. Eng. 46(3): 3191-3207 (2023) - [j28]Manal Abdullah Alohali, Muna Elsadig, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel:
Blockchain Assisted Optimal Machine Learning Based Cyberattack Detection and Classification Scheme. Comput. Syst. Sci. Eng. 46(3): 3583-3598 (2023) - [j27]Z. Faizal Khan, Saeed M. Alshahrani, Abdulrahman Abdullah Alghamdi, Someah Alangari, Nouf Ibrahim Altamami, Khalid A. Alissa, Sana Alazwari, Mesfer Al Duhayyim, Fahd N. Al-Wesabi:
Machine Learning Based Cybersecurity Threat Detection for Secure IoT Assisted Cloud Environment. Comput. Syst. Sci. Eng. 47(1): 855-871 (2023) - [j26]Fahd N. Al-Wesabi, Zhijian Fang, Hassan M. H. Farh, Zhiguo Wei, Khaled Ameur, Abdullrahman A. Al-Shamma'a, Abdullah M. Al-Shaalan:
Dynamic global power extraction of partially shaded PV system using a hybrid MPSO-PID with anti-windup strategy. Eng. Appl. Artif. Intell. 126: 106965 (2023) - [j25]Fahd N. Al-Wesabi, Hanan Abdullah Mengash, Radwa Marzouk, Nuha Alruwais, Randa Allafi, Rana Alabdan, Meshal Alharbi, Deepak Gupta:
Pelican Optimization Algorithm with Federated Learning Driven Attack Detection model in Internet of Things environment. Future Gener. Comput. Syst. 148: 118-127 (2023) - [j24]Kamal Z. Zamli, Fakhrud Din, Hussam S. Alhadawi, Shah Khalid, Hadeel Alsolai, Mohamed K. Nour, Fahd N. Al-Wesabi, Muhammad Assam:
Exploiting an Elitist Barnacles Mating Optimizer implementation for substitution box optimization. ICT Express 9(4): 619-627 (2023) - [j23]Manzoor Ahmed, Jinshi Liu, Muhammad Ayzed Mirza, Wali Ullah Khan, Fahd N. Al-Wesabi:
MARL based resource allocation scheme leveraging vehicular cloudlet in automotive-industry 5.0. J. King Saud Univ. Comput. Inf. Sci. 35(6): 101420 (2023) - [j22]Fahd N. Al-Wesabi, Marwa Ismael Obayya, Anwer Mustafa Hilal, Oscar Castillo, Deepak Gupta, Ashish Khanna:
Multi-objective quantum tunicate swarm optimization with deep learning model for intelligent dystrophinopathies diagnosis. Soft Comput. 27(18): 13077-13092 (2023) - [j21]Hasan Tooba, Jahanzaib Malik, Iram Bibi, Wali Ullah Khan, Fahd N. Al-Wesabi, Kapal Dev, Gaojian Huang:
Securing Industrial Internet of Things Against Botnet Attacks Using Hybrid Deep Learning Approach. IEEE Trans. Netw. Sci. Eng. 10(5): 2952-2963 (2023) - 2022
- [j20]Faisal Mehmood Butt, Lal Hussain, Syed Hassan Mujtaba Jafri, Haya Mesfer Alshahrani, Fahd N. Al-Wesabi, Kashif Javed Lone, Elsayed M. Tag El Din, Mesfer Al Duhayyim:
Intelligence based Accurate Medium and Long Term Load Forecasting System. Appl. Artif. Intell. 36(1) (2022) - [j19]Yaser Ali Shah, Farhan Aadil, Amaad Khalil, Muhammad Assam, Ibrahim Abunadi, Ala Saleh D. Alluhaidan, Fahd N. Al-Wesabi:
An Evolutionary Algorithm-Based Vehicular Clustering Technique for VANETs. IEEE Access 10: 14368-14385 (2022) - [j18]Adil Aslam Mir, Fatih Vehbi Çelebi, Muhammad Rafique, Lal Hussain, Ahmed S. Almasoud, Masoud Alajmi, Fahd N. Al-Wesabi, Anwer Mustafa Hilal:
An Improved Imputation Method for Accurate Prediction of Imputed Dataset Based Radon Time Series. IEEE Access 10: 20590-20601 (2022) - [j17]Ali Kamran, Umar Farooq, Ihsan Rabbi, Kashif Zia, Muhammad Assam, Hadeel Alsolai, Fahd N. Al-Wesabi:
A Unified Mechanism for Cloud Scheduling of Scientific Workflows. IEEE Access 10: 71233-71246 (2022) - [j16]Fahd N. Al-Wesabi, Fadwa M. Alrowais, Jaber S. Alzahrani, Radwa Marzouk, Mesfer Al Duhayyim, Ahmed Alkhayyat, Deepak Gupta:
Oppositional poor and rich optimization with deep learning enabled secure internet of drone communication system. Comput. Electr. Eng. 104(Part): 108368 (2022) - [j15]Anwer Mustafa Hilal, Fahd N. Al-Wesabi, Abdelzahir Abdelmaboud, Manar Ahmed Hamza, Mohammad Mahzari, Abdulkhaleq Q. A. Hassan:
A Hybrid Intelligent Text Watermarking and Natural Language Processing Approach for Transferring and Receiving an Authentic English Text Via Internet. Comput. J. 65(2): 423-435 (2022) - [j14]Anwer Mustafa Hilal, Rana Alabdan, Mohamed Tahar Ben Othman, Siwar Ben Haj Hassine, Fahd N. Al-Wesabi, Mohammed Rizwanullah, Ishfaq Yaseen, Abdelwahed Motwakel:
