Mznah Al-Rodhaan

Orcid: 0000-0002-9790-5345

Affiliations:
  • King Saud University


According to our database1, Mznah Al-Rodhaan authored at least 66 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Three-stage Transferable and Generative Crowdsourced Comment Integration Framework Based on Zero- and Few-shot Learning with Domain Distribution Alignment.
ACM Trans. Knowl. Discov. Data, April, 2024

2023
A Self-play and Sentiment-Emphasized Comment Integration Framework Based on Deep Q-Learning in a Crowdsourcing Scenario : Extended Abstract.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

2022
A Self-Play and Sentiment-Emphasized Comment Integration Framework Based on Deep Q-Learning in a Crowdsourcing Scenario.
IEEE Trans. Knowl. Data Eng., 2022

A Novel Sentiment Polarity Detection Framework for Chinese.
IEEE Trans. Affect. Comput., 2022

2021
Bus-based WSMP Dissemination Protocol for Vehicular Network.
Proceedings of the iiWAS2021: The 23rd International Conference on Information Integration and Web Intelligence, Linz, Austria, 29 November 2021, 2021

Detecting Hybrid Anomalies Using an Unsupervised Approach in Online Social Networks.
Proceedings of the Big Data and Security - Third International Conference, 2021

2020
Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection.
Secur. Commun. Networks, 2020

LGIEM: Global and local node influence based community detection.
Future Gener. Comput. Syst., 2020

2019
PPSDT: A Novel Privacy-Preserving Single Decision Tree Algorithm for Clinical Decision-Support Systems Using IoT Devices.
Sensors, 2019

A privacy preserving location service for cloud-of-things system.
J. Parallel Distributed Comput., 2019

Deep rolling: A novel emotion prediction model for a multi-participant communication context.
Inf. Sci., 2019

Natural disaster topic extraction in Sina microblogging based on graph analysis.
Expert Syst. Appl., 2019

A New Method of Privacy Protection: Random k-Anonymous.
IEEE Access, 2019

Computationally Efficient Fine-Grain Cube CP-ABE Scheme with Partially Hidden Access Structure.
Proceedings of the Big Data and Security - First International Conference, 2019

2018
A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications.
Sensors, 2018

Improving Vehicular Authentication in VANET Using.
Int. J. Commun. Networks Inf. Secur., 2018

Protection of location privacy for moving <i>k</i>NN queries in social networks.
Appl. Soft Comput., 2018

A Comparative Study of Subgraph Matching Isomorphic Methods in Social Networks.
IEEE Access, 2018

Weighted Greedy Dual Size Frequency Based Caching Replacement Algorithm.
IEEE Access, 2018

An Improved Web Cache Replacement Algorithm Based on Weighting and Cost.
IEEE Access, 2018

EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extension.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Phase-preserving approach in denoising computed tomography medical images.
Comput. methods Biomech. Biomed. Eng. Imaging Vis., 2017

A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems.
IEEE Access, 2017

2016
Three connected dominating set algorithms for wireless sensor networks.
Int. J. Sens. Networks, 2016

LED: A fast overlapping communities detection algorithm based on structural clustering.
Neurocomputing, 2016

An efficient and scalable density-based clustering algorithm for datasets with complex structures.
Neurocomputing, 2016

Secure multi-owner-based cloud computing scheme for big data.
Int. J. Big Data Intell., 2016

A Collaborative Filtering Recommendation Algorithm Based on Hierarchical Structure and Time Awareness.
IEICE Trans. Inf. Syst., 2016

A secure service provisioning framework for cyber physical cloud computing systems.
CoRR, 2016

Detect structural-connected communities based on BSCHEF in C-DBLP.
Concurr. Comput. Pract. Exp., 2016

2015
Iterative adaptive subdivision surface approach to reduce memory consumption in rendering process (IteAS).
J. Intell. Fuzzy Syst., 2015

Social Network and Tag Sources Based Augmenting Collaborative Recommender System.
IEICE Trans. Inf. Syst., 2015

Distributed back-pressure scheduling with opportunistic routing in cognitive radio networks.
EURASIP J. Wirel. Commun. Netw., 2015

An innovative technique for contrast enhancement of computed tomography images using normalized gamma-corrected contrast-limited adaptive histogram equalization.
EURASIP J. Adv. Signal Process., 2015

Collaborative Bibliographic System for Review/Survey Articles.
CoRR, 2015

KDVEM : a k-degree anonymity with vertex and edge modification algorithm.
Computing, 2015

Weighted curvature-preserving PDE image filtering method.
Comput. Math. Appl., 2015

Marker Hiding Methods: Applications in Augmented Reality.
Appl. Artif. Intell., 2015

2014
AP Association for Proportional Fairness in Multirate WLANs.
IEEE/ACM Trans. Netw., 2014

Distributed Energy-Efficient Approaches for Connected Dominating Set Construction in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Intelligent fuzzy approach for fast fractal image compression.
EURASIP J. Adv. Signal Process., 2014

Evaluation of Current Documents Image Denoising Techniques: A Comparative Study.
Appl. Artif. Intell., 2014

Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Q-Routing in Cognitive Packet Network Routing Protocol for MANETs.
Proceedings of the NCTA 2014 - Proceedings of the International Conference on Neural Computation Theory and Applications, part of IJCCI 2014, Rome, Italy, 22, 2014

Threat-based evaluation for context-aware multimedia surveillance system.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

2013
Connected dominating set algorithms for wireless sensor networks.
Int. J. Sens. Networks, 2013

An Efficient Biometric Authentication Protocol for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

A distributed self-healing algorithm for virtual backbone construction and maintenance in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Wireless for Space and Extreme Environments, 2013

Distributed Algorithm for Connected Dominating Set Construction in Sensor Networks.
Proceedings of the IEEE International Conference on Systems, 2013

Queuing modeling for delay analysis in mission oriented sensor networks under the protocol interference model.
Proceedings of the 2nd ACM annual international workshop on Mission-oriented wireless sensor networking, 2013

2012
Two Connected Dominating Set Algorithms for Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Biometric access control for wireless nodes.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
Achieving Proportional Fairness via AP Power Control in Multi-Rate WLANs.
IEEE Trans. Wirel. Commun., 2011

On network connectivity of wireless sensor networks for sandstorm monitoring.
Comput. Networks, 2011

A Model-Based Approach for Outlier Detection in Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011

BorderSense: Border patrol through advanced wireless sensor networks.
Ad Hoc Networks, 2011

MISE-PIPE: Magnetic induction-based wireless sensor networks for underground pipeline monitoring.
Ad Hoc Networks, 2011

Load Balancing Access Point Association Schemes for IEEE 802.11 Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Topology Analysis of Wireless Sensor Networks for Sandstorm Monitoring.
Proceedings of IEEE International Conference on Communications, 2011

A cooperative intrusion detection scheme for clustered mobile ad hoc networks.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Efficient Expanding Ring Search for MANETs.
Int. J. Commun. Networks Inf. Secur., 2010

Efficient Route Discovery Algorithm for MANETs.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

2009
Traffic locality oriented route discovery algorithms for mobile ad hoc networks.
PhD thesis, 2009

Traffic Locality Oriented Route Discovery Algorithm with Delay.
Int. J. Comput. Their Appl., 2009

On the Performance of Traffic Locality Oriented Route Discovery Algorithm with Delay.
Int. J. Commun. Netw. Syst. Sci., 2009

Traffic Locality Oriented Route Discovery Algorithm with Chase Packets for Mobile Ad Hoc Networks.
Proceedings of the 2009 International Conference on Wireless Networks, 2009


  Loading...