


default search action
Mohammad Dahman Alshehri
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Muhammad Tahir, Fazlullah Khan
, Maqsood Hayat, Mohammad Dahman Alshehri:
An effective machine learning-based model for the prediction of protein-protein interaction sites in health systems. Neural Comput. Appl. 36(1): 65-75 (2024) - [j37]Youxiang Duan
, Ning Chen
, Ali Kashif Bashir
, Mohammad Dahman Alshehri
, Lei Liu
, Peiying Zhang
, Keping Yu
:
A Web Knowledge-Driven Multimodal Retrieval Method in Computational Social Systems: Unsupervised and Robust Graph Convolutional Hashing. IEEE Trans. Comput. Soc. Syst. 11(3): 3146-3156 (2024) - 2023
- [j36]Anique Azhar, Saddaf Rubab
, Malik Murtaza Khan, Yawar Abbas Bangash, Mohammad Dahman Alshehri, Fizza Illahi, Ali Kashif Bashir:
Detection and prediction of traffic accidents using deep learning techniques. Clust. Comput. 26(1): 477-493 (2023) - [j35]Jun Liu
, Kai Qian, Zhibao Qin, Mohammad Dahman Alshehri
, Qiong Li, Yonghang Tai:
Cloud computing-enabled IIOT system for neurosurgical simulation using augmented reality data access. Digit. Commun. Networks 9(2): 347-357 (2023) - [j34]Yong Zhang, Xiaoming Zhang, Mohammad Dahman Alshehri:
A machine learning-enabled intelligent application for public health and safety. Neural Comput. Appl. 35(20): 14551-14564 (2023) - [j33]Rajesh Gupta
, Nilesh Kumar Jadav
, Harsh Mankodiya, Mohammad Dahman Alshehri
, Sudeep Tanwar
, Ravi Sharma
:
Blockchain and Onion-Routing-Based Secure Message Exchange System for Edge-Enabled IIoT. IEEE Trans. Ind. Informatics 19(2): 1965-1976 (2023) - [j32]Fazlullah Khan
, Mian Ahmad Jan
, Ryan Alturki
, Mohammad Dahman Alshehri
, Syed Tauhid Ullah Shah, Ateeq Ur Rehman
:
A Secure Ensemble Learning-Based Fog-Cloud Approach for Cyberattack Detection in IoMT. IEEE Trans. Ind. Informatics 19(10): 10125-10132 (2023) - [j31]Jingwei Liu
, Weiyang Jiang
, Rong Sun
, Ali Kashif Bashir
, Mohammad Dahman Alshehri
, Qiaozhi Hua
, Keping Yu
:
Conditional Anonymous Remote Healthcare Data Sharing Over Blockchain. IEEE J. Biomed. Health Informatics 27(5): 2231-2242 (2023) - [j30]Yike Zheng
, Xingwang Li
, Hui Zhang
, Mohammad Dahman Alshehri
, Shuping Dang
, Gaojian Huang
, Changsen Zhang:
Overlay Cognitive ABCom-NOMA-Based ITS: An In-Depth Secrecy Analysis. IEEE Trans. Intell. Transp. Syst. 24(2): 2217-2228 (2023) - [j29]Shalli Rani
, Himanshi Babbar, Pardeep Kaur, Mohammad Dahman Alshehri
, Syed Hassan Ahmed
:
An Optimized Approach of Dynamic Target Nodes in Wireless Sensor Network Using Bio Inspired Algorithms for Maritime Rescue. IEEE Trans. Intell. Transp. Syst. 24(2): 2548-2555 (2023) - [j28]Xingwang Li
, Yike Zheng
, Mohammad Dahman Alshehri
, Linpeng Hai, Venki Balasubramanian
, Ming Zeng
, Gaofeng Nie
:
Cognitive AmBC-NOMA IoV-MTS Networks With IQI: Reliability and Security Analysis. IEEE Trans. Intell. Transp. Syst. 24(2): 2596-2607 (2023) - [j27]Xinzheng Feng
, Jun Wu
, Ali Kashif Bashir
, Jianhua Li, Ao Shen
, Mohammad Dahman Alshehri
:
Vulnerability-Aware Task Scheduling for Edge Intelligence Empowered Trajectory Analysis in Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(4): 4661-4670 (2023) - [j26]Yuxin Qi
, Jun Wu
, Ali Kashif Bashir
, Xi Lin
, Wu Yang, Mohammad Dahman Alshehri
:
Privacy-Preserving Cross-Area Traffic Forecasting in ITS: A Transferable Spatial-Temporal Graph Neural Network Approach. IEEE Trans. Intell. Transp. Syst. 24(12): 15499-15512 (2023) - 2022
- [j25]Khyati Kapadiya, Usha Patel
, Rajesh Gupta
, Mohammad Dahman Alshehri
, Sudeep Tanwar
, Gulshan Sharma, Pitshou N. Bokoro
:
Blockchain and AI-Empowered Healthcare Insurance Fraud Detection: an Analysis, Architecture, and Future Prospects. IEEE Access 10: 79606-79627 (2022) - [j24]Sudeep Tanwar
, Umesh Bodkhe, Mohammad Dahman Alshehri, Rajesh Gupta
, Ravi Sharma:
Blockchain-assisted industrial automation beyond 5G networks. Comput. Ind. Eng. 169: 108209 (2022) - [j23]Misha Urooj Khan
, Sana Samer, Mohammad Dahman Alshehri, Naveed Khan Baloch, Hareem Khan, Fawad Hussain, Sung Won Kim, Yousaf Bin Zikria
:
Artificial neural network-based cardiovascular disease prediction using spectral features. Comput. Electr. Eng. 101: 108094 (2022) - [j22]Sulaiman Khan
, Anwar Hussain
, Shah Nazir
, Fazlullah Khan
, Ammar Oad
, Mohammad Dahman Alshehri
:
Efficient and reliable hybrid deep learning-enabled model for congestion control in 5G/6G networks. Comput. Commun. 182: 31-40 (2022) - [j21]Himanshu Mittal, Ashish Kumar Tripathi, Avinash Chandra Pandey, Mohammad Dahman Alshehri, Mukesh Saraswat, Raju Pal
:
A new intrusion detection method for cyber-physical system in emerging industrial IoT. Comput. Commun. 190: 24-35 (2022) - [j20]Riya Kakkar
, Rajesh Gupta
, Mohammad Dahman Alshehri
, Sudeep Tanwar
, Amit Dua
, Neeraj Kumar
:
Block-CPS: Blockchain and Non-Cooperative Game-Based Data Pricing Scheme for Car Sharing. IEEE Internet Things J. 9(24): 25780-25790 (2022) - [j19]M. Irfan Marwat, Javed Ali Khan
, Mohammad Dahman Alshehri, Muhammad Asghar Ali, Hizbullah, Haider Ali, Muhammad Assam:
Sentiment Analysis of Product Reviews to Identify Deceptive Rating Information in Social Media: A SentiDeceptive Approach. KSII Trans. Internet Inf. Syst. 16(3): 830-860 (2022) - [j18]Sachi Chaudhary
, Riya Kakkar
, Nilesh Kumar Jadav
, Anuja Nair
, Rajesh Gupta
, Sudeep Tanwar
, Smita Agrawal
, Mohammad Dahman Alshehri
, Ravi Sharma
, Gulshan Sharma
, Innocent E. Davidson
:
A Taxonomy on Smart Healthcare Technologies: Security Framework, Case Study, and Future Directions. J. Sensors 2022: 1-30 (2022) - [j17]Tejal Rathod
, Nilesh Kumar Jadav
, Mohammad Dahman Alshehri
, Sudeep Tanwar
, Ravi Sharma, Raluca-Andreea Felseghi
, Maria Simona Raboaca
:
Blockchain for Future Wireless Networks: A Decade Survey. Sensors 22(11): 4182 (2022) - [j16]Muhammad Babar
, Muhammad Usman Tariq
, Mohammad Dahman Alshehri, Fasee Ullah
, Muhammad Irfan Uddin
:
Smart teledentistry healthcare architecture for medical big data analysis using IoT-enabled environment. Sustain. Comput. Informatics Syst. 35: 100719 (2022) - [j15]Peiying Zhang
, Yanrong Hong
, Neeraj Kumar
, Mamoun Alazab
, Mohammad Dahman Alshehri
, Chunxiao Jiang
:
BC-EdgeFL: A Defensive Transmission Model Based on Blockchain-Assisted Reinforced Federated Learning in IIoT Environment. IEEE Trans. Ind. Informatics 18(5): 3551-3561 (2022) - [j14]Senthil Murugan Nagarajan, Ganesh Gopal Deverajan
, U. Kumaran
, M. Thirunavukkarasan, Mohammad Dahman Alshehri
, Salem Alkhalaf
:
Secure Data Transmission in Internet of Medical Things Using RES-256 Algorithm. IEEE Trans. Ind. Informatics 18(12): 8876-8884 (2022) - [j13]Nilesh Kumar Jadav
, Rajesh Gupta
, Mohammad Dahman Alshehri
, Harsh Mankodiya, Sudeep Tanwar
, Neeraj Kumar
:
Deep Learning and Onion Routing-Based Collaborative Intelligence Framework for Smart Homes Underlying 6G Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 3401-3412 (2022) - 2021
- [j12]Nabeela Awan
, Ahmad Ali, Fazlullah Khan
, Muhammad Zakarya
, Ryan Alturki
, Mahwish Kundi
, Mohammad Dahman Alshehri
, Muhammad Haleem
:
Modeling Dynamic Spatio-Temporal Correlations for Urban Traffic Flows Prediction. IEEE Access 9: 26502-26511 (2021) - [j11]Qin Chen
, Meiling Li
, Xiaoxia Yang, Ryan Alturki
, Mohammad Dahman Alshehri
, Fazlullah Khan
:
Impact of Residual Hardware Impairment on the IoT Secrecy Performance of RIS-Assisted NOMA Networks. IEEE Access 9: 42583-42592 (2021) - [j10]Ryan Alturki
, Hasan J. Alyamani
, Mohammed Abdulaziz Ikram
, Md. Arafatur Rahman
, Mohammad Dahman Alshehri
, Fazlullah Khan
, Muhammad Haleem
:
Sensor-Cloud Architecture: A Taxonomy of Security Issues in Cloud-Assisted Sensor Networks. IEEE Access 9: 89344-89359 (2021) - [j9]Syed Roohullah Jan, Rahim Khan
, Fazlullah Khan
, Mian Ahmad Jan
, Mohammad Dahman Alshehri, Venki Balasubramaniam
, Paramjit S. Sehdev:
Marginal and average weight-enabled data aggregation mechanism for the resource-constrained networks. Comput. Commun. 174: 101-108 (2021) - [j8]Jiangfeng Sun
, Fazlullah Khan
, Junxia Li, Mohammad Dahman Alshehri
, Ryan Alturki
, Mohammad O. Wedyan
:
Mutual Authentication Scheme for the Device-to-Server Communication in the Internet of Medical Things. IEEE Internet Things J. 8(21): 15663-15671 (2021) - [j7]Mengji Chen, Taj Malook, Ateeq Ur Rehman
, Yar Muhammad, Mohammad Dahman Alshehri, Aamir Akbar
, Muhammad Bilal
, Muazzam Ali Khan:
Blockchain-Enabled healthcare system for detection of diabetes. J. Inf. Secur. Appl. 58: 102771 (2021) - [j6]Yar Muhammad
, Mohammad Dahman Alshehri
, Wael Mohammad Alenazy
, Vinh Truong Hoang
, Ryan Alturki
:
Identification of Pneumonia Disease Applying an Intelligent Computational Framework Based on Deep Learning and Machine Learning Techniques. Mob. Inf. Syst. 2021: 9989237:1-9989237:20 (2021) - [j5]Victor R. Kebande
, Feras M. Awaysheh, Richard Adeyemi Ikuesan
, Sadi Alawadi
, Mohammad Dahman Alshehri
:
A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles. Sensors 21(18): 6018 (2021) - [j4]Inam Ullah Khan
, Asrin Abdollahi
, Ryan Alturki
, Mohammad Dahman Alshehri
, Mohammed Abdulaziz Ikram
, Hasan J. Alyamani
, Shahzad Khan
:
Intelligent Detection System Enabled Attack Probability Using Markov Chain in Aerial Networks. Wirel. Commun. Mob. Comput. 2021: 1542657:1-1542657:9 (2021) - 2020
- [j3]Guojie Yang
, Mian Ahmad Jan
, Varun G. Menon
, P. G. Shynu, Mian Muhammad Aimal, Mohammad Dahman Alshehri:
A Centralized Cluster-Based Hierarchical Approach for Green Communication in a Smart Healthcare System. IEEE Access 8: 101464-101475 (2020)
2010 – 2019
- 2019
- [b1]Mohammad Dahman Alshehri:
Intelligent trust management methodology for the internet of things (IoT) to enhance cyber security. University of Technology Sydney, Australia, 2019 - [j2]Mohammad Dahman Alshehri
, Farookh Khadeer Hussain
:
A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT). Computing 101(7): 791-818 (2019) - [p2]Mohammad Dahman Alshehri, Farookh Khadeer Hussain, Mahmoud Elkhodr, Belal Saeed Alsinglawi
:
A Distributed Trust Management Model for the Internet of Things (DTM-IoT). Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 1-9 - [p1]Belal Saeed Alsinglawi
, Quang Vinh Nguyen
, Upul Gunawardana, Simeon Simoff
, Anthony J. Maeder, Mahmoud Elkhodr, Mohammad Dahman Alshehri:
Passive RFID Localization in the Internet of Things. Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 73-81 - 2018
- [j1]Mohammad Dahman Alshehri
, Farookh Khadeer Hussain
, Omar Khadeer Hussain
:
Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT). Mob. Networks Appl. 23(3): 419-431 (2018) - [c4]Mahmoud Elkhodr
, Belal Alsinglawi
, Mohammad Dahman Alshehri:
Data Provenance in the Internet of Things. AINA Workshops 2018: 727-731 - 2017
- [c3]Mohammad Dahman Alshehri, Farookh Khadeer Hussain:
A Centralized Trust Management Mechanism for the Internet of Things (CTM-IoT). BWCCA 2017: 533-543 - 2015
- [c2]Mohammad Dahman Alshehri, Farookh Khadeer Hussain:
A Comparative Analysis of Scalable and Context-Aware Trust Management Approaches for Internet of Things. ICONIP (4) 2015: 596-605 - [c1]Mohammed Abdulaziz Ikram
, Mohammad Dahman Alshehri, Farookh Khadeer Hussain:
Architecture of an IoT-based system for football supervision (IoT Football). WF-IoT 2015: 69-74
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-25 17:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint