Saif M. Al-Kuwari

Orcid: 0000-0002-4402-7710

According to our database1, Saif M. Al-Kuwari authored at least 47 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Analysis of Quantum Machine Learning Algorithms in Noisy Channels for Classification Tasks in the IoT Extreme Environment.
IEEE Internet Things J., February, 2024

SVFL: Efficient Secure Aggregation and Verification for Cross-Silo Federated Learning.
IEEE Trans. Mob. Comput., January, 2024

Recent Advances in Digital Image and Video Forensics, Anti-forensics and Counter Anti-forensics.
CoRR, 2024

Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks.
IEEE Commun. Surv. Tutorials, 2024

2023
The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs.
Int. J. Parallel Emergent Distributed Syst., September, 2023

Multi-key Fully Homomorphic Encryption without CRS from RLWE.
Comput. Stand. Interfaces, August, 2023

Security of underwater and air-water wireless communication: State-of-the-art, challenges and outlook.
Ad Hoc Networks, April, 2023

The impact of cost function globality and locality in hybrid quantum neural networks on NISQ devices.
Mach. Learn. Sci. Technol., March, 2023

Generic Construction of Black-Box Traceable Attribute-Based Encryption.
IEEE Trans. Cloud Comput., 2023

Explainable quantum clustering method to model medical data.
Knowl. Based Syst., 2023

On the Physical-Layer Security of a Dual-Hop UAV-Based Network in the Presence of Per-Hop Eavesdropping and Imperfect CSI.
IEEE Internet Things J., 2023

Physical Unclonable Functions (PUF) for IoT Devices.
ACM Comput. Surv., 2023

Revocable attribute-based encryption from standard lattices.
Comput. Stand. Interfaces, 2023

Expanding Boundaries: Cross-Media Routing for Seamless Underwater and Aerial Communication.
CoRR, 2023

FSSA: Efficient 3-Round Secure Aggregation for Privacy-Preserving Federated Learning.
CoRR, 2023

Physical Realization of Measurement Based Quantum Computation.
IEEE Access, 2023

Secrecy Analysis of a Dual-Hop Wireless Network with Independent Eavesdroppers and Outdated CSI.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

Location-based Physical Layer Authentication in Underwater Acoustic Communication Networks.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Mitigating IEC-60870-5-104 Vulnerabilities: Anomaly Detection in Smart Grid based on LSTM Autoencoder.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Hybrid PLS-ML Authentication Scheme for V2I Communication Networks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

A Novel Integrity Protocol Based on Physical Unclonable Functions.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

2022
Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption.
IEEE Trans. Cloud Comput., 2022

Fully Collusion Resistant Trace-and-Revoke Functional Encryption for Arbitrary Identities.
IACR Cryptol. ePrint Arch., 2022

Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security.
Des. Codes Cryptogr., 2022

Can Artificial Noise Boost Further the Secrecy of Dual-hop RIS-aided Networks?
CoRR, 2022

Security of Underwater and Air-Water Wireless Communication.
CoRR, 2022

Provable Data Possession Schemes from Standard Lattices for Cloud Computing.
Comput. J., 2022

Security Performance Analysis of a NOMA-Assisted Underwater VLC System Under Imprecise Channel Estimations.
IEEE Access, 2022

Security Analysis of Merging Control for Connected and Automated Vehicles.
Proceedings of the 2022 IEEE Intelligent Vehicles Symposium, 2022

Qiskit As a Simulation Platform for Measurement-based Quantum Computation.
Proceedings of the IEEE 19th International Conference on Software Architecture Companion, 2022

Demonstrating Quantum Advantage in Hybrid Quantum Neural Networks for Model Capacity.
Proceedings of the IEEE International Conference on Rebooting Computing, 2022

Deep-Disaster: Unsupervised Disaster Detection and Localization Using Visual Data.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Generic Construction of Trace-and-Revoke Inner Product Functional Encryption.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Attribute-based proxy re-encryption from standard lattices.
Theor. Comput. Sci., 2021

Revocable attribute-based proxy re-encryption.
J. Math. Cryptol., 2021

Attribute-based proxy re-signature from standard lattices and its applications.
Comput. Stand. Interfaces, 2021

Attack Specification Language: Domain Specific Language for Dynamic Training in Cyber Range.
Proceedings of the IEEE Global Engineering Education Conference, 2021

Data Confidentiality for IoT Networks: Cryptographic Gaps and Physical-Layer Opportunities.
Proceedings of the 26th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2021

2012
Algorithmic approach for clandestine localisation and tracking in short-range environments.
Int. J. Commun. Networks Distributed Syst., 2012

On the Indifferentiability of the Integrated-Key Hash Functions.
IACR Cryptol. ePrint Arch., 2012

Forensic Tracking and Mobility Prediction in Vehicular Networks.
Proceedings of the Advances in Digital Forensics VIII, 2012

2011
Cryptographic Hash Functions: Recent Design Trends and Security Notions.
IACR Cryptol. ePrint Arch., 2011

Fuzzy Trace Validation: Toward an Offline Forensic Tracking Framework.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

2010
Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion.
Proceedings of the Communications and Multimedia Security, 2010

2009
A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009


  Loading...