Ismail Mohamed Keshta

Orcid: 0000-0001-9803-5882

Affiliations:
  • AlMaarefa University, Riyadh, Saudi Arabia


According to our database1, Ismail Mohamed Keshta authored at least 52 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Deep Learning Model for Interpretability and Explainability of Aspect-Level Sentiment Analysis Based on Social Media.
IEEE Trans. Comput. Soc. Syst., June, 2025

Certificate-Less Healthcare Signature Scheme for Secure Consumer Technology-Centric Wireless Medical Sensor Devices.
IEEE Trans. Consumer Electron., May, 2025

Synergistic Integration of 5G-Enabled Cloud Native Infrastructures With Advanced Technologies for Urban Safety Enhancement.
IEEE Trans. Consumer Electron., May, 2025

Satellite IoT Terminal Authentication Mechanism for Enhancing Consumer Security Over Cyber-Physical Systems.
IEEE Trans. Consumer Electron., May, 2025

Edge AI-Based Dynamic Treatment Strategy Generation Model for Consumer Healthcare Technology.
IEEE Trans. Consumer Electron., May, 2025

Consumer Technology in Task Offloading and Edge Resource Allocation: AIoT and Edge Computing for Next-Generation Communication.
IEEE Trans. Consumer Electron., May, 2025

Lightweight AI and Blockchain Optimization for Enhancing Consumer Electronics Decision-Making.
IEEE Trans. Consumer Electron., May, 2025

Cloud-based non-invasive cognitive breath monitoring system for patients in health-care system.
Int. J. Data Sci. Anal., May, 2025

Anonymity and security improvements in heterogeneous connected vehicle networks.
Int. J. Data Sci. Anal., May, 2025

Trust Management Scheme for Securing Vehicular Ad Hoc Networks Against Malicious Nodes and False Message Anomaly.
Trans. Emerg. Telecommun. Technol., April, 2025

Content-aware recommendation system for integrated temporal semantic review text over web of things.
Serv. Oriented Comput. Appl., March, 2025

Leveraging Consumer Technology for Healthcare Systems Using Blockchain Based Bio-Sensor Devices.
IEEE Trans. Consumer Electron., February, 2025

A Fuzzy-AHP Decision-Making Framework for Optimizing Software Maintenance and Deployment in Information Security Systems.
J. Softw. Evol. Process., January, 2025

Energy-efficient resource allocation over wireless communication systems through deep reinforcement learning.
Int. J. Commun. Syst., January, 2025

5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach.
IEEE Open J. Commun. Soc., 2025

Mobile Edge Computing Model for Dynamically Processes Tasks Through Multi-UAV Cooperation.
J. Circuits Syst. Comput., 2025

Privacy-preserving explainable AI enable federated learning-based denoising fingerprint recognition model.
Image Vis. Comput., 2025

Intelligent cognitive internet of things-based spectrum sensing algorithm for future communication.
Int. J. Web Grid Serv., 2025

Multi-Stage Neural Network-Based Ensemble Learning Approach for Wheat Leaf Disease Classification.
IEEE Access, 2025

Generative AI as a Catalyst for Transforming Transnational Engineering Education: Opportunities, Challenges, and Future Directions.
Proceedings of the IEEE Global Engineering Education Conference, 2025

2024
Hybrid disease prediction approach leveraging digital twin and metaverse technologies for health consumer.
BMC Medical Informatics Decis. Mak., December, 2024

Artificial intelligence-Enabled deep learning model for multimodal biometric fusion.
Multim. Tools Appl., October, 2024

HGANet-23: a novel architecture for human gait analysis based on deep neural network and improved satin bowerbird optimization.
Signal Image Video Process., September, 2024

Quantum Target Recognition Enhancement Algorithm for UAV Consumer Applications.
IEEE Trans. Consumer Electron., August, 2024

Smart Implementation of Industrial Internet of Things Using Embedded Mechatronic System.
IEEE Embed. Syst. Lett., June, 2024

Self-Attention Mechanism-Based Federated Learning Model for Cross Context Recommendation System.
IEEE Trans. Consumer Electron., February, 2024

Few-shot learning-based human behavior recognition model.
Comput. Hum. Behav., February, 2024

Deep learning model to detect deceptive generative adversarial network generated images using multimedia forensic.
Comput. Electr. Eng., January, 2024

A CRC-Based Authentication Model and ECC-Based Authentication Protocol for Resource-Constrained IoT Applications.
IEEE Access, 2024

Optimized Securty Mechanism for publicly Secret Key Sharing Over Cloud using Blockchain 137-150.
Proceedings of SNSFAIT 2024: International Symposium on Securing Next Generation Systems Using Future Artificial Intelligence Technologies, 2024

Artificial Intelligence aware Knowledge Graphs and Deep Learning-Based Diagnostic Prediction Model in Healthcare.
Proceedings of the 7th International Conference on Contemporary Computing and Informatics, 2024

2023
Energy efficient indoor localisation for narrowband internet of things.
CAAI Trans. Intell. Technol., December, 2023

An Efficient Brain Tumor Segmentation Method Based on Adaptive Moving Self-Organizing Map and Fuzzy K-Mean Clustering.
Sensors, September, 2023

IoT-Based Federated Learning Model for Hypertensive Retinopathy Lesions Classification.
IEEE Trans. Comput. Soc. Syst., August, 2023

Generic Edge Computing System for Optimization and Computation Offloading of Unmanned Aerial Vehicle.
Comput. Electr. Eng., July, 2023

Blockchain aware proxy re-encryption algorithm-based data sharing scheme.
Phys. Commun., June, 2023

Optimized LightGBM model for security and privacy issues in cyber-physical systems.
Trans. Emerg. Telecommun. Technol., June, 2023

Policy conflict detection approach for decision-making in intelligent industrial Internet of Things.
Comput. Electr. Eng., May, 2023

Smart robots' virus defense using data mining technology.
J. Intell. Syst., 2023

2022
Analysis of Blockchain in the Healthcare Sector: Application and Issues.
Symmetry, 2022

A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice.
J. King Saud Univ. Comput. Inf. Sci., 2022

A Secure and Resilient Scheme for Telecare Medical Information Systems With Threat Modeling and Formal Verification.
IEEE Access, 2022

Privacy and Security in Mobile Health Technologies: Challenges and Concerns.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Email phishing detection based on naïve Bayes, Random Forests, and SVM classifications: A comparative study.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Efficient Email phishing detection using Machine learning.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

2021
Machine LearningTechniquesfor Detection of Website Phishing: A Review for Promises and Challenges.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
Efficient Detection of Phishing Websites Using Multilayer Perceptron.
Int. J. Interact. Mob. Technol., 2020

Towards the implementation of requirements management specific practices (SP 1.1 and SP 1.2) for small- and medium-sized software development organisations.
IET Softw., 2020

2019
Approaches to Software Process Improvement: A State-of-the-Art Review.
J. Softw., 2019

2018
Towards Implementation of Process and Product Quality Assurance Process Area for Saudi Arabian Small and Medium Sized Software Development Organizations.
IEEE Access, 2018

2017
Towards Implementation of Requirements Management Specific Practices (SP1.3 and SP1.4) for Saudi Arabian Small and Medium Sized Software Development Organizations.
IEEE Access, 2017

2016
Energy Management in Wireless Sensor Networks Based on Naive Bayes, MLP, and SVM Classifications: A Comparative Study.
J. Sensors, 2016


  Loading...