Fathi H. Amsaad

Orcid: 0000-0002-7582-8326

Affiliations:
  • Wright State University, Dayton, OH, USA
  • Eastern Michigan University (EMU), School of Information Security and Applied Computing, USA (former)


According to our database1, Fathi H. Amsaad authored at least 49 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enhancing Hardware Trojan Security through Reference-Free Clustering using Representatives.
Proceedings of the 37th International Conference on VLSI Design and 23rd International Conference on Embedded Systems, 2024

2023
Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things.
Sensors, July, 2023

A comprehensive review on blockchains for Internet of Vehicles: Challenges and directions.
Comput. Sci. Rev., May, 2023

Comparative Analysis Study for Air Quality Prediction in Smart Cities Using Regression Techniques.
IEEE Access, 2023

Unsupervised IC Security with Machine Learning for Trojan Detection.
Proceedings of the 66th IEEE International Midwest Symposium on Circuits and Systems, 2023

Benchmarking for Hardware Security: Types, Design Levels, and Limitations.
Proceedings of the 66th IEEE International Midwest Symposium on Circuits and Systems, 2023

Shrew Distributed Denial-of-Service (DDoS) Attack in IoT Applications: A Survey.
Proceedings of the Internet of Things. Advances in Information and Communication Technology, 2023

Power Analysis Side-Channel Attacks on Same and Cross-Device Settings: A Survey of Machine Learning Techniques.
Proceedings of the Internet of Things. Advances in Information and Communication Technology, 2023

Comprehensive Survey of Machine Learning Techniques for Detecting and Preventing Network Layer DoS Attacks.
Proceedings of the Internet of Things. Advances in Information and Communication Technology, 2023

A Comparative Study of Secure and Efficient Data Duplication Mechanisms for Cloud-Based IoT Applications.
Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23), 2023

Toward Secure and Efficient CNN Recognition with Different Activation and Optimization Functions.
Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23), 2023

Comparative Analysis of Sequential and Parallel Computing for Object Detection Using Deep Learning Model.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

2022
A blockchain-enabled framework for securing connected consumer electronics against wireless attacks.
Simul. Model. Pract. Theory, 2022

A Mobility-Aware Human-Centric Cyber-Physical System for Efficient and Secure Smart Healthcare.
IEEE Internet Things J., 2022

Light Weight Authentication Scheme for Smart Home IoT Devices.
Cryptogr., 2022

A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions.
CoRR, 2022

Blockchain-Enabled Deep Recurrent Neural Network Model for Clickbait Detection.
IEEE Access, 2022

2021
A Secure Lightweight Hardware-Assisted Charging Coordination Authentication Framework for Trusted Smart Grid Energy Storage Units.
SN Comput. Sci., 2021

A Secure Hardware-Assisted AMI Authentication Scheme for Smart Cities.
IEEE Consumer Electron. Mag., 2021

Enhancing the Performance of Lightweight Configurable PUF for Robust IoT Hardware-Assisted Security.
IEEE Access, 2021

A Lightweight Hardware-based Authentication for Secure Smart Grid Energy Storage Units.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021

A Low-Power IoT-enabled Smart Monitoring System for Efficient Product Delivery.
Proceedings of the 64th IEEE International Midwest Symposium on Circuits and Systems, 2021

Detection of Denial of Charge (DoC) Attacks in Smart Grid Using Convolutional Neural Networks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

On the Assessment of Robustness of Telemedicine Applications against Adversarial Machine Learning Attacks.
Proceedings of the Advances and Trends in Artificial Intelligence. Artificial Intelligence Practices, 2021

Analysis of Sentimental Behaviour over Social Data Using Machine Learning Algorithms.
Proceedings of the Advances and Trends in Artificial Intelligence. Artificial Intelligence Practices, 2021

An Efficient and Reliable Lightweight PUF for IoT-based Applications.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Efficient Privacy-preserving Charging Coordination with Linkability-resistance in the Smart Grid.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
Detection of Lying Electrical Vehicles in Charging Coordination Application Using Deep Learning.
CoRR, 2020

Detection of Lying Electrical Vehicles in Charging Coordination Using Deep Learning.
IEEE Access, 2020

Enhanced Grey Risk Assessment Model for Support of Cloud Service Provider.
IEEE Access, 2020

A Trusted Authentication Scheme for IoT-based Smart Grid Applications.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

Efficient Context-aware File System Approach.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

Successes and Failures in Exploring Biometric Algorithms in NIST Open Source Software and Data.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

2019
Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain.
IEEE Access, 2019

Pair Data Division Algorithm For Handling Data Classification.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

Burglary Detection Framework for House Crime Control.
Proceedings of the 19th International Conference on Computational Science and Its Applications, 2019

2018
Duty-Cycle-Based Controlled Physical Unclonable Function.
IEEE Trans. Very Large Scale Integr. Syst., 2018

Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks.
Inf., 2018

A Dynamic Area-Efficient Technique to Enhance ROPUFs Security Against Modeling Attacks.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Novel technique to improve strength of weak arbiter PUF.
Proceedings of the IEEE 60th International Midwest Symposium on Circuits and Systems, 2017

2016
A novel security technique to generate truly random and highly reliable reconfigurable ROPUF-based cryptographic keys.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

Multi-biometric system using Fuzzy Vault.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

Power reduction for Smart Homes in an Internet of Things framework.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

Simultaneous Priority and Detection based Carrier Sense Multiple Access protocol.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

Efficient allocation of slot using Medium Access Control protocol.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

Automatic Tampering Detection Paradigm to Support Personal Health Record.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

2015
Assessment of NAND based ring oscillator for hardware Trojan detection.
Proceedings of the IEEE 58th International Midwest Symposium on Circuits and Systems, 2015

Analyzing the performance of a configurable ROPUF design controlled by programmable XOR gates.
Proceedings of the IEEE 58th International Midwest Symposium on Circuits and Systems, 2015


  Loading...