Abdulhadi Shoufan

Orcid: 0000-0002-3968-8637

According to our database1, Abdulhadi Shoufan authored at least 80 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Techniques to Detect Crime Leaders within a Criminal Network: A Survey, Experimental, and Comparative Evaluations.
CoRR, 2024

2023
Contingency Clarification Protocols for Reliable Counter-Drone Operation.
IEEE Trans. Aerosp. Electron. Syst., December, 2023

Can Students without Prior Knowledge Use ChatGPT to Answer Test Questions? An Empirical Study.
ACM Trans. Comput. Educ., December, 2023

Unmanned Aerial Vehicles Traffic Management Solution Using Crowd-Sensing and Blockchain.
IEEE Trans. Netw. Serv. Manag., March, 2023

How to Design and Deliver Courses for Higher Education in the AI Era: Insights from Exam Data Analysis.
CoRR, 2023

Exploring Students' Perceptions of ChatGPT: Thematic Analysis and Follow-Up Survey.
IEEE Access, 2023

GhostFaceNets: Lightweight Face Recognition Model From Cheap Operations.
IEEE Access, 2023

Light-Weight Security Protocol and Data Model for Chip-to-Chip Zero-Trust.
IEEE Access, 2023

Zero-Trust Communication between Chips.
Proceedings of the 31st IFIP/IEEE International Conference on Very Large Scale Integration, 2023

Active Distance Learning: How Student Perceptions Affect Academic Performance.
Proceedings of the IEEE International Conference on Teaching, 2023

A Low-Power Remote Identification Module for Drones.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2023

2022
A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations.
J. King Saud Univ. Comput. Inf. Sci., 2022

YouTube and Education: A Scoping Review.
IEEE Access, 2022

Choosing YouTube Videos for Self-Directed Learning.
IEEE Access, 2022

Unmanned Aerial Vehicles' Remote Identification: A Tutorial and Survey.
IEEE Access, 2022

Blockchain Interoperability in Unmanned Aerial Vehicles Networks: State-of-the-Art and Open Issues.
IEEE Access, 2022

2021
Identifying Drone Operator by Deep Learning and Ensemble Learning of IMU and Control Data.
IEEE Trans. Hum. Mach. Syst., 2021

Ranking educational channels on YouTube: Aspects and issues.
Educ. Inf. Technol., 2021

Blockchain Interoperability in UAV Networks: State-of-the-art and Open Issues.
CoRR, 2021

Integrating Counter-UAS Systems into the UTM System for Reliable Decision Making.
CoRR, 2021

Active Distance Learning of Embedded Systems.
IEEE Access, 2021

2020
Lecture-Free Classroom: Fully Active Learning on Moodle.
IEEE Trans. Educ., 2020

SR Latch: The Wrong Introduction to Digital Memory.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

Optimized Random Forest Classifier for Drone Pilot Identification.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

Long-Range Visual UAV Detection and Tracking System with Threat Level Assessment.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

2019
Estimating the cognitive value of YouTube's educational videos: A learning analytics approach.
Comput. Hum. Behav., 2019

What motivates university students to like or dislike an educational online video? A sentimental framework.
Comput. Educ., 2019

Machine Learning-Based Drone Detection and Classification: State-of-the-Art in Research.
IEEE Access, 2019

2018
Drone Pilot Identification by Classifying Radio-Control Signals.
IEEE Trans. Inf. Forensics Secur., 2018

On the intrinsic complexity of logical transformation problems.
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

2017
Toward Modeling the Intrinsic Complexity of Test Problems.
IEEE Trans. Educ., 2017

On inter-Rater reliability of information security experts.
J. Inf. Secur. Appl., 2017

Continuous authentication of UAV flight command data using behaviometrics.
Proceedings of the 2017 IFIP/IEEE International Conference on Very Large Scale Integration, 2017

On the Likes and Dislikes of YouTube's Educational Videos: A Quantitative Study.
Proceedings of the 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology, 2017

An intrinsic complexity model for the problem of total resistance determination.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2017

How Reliable are Experts’ Assessments? A Case Study on UAV Security.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

2016
Subscription-free Pay-TV over IPTV.
J. Syst. Archit., 2016

Live demonstration of DLD-VISU: An eLearning platform for digital logic design.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

Epistemic fidelity and cognitive constructivism in DLD-VISU.
Proceedings of the 2016 IEEE Global Engineering Education Conference, 2016

