Khaled Abdul-Aziz Al-Utaibi

Orcid: 0000-0002-3965-5018

According to our database1, Khaled Abdul-Aziz Al-Utaibi authored at least 20 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Reliable data transmission for a VANET-IoIT architecture: A DNN approach.
Internet Things, April, 2024

2022
Speeding up wheel factoring method.
J. Supercomput., 2022

Efficient Sequential and Parallel Prime Sieve Algorithms.
Symmetry, 2022

Fast Overlapping Block Processing Algorithm for Feature Extraction.
Symmetry, 2022

Modeling and simulation of the "IL-36 cytokine" and CAR-T cells interplay in cancer onset.
Int. J. Model. Simul. Sci. Comput., 2022

Discrete biological modeling for the immune response to dengue virus.
Int. J. Model. Simul. Sci. Comput., 2022

Artificial intelligence to link environmental endocrine disruptors (EEDs) with bone diseases.
Int. J. Model. Simul. Sci. Comput., 2022

On the Comparison of Optimal NOMA and OMA in a Paradigm Shift of Emerging Technologies.
IEEE Access, 2022

A Novel Channel Model and Optimal Power Control Schemes for Mobile mmWave Two-Tier Networks.
IEEE Access, 2022

A Comprehensive Literature Review on Children's Databases for Machine Learning Applications.
IEEE Access, 2022

2021
Reliable Recurrence Algorithm for High-Order Krawtchouk Polynomials.
Entropy, 2021

A Machine Learning Method to Synthesize Channel State Information Data in Millimeter Wave Networks.
IEEE Access, 2021

Fast Shot Boundary Detection Based on Separable Moments and Support Vector Machine.
IEEE Access, 2021

Allied Power Constraint Optimization and Optimal Beam Tracking Schemes for Mobile mmWave Massive MIMO Communications.
IEEE Access, 2021

6G Wireless Communications Networks: A Comprehensive Survey.
IEEE Access, 2021

All Your Fake Detector are Belong to Us: Evaluating Adversarial Robustness of Fake-News Detectors Under Black-Box Settings.
IEEE Access, 2021

2018
Intrusion detection taxonomy and data preprocessing mechanisms.
J. Intell. Fuzzy Syst., 2018

Searching Encrypted Data on the Cloud.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Learning mechanisms for anomaly-based intruson detection: Updated review.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2010
A bio-inspired image encryption algorithm based on chaotic maps.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010


  Loading...