Asma Cherif

Orcid: 0000-0003-3875-074X

Affiliations:
  • King Abdulaziz University, Faculty of Comuting and Information Technology, Jeddah, Saudi Arabia


According to our database1, Asma Cherif authored at least 42 papers between 2009 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A Distributed Blockchain-based Access Control for the Internet of Things.
CoRR, March, 2025

Semantic approaches for query expansion: taxonomy, challenges, and future research directions.
PeerJ Comput. Sci., 2025

QADM: A quality-aware data model for freelancing applications based on recommendation systems.
J. Inf. Sci., 2025

Advances in natural language processing for healthcare: A comprehensive review of techniques, applications, and future directions.
Comput. Sci. Rev., 2025

An Overview of Hyper-Heuristic Approaches for Fog-Cloud Resource Allocation: Current State and Future Directions.
Proceedings of the 10th International Conference on Fog and Mobile Edge Computing, 2025

2024
Encoder-decoder graph neural network for credit card fraud detection.
J. King Saud Univ. Comput. Inf. Sci., 2024

Securing big graph databases: an overview of existing access control techniques.
Int. J. Intell. Inf. Database Syst., 2024

Improving Autonomous Vehicles Maneuverability and Collision Avoidance in Adverse Weather Conditions Using Generative Adversarial Networks.
IEEE Access, 2024

qArI: A Hybrid CTC/Attention-Based Model for Quran Recitation Recognition Using Bidirectional LSTMP in an End-to-End Architecture.
IEEE Access, 2024

Leveraging Optimization Techniques for Effective Arabic Query Expansion.
Proceedings of the Web Information Systems Engineering - WISE 2024 PhD Symposium, Demos and Workshops, 2024

Real-time Object Detection in Autonomous Vehicles with YOLO.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 28th International Conference KES-2024, 2024

Dynamic Clustering-based Task Orchestrator in Mobile Edge Computing.
Proceedings of the International Wireless Communications and Mobile Computing, 2024

Enhancing IoT Security Through IOTA-Based Identity Management and Machine Learning.
Proceedings of the Blockchain and Applications, 2024

Securing the Internet of Things: A Comparative Study on Integrating Access Control with Distributed Ledger Technology.
Proceedings of the 6th International Conference on Blockchain Computing and Applications, 2024

2023
ODM-BCSA: An Offloading Decision-Making Framework based on Binary Cuckoo Search Algorithm for Mobile Edge Computing.
Comput. Networks, May, 2023

Credit card fraud detection in the era of disruptive technologies: A systematic review.
J. King Saud Univ. Comput. Inf. Sci., January, 2023

Efficient Storage Approach for Big Data Analytics: An Iterative-Probabilistic Method for Dynamic Resource Allocation of Big Satellite Images.
IEEE Access, 2023

Towards an End-to-End Speech Recognition Model for Accurate Quranic Recitation.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

2022
Collaborative editing over opportunistic networks.
Int. J. Ad Hoc Ubiquitous Comput., 2022

Towards an intelligent adaptive security framework for preventing and detecting credit card fraud.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022

Machine Learning Models for Early Prediction of Asthma Attacks Based on Bio-signals and Environmental Triggers.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022

Property Graph Access Control Using View-Based and Query-Rewriting Approaches.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022

2021
EdgeDoc: An edge-based distributed collaborative editing system.
Pervasive Mob. Comput., 2021

DeepROD: a deep learning approach for real-time and online detection of a panic behavior in human crowds.
Mach. Vis. Appl., 2021

Predictive models for personalized asthma attacks based on patient's biosignals and environmental factors: a systematic review.
BMC Medical Informatics Decis. Mak., 2021

A Survey of Computational Offloading in Cloud/Edge-based Architectures: Strategies, Optimization Models and Challenges.
KSII Trans. Internet Inf. Syst., 2021

A Distributed Fog-based Access Control Architecture for IoT.
KSII Trans. Internet Inf. Syst., 2021

A survey on access control in IoT: models, architectures and research opportunities.
Int. J. Secur. Networks, 2021

An overview of continuous device-to-device authentication techniques for the internet of things.
Int. J. Ad Hoc Ubiquitous Comput., 2021

A Robust Device-to-Device Continuous Authentication Protocol for the Internet of Things.
IEEE Access, 2021

A Hybrid Approach for Optimizing Arabic Semantic Query Expansion.
Proceedings of the 18th IEEE/ACS International Conference on Computer Systems and Applications, 2021

2019
Towards an Edge-Based Architecture for Real-Time Collaborative Editors.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

Towards Optimistic Access Control for Cloud-Based Collaborative Editors.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2017
Evaluating data convergence of collaborative editors in opportunistic networks.
Proceedings of the 6th International Conference on Information and Communication Technology and Accessibility, 2017

2016
Using CSP for coordinating undo-based collaborative applications.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

2015
A Constraint-based Approach for Generating Transformation Patterns.
Proceedings of the Proceedings 14th International Workshop on Foundations of Coordination Languages and Self-Adaptive Systems, 2015

2014
Practical access control management for distributed collaborative editors.
Pervasive Mob. Comput., 2014

2012
Access Control Models for Collaborative Applications. (Modèles de contrôle d'accès pour les applications collaboratives).
PhD thesis, 2012

2011
Optimistic access control for distributed collaborative editors.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

2010
Log garbage collector-based real time collaborative editor for mobile devices.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
A Flexible Access Control Model for Distributed Collaborative Editors.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

Undo-Based Access Control for Distributed Collaborative Editors.
Proceedings of the Cooperative Design, 2009


  Loading...