ABS controller: An introductory case study for motivating non-major students.
Proceedings of the 2016 IEEE Global Engineering Education Conference, 2016

2015
A Web-Based Visualization and Animation Platform for Digital Logic Design.
IEEE Trans. Learn. Technol., 2015

Natural Language Processing for Dialectical Arabic: A Survey.
Proceedings of the Second Workshop on Arabic Natural Language Processing, 2015

Secure Communication in Civil Drones.
Proceedings of the Information Systems Security and Privacy, 2015

On the Power Consumption of Cryptographic Processors in Civil Microdrones.
Proceedings of the ICISSP 2015, 2015

2013
Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure.
Comput. J., 2013

A fault attack on a hardware-based implementation of the secure hash algorithm SHA-512.
Proceedings of the 2012 International Conference on Reconfigurable Computing and FPGAs, 2013

2012
A hardware security module for quadrotor communication.
Proceedings of the 2012 International Conference on Field-Programmable Technology, 2012

Consumer Opinions on Short-Interval Charging for Pay-TV over IPTV.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Efficient Generic Construction of Forward-Secure Identity-Based Signature.
Proceedings of the Seventh International Conference on Availability, 2012

2011
A novel cryptoprocessor architecture for chained Merkle signature scheme.
Microprocess. Microsystems, 2011

A benchmarking environment for performance evaluation of tree-based rekeying algorithms.
J. Syst. Softw., 2011

A simple power analysis attack on a McEliece cryptoprocessor.
J. Cryptogr. Eng., 2011

A novel architecture for a secure update of cryptographic engines on trusted platform module.
Proceedings of the 2011 International Conference on Field-Programmable Technology, 2011

2010
A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem.
IEEE Trans. Computers, 2010

A Course on Reconfigurable Processors.
ACM Trans. Comput. Educ., 2010

A Demonstrator for Beamforming in C2X Communication.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010

Enhancing Security and Privacy in C2X Communication by Radiation Pattern Control.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010

Interactive Optimization of FPGA-based Systems-on-Chips.
Proceedings of the Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen (MBMV), 2010

A platform for visualizing digital circuit synthesis with VHDL.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

A fast hash tree generator for Merkle signature scheme.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

A compact course on VHDL-AMS.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

Reconfigurable Computing Education in Computer Science.
Proceedings of the Reconfigurable Computing: Architectures, 2010

An FPGA Accelerator for Hash Tree Generation in the Merkle Signature Scheme.
Proceedings of the Reconfigurable Computing: Architectures, 2010

2009
High-Performance Rekeying Processor Architecture for Group Key Management.
IEEE Trans. Computers, 2009

Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks
CoRR, 2009

An efficient reliability evaluation approach for system-level design of embedded systems.
Proceedings of the 10th International Symposium on Quality of Electronic Design (ISQED 2009), 2009

A compact error model for reliable system design.
Proceedings of the 2009 International Conference on High Performance Computing & Simulation, 2009

A Timing Attack against Patterson Algorithm in the McEliece PKC.
Proceedings of the Information, Security and Cryptology, 2009

Understanding physical models in VHDL-AMS.
Proceedings of the Forum on specification and Design Languages, 2009

A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms.
Proceedings of the 20th IEEE International Conference on Application-Specific Systems, 2009

2008
Schlüsselverwaltung im Sicheren Multicast.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

A Novel Rekeying Message Authentication Procedure Based on Winternitz OTS and Reconfigurable Hardware Architectures.
Proceedings of the ReConFig'08: 2008 International Conference on Reconfigurable Computing and FPGAs, 2008

Side Channels in the McEliece PKC.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

2007
Group key management: algorithms, benchmarking, and reconfigurable architectures.
PhD thesis, 2007

Reliable Performance Evaluation of Rekeying Algorithms in Secure Multicast.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Secure Multicast Rekeying: A Case Study for HW/SW-Codesign.
Proceedings of the Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen (MBMV), 2007

Compact AES-based Architecture for Symmetric Encryption, Hash Function, and Random Number Generation.
Proceedings of the FPL 2007, 2007

High-Flexibility Rekeying Processor for Key Management in Secure Multicast.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2005
A Novel Batch Rekeying Processor Architecture for Secure Multicast Key Management.
Proceedings of the High Performance Embedded Architectures and Compilers, 2005


  Loading...