default search action
Mohammed Saeed Alkatheiri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Sajjad Hussain Chauhdary, Mohammed Saeed Alkatheiri, Mohammed A. Alqarni, Sajid Saleem:
An efficient evolutionary deep learning-based attack prediction in supply chain management systems. Comput. Electr. Eng. 109(Part A): 108768 (2023) - [i3]Anil Carie, Abdur Rashid Sangi, Satish Anamalamudi, Murali Krishna Enduri, Baha Ihnaini, Hemn Barzan Abdalla, Mohammed Saeed Alkatheiri:
Directional Antenna Based Scheduling Protocol for IoT Networks. CoRR abs/2305.02511 (2023) - 2022
- [j8]Mohammed Saeed Alkatheiri:
Artificial intelligence assisted improved human-computer interactions for computer systems. Comput. Electr. Eng. 101: 107950 (2022) - [c12]Sultan Almalki, Usman Saeed, Mohammed Saeed Alkatheiri:
Analysis of Eyebrow Motion for Micro-Expression Recognition. ICIGP 2022: 109-116 - [i2]Gaoxiang Li, Khalid T. Mursi, Ahmad O. Aseeri, Mohammed Saeed Alkatheiri, Yu Zhuang:
A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks. CoRR abs/2206.01314 (2022) - 2021
- [j7]Abdur Rashid Sangi, Mohammed Saeed Alkatheiri, Satish Anamalamudi, Mohammed A. Alqarni, Muhammad Hammad Memon, Wanan Yang:
Spectrum Handoff Aware AODV Routing Protocol for Cognitive Radio Vehicular Ad Hoc Networks. Complex. 2021: 6981719:1-6981719:13 (2021) - 2020
- [j6]Usman Tariq, Ahmad O. Aseeri, Mohammed Saeed Alkatheiri, Yu Zhuang:
Context-Aware Autonomous Security Assertion for Industrial IoT. IEEE Access 8: 191785-191794 (2020) - [j5]Abdur Rashid Sangi, Mohammed Saeed Alkatheiri, Satish Anamalamudi, Jianwei Liu:
Cognitive AODV routing protocol with novel channel-route failure detection. Multim. Tools Appl. 79(13-14): 8951-8968 (2020) - [j4]Rajakumar Arul, Gunasekaran Raja, Alaa Omran Almagrabi, Mohammed Saeed Alkatheiri, Sajjad Hussain Chauhdary, Ali Kashif Bashir:
A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario. IEEE Trans. Ind. Informatics 16(1): 681-690 (2020) - [c11]Meznah A. Alamro, Khalid T. Mursi, Yu Zhuang, Mohammed Saeed Alkatheiri, Ahmad O. Aseeri:
Does Sophisticating Double Arbiter PUF Design Ensure its Security? Performance and Security Assessments on 5-1 DAPUF. IEEE BigData 2020: 1788-1795 - [p1]Mohammed Saeed Alkatheiri, Abdur Rashid Sangi, Satish Anamalamudi:
Physical Unclonable Function (PUF)-Based Security in Internet of Things (IoT): Key Challenges and Solutions. Handbook of Computer Networks and Cyber Security 2020: 461-473
2010 – 2019
- 2019
- [j3]Muhammad Bilal, Muhammad Rizwan, Sajid Saleem, Muhammad Murtaza Khan, Mohammed Saeed Alkatheiri, Mohammed A. Alqarni:
Automatic Seizure Detection Using Multi-Resolution Dynamic Mode Decomposition. IEEE Access 7: 61180-61194 (2019) - [j2]Farah Naz, Muhammad Kamran, Waqar Mehmood, Wilayat Khan, Mohammed Saeed Alkatheiri, Ahmed S. Alghamdi, Abdulrahman A. Alshdadi:
Automatic identification of sarcasm in tweets and customer reviews. J. Intell. Fuzzy Syst. 37(5): 6815-6828 (2019) - [c10]Meznah A. Alamro, Yu Zhuang, Ahmad O. Aseeri, Mohammed Saeed Alkatheiri:
Examination of Double Arbiter PUFs on Security against Machine Learning Attacks. IEEE BigData 2019: 3165-3171 - [c9]Khalid T. Mursi, Yu Zhuang, Mohammed Saeed Alkatheiri, Ahmad O. Aseeri:
Extensive Examination of XOR Arbiter PUFs as Security Primitives for Resource-Constrained IoT Devices. PST 2019: 1-9 - [c8]Muhammad Murtaza Khan, Muhammad U. Ilyas, Sajid Saleem, Jalal S. Alowibdi, Mohammed Saeed Alkatheiri:
Emerging Computer Vision Based Machine Learning Issues for Smart Cities. RIIFORUM 2019: 315-322 - [c7]Muneeba Sirshar, Sajid Saleem, Muhammad U. Ilyas, Muhammad Murtaza Khan, Mohammed Saeed Alkatheiri, Jalal S. Alowibdi:
Big Data Dimensionality Reduction for Wireless Sensor Networks Using Stacked Autoencoders. RIIFORUM 2019: 391-400 - [i1]Rajakumar Arul, Gunasekaran Raja, Alaa Omran Almagrabi, Mohammed Saeed Alkatheiri, Sajjad Hussain Chauhdary, Ali Kashif Bashir:
A Quantum Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario. CoRR abs/1911.00692 (2019) - 2018
- [j1]Satish Anamalamudi, Abdur Rashid Sangi, Mohammed Saeed Alkatheiri, Ahmedin Mohammed Ahmed:
AODV routing protocol for Cognitive radio access based Internet of Things (IoT). Future Gener. Comput. Syst. 83: 228-238 (2018) - [c6]Ahmad O. Aseeri, Yu Zhuang, Mohammed Saeed Alkatheiri:
A Subspace Pre-learning Approach to Fast High-Accuracy Machine Learning of Large XOR PUFs with Component-Differential Challenges. IEEE BigData 2018: 1563-1568 - [c5]Ahmad O. Aseeri, Yu Zhuang, Mohammed Saeed Alkatheiri, Bipana Thapaliya:
LaHiIO: Accelerating Persistent Big Data Machine Learning via Latency Hiding IOs. IEEE BigData 2018: 2063-2070 - [c4]Ahmad O. Aseeri, Yu Zhuang, Mohammed Saeed Alkatheiri:
A Machine Learning-Based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things. ICIOT 2018: 49-56 - [d1]Ahmad O. Aseeri, Mohammed Saeed Alkatheiri, Yu Zhuang:
Physical Unclonable Functions. UCI Machine Learning Repository, 2018 - 2017
- [c3]Ahmad O. Aseeri, Yu Zhuang, Mohammed Saeed Alkatheiri:
A Memory Capacity-Aware Algorithm for Fast Clustering of Disk-Resident Big Datasets. DASC/PiCom/DataCom/CyberSciTech 2017: 194-201 - [c2]Mohammed Saeed Alkatheiri, Yu Zhuang, Mikhail Korobkov, Abdur Rashid Sangi:
An experimental study of the state-of-the-art PUFs implemented on FPGAs. DSC 2017: 174-180 - [c1]Mohammed Saeed Alkatheiri, Yu Zhuang:
Towards fast and accurate machine learning attacks of feed-forward arbiter PUFs. DSC 2017: 181-187
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint