Mahmoud Nabil

Orcid: 0000-0003-3059-7912

Affiliations:
  • North Carolina A&T State University, Greensboro, NC, USA


According to our database1, Mahmoud Nabil authored at least 52 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Leveraging Machine Learning for Wi-Fi-Based Environmental Continuous Two-Factor Authentication.
IEEE Access, 2024

2023
Enabling Content-Centric Device-to-Device Communication in the Millimeter-Wave Band.
IEEE Trans. Mob. Comput., 2023

Local (Per-Input) Robustness Based Guided Adversarial training of Deep Neural Networks.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023

Mitigating Targeted Universal Adversarial Attacks on Time Series Power Quality Disturbances Models.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Trojan Triggers for Poisoning Unmanned Aerial Vehicles Navigation: A Deep Learning Approach.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Adversarial Attacks on Deep Learning-Based UAV Navigation Systems.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

Smart Supply Chain Management with Attribute-Based Encryption Access Control.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

A Discriminative DeepLab Model (DDLM) for Surface Anomaly Detection and Localization.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

2022
A Review on Human-Machine Trust Evaluation: Human-Centric and Machine-Centric Perspectives.
IEEE Trans. Hum. Mach. Syst., 2022

Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grids.
IEEE Trans. Dependable Secur. Comput., 2022

Detecting Sybil Attacks Using Proofs of Work and Location in VANETs.
IEEE Trans. Dependable Secur. Comput., 2022

Accurate and Privacy-Preserving Person Localization Using Federated-Learning and the Camera Surveillance Systems of Public Places.
IEEE Access, 2022

Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2022

Identifying Anomalous Flight Trajectories by leveraging ensembled outlier detection framework.
Proceedings of the International Joint Conference on Neural Networks, 2022

Blockchain-based Smart Supply Chain Management.
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022

2021
Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services.
IEEE Trans. Dependable Secur. Comput., 2021

Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings.
IEEE Syst. J., 2021

Efficient Privacy-Preserving Electricity Theft Detection With Dynamic Billing and Load Monitoring for AMI Networks.
IEEE Internet Things J., 2021

Privacy-Preserving Non-Participatory Surveillance System for COVID-19-Like Pandemics.
IEEE Access, 2021

Antenna Beamwidth Optimization in Directional Device-to-Device Communication Using Multi-Agent Deep Reinforcement Learning.
IEEE Access, 2021

A Distributed Surveillance System With Full Coverage Guarantee Using Positive Orthogonal Codes.
IEEE Access, 2021

Efficient Detection of GPS Spoofing Attacks on Unmanned Aerial Vehicles Using Deep Learning.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

A Robust Completed Local Binary Pattern (RCLBP) for Surface Defect Detection.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

DA<sup>2</sup>-Net : Diverse & Adaptive Attention Convolutional Neural Network.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

Privacy-Preserving Biometric-based Authentication Scheme for Electric Vehicles Charging System.
Proceedings of the 3rd IEEE Middle East and North Africa COMMunications Conference, 2021

Google Searches and COVID-19 Cases in Saudi Arabia: A Correlation Study.
Proceedings of the 3rd IEEE Middle East and North Africa COMMunications Conference, 2021

Identifying Information Superspreaders of COVID-19 from Arabic Tweets.
Proceedings of the 3rd IEEE Middle East and North Africa COMMunications Conference, 2021

Detection of Denial of Charge (DoC) Attacks in Smart Grid Using Convolutional Neural Networks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

2020
IoT-enabled autonomous system collaboration for disaster-area management.
IEEE CAA J. Autom. Sinica, 2020

A Blockchain-based Medical Data Marketplace with Trustless Fair Exchange and Access Control.
Proceedings of the IEEE Global Communications Conference, 2020

Mimic Learning to Generate a Shareable Network Intrusion Detection Model.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks.
IEEE Internet Things J., 2019

MDMS: Efficient and Privacy-Preserving Multidimension and Multisubset Data Collection for AMI Networks.
IEEE Internet Things J., 2019

Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grid.
CoRR, 2019

Detecting Sybil Attacks using Proofs of Work and Location in VANETs.
CoRR, 2019

PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks.
IEEE Access, 2019

EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks.
IEEE Access, 2019

Blockchain-based Firmware Update Scheme Tailored for Autonomous Vehicles.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Deep Recurrent Electricity Theft Detection in AMI Networks with Evolutionary Hyper-Parameter Tuning.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

A Multi-Authority Attribute-Based Signcryption Scheme with Efficient Revocation for Smart Grid Downlink Communication.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Blockchain-Based Charging Coordination Mechanism for Smart Grid Energy Storage Units.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Blockchain-based Privacy-Preserving Charging Coordination Mechanism for Energy Storage Units.
CoRR, 2018

EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks.
CoRR, 2018

Efficient and Privacy-Preserving Ride SharingOrganization for Transferable andNon-Transferable Services.
CoRR, 2018

Privacy-Preserving Collection of Power Consumption Data for Enhanced AMI Networks.
Proceedings of the 25th International Conference on Telecommunications, 2018

Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Efficient Multi-Keyword Ranked Search over Encrypted Data for Multi-Data-Owner Settings.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Random Projection and Its Applications.
CoRR, 2017

2016
CUFE at SemEval-2016 Task 4: A Gated Recurrent Model for Sentiment Classification.
Proceedings of the 10th International Workshop on Semantic Evaluation, 2016

2015
ASTD: Arabic Sentiment Tweets Dataset.
Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2015

2014
LABR: A Large Scale Arabic Book Reviews Dataset.
CoRR, 2014

2012
A Comparative Study of Localization Algorithms in WSNs.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012


  Loading...