Modelling of biosignal based decision making model for intracranial haemorrhage diagnosis in IoT environment. Expert Syst. J. Knowl. Eng. 39(7) (2022) - [j13]Radwa Marzouk, Jaber S. Alzahrani, Fadwa M. Alrowais, Fahd N. Al-Wesabi, Manar Ahmed Hamza:
Quasi-oppositional wild horse optimization based multi-agent path finding scheme for real time IoT systems. Expert Syst. J. Knowl. Eng. 39(10) (2022) - [j12]Manzoor Ahmed, Zain Ali, Wali Ullah Khan, Omer Waqar, Muhammad Asif, Abd Ullah Khan, Muhammad Awais Javed, Fahd N. Al-Wesabi:
Cooperative backscatter NOMA with imperfect SIC: Towards energy efficient sum rate maximization in sustainable 6G networks. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 7940-7947 (2022) - [j11]Anwer Mustafa Hilal, Fahd N. Al-Wesabi, Manar Ahmed Hamza, Mohammed Medani, Khalid Mahmood, Mohammad Mahzari:
Content authentication and tampering detection of Arabic text: an approach based on zero-watermarking and natural language processing. Pattern Anal. Appl. 25(1): 47-62 (2022) - [j10]Abdul Jabbar, Xi Li, Muhammad Assam, Javed Ali Khan, Marwa Ismael Obayya, Mimouna Abdullah Alkhonaini, Fahd N. Al-Wesabi, Muhammad Assad:
AFD-StackGAN: Automatic Mask Generation Network for Face De-Occlusion Using StackGAN. Sensors 22(5): 1747 (2022) - [j9]Mesfer Al Duhayyim, Fahd N. Al-Wesabi, Anwer Mustafa Hilal, Manar Ahmed Hamza, Shalini Goel, Deepak Gupta, Ashish Khanna:
Design of robust deep learning-based object detection and classification model for autonomous driving applications. Soft Comput. 26(16): 7641-7652 (2022) - [j8]Fahd N. Al-Wesabi, Marwa Ismael Obayya, Manar Ahmed Hamza, Jaber S. Alzahrani, Deepak Gupta, Sachin Kumar:
Energy Aware Resource Optimization using Unified Metaheuristic Optimization Algorithm Allocation for Cloud Computing Environment. Sustain. Comput. Informatics Syst. 35: 100686 (2022) - [i1]Manzoor Ahmed, Zain Ali, Wali Ullah Khan, Omer Waqar, Muhammad Asif, Abd Ullah Khan, Muhammad Awais Javed, Fahd N. Al-Wesabi:
Cooperative Backscatter NOMA with Imperfect SIC: Towards Energy Efficient Sum Rate Maximization in Sustainable 6G Networks. CoRR abs/2207.03295 (2022) - 2021
- [j7]Fahd N. Al-Wesabi, Amani Abdulrahman Albraikan, Anwer Mustafa Hilal, Asma Abdulghani Al-Shargabi, Saleh Alhazbi, Mesfer Al Duhayyim, Mohammed Rizwanullah, Manar Ahmed Hamza:
Design of Optimal Deep Learning Based Human Activity Recognition on Sensor Enabled Internet of Things Environment. IEEE Access 9: 143988-143996 (2021) - [j6]Fahd N. Al-Wesabi, Saleh Alzahrani, Fuad Ali Mohammed Al-Yarimi, Mohammed Abdul, Nadhem Nemri, Mohammed M. Almazah:
A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship. Comput. Syst. Sci. Eng. 37(3): 297-311 (2021) - [j5]Haya Mesfer Alshahrani, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Nadhem Nemri, Seifedine Nimer Kadry, Bassam A. Y. Alqaralleh:
An automated deep learning based satellite imagery analysis for ecology management. Ecol. Informatics 66: 101452 (2021) - 2020
- [j4]Fahd N. Al-Wesabi:
Proposing High-Smart Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet. IEICE Trans. Inf. Syst. 103-D(10): 2104-2112 (2020) - [j3]Fahd N. Al-Wesabi, Khalid Mahmood, Nadhem Nemri:
A zero watermarking approach for content authentication and tampering detection of Arabic text based on fourth level order and word mechanism of Markov model. J. Inf. Secur. Appl. 52: 102473 (2020) - [j2]Fuad Ali Mohammed Al-Yarimi, Nabil Mohammed Ali Munassar, Fahd N. Al-Wesabi:
Electrocardiogram stream level correlated patterns as features to classify heartbeats for arrhythmia prediction. Data Technol. Appl. 54(5): 685-701 (2020)
2010 – 2019
- 2019
- [j1]Fahd N. Al-Wesabi, Huda G. Iskandar, Mokhtar M. Ghilan:
Improving Performance in Component Based Distributed Systems. EAI Endorsed Trans. Scalable Inf. Syst. 6(22): e7 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint