


default search action
Taha Alfakih
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j21]Richa Gupta, Mansi Bhandari, Anhad Grover, Taher Al-Shehari
, Mohammed Kadrie, Taha Alfakih, Hussain Alsalman:
Correction: Predictive modeling of ALS progression: an XGBoost approach using clinical features. BioData Min. 18(1) (2025) - [j20]C. Madan Kumar, Mohammad S. Obaidat, Taher Al-Shehari
, Mohammed Kadrie, Taha Alfakih
, Hussain Alsalman, Ruhul Amin
:
Seamless healthcare access: An efficient solution to access medical data using Internet of Things based multimedia communication. Int. J. Commun. Syst. 38(3): nla (2025) - 2024
- [j19]Taher Al-Shehari
, Domenico Rosaci
, Muna S. Al-Razgan
, Taha Alfakih
, Mohammed Kadrie, Hammad Afzal
, Raheel Nawaz
:
Enhancing Insider Threat Detection in Imbalanced Cybersecurity Settings Using the Density-Based Local Outlier Factor Algorithm. IEEE Access 12: 34820-34834 (2024) - [j18]Hussain AlSalman
, Mabrook S. Al-Rakhami
, Taha Alfakih
, Mohammad Mehedi Hassan
:
Federated Learning Approach for Breast Cancer Detection Based on DCNN. IEEE Access 12: 40114-40138 (2024) - [j17]Zeeshan Anwar
, Hammad Afzal
, Taher Al-Shehari
, Muna S. Al-Razgan
, Taha Alfakih
, Raheel Nawaz
:
Mining the Opinions of Software Developers for Improved Project Insights: Harnessing the Power of Transfer Learning. IEEE Access 12: 65942-65955 (2024) - [j16]Anindya Nag
, Hirak Mondal
, Md. Mehedi Hassan
, Taher Al-Shehari
, Mohammed Kadrie
, Muna Al-Razgan
, Taha Alfakih
, Sujit Biswas, Anupam Kumar Bairagi
:
TumorGANet: A Transfer Learning and Generative Adversarial Network- Based Data Augmentation Model for Brain Tumor Classification. IEEE Access 12: 103060-103081 (2024) - [j15]Salah T. Alshammari
, Muna Al-Razgan
, Taha Alfakih
, Khalid A. AlGhamdi:
Building a Comprehensive Trust Evaluation Model to Secure Cloud Services From Reputation Attacks. IEEE Access 12: 150754-150775 (2024) - [j14]Hussain Alsalman
, Mabrook S. Al-Rakhami
, Taha Alfakih
, Mohammad Mehedi Hassan
:
Corrections to "Federated Learning Approach for Breast Cancer Detection Based on DCNN". IEEE Access 12: 162939 (2024) - [j13]Richa Gupta, Mansi Bhandari, Anhad Grover, Taher Al-Shehari, Mohammed Kadrie, Taha Alfakih
, Hussain Alsalman:
Predictive modeling of ALS progression: an XGBoost approach using clinical features. BioData Min. 17(1) (2024) - [j12]Mohammad Abdussami
, Sanjeev Kumar Dwivedi, Taher Al-Shehari
, P. Saravanan, Mohammed Kadrie, Taha Alfakih
, Hussain Alsalman, Ruhul Amin
:
DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation. Comput. Electr. Eng. 120: 109696 (2024) - [j11]Mohammed Zakariah
, Muna Al-Razgan, Taha Alfakih:
Skin cancer detection with MobileNet-based transfer learning and MixNets for enhanced diagnosis. Neural Comput. Appl. 36(34): 21383-21413 (2024) - [j10]C. Madan Kumar, Sanjeev Kumar Dwivedi, M. Brindha
, Taher Al-Shehari
, Taha Alfakih
, Hussain Alsalman, Ruhul Amin
:
REPACA: Robust ECC based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security. Peer Peer Netw. Appl. 17(6): 4264-4285 (2024) - [j9]Mohammed Zakariah
, Muna Al-Razgan, Taha Alfakih
:
Pathological voice classification using MEEL features and SVM-TabNet model. Speech Commun. 162: 103100 (2024) - [j8]Isha Pali, Mohammad Abdussami
, Ruhul Amin
, Taher Al-Shehari
, Muna Al-Razgan
, Taha Alfakih
:
S2DN: Design of robust authentication protocol with session key establishment in multi-controller based software-defined VANETs. Veh. Commun. 47: 100767 (2024) - 2023
- [j7]Taher Al-Shehari
, Muna S. Al-Razgan
, Taha Alfakih
, Rakan A. Alsowail, Saravanan Pandiaraj
:
Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm. IEEE Access 11: 118170-118185 (2023) - [j6]Mohammed Faisal, Mansour Alsulaiman, Mohamed Mekhtiche, Mohamed Abdelkader Bencherif, Mohammed Algabri, Tariq Bin Saleh Alrayes, Ghulam Muhammad, Hassan Mathkour, Wadood Abdul, Yousef A. Alohali, Muneer H. Al-Hammadi, Hamdi Altaheri, Taha Alfakih:
Enabling Two-Way Communication of Deaf Using Saudi Sign Language. IEEE Access 11: 135423-135434 (2023) - [j5]Mansour Alsulaiman, Mohammed Faisal, Mohamed Mekhtiche, Mohamed Bencherif, Tariq Bin Saleh Alrayes, Ghulam Muhammad, Hassan Mathkour, Wadood Abdul, Yousef A. Alohali, Mansour Alqahtani, Habib Al-Habib, Hassan Alhalafi, Mohammed Algabri, Muneer A. Al-Hammadi, Hamdi Altaheri, Taha Alfakih:
Facilitating the communication with deaf people: Building a largest Saudi sign language dataset. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101642 (2023) - 2022
- [j4]Muneer H. Al-Hammadi
, Mohamed Abdelkader Bencherif
, Mansour Alsulaiman, Ghulam Muhammad
, Mohamed Amine Mekhtiche, Wadood Abdul
, Yousef A. Alohali
, Tareq S. Alrayes, Hassan Mathkour, Mohammed Faisal, Mohammed Algabri, Hamdi Altaheri
, Taha Alfakih
, Hamid Ghaleb:
Spatial Attention-Based 3D Graph Convolutional Neural Network for Sign Language Recognition. Sensors 22(12): 4558 (2022) - 2021
- [j3]Taha Alfakih
, Mohammad Mehedi Hassan
, Muna S. Al-Razgan:
Multi-Objective Accelerated Particle Swarm Optimization With Dynamic Programing Technique for Resource Allocation in Mobile Edge Computing. IEEE Access 9: 167503-167520 (2021) - 2020
- [j2]Taha Alfakih
, Mohammad Mehedi Hassan
, Abdu Gumaei
, Claudio Savaglio
, Giancarlo Fortino
:
Task Offloading and Resource Allocation for Mobile Edge Computing by Deep Reinforcement Learning Based on SARSA. IEEE Access 8: 54074-54084 (2020)
2010 – 2019
- 2019
- [j1]Hashem Alayed, Fadl Dahan
, Taha Alfakih
, Hassan Mathkour, Mohammed Arafah:
Enhancement of Ant Colony Optimization for QoS-Aware Web Service Selection. IEEE Access 7: 97041-97051 (2019)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 00:